Application Security
A foolproof platform for digital transactions
eSente is PCI DSS, GDPR, & DSP2 compliant. It uses the most powerful security technologies like Biometric Authentication, AI, and NFC to offer you an advanced digital wallet solution.
Enjoy eSente’s faultless security with full compliance
Offering advanced security is eSente’s top-most priority and that’s why our solution is compliant with various security requirements and regulations.
PCI DSS
We are PCI - DSS compliant and eliminate the chances of storing sensitive data.
GDPR
eSente is completely compliant with the GDRP data protection regulation thereby increasing the trust and credibility of the platform
DSP2
eSente is compliant with various regulators ensuring DSP2 compliance.
What does eSente’s advanced security system offers?
eSente has an exclusive and advanced security system that protects data the moment it enters our system. Below are the few of eSente’s advanced security system’s offerings.
Secure bank account
Funds are held on our escrow account to ensure their availability while relieving you of the associated regulatory burden.
Internal scans
Regular checks by our specialists and penetration tests by certified auditors ensure our compliance with banking standards and regulation.
Tokenised card data
Payment data is encrypted to ensure that payment details may be kept for future use in a secure environment.
Authenticated API calls
We ensure that all the API calls are authenticated with our advanced and secure military-grade encryptions.
Configurable building blocks
eSente platform supports and utilizes unique user IDs along with secure authentication for all kind of access whether it’s administrative access or access to service authentication data. Secure authentication is imposed to all the accounts generated and managed by application.
Login and password management
eSente platform assigns unique IDs for all the user accounts. It enforces the process of login and management for various interfaces through completion of installation and also for each subsequent change that is made after installation.
Secure preference library
The Secure Preferences library uses the AES algorithm which randomly generates encryption key during the first instantiation of “Secure Preferences” in the application. The key encrypts the key-value pairs which are then encoded with base64 algorithm.
Avoid reverse engineering proof with Proguard
Proguard makes it difficult to read your codes while decompiling. This command line tool shrinks, optimizes, and obfuscates codes even the pre-verified ones. These steps makes the codebase compact, and efficient thus making it difficult to reverse engineer an application
Restricting privileges with group access management
The eSente platform also comes with User Access Management which restricts the access to required resources or functions along with enforcing the least privileges for the built-in accounts.
Audit Trail
The admin offers a comprehensive audit trail of all the activities on the system. The system tracks and logs all the activities that are performed by each user and the admin. eSente provides you with automated audit trails for the reconstruction of several events.
Log files maintenance
Saving database server’s logout output is better than completely discarding it. However, the large volumes of these data slow down the server. You can rotate the log files so that the new log files are added and the old ones are replaced after a reasonable period.
Securing data transmission
eSente comes with a robust AES encryption method that secures data exchange in every transaction that takes place between ‘Administration Application’ (Server) and ‘Service Distribution Application’ (Client). The AES encryption ensures high security of Sensitive Authentication Data which is used for each transaction.
Key Generation for Application User
In eSente, AES key is generated for every application that uses unique identification of user and the MSISDN & OTP. All the data exchange taking place between the server application and client after that are then encrypted using shared AES key.
Network Security with VPN and HTTPS
eSente has established HTTPS and VPN tunnel for secure communication with the API Client based application. RSA tunnel is used for communication with mobile devices. Similarly, HTTPS protocol is used for communication with Web portals.
Key Protection
eSente shields the Symmetric AES keys by storing them in HSM. Encryption keys are changed for keys after once a definite amount of cipher-text are produced by a given key. Keys are replaced by destructing and archiving to maintain the integrity of weak keys.
Securing data with SHA algorithm
eSente uses SHA algorithms for the process of verifying the data integrity stored at the database level. This method compares the message digests which are calculated before and after the transmission. If the results don’t match then the server simply rejects the data.
SHA-256 Hashing
SHA-256 performs hashing function in which it converts the text of any length into the string of 256 bits. This algorithm can manage data string of any size and render a hash which is almost impossible to predict thus making it a reliable means of securing data.
Periodic Data backup
The eSente uses the REST API which makes the server communication easier. It also takes backup of all the transactions that takes place via the platform. This backup facilitates the user to view past transactions quickly. Moreover, it also helps the admin to make reports.