FAQ
Premium Certificates

1.
What is a Premium Certificate?
A Premium Certificate is a certificate tailor-made for specific organizations for data protection purpose. The certificate service is so designed that it can be closely integrated with the existing business logics and operation workflows of applicants to ensure that users can be best protected by the latest PKI technology with minimual impact on their current business practices. It is supported by the same technology and operation Digi-Sign uses for its Recognized CA service ( i.e. ID-Certs). It provides the same level of assurance and best practice of certificate service as ID-Certs. Yet, its high level of flexibility allows it to be fitted into the business operation of different organizations.
   
2.
What is the difference between Electronic Signature and Digital Signature?
A digital signature refers to a signature which is supported by a recognized certificate and is created while the recognized certificate is still valid. Digi-Sign's ID-Certs are recognized certificates under the Electronic Transactions Ordinance in Hong Kong.

An electronic signature, on the other hand, refers to a signature that is created by electronic means and can be attached or logically attached to an electronic record for the purposes of identification, authentication and non-repudiation of approval intention. A Premium Certificate can provides Electronic Signatures for identification, authentication and non-repudiation of approval intention using the same technology and assurance as provided in Digi-Sign's ID Certs.

Under the current Electronic Transactions (Amendment) Ordinance 2004 , digital signatures could be applied for electronic transactions related to the government, while Electronic Signatures could be applied for electronic transactions between non-government organizations and/or individuals.
   
3. How is the Premium Certificate used in the market?
Organizations can apply for Premium Certificates to provide confidentiality, integrity and non-repudiation protection for their electronic transactions and communication in the cyberspace. Some application examples are as follows:
-
Second factor authentication for e-banking , e-procurement , or other trade services
- Electronic Signatures for electronic records and transactions which required legal binding support
- Identification solutions for application with user community both local and overseas
   

Back Back to top