Frequently Asked Questions

Here are the answers to the most frequently asked questions we receive. You can also contact us
through the form given below and our team will get back to you surely and speedily!

Questions ?

DSC i.e. Digital Signature Certificates are like a digital equivalent of a paper/physical certificate. An example of a physical certificate would be a driver's license. They work like paper certificates with the manual signatures, it's just that the digital signatures are affixed digitally on digital documents and provide an array of benefits extra than the traditional form of signing.

PKI (or Public Key Infrastructure) is a solid framework of encryption and cybersecurity that safeguard your communication between the server(your website) and the client (the user). It generally includes the involvement of two keys: a public key and a private key. The Public key is available for every user that wants to connect with the website. Whereas, the private key is a unique key generated when a connection is made and the user wants to keep the connection a secret.

Certifying Authorities are licensed bodies which facilitate digital signature certificates. Certifying authorities are regulated by the Controller of Certifying Authorities (CCA), a government of India endeavor. They are licensed to issue, revoke, renew and cache digital signature certificates. Subscriber Agreement is an agreement between a subscriber and a Certifying Authority for the provision of designated public certification services in accordance with a Certification Practice Statement. A key agreement protocol is a secure and convenient mode for two or more parties to resolve upon a key to be used for a secret ­key cryptography. It is also referred to as key exchange protocol.

It is the mechanism used to check the validity of the digital signature certificate, every time a digital signature certificate is used to sign a transaction. This ensures that the certificate has not been revoked or expired. One can validate a certificate by using one of these mechanisms; CRL, OCSP or CAM

Public Key Infrastructure protects the information shared from one party to another from getting traced or altered. PKI secures sensitive electronic information as it passes back and forth between two different parties and provides each party with a key to encrypt and decrypt the digital data. Whenever you pick this two-key encryption system, your information gets stored in the encrypted form and can be decrypted only by using the dedicated key shared by the DSC holder to the person he wants to share information with.
Other Question ?