-
Shop No. 5, 1st Floor, Vallabh Vihar Park,
Near Bhagirath Bungalows, Vijay Park BRTS,
Ahmedabad, Gujarat - 382345, India -
Mail us:
info@proxkeytoken.in
- Become a Partner
Upgrade Not Possible
Older Proxkey tokens cannot be upgraded to the latest CSP
version.
The upgrade path for these tokens is limited and may not support the newest
standards, depending on the specific hardware.
For full compliance with the latest CCA guidelines, purchasing a new token is the only viable option.
Buy New Token
PROXKey Token Upgrade
FIPS 140-2 Level 3 Certified
As per new CCA guidelines,
“Security Requirements for Crypto Devices”, Version 1.0, coming in effect from 01 July
2018, crypto devices, including WD ProxKey Tokens, are upgrading to implement new
regulations.
Upgrade Process
Its is recommended to UNINSTALL the existing ProxKey drivers before using this utility Install the ProxKey Offline Upgrade Utility and open Icon from desktop & Connect your token
ProxKey has upgraded its new CSP to meet the new CCA Guidlines ‘ Security Requirements for Crypto Devices’. Existing stocks tokens will require update to to download new Certificate from July 1, 2018. Token in which certificate is already downloaded before July 1, 2018 will continue to work for all normal functions (Except downloading of new certificate)
Important Point :New CSP (For Certificate download) : PROXKey CSP India V2.0
Notes :
◉ Please remember that only Token Upgrade no token will be shipped
◉ EAfter
Upgradation Digital Signature Certificate will be removed as it will get formatted
◉
Upgrade / Update Token – CCA Guidelines Security Requirements for Crypto Devices
Certifications
◉ FIPS-140-2 Level 3 validation ◉ Cert #3602
API/Protocols
◉ Microsoft CAPI, CNG ◉ EPKCS#11 V2.20 ◉ Microsoft Smart Card Minidriver ◉ PC/SC, CCID ◉ SSL v3 ◉ IPSec/IKE
ADVANTAGES OF FIPS VALIDATION
The Federal Information Processing Standard (FIPS 140-2) specifies
the security requirements that will be satisfied by a cryptographic module. It provides
four increasing, qualitative levels intended to cover a wide range of potential
applications and environments. The areas covered, related to the secure design and
implementation of a cryptographic module include a number of important specifications
such as ports, interfaces, authentication, physical security, cryptographic key
management, design assurance, attack mitigation, and more.
FIPS creates a uniform
level of security for all federal agencies in order to protect what's categorized as
sensitive but unclassified information: electronic data not classified as secret or
higher, which makes up a large portion of the data around. All products that are
validated under this standard have undergone rigorous testing and
development.
Because of their highly assured level of security and because they
meet such a broad spectrum of security requirements, FIPS 140-2 validated security
products are widely accepted by government agencies, banks, enterprises worldwide.

Supported Algorithms
◉ RSA ◉ EDSA ◉ AES ◉ SHA-1/256/384/512 ◉ T-DES