-
Address:
5 Vallabh Complex, Vijay Park, Ahmedabad.
-
Mail us:
info@mtokens.in
- Become a Partner
Reset Longmai's mToken
1) Auto plug and play- no cd required for driver installation
2) Connectivity: USB 2.0 full speed, Connector type A
3) FIPS 140-2 Level 3 certified hardware encryption
4) Laser printed serial number on each mtoken
5) Supported STS: 32bit and 64bit Windows XP SP3, Server 2003, Vista, Server 2008,
Seven, Eight, 32bit and 64bit Linux and MAC OS X
Buy Now
Longmai's mToken Unlock
To reset the token pin please provide the serial number of the locked USB token. We will generate the unlock code using the serial number.
USB crypto tokens generally ask to input the pin to access the certificate. It is meant to restrict unauthorized access to one DSC. But sometimes the user, himself, forget the pin. In this situation, we provide unlock pin. It is the process where unique code is generated using a serial number of the token.
Please download the Remote Unlock Client from link : Download
To unlock a CSP 1.0 Century Longmai's mToken, it must be upgraded to the newest CSP version. You can apply for upgrading the token CSP version here. Once CSP is upgraded, you can follow the above-mentioned process to unlock the token.
However, sometimes upgrading the CSP version might damage the digital signature certificate available inside it. Some certifying authorities allow re-download of digital signatures.
Notes :
◉ Please remember that only Token Upgrade no token will be shipped
◉ EAfter
Upgradation Digital Signature Certificate will be removed as it will get formatted
◉
Upgrade / Update Token – CCA Guidelines Security Requirements for Crypto Devices
Certifications
◉ FIPS-140-2 Level 3 validation ◉ Cert #3602
API/Protocols
◉ Microsoft CAPI, CNG ◉ EPKCS#11 V2.20 ◉ Microsoft Smart Card Minidriver ◉ PC/SC, CCID ◉ SSL v3 ◉ IPSec/IKE
ADVANTAGES OF FIPS VALIDATION
The Federal Information Processing Standard (FIPS 140-2) specifies
the security requirements that will be satisfied by a cryptographic module. It provides
four increasing, qualitative levels intended to cover a wide range of potential
applications and environments. The areas covered, related to the secure design and
implementation of a cryptographic module include a number of important specifications
such as ports, interfaces, authentication, physical security, cryptographic key
management, design assurance, attack mitigation, and more.
FIPS creates a uniform
level of security for all federal agencies in order to protect what's categorized as
sensitive but unclassified information: electronic data not classified as secret or
higher, which makes up a large portion of the data around. All products that are
validated under this standard have undergone rigorous testing and
development.
Because of their highly assured level of security and because they
meet such a broad spectrum of security requirements, FIPS 140-2 validated security
products are widely accepted by government agencies, banks, enterprises worldwide.

Supported Algorithms
◉ RSA ◉ EDSA ◉ AES ◉ SHA-1/256/384/512 ◉ T-DES