Multi-layered security architecture
: security across five levels
Our systems are based on a multi-layered security architecture that has been developed in strict accordance with the zero-trust principle. Each layer of our infrastructure is secured, monitored and logged independently. The combination of multiple security layers creates a robust identity infrastructure that meets both technical and regulatory requirements.
Security starts with identity and ends with full traceability of every single system operation
identity level
The cornerstone of our security architecture is the reliable identification of individuals. Our systems use biometric methods, document verification and liveness detection to ensure that an identity can be established with certainty and authenticity.
In addition, our systems enable biometric duplicate checks, which can be used to identify multiple identities. This check is based on biometric characteristics and can be carried out without the need for centralised personal data databases.
device level
Our self-service systems feature built-in security mechanisms that monitor and log all system interactions. Every interaction with a device is documented and can be traced at a later date.
This allows attempts at tampering or unauthorised interference to be detected at an early stage.
level of communication
Data connections between devices, platforms and specialist systems are continuously monitored and secured. Every data transfer is authenticated and validated before it is processed within the system.
This creates a secure communication architecture for digital identity and trust services.
platform level
Our management systems, integration platforms and partner portals also adhere to a strict zero-trust model. Access to systems is continuously monitored, authenticated and logged.
This ensures that even complex system environments can be operated reliably.
Audit and archiving level
All relevant system operations are documented and archived in an audit-proof manner. Our core system, MIDAS Core, ensures the permanent storage and traceability of all identification processes and system actions.
The audit-proof documentation of identification processes is also an integral part of our patented system architecture. This ensures that all processes can be traced at any time and verified in accordance with regulatory requirements.