Security at Proxy

Deploy keyless access that’s secure without being burdensome.


Tokenized Data and Credentials

Proxy’s patent-pending Universal Identity technology removes the need to trust personal devices and wireless communication channels through the combined use of tokenization and encryption.

Tokenization is the process of protecting sensitive data by replacing it with an algorithmically generated number called a token, and it is commonly used to protect sensitive information. 
Your Proxy Signal, emitted via Bluetooth from your smartphone, transmits your identity to other Proxy devices through randomly generated tokens which can be authenticated and verified by the receiver. These tokens can be stored on personal devices or passed through various insecure networks such as Bluetooth, without your personal information ever being exposed.

Proxy tokens can also carry additional payload in a uniquely encrypted, one-time, authenticated vault, enabling offline verification while keeping the payload safe from eavesdroppers.


How does Proxy secure your data?

At Proxy, we practice security in depth and apply best practices to keep your data and our systems safe.

Data encryption in transit and at rest
Real-time infrastructure monitoring
Regular security audits

Security questions or issues?

If you have security questions or think you may have found a security vulnerability, please get in touch with our security team.