3D Digital Signer Services provides Digital Signature Certificates (DSC) through Controller of Certifying Authorities (CCA), Govt. of India, licensed Certifying Authorities (CA). A digital signature is an electronic form of a signature that can be used to authenticate the identity of the sender of a message or the signer of a document, and also ensure that the original content of the message or document that has been sent is unchanged.
Digital Signature Certificate can be presented electronically to prove your identity, to access information or services on the Internet or to sign certain documents digitally. A Digital Signature Certificate authenticates your identity electronically. It also provides you with a high level of security for your online transactions by ensuring absolute privacy of the information exchanged using a digital certificate. You can use certificates to encrypt information such that only the intended recipient can read it. You can digitally sign information to assure the recipient that it has not been changed in transit, and also verify your identity as the sender of the message.
Digital Signature Certificate features are mentioned below:
- Explicitly associates the identity of an individual/device with a pair of electronic keys - public and private keys - and this association is endorsed by the CA.
- The certificate contains information about a user's identity (for example, their name, pin code, country, email address, the date the certificate was issued and the name of the Certifying Authority that issued it).
- These keys complement each other in that one does not function in the absence of the other. They are used by browsers and servers to encrypt and decrypt information regarding the identity of the certificate user during information exchange processes.
- The private key is stored on the user's computer hard disk or on an external device such as a token. The user retains control of the private key; it can only be used with the issued password.
- The public key is disseminated with the encrypted information. The authentication process fails if either one of these keys in not available or do not match. This means that the encrypted data cannot be decrypted and therefore, is inaccessible to unauthorized parties.