• Shop No. 5, 1st Floor, Vallabh Vihar Park,
    Near Bhagirath Bungalows, Vijay Park BRTS,
    Ahmedabad, Gujarat - 382345, India

  • Mail us:

    info@proxkeytoken.in

  • Become a Partner

Reset Token

Main Product Image
Product Thumbnail 1 Product Thumbnail 2 Product Thumbnail 3 Product Thumbnail 4

Reset PROXKey Token

150 Rs69 Rs

1) Insert Token in your System.
2) Download unlock utility.


Buy Now

PROXKey Unlock


To reset the token pin please provide the serial number of the locked USB token. We will generate the unlock code using the serial number.

USB crypto tokens generally ask to input the pin to access the certificate. It is meant to restrict unauthorized access to one DSC. But sometimes the user, himself, forget the pin. In this situation, we provide unlock pin. It is the process where unique code is generated using a serial number of the token.

Please download the Remote Unlock Client from link : Download

To unlock a CSP 1.0 PROXKey token, it must be upgraded to the newest CSP version. You can apply for upgrading the token CSP version here. Once CSP is upgraded, you can follow the above-mentioned process to unlock the token.

However, sometimes upgrading the CSP version might damage the digital signature certificate available inside it. Some certifying authorities allow re-download of digital signatures.


Notes :

◉ Please remember that only Token Upgrade no token will be shipped
◉ EAfter Upgradation Digital Signature Certificate will be removed as it will get formatted
◉ Upgrade / Update Token – CCA Guidelines Security Requirements for Crypto Devices

proxkey token for dsc
Supported Algorithms

◉ RSA ◉ EDSA ◉ AES ◉ SHA-1/256/384/512 ◉ T-DES

How To Download DSC
Certifications

◉ FIPS-140-2 Level 3 validation ◉ Cert #3602

eMudhra DSC Token
API/Protocols

◉ Microsoft CAPI, CNG ◉ EPKCS#11 V2.20 ◉ Microsoft Smart Card Minidriver ◉ PC/SC, CCID ◉ SSL v3 ◉ IPSec/IKE

ADVANTAGES OF FIPS VALIDATION


The Federal Information Processing Standard (FIPS 140-2) specifies the security requirements that will be satisfied by a cryptographic module. It provides four increasing, qualitative levels intended to cover a wide range of potential applications and environments. The areas covered, related to the secure design and implementation of a cryptographic module include a number of important specifications such as ports, interfaces, authentication, physical security, cryptographic key management, design assurance, attack mitigation, and more.

FIPS creates a uniform level of security for all federal agencies in order to protect what's categorized as sensitive but unclassified information: electronic data not classified as secret or higher, which makes up a large portion of the data around. All products that are validated under this standard have undergone rigorous testing and development.

Because of their highly assured level of security and because they meet such a broad spectrum of security requirements, FIPS 140-2 validated security products are widely accepted by government agencies, banks, enterprises worldwide.