Digital Signature Overview

Do you still sign on paper ?
Go Paperless !!!
eSign from anywhere anytime with just an OTP

Digital Signature Certificates (DSC) or Digital Signature are being adopted by various government agencies and now is a statutory requirement in various applications.

What is DSC

In this recent time, many organizations are permitting the Digital Signature Certifications for various purposes and functional operations in their organizations. 

Digital Signature Certificates (DSC) or Digital Signature are being adopted by various government agencies and now is a permitted requirement in various applications.

We offer different classes of certificates to help organizations and individuals secure online transactions with legal validity as per the Indian IT Act


Types of Certificates

A digital signature certificate (DSC) contains information about the user’s name, pin code, country, email address, date of issuance of the certificate, and name of the certifying authority.

Signing

A digital signature certificate (DSC) contains information about the user’s name, pin code, country, email address, date of issuance of certificate and name of the certifying authority.

Encryption

Encrypt DSC can only be used to encrypt a document, it is popularly used in the tender portal, to help companies encrypt the documents and upload them. You could also use the certificate to encrypt and send classified information.

Sign & Encrypt

Sign & Encrypt DSC can be used for both signing and encrypting. It is convenient for users who need to secure and maintain the confidentiality of the information shared.

Validity of a Certificate

Certificates could be bought with a validity of up to two years. (The validity is controlled by law, and you cannot buy certificates more than three years and less than One year validity)

Classes of Certificates

CLASS III

Digital signatures certificates are applicable in environments with significant risks. However, the Class 3 Digital Signature Certificate is applicable to environments where threats to data and consequences of failure of security services are high, for instance, high-value transactions or high levels of fraud risk.