BlueID SECURITY

BlueID lets you take your authorization management to a new level of guaranteed security on your users’ mobile devices. A highly complex asymmetrical certificate process based on a Public Key Infrastructure (PKI) creates robust identities and continually protects the trustworthiness of your authorizations.

PKI is used where communication and authorization between a constantly rising number of users, devices and things shall be managed in a scalable and secure manner.

BlueID is maintained and continuously improved by trusted computing specialists to secure the highest level of security and the best comfort at all times. BlueID – a platform that makes security scalable.

platform BlueID access control platform

SECURE THROUGH PKI

The Public Key Infrastructure of BlueID provides protection through:

  • Encryption with up to 4.096 Bit
  • Use of the industry standards RSA and AES
  • Root CA (Certification Authority) in the Trust Center

CERTIFICATE BASED

Integrity of each permission is traceable and autonomously verifiable at all times through encryption with certificates. BlueID uses:

  • The Secure Hash Algorythm (SHA)
  • Elliptic Curve Cryptography (ECC)

 

ALWAYS UP-TO-DATE

With BlueID, you continuously receive the newest updates for all supported smartphone platforms as well as upgrades to support future wireless standards. Therefore, BlueID is always available to you in the newest version and you profit from the convenience of digital permission management.

CERTIFIED BY VDE

BlueID IDaaS Secured Object
BlueID IDaaS Secured Object
BlueID IDaaS Secured Object