We provide robust encryption solutions to securely protect customer data, minimizing the risks of unauthorized access and data breaches. This guide explains how to implement these solutions easily in various environments while adhering to the latest security standards.

Encryption Options

Query String Encryption

Query String Encryption

Secure Data Transfer Options

Secure Data Transfer Options

Encryption/Decryption Methods

Encryption/Decryption Methods

1. Query String Encryption

Sensitive data sent via URL query strings is encrypted using the AES-256 encryption method.

1

Prepare Data in JSON Format

2

Perform AES-256 Encryption Using the Provided API Key

3

Add Encrypted Data to the URL as the 'encrypted' Query Parameter

Caution: The following query parameters are not encrypted: pid, lang, sid, action.
The pid, lang query strings and the sid, action query strings used on the “Additional Process (Injection)” page do not support encryption.

2. Secure Data Transfer Options

Data in API methods (POST/SUBMISSION, GET/SUBMISSION, PUT/SUBMISSION, WEBHOOK) is encrypted using and .

2-1. Key Features

  • Data encryption using AES-256.
  • Data integrity and authentication guaranteed via PKI.
  • Enhanced data protection during transmission.

3. Encryption and Decryption Methods

3-1. Key Generation Process

1

Generate Hashed Key

2

Encryption Example

Below are examples of encrypting data using AES-256

3

Decryption Example

Below are examples of decrypting data encrypted with AES-256