Nexus personal Installing Nexus Personal software install

  • Top
  • Security(11)
1. Security instructions for users of ONE FOR ALL smart cards / USB keys

Featured In digital business, the level of security is highly dependent on applying due care and diligence and on the storage media on which the digital certificate holder stores their private key. At the moment, the highest security is provided by smart cards / USB…

Read more
2. Data Protection Policy

Data Protection Policy V1, valid from May 25, 2018 Read more

Read more
3. Relevant regulations and legislation

Halcom CA operates in accordance with law and regulations:REGULATION (EU) No 910/2014 OF THE EUROPEAN PARLIAMENT AND OF THE COUNCIL of 23 July 2014 on electronic identification and trust services for electronic transactions in the internal market and repealing…

Read more
4. Terminological dictionary

Certification Authority (CA) The CA (an agency for certification) is a legal entity that is authorised to issue digital certificates or provide other services related to authentication and electronic signatures. Certification Practice Statement (CPS) The…

Read more
5. Certification Authority and Registration Authorities

The Certification Authority (CA) plays the central role in the public key infrastructure. It represents an institution that enjoys the trust of all users of digital certificates and signatures. The CA receives requests for issuing digital certificates, performs…

Read more
6. Smart card / USB key

Smart cards / USB keys are at the moment the most secure technology for storing qualified digital certificates. A smart card / USB key is a “small computer” designed using cryptographic circuitry. The private key is safely stored on the card / USB key…

Read more
7. What is the difference between a public and a private key?

Each qualified certificate holder has a pair of keys, the private and the public key. The private key allows the generation of a digital signature that is unique to each holder, while the public key is available to anyone. A document is digitally signed using…

Read more
8. Public key infrastructure

In electronic business, the system for using the security methods based on asymmetric cryptography is called the Public Key Infrastructure (PKI). The PKI is determined by procedures and equipment for: key generation and storage certifying key holders and…

Read more
9. Digital signature security

The level of security depends on the storage media on which the digital certificate holder stores their private key. At the moment, the highest security is provided by smart cards, whose main advantage is that the private key never leaves the card and the…

Read more
10. Cryptography

Throughout history, cryptography has been dealing with the problem of how to conceal a message from other groups of people. Cryptography or encryption is the process of converting readable text (plaintext) into unreadable text (ciphertext), which is very…

Read more
© 2018 - Data Protection Policy
Powered by PROGMBH