DCM Platform Guide
  • 🌐DCM platform
  • ⚙️Specifics of working with the API
    • 🔐Security stack
    • 🔑Key Generation
    • 🔐Data encrypting
    • 🪃Retry policy
  • 🎨Design guide
  • 🗂️DCM platform's artifacts
  • 🏦Bank
    • 📋Preparing for integration
    • 🏪E-commerce
      • 📦Order and payment
      • 📨Payment message
        • 1️⃣Validation
        • 2️⃣Сallback 1 “Pay-in”
        • 3️⃣Callback 3 “Pay-out”
        • 4️⃣Callback 4 "Credit callback"
      • 🎯Testing
      • 🖇️Merchant Onboarding
      • ⛔Error reference guide
    • 🗃️Alias database
      • 🗝️Adding alias
      • ↕️"Сallback "Alias updated"
      • ☑️Get alias status
    • 💸p2p transfers
      • 📲p2p by phone number
        • ⏺️p2p order (to pay)
        • 🔍Receiver search
        • 🗂️Get receiver's data
        • ⏪Callback "Pay request"
      • 🖇️p2p by deeplink or QR code
        • ⏺️p2p order (to request)
        • Pay request initiation
      • 📨Payment message
        • 1️⃣Validation
        • 2️⃣Сallback “Pay-in”
        • 3️⃣Callback "Pay-out"
    • 💲Gross settlement
      • 1️⃣Callback “Gross_Settlement”
      • 2️⃣Gross_settlement_list
      • 3️⃣Gross_settlement_by_id
      • 4️⃣Gross_settlement_pay
      • 5️⃣Gross_settlement_confirm
      • 6️⃣Gross_settlement_confirm_internal
      • 📧Email notification
    • ✔️Reconciliation
  • 🏢Merchant
    • 🏫DCM platform for Merchants
      • 🔠Integration options
    • 👨‍🏫Preparing for integration
      • ⚙️Working with the API
      • 🔑Key Generation
      • 🖥️Updating interfaces
    • 🏪E-commerce
      • 📦Order
        • 💵Payment through the DCM platform
        • 💳Payment on the Merchant's website
        • 📋Emitters
        • 📬Order status
      • 1️⃣Сallback "Pay-in"
  • 📑Document data
    • 🆕Version history
    • 📃Change log
Powered by GitBook
On this page
  1. Specifics of working with the API

Security stack

PreviousSpecifics of working with the APINextKey Generation

The security architecture of the DCM platform ensures robust protection for interbank transactions and payment processing, as confirmed by a from the independent company UNIONFLAME. Inspections conducted according to OWASP, PCI, NIST, and OSSTMM standards revealed no critical vulnerabilities, affirming compliance with modern security requirements.

Key Security Features

  1. Authentication and Authorization

    • JWT-based Authentication: JSON Web Tokens (JWT) provide API request authentication through secure encoding of information. Each token is signed with a private key and verified using a public key, ensuring secure and authorized communication.

    • Session Token Management: Each session token undergoes validation to maintain secure interactions and prevent unauthorized activity.

  2. Data Encryption and Personal Data Protection

    • AES-256 Encryption: Confidential data, including user information and transaction records, is encrypted using AES-256 for complete security.

    • Public/Private Key Infrastructure (RS256): Data is encrypted using a public key, ensuring access is restricted to the private key owner.

    • SHA-256 Hashing: Transaction attributes and confidential keys are hashed to ensure data integrity.

    • Base64 Encoding: Encrypted data is encoded for secure transmission through the API.

  3. Secure Communication

    • HTTPS and TLS 1.3: All data during transmission is encrypted with modern protocols, guaranteeing confidentiality and integrity.

    • CSRF Protection: Protects against cross-site request forgery by verifying referer hosts for all requests.

  4. Dedicated Infrastructure

    • Unique Hosts for Each Participant: Each participant is assigned a unique host and identifier, enhancing traceability and data isolation.

  5. Additional Features

    • Regulatory Compliance: Fully compliant with ISO 20022 and GDPR standards, ensuring comprehensive security and privacy.

Key Advantages

  • Real-Time Security: Instant data verification and protection.

  • End-to-End Encryption: All confidential data is protected throughout its lifecycle.

  • Immutable Data: Replication of digital records in a distributed network ensures full transparency and auditability.

  • Cost Reduction: Optimized operations reduce overhead and enhance scalability.

  • Integration-Friendly: Easily integrates with existing financial systems.

Technology Stack

  • Encryption Protocols: AES-256, RSA-256, SHA-256.

  • Authentication: JWT for secure API requests.

⚙️
🔐
report