Data Encryption and Decryption
Why Use Data Encryption
In the network transmission, the communication between the enterprise and the Chaintool server may be intercepted by hackers. ID verification products contain a lot of sensitive information from enterprise and customers, such as customer ID, real name, ID number, etc. Once intercepted, it may be used by hackers to commit crimes, causing customer losses. Therefore, the Chaintool-KYC product provides a solution to encrypt the entire request and data in the communication to avoid data leakage.
Chaintool Uses AES Encryption
Advanced Encryption Standard (AES) is a relatively common encryption method in symmetric key encryption. The encryption and decryption key of this encryption method is the AES key.
How Chaintool-KYC Products Encrypt and Decrypt
Upload AES Key
TODO Additional procedures are needed here
link Click to set up your AES key
Request Encryption
If an encrypted request scheme is adopted, the entire request message body needs to be AES encrypted. The encryption key is the AES key uploaded in the Chaintool management background. The code sample is as follows:
Response Decryption
If encryption scheme is used, while the request is encrypted, the response to the request will also be encrypted using the AES key uploaded through the Chaintool management console. The code sample is as follows:
Last updated