Application Security2020-01-28T09:56:30+00:00

DigiPay: A foolproof platform for digital transactions

DigiPay.Guru has a top-notch security as we have used cutting-edge technology that keeps all its transactions safe from any potential threat.

digital-wallet-application-security-banner-img

Application Security

DigiPay.Guru platform supports and utilizes unique user IDs along with secure authentication for all kind of access whether it’s administrative access or access to service authentication data. Secure authentication is imposed to all the accounts generated and managed by application.

Login and password management

DigiPay.Guru platform assigns unique IDs for all the user accounts. It enforces the process of login and management for various interfaces through completion of installation and also for each subsequent change that is made after installation.

Secure preference library

The Secure Preferences library uses the AES algorithm which randomly generates encryption key during the first instantiation of “Secure Preferences” in the application. The key encrypts the key-value pairs which are then encoded with base64 algorithm.

Avoid reverse engineering proof with Proguard

Proguard makes it difficult to read your codes while decompiling. This command line tool shrinks, optimizes, and obfuscates codes even the pre-verified ones. These steps makes the codebase compact, and efficient thus making it difficult to reverse engineer an application

Restricting privileges with group access management

The DigiPay.Guru platform also comes with User Access Management which restricts the access to required resources or functions along with enforcing the least privileges for the built-in accounts.

Audit Trail

The admin offers a comprehensive audit trail of all the activities on the system. The system tracks and logs all the activities that are performed by each user and the admin. DigiPay.Guru provides you with automated audit trails for the reconstruction of several events.

Log files maintenance

Saving database server’s logout output is better than completely discarding it. However, the large volumes of these data slow down the server. You can rotate the log files so that the new log files are added and the old ones are replaced after a reasonable period.

Securing data transmission

DigiPay.Guru comes with a robust AES encryption method that secures data exchange in every transaction that takes place between ‘Administration Application’ (Server) and ‘Service Distribution Application’ (Client). The AES encryption ensures high security of Sensitive Authentication Data which is used for each transaction.

Network Security with VPN and HTTPS

DigiPay.Guru has established HTTPS and VPN tunnel for secure communication with the API Client based application. RSA tunnel is used for communication with mobile devices. Similarly, HTTPS protocol is used for communication with Web portals.

Key Generation for Application User

In DigiPay, AES key is generated for every application that uses unique identification of user and the MSISDN & OTP. All the data exchange taking place between the server application and client after that are then encrypted using shared AES key.

Key Protection

Digipay.Guru shields the Symmetric AES keys by storing them in HSM. Encryption keys are changed for keys after once a definite amount of cipher-text are produced by a given key. Keys are replaced by destructing and archiving to maintain the integrity of weak keys.

Network Security with VPN and HTTPS

DigiPay.Guru has established HTTPS and VPN tunnel for secure communication with the API Client based application. RSA tunnel is used for communication with mobile devices. Similarly, HTTPS protocol is used for communication with Web portals.

Key Generation for Application User

In DigiPay, AES key is generated for every application that uses unique identification of user and the MSISDN & OTP. All the data exchange taking place between the server application and client after that are then encrypted using shared AES key.

Key Protection

Digipay.Guru shields the Symmetric AES keys by storing them in HSM. Encryption keys are changed for keys after once a definite amount of cipher-text are produced by a given key. Keys are replaced by destructing and archiving to maintain the integrity of weak keys.

Securing data with SHA algorithm

DigiPay.Guru uses SHA algorithms for the process of verifying the data integrity stored at the database level. This method compares the message digests which are calculated before and after the transmission. If the results don’t match then the server simply rejects the data.

SHA-256 Hashing

SHA-256 performs hashing function in which it converts the text of any length into the string of 256 bits. This algorithm can manage data string of any size and render a hash which is almost impossible to predict thus making it a reliable means of securing data.

Periodic Data backup

The DigiPay.Guru uses the REST API which makes the server communication easier. It also takes backup of all the transactions that takes place via the platform. This backup facilitates the user to view past transactions quickly. Moreover, it also helps the admin to make reports.