Century Longmai – Digital Security Logo Century Longmai – Digital Security Retina Logo Century Longmai – Digital Security Sticky Logo Century Longmai – Digital Security Sticky Logo Retina
  • PRODUCTSLongmai product portfolio
    • mToken PKI Authentication
      • mToken CryptoID-FIPS Token
      • mToken K1-HID Token
      • mToken K2-CCID Token
      • mToken K3-Auto Plug & Play Token
      • mToken K5-Mobile PKI Token
      • mToken K9-Bio Token
      • mToken UKey
      • mToken TF-Smart Card MicroSD
    • mLock Software Protection
      • mLock X1-Smart STD
      • mLock X3–Smart Code
      • mLock X5-Supporting Linux OS
      • mLock Smart UDisk
      • mLock Time
    • mOTP Authentication Token
      • mOTP m100
      • mOTP m200
      • mOTP m300
    • meDocs e-Document Management
      • meDocs-M
      • meDocs-P
    • mCard Smart Card
      • mCard CPK
      • mCard JavaCard
    • mReader Smart Card Reader
      • mReader W100
    • mFIDO FIDO Authentication
      • mFIDO U2
      • mFIDO U4
    • mNFC NFC Readers
      • mNFC N100
      • mNFC N200
  • SOLUTIONS & SERVICES
    • Identity & Access
      • Access Control
      • License Control
      • mCard CPK solution
      • Online IA
    • Government
      • eDocument Security
      • eHealthCare
      • Online Gaming Security
      • Wireless Digital Signature
    • Financial
      • eBanking
      • eCommerce
      • Mobile Payment
    • Personal e-Document Security
    • ODM/OEM Services
  • ABOUT US
    • Who We Are
    • What We Do
    • Who We Work With
    • Contact Info
    • Corporate Program
    • Jobs/Careers
    • FAQs
    • Press Release
    • Technologies
      • Bluetooth LE
      • BYOD
      • Cryptography
      • Glossary Terms
      • mCard Java Card
      • Internet of Things
      • One Time Password
      • Other Technologies
  • PRODUCTSLongmai product portfolio
    • mToken PKI Authentication
      • mToken CryptoID-FIPS Token
      • mToken K1-HID Token
      • mToken K2-CCID Token
      • mToken K3-Auto Plug & Play Token
      • mToken K5-Mobile PKI Token
      • mToken K9-Bio Token
      • mToken UKey
      • mToken TF-Smart Card MicroSD
    • mLock Software Protection
      • mLock X1-Smart STD
      • mLock X3–Smart Code
      • mLock X5-Supporting Linux OS
      • mLock Smart UDisk
      • mLock Time
    • mOTP Authentication Token
      • mOTP m100
      • mOTP m200
      • mOTP m300
    • meDocs e-Document Management
      • meDocs-M
      • meDocs-P
    • mCard Smart Card
      • mCard CPK
      • mCard JavaCard
    • mReader Smart Card Reader
      • mReader W100
    • mFIDO FIDO Authentication
      • mFIDO U2
      • mFIDO U4
    • mNFC NFC Readers
      • mNFC N100
      • mNFC N200
  • SOLUTIONS & SERVICES
    • Identity & Access
      • Access Control
      • License Control
      • mCard CPK solution
      • Online IA
    • Government
      • eDocument Security
      • eHealthCare
      • Online Gaming Security
      • Wireless Digital Signature
    • Financial
      • eBanking
      • eCommerce
      • Mobile Payment
    • Personal e-Document Security
    • ODM/OEM Services
  • ABOUT US
    • Who We Are
    • What We Do
    • Who We Work With
    • Contact Info
    • Corporate Program
    • Jobs/Careers
    • FAQs
    • Press Release
    • Technologies
      • Bluetooth LE
      • BYOD
      • Cryptography
      • Glossary Terms
      • mCard Java Card
      • Internet of Things
      • One Time Password
      • Other Technologies

Government Electronic Office Solution

Currently, the extra-net applications of E-government systems run by government authorities have gone beyond simple government information publication and are beginning to provide, by electronic means, services like online office, online approval and document circulation. When government officials are on business trips or outside the office, they may expect to access  the government network securely and easily as if they were in the office, so that they can deal with their routine jobs easily and securely.

The needs of government authorities for mobile officing are expanding quickly but unlike enterprises, the most important concern of government authorities lies in the security. In order to ease government authorities from their security concerns, a secure technology support platform will be indispensable for E-government office systems.

Current situation

The control on identity and authority of E-government users at all levels is primarily realized by the identification authentication mechanism. However, the identity authentication mechanisms currently available are mostly based on static password, which exposes the user account information to the following risks: theft, guessing, borrowing, monitoring, re-transmission and interception. They are the major causes for system attack, information loss or unauthorized use. That is because the biggest problem with authentication mechanism based on static password is that the password may be intercepted and reused and this is also the focus of all safety issues.

Century Longmai Solution

Longmai Identity authentication system has taken sufficient consideration of the actual needs of E-government systems and adopts high-intensity authentication mechanism to verify the validity of users. Only authenticated users have access to the system, so it can ensure, to a large extent, that users logged in to the systems are authorized individuals, and hence significantly reduces the risks of attacks and unauthorized access.

Solution Benefits

  • In the data transmission process, the server-side E-government system communicates with Longmai identity authentication servers via an encrypted channel, which ensures the security in data transmission process.
  • During the authentication process at the  E-government server side, the principles and logics of the E-government system will be affected, so data in the E-government system will be secure. The identity authentication server farm is not exposed to public network and a mutual authentication mechanism is used in the communication between the server farm and the application servers, so as to ensure that the authentication process will not be bypassed.
Copyright © 2013 - Century Longmai. All Rights Reserved Privacy Terms | 中文网站