-
Address:
5 Vallabh Complex, Vijay Park, Ahmedabad.
-
Mail us:
info@mtokens.in
- Become a Partner
Token Upgrade Information
Older mTokens have a limited upgrade path.
While some older tokens can be updated to an intermediate CSP version, this does not
guarantee compliance with the latest security standards.
To ensure full compliance with the current CCA guidelines and avoid any service interruptions, purchasing a new, certified token is the most reliable solution.
Buy New mToken
Longmai's mToken Upgrade
As per new CCA Guidelines issued for Tokens and other PKI Device is now effective. All PKI USB Token and devices must follow the new security guidelines and advisory of CCA, so you must have to upgrade your Old Longmai's mToken / Auto USB Tokens to newly upgraded Longmai's mToken/ Auto with CSP - Cryptographic Service Provider Version 2.0 so that you could use it for downloading Digital Signature Certificates of all types. This guideline must also implement to other PKI devices and USB Tokens such as Longmai's mToken, ePass 2003 Auto, TrustKey, Aladdin SafeNet, WatchData, mToken, Proxkey, Gemalto, etc.
As per new CCA guidelines, “Security Requirements for Crypto Devices”, Version 1.0, coming in effect from 01 July 2018, crypto devices, including Longmai's mToken, are upgrading to implement new regulations.
Kindly update CSP version of all your stored / old Longmai's mToken USB Tokens to v2.0 as v1.0 will not work from now onwards. If you have already an old token Longmai's mToken and following queries in mind when you are at the right place before downloading Digital Signature Certificate.
Notes :
◉ Please remember that only Token Upgrade no token will be shipped
◉ EAfter
Upgradation Digital Signature Certificate will be removed as it will get formatted
◉
Upgrade / Update Token – CCA Guidelines Security Requirements for Crypto Devices
Certifications
◉ FIPS-140-2 Level 3 validation ◉ Cert #3602
API/Protocols
◉ Microsoft CAPI, CNG ◉ EPKCS#11 V2.20 ◉ Microsoft Smart Card Minidriver ◉ PC/SC, CCID ◉ SSL v3 ◉ IPSec/IKE
ADVANTAGES OF FIPS VALIDATION
The Federal Information Processing Standard (FIPS 140-2) specifies
the security requirements that will be satisfied by a cryptographic module. It provides
four increasing, qualitative levels intended to cover a wide range of potential
applications and environments. The areas covered, related to the secure design and
implementation of a cryptographic module include a number of important specifications
such as ports, interfaces, authentication, physical security, cryptographic key
management, design assurance, attack mitigation, and more.
FIPS creates a uniform
level of security for all federal agencies in order to protect what's categorized as
sensitive but unclassified information: electronic data not classified as secret or
higher, which makes up a large portion of the data around. All products that are
validated under this standard have undergone rigorous testing and
development.
Because of their highly assured level of security and because they
meet such a broad spectrum of security requirements, FIPS 140-2 validated security
products are widely accepted by government agencies, banks, enterprises worldwide.

Supported Algorithms
◉ RSA ◉ EDSA ◉ AES ◉ SHA-1/256/384/512 ◉ T-DES