• Eimza token
    For citizens
    For individuals
    For legal entities
    For government organizations
  • E-signature
    E-imza kart
    For citizens
    18 AZN
    For individuals
    36 AZN
    For legal entities
    72 AZN
    For government organizations
    80 AZN
  • Call center
  • Legislation
    By the law of Azerbaijan Republic, the document signed with E-signature
    is equal to the document signed by hand

Frequently asked questions

1. What is an electronic signature?

In compliance with the legislation of the Republic of Azerbaijan, electronic documents signed with electronic signature are equal to documents signed by manual and certified with stamp.

E-signature is considered to be an effective solution for those who want to keep pace with the requirements in our time. Documents signed with electronic signatures can be delivered to necessary place within a few seconds. Despite the fact that all participants of the electronic documents are far away from each other, have they the same opportunities. When using the eSignature, documents have the same legal effect as documents created and signed in paper format.

2. Where is it possible to obtain electronic signature services?

Electronic signature services of NCSC can be obtained from Registration centers.

3. Which documents are required to obtain electronic signature card?

During applying to the Registration Centers each citizen wanting to get electronic signature card must submit ID card (driver’s license is not accepted as a document certifying personality)

4. What does “Time Stamp” mean?

“Time stamp” is certified affirmation granted by NCSC which means that this document was signed in a particular time. To this end the computer must be connected to the Internet. Thus, these processes should be carried out in on-line mode. Time Stamp must be used along with the eSignature confirming the time of signing a particular document.

5. What is authentication?

Use of authentication certificate granted by NCSC for user identification in electronic environment.

6. Can e-signature card be used abroad?

E-signature card can be used abroad as well.

7. What must I do when I lost my e-signature card, or my card is stolen, or forgot its identification code (PIN code) and PUK code?

You must call our Call Center (157). The number is shown on the back of the signature chip card. Certificates in the card will be blocked and their power will be suspended.

8. E-imza kartının Puk kodu var və mən Pinkodu unutmuşam, və ya Pin bloka düşübsə nə etməliyəm?

Start (Пуск) > All programs (Все программы) > Charismatics > Smart Security Interface > Smart Security Interface - daxil olaraq, açılan pəncərədə:

- PIN kodu unutmuşam: Change token PIN (Изменить Pin токена) bölməsində, Old PIN (Старый пин) qrafasına - PUK kodu daxil edirik, New PIN (Новый PIN) qrafasında - yeni pini daxil edirik, Repeat PIN (Подтверждение) qrafasında - təkrar yeni PIN daxil edirik və Change PIN (Сменить PIN) düyməsini sıxırıq

- PIN kodu bloka salmışam: Unlock PIN (Разблокировать PIN) bölməsində, SO PIN qrafasına - PUK kodu daxil edirik, New PIN (Новый PIN) qrafasında - yeni pini daxil edirik, Repeat PIN (Подтверждение) qrafasında - təkrar yeni PIN daxil edirik və Unlock PIN (Разблокировать PIN) düyməsini sıxırıq

9. Can I give another person the right to use my e-signature card?

As e-signature card belongs to a concrete person, so only he/she can put signature. Giving the card to another person and saying identification code (PIN code) to another person is considered serious case of violation.

10. What equipment is required important for use of electronic signature services?

Computer and card reader are important. Internet is also required for the use of “time stamp”.

11. Can two different persons sign a prepared document?

Of course, it is possible. No concrete number is shown.

12. Can a man have two e-signature cards - first as legal, second as natural person?

Yes, it is possible. A man can have as many certificates as he/she wishes.

13. If the document is prepared by different employees or the head of the enterprise can this document be signed on his/her computer (or on a few computers)?

Yes, signature can be put on any computer connected to the Internet and possessing software for e-signature and card reader (for time stamp).

14. If one side signs the document electronically another side signs it manually, is it considered authentic?

Such a combination is possible. In this case, it is necessary to officially register the electronic document in the listing and to confirm it. Only after that the document can survive in the form of paper.

15. On what operating systems does e-signature card reader work?

It was tested on Microsoft operating system.

16. Why does certificate have term of activity?

Certificate should have data nature and capacity of which is defined by minimum of RFC 2459 (Internet X.509 Public Key Infrastructure Certificate and CRL Profile) document. There may also be other information. For instance, postal address, etc. In a word, the certificate may contain any information which can be operated by NCSC.

Term of activity is defined for the issued certificate. For instance, it may be considered authentic for 3 years. When the time expires a new certificate is granted to its holder. Term of activity of the certificate depends a lot on information available in it. The more information the document contains, the less useful activity term it gets. It is associated with the fact that information may change, and it will be necessary to grant its holder a new certificate until term of activity of the old one expires. Besides that, any information in the certificate is public open. Thus, it becomes clear that it is necessary to include less information in the certificate as possible. Revocation of certificate is considered as part of the certification process. Before the expiry of certificate, there are many reasons for its revocation. For example, its holder has changed his/her workplace or lost electronic signature. In such cases the certificate should be revoked immediately. The basic aim is to protect it from random or ill-intentioned use.

17. Why are two keys necessary?

Unlike symmetric key encryption, two different keys are used for encoding and decoding of information in asymmetric systems that cannot be separated from each other.

One of the keys is used for encoding and the other for decoding. With public key activity principle of the system is based on the secret way of introduction of one-sided way functions.

The generation of keys is carried out by system user keeping the keys. In the future this key will be used for information decoding (private key), another key to be used for information encryption (public key), it is important that this key is used by everyone. As this key cannot be used for the dissemination of information, so it is of no use restricting its spreading.

Other users of the system can encode important information with the help of the public key of the person receiving the information, and no one can decode the content except the person who receives information. Thus, for this the important private key is only at the disposal of the person receiving the information.

In turn, public key algorithms provide higher level of confidentiality of keys. Thus, the private key of the person who receives information never leaves his/her personal information archive. In this connection, symmetric key algorithms are used in practice for personal information encryption, combination of both algorithms are used during dissemination of information encryption.

Unlike decoding, asymmetric systems of e-signature are based on private key for signature formation, and public key for its verification. Thus, signature holder keeps his/her key secret and nobody can sign the electronic document instead of him. At the same time with the help of public key someone can be sure of the validity of the signature and its authenticity.

  • Center’s services
  • Registration Centers
  • Contacts
  • Novelty
  • ISO 27001
  • Center certificates
  • Revoked certificates
  • Help and Support
  • FAQ
  • Instructions
  • Governing Bodies Center
  • E-government Center
  • Root center
  • Documents
  • How to get a certificate
  • Certificate Usage
  • Software for install
  • E-doc signer
  • E-cryptor
  • Certificate Policy
  • Certification Practice Statement
  • E-signer
  • Mobile ID
  • For citizens
  • For government organizations
  • For legal entities
  • Mobile ID
  • For owner entities
  • Root center
  • Governing bodies center
  • E-government center
  • Mobile ID center