Security Standards & Protocol Support
- TLS 1.2+ / 1.3 Secure Transport
- Hybrid Encryption Model (Asymmetric + Symmetric)
- AES-256 Data Encryption
- Secure Key Exchange Mechanism
- Enterprise Network Routing Support (APIM / Proxy-based)
1. Communication Flow
SDK communication follows a secure architecture that ensures all requests pass through the client’s infrastructure before reaching the Quepass platform. Flow Client App- Integrates Quepass SDK
- SDK sends requests to Client Proxy / APIM
- Traffic routed through approved network channels
- Domain whitelisting & IP validation enforced
- Quepass Environment
- Secure response served back through the same controlled channel
2. Secure Data Transmission
All data transmitted between the SDK and the Quepass platform is encrypted using a hybrid cryptographic approach. This method combines:- Secure key exchange mechanisms
- High-performance symmetric encryption for data protection
3. Encryption Workflow
When the SDK communicates with backend services, a secure encryption workflow is executed to protect sensitive information at every stage.Secure Session Establishment
A secure TLS (1.2+/1.3) connection is established between the SDK and the client’s proxy/APIM layer to initiate protected communication.
Key Exchange
A secure asymmetric key exchange mechanism is used to safely generate and exchange encryption keys between the SDK and backend services.
Data Encryption
Sensitive data (biometric information, identity documents, tokens) is encrypted using AES-256 symmetric encryption before transmission.
Secure Transmission
Encrypted payloads are routed through approved enterprise network channels with domain whitelisting and IP validation enforced.
4. Security Benefits
The encryption architecture provides several security advantages.- Strong Data Protection
- Secure Key Exchange
- Data Integrity Protection
- Secure Bidirectional Communication
5. Sensitive Data Protection
The Quepass SDK ensures that sensitive data remains protected during transmission, including:- Biometric information
- Identity document data
- Authentication tokens
- Verification results