• Address:

    5 Vallabh Complex, Vijay Park, Ahmedabad.

  • Mail us:

    info@mtokens.in

  • Become a Partner

Upgrade Token

Main Product Image
Product Thumbnail 1 Product Thumbnail 2 Product Thumbnail 3 Product Thumbnail 4

Token Upgrade Information

Older mTokens have a limited upgrade path.
While some older tokens can be updated to an intermediate CSP version, this does not guarantee compliance with the latest security standards.

To ensure full compliance with the current CCA guidelines and avoid any service interruptions, purchasing a new, certified token is the most reliable solution.


Buy New mToken

Longmai's mToken Upgrade


As per new CCA Guidelines issued for Tokens and other PKI Device is now effective. All PKI USB Token and devices must follow the new security guidelines and advisory of CCA, so you must have to upgrade your Old Longmai's mToken / Auto USB Tokens to newly upgraded Longmai's mToken/ Auto with CSP - Cryptographic Service Provider Version 2.0 so that you could use it for downloading Digital Signature Certificates of all types. This guideline must also implement to other PKI devices and USB Tokens such as Longmai's mToken, ePass 2003 Auto, TrustKey, Aladdin SafeNet, WatchData, mToken, Proxkey, Gemalto, etc.


As per new CCA guidelines, “Security Requirements for Crypto Devices”, Version 1.0, coming in effect from 01 July 2018, crypto devices, including Longmai's mToken, are upgrading to implement new regulations.


Kindly update CSP version of all your stored / old Longmai's mToken USB Tokens to v2.0 as v1.0 will not work from now onwards. If you have already an old token Longmai's mToken and following queries in mind when you are at the right place before downloading Digital Signature Certificate.


Notes :

◉ Please remember that only Token Upgrade no token will be shipped
◉ EAfter Upgradation Digital Signature Certificate will be removed as it will get formatted
◉ Upgrade / Update Token – CCA Guidelines Security Requirements for Crypto Devices

Supported Algorithms

◉ RSA ◉ EDSA ◉ AES ◉ SHA-1/256/384/512 ◉ T-DES

Certifications

◉ FIPS-140-2 Level 3 validation ◉ Cert #3602

API/Protocols

◉ Microsoft CAPI, CNG ◉ EPKCS#11 V2.20 ◉ Microsoft Smart Card Minidriver ◉ PC/SC, CCID ◉ SSL v3 ◉ IPSec/IKE

ADVANTAGES OF FIPS VALIDATION


The Federal Information Processing Standard (FIPS 140-2) specifies the security requirements that will be satisfied by a cryptographic module. It provides four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module include a number of important specifications such as ports, interfaces, authentication, physical security, cryptographic key management, design assurance, attack mitigation, and more.

FIPS creates a uniform level of security for all federal agencies in order to protect what's categorized as sensitive but unclassified information: electronic data not classified as secret or higher, which makes up a large portion of the data around. All products that are validated under this standard have undergone rigorous testing and development.

Because of their highly assured level of security and because they meet such a broad spectrum of security requirements, FIPS 140-2 validated security products are widely accepted by government agencies, banks, enterprises worldwide.