The Smart Certificate platform is based on secure technologies (e.g. Blockchain) and protocols fully compliant with privacy laws and GDPR framework guaranteeing documents’ integrity (time-stamping and signature), authenticity (guaranty of the issuer identity of the document) and validity (the document is still valid, has not been revoked or its expiration date has not been reached).
So, the Smart Certificate platform makes fraud impossible for any digital documents and allows a 100% secure verification.
Beside database encryption, and as part of our data protection system, data for each recipient of documents are also encrypted with a specific key for each set of data until recipient accepts terms and conditions to activate granted documents (patented method). Data for those granted documents are then decrypted and documents are generated (with those decrypted data) but stay in a secure environment (dedicated servers).
We have undergone and keep on-going a personal data audit and oversight activities to ensure consistent GDPR compliance. We have a DPO to oversee activities.
We are proceeding regularly PEN TEST by SECTIGO and freqently monitored by SECURITY SCORECARD
.
The Smart Certificate platform was designed and developed by our R&D team which, in addition to the technical and technological background provided, has acquired over the years the experience and skills specific to the dematerialization and security of data and documents.
All developments of the Smart Certificate platform follow a quality approach respected by all those involved in the analysis, design, development and testing process. Our development approach is centered on the client and its needs. We opt for an Agile development methodology where functionalities are prioritized according to customer needs and according to risk management in the development of the platform. Each development cycle of maximum one calendar month includes the classic phases of analysis, customer validation, technical design, development, testing and integration.
In addition, the Smart Certificate platform, the operational procedures and the Terms & Conditions of the platform (lists of the articles of general conditions that govern the use of the Smart Certificate platform and that must be approved by any user) are compliant with GDPR and privacy frameworks.
The Smart Certificate platform is based on Microsoft framework/technologies (.NET) for the back end, and VUE JS framework for front end, and complies with market standards in terms of web development but also in terms of deployment and configuration.
Here is an overview of the Smart Certificate platform that meets all the expected architecture standards, particularly in terms of information security: The infrastructure is ISO27001 compliant.
The platform is linked to a Microsoft SQL Server database with the following characteristics:
The SMART CERTIFICATE platform uses some of the most advanced technologies for internet security. Being aware of the sensitivity of the data it holds, the SMART CERTIFICATE workflow includes a 360° security approach, communication channels and storage facilities.
Thanks to these innovations, the Smart Certificate platform is able to guarantee:
Security and privacy protection have always been N°1 priority since the conception of the Smart Certificate platform, via a specific architecture to protect recipients’ private data and their documents.
The scope of the proposed architecture makes it possible to protect documents until they are activated by the recipient by keeping them encrypted while ensuring that decryption keys are not stored on the issuing server. This constraint ensures that:
The architecture implemented also makes it possible to provide an authenticated document, allowing the third-party verifier to ensure that the document received by the recipient was actually issued by the Smart Certificate platform and has not been subsequently modified.
In addition to the security architecture put in place to protect private data, the Smart Certificate platform uses the most advanced Internet security technologies. Aware of the sensitivity of the data handled by the platform, we have specified and implemented a security bulwark around our data processing, communication channels and storage system.