Certifying Authority(CA)

Public-key Infrastructure (PKI)

Digital Identity profiles Computer Services Ltd’s digital representation with unique descriptive data to facilitate electronic authentication in the digital world. Electronic authentication is the process of proving the validity of user identities presented electronically. Identity authentication is at the heart of online security. Online security requirements also revolve around the need to preserve the confidentiality and the integrity of information and the non-repudiation of transactions. Among variety of security measures with different strength and efficiency, Public Key Cryptography can address most security requirements for securing online environment. PKI sets legal and technological framework for implementing Public Key Cryptography in order to ensure trustworthy electronic transactions promoting e-procurement, e-commerce, e-business and e-government. PKI also secures organizational electronic workflow (e.g. file sharing) and personal online communications (e.g. secure mailing).

Digital Certificate

A Digital Certificate (DC) or public key certificate is an electronic document considered as a digital Identity that binds a Public Key with an identity – information such as the name of a person or an organization, their address, and so forth. A person can present a Digital Certificate electronically to prove his identity or his right to access information or services online.

Digital Certificates are also used to digitally sign and encrypt documents or information. Thus, digital certificates ensure authenticity, integrity and confidentiality of documents along with assuring Computer Services Ltd’s digital identity. Apart from security aspect, digitally signed documents using a recognized and trusted digital certificate guarantees the legal validity of electronic documents like paper based signed documents.

The client needs a provision for use of Digital Certificate for signing and encrypting different types of documents. In order to do so the user system must have the facility for the use of Digital Certificates. This is acquired through a process of PKI enablement. The enablement involves introduction of some features in the client system and creating a process for placing the digital signature at prescribed positions on the forms or other documents. Signature of more than one person is possible where necessary. The verification of the sender is also carried out with this enablement.

The digital certificates may be kept in the browser where it is downloaded and signing is to be done from there. There is a key store that takes care of keeping the digital certificate along with private key. The digital certificates may also be kept in a crypto token and used as necessary.

The validity of the Digital Certificates is checked from a CRL (Certificate Revocation List). This is a list of certificates that have been revoked.

Why Digital Certificate should be trusted

Digital certificate is issued by a trusted party known as a Certifying Authority (CA) according to law, standards and policies se by the Government. A CA issues Digital Certificates to the applicants after being satisfied about the authenticity of the identity of the applicant. A CA attests its digital signature on the Digital Certificates to make it forgery resistant.

Computer Services LtdĀ  is a trusted Certifying Authority licensed by the office of the Controller of Certifying Authorities (CCA), Bangladesh under the Ministry of Information and Communication Technology, Bangladesh following the enactment of Bangladesh ICT ACT 2006 and Bangladesh IT CA Rules 2010. Digital Certificates issued by Computer Services Ltd is in compliance with the cryptographic and interoperability standards and policies set by CCA Bangladesh. Security process of Computer Services Ltd is implemented adopting international standard practice and technology, so that we can provide Bangladesh/overseas customer most secure technology advance Digital Certificate.

000-017   000-080   000-089   000-104   000-105   000-106   070-461   100-101   100-105  , 100-105  , 101   101-400   102-400   1V0-601   1Y0-201   1Z0-051   1Z0-060   1Z0-061   1Z0-144   1z0-434   1Z0-803   1Z0-804   1z0-808   200-101   200-120   200-125  , 200-125  , 200-310   200-355   210-060   210-065   210-260   220-801   220-802   220-901   220-902   2V0-620   2V0-621   2V0-621D   300-070   300-075   300-101   300-115   300-135   3002   300-206   300-208   300-209   300-320   350-001   350-018   350-029   350-030   350-050   350-060   350-080   352-001   400-051   400-101   400-201   500-260   640-692   640-911   640-916   642-732   642-999   700-501   70-177   70-178   70-243   70-246   70-270   70-346   70-347   70-410   70-411   70-412   70-413   70-417   70-461   70-462   70-463   70-480   70-483   70-486   70-487   70-488   70-532   70-533   70-534   70-980   74-678   810-403   9A0-385   9L0-012   9L0-066   ADM-201   AWS-SYSOPS   C_TFIN52_66   c2010-652   c2010-657   CAP   CAS-002   CCA-500   CISM   CISSP   CRISC   EX200   EX300   HP0-S42   ICBB   ICGB   ITILFND   JK0-022   JN0-102   JN0-360   LX0-103   LX0-104   M70-101   MB2-704   MB2-707   MB5-705   MB6-703   N10-006   NS0-157   NSE4   OG0-091   OG0-093   PEGACPBA71V1   PMP   PR000041   SSCP   SY0-401   VCP550