-
Address:
5 Vallabh Complex, Vijay Park, Ahmedabad.
-
Mail us:
info@mtokens.in
- Become a Partner
Upgrade Longmai's mToken
1) Auto plug and play- no cd required for driver installation
2) Connectivity: USB 2.0 full speed, Connector type A
3) FIPS 140-2 Level 3 certified hardware encryption
4) Laser printed serial number on each Longmai's mToken
5) Supported STS: 32bit and 64bit Windows XP SP3, Server 2003, Vista, Server 2008, Seven, Eight, 32bit and 64bit Linux and MAC OS X
Buy Now
Longmai's mToken Upgrade
As per new CCA Guidelines issued for Tokens and other PKI Device is now effective. All PKI USB Token and devices must follow the new security guidelines and advisory of CCA, so you must have to upgrade your Old Longmai's mToken / Auto USB Tokens to newly upgraded Longmai's mToken/ Auto with CSP - Cryptographic Service Provider Version 2.0 so that you could use it for downloading Digital Signature Certificates of all types. This guideline must also implement to other PKI devices and USB Tokens such as Longmai's mToken, ePass 2003 Auto, TrustKey, Aladdin SafeNet, WatchData, mToken, Proxkey, Gemalto, etc.
As per new CCA guidelines, “Security Requirements for Crypto Devices”, Version 1.0, coming in effect from 01 July 2018, crypto devices, including Longmai's mToken, are upgrading to implement new regulations.
Kindly update CSP version of all your stored / old Longmai's mToken USB Tokens to v2.0 as v1.0 will not work from now onwards. If you have already an old token Longmai's mToken and following queries in mind when you are at the right place before downloading Digital Signature Certificate.
Notes :
◉ Please remember that only Token Upgrade no token will be shipped
◉ EAfter Upgradation Digital Signature Certificate will be removed as it will get formatted
◉ Upgrade / Update Token – CCA Guidelines Security Requirements for Crypto Devices
Certifications
◉ FIPS-140-2 Level 3 validation ◉ Cert #3602
API/Protocols
◉ Microsoft CAPI, CNG ◉ EPKCS#11 V2.20 ◉ Microsoft Smart Card Minidriver ◉ PC/SC, CCID ◉ SSL v3 ◉ IPSec/IKE
ADVANTAGES OF FIPS VALIDATION
The Federal Information Processing Standard (FIPS 140-2) specifies the security requirements that will be satisfied by a cryptographic module. It provides four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module include a number of important specifications such as ports, interfaces, authentication, physical security, cryptographic key management, design assurance, attack mitigation, and more.
FIPS creates a uniform level of security for all federal agencies in order to protect what's categorized as sensitive but unclassified information: electronic data not classified as secret or higher, which makes up a large portion of the data around. All products that are validated under this standard have undergone rigorous testing and development.
Because of their highly assured level of security and because they meet such a broad spectrum of security requirements, FIPS 140-2 validated security products are widely accepted by government agencies, banks, enterprises worldwide.
Supported Algorithms
◉ RSA ◉ EDSA ◉ AES ◉ SHA-1/256/384/512 ◉ T-DES