BlueID lets you take your authorization management to a new level of guaranteed security on your users’ mobile devices. A highly complex asymmetrical certificate process based on a Public Key Infrastructure (PKI) creates robust identities and continually protects the trustworthiness of your authorizations.
PKI is used where communication and authorization between a constantly rising number of users, devices and things shall be managed in a scalable and secure manner.
BlueID is maintained and continuously improved by trusted computing specialists to secure the highest level of security and the best comfort at all times. BlueID – a platform that makes security scalable.
SECURE THROUGH PKI
The Public Key Infrastructure of BlueID provides protection through:
- Encryption with up to 4.096 Bit
- Use of the industry standards RSA and AES
- Root CA (Certification Authority) in the Trust Center
Integrity of each permission is traceable and autonomously verifiable at all times through encryption with certificates. BlueID uses:
- The Secure Hash Algorythm (SHA)
- Elliptic Curve Cryptography (ECC)
With BlueID, you continuously receive the newest updates for all supported smartphone platforms as well as upgrades to support future wireless standards. Therefore, BlueID is always available to you in the newest version and you profit from the convenience of digital permission management.