Data Encryption and Decryption
Comprehensive guide to secure customer data through robust encryption solutions. Learn about methods to minimize risks of unauthorized access and data breaches while complying with the latest security standards.
We provide robust encryption solutions to securely protect customer data, minimizing the risks of unauthorized access and data breaches. This guide explains how to implement these solutions easily in various environments while adhering to the latest security standards.
Encryption Options
Query String Encryption
Query String Encryption
Secure Data Transfer Options
Secure Data Transfer Options
Encryption/Decryption Methods
Encryption/Decryption Methods
1. Query String Encryption
Sensitive data sent via URL query strings is encrypted using the AES-256 encryption method.
Prepare Data in JSON Format
Perform AES-256 Encryption Using the Provided API Key
Add Encrypted Data to the URL as the 'encrypted' Query Parameter
Caution: The following query parameters are not encrypted: pid
, lang
, sid
, action
.
The pid
, lang
query strings and the sid
, action
query strings used on the “Additional Process (Injection)” page do not support encryption.
2. Secure Data Transfer Options
Data in API methods (POST/SUBMISSION, GET/SUBMISSION, PUT/SUBMISSION, WEBHOOK) is encrypted using and .
2-1. Key Features
- Data encryption using AES-256.
- Data integrity and authentication guaranteed via PKI.
- Enhanced data protection during transmission.
3. Encryption and Decryption Methods
3-1. Key Generation Process
Generate Hashed Key
Encryption Example
Below are examples of encrypting data using AES-256
Decryption Example
Below are examples of decrypting data encrypted with AES-256
Was this page helpful?