AyMINE – Technical documentation
Interfaces to other systems
Enterprise Architect Connector
Business excelenece
Balance Scroecards
Task & Project Control
- Helpdesk ticket - reply to customer
- Test
- Qualification of user or contact
- Project role
- What makes up the methodology / QMS
- dragdrop
- Location
- My areas
- Kanban Task Overview
- Personal Task
- Internal helpdesk
- Customer Care Centre
- Project baseline
- Return project plan by baseline
- Project Schedule
- Processing time sheets
- Records managed by a project
- Activation buttons
- Why some data can't be deleted
- Starting events
- Qualification of user or contact
- task_taskobjects
- Project
- Reminders and Messages
- eventobj_raisingevents
- decision_decobjects
- eventobj_startingevents
- eventobj_eventbuttons
- Type of tests
- Deal management
- FMEA - Detection
- FMEA - Features
- FMEA Methodology | AyMINE
- FMEA - Occurence analysis
- FMEA Severity analysis
- FMEA
- Management of responsibilities - RACI Matrix
- RACI Matrix for Project
- Improvements and Preventive Measures
- Notice – example of use
- tskproblem_terminology
- 8D report
- Task Scheduling
- Administration of the Task Management Module
- Adminitration of areas, projects, calendars
- Discussion
- GDPR and record of qualifications
- System rights for the task management module
- Project Planning
- Employee Tasks
- Incident and Quality Issue Management
- Collaborative Resolution of Multiple Problems
- List of business areas
- Required qualifications
- Plan template / strategy
- Decision
- Configuration Package
- Record template
- Change management process in a project
- Task list
- Requirements
- Team Member
- Right to Manage Qualifications
- Input requirements
- Obligation
- Competencies and Skills
- Problems, tickets and their management
- Meeting
- Package definition
- Phrases and terms
- Data Area
- Risk
- Task
- Business event
- Task, project & quality management
- Records and protocols
- Directives and Policies
- Events
- Risk Pattern
- Information
- Project definition
- Activity log
- eventinstances
- Personal calendar
- Objects of decision making
- Event activation buttons
- Objects affected by the problem
- Variant decision-making
- Recorded activities
- Self-Reminders
- QMS and Task Management
- Objects related to the task pattern
- Effect of the task on the right to modify the atta
- Level of Competence
- Manager approval with the task report
- Region / project / methodology
- Manage your marks
- tskdefusertask
- Quality Management System (QMS)
- tsktask_batasks
- Project Team
- Events and meetings
- Events and meetings
- List of event instances
- moduleclientoptions
- Processed objects
- Mark patterns
- Notification events
Interprocess management
Human Resources
- hrstcontract
- roles
- Human resources
- Digital Personnel Archive
- Personalistics – User Permissions and roles
- Registration of job seekers
- Manage department / division data
- Job Position
- Worker
- Worker overview
- An overview of your staff
- Responsible HR Manager
- Synchronizing staff and system users
- modulesafety
Asset Management
- Products, assets and sales
- Tendering and purchasing
- Analytical model
- Product Supplier
- Product Categories
- Product or Product Property
- Project Goal
- Business Offer
- Offers summaries
- Recalculate bid
- Offer and Price Access Rights
- Creating and processing orders
- System order status query
- Order Reports
- Pricing
- Pricing – volume discounts
- Products and Goods
- Product status and change
- Product Units
- Quality criteria
- Why are the Quality criteria usefull
- DFMEA - Product FMEA
- Hara | Hazarad & Risk Analysis
Customer Relationship - CRM
- Contacts and directories module (
- System Permissions and CRM Module Settings
- Customer Order Overview
- Address books
- Address book list and management
- Privacy policy
- Send bulk messages in compliance with GDPR
- Bulk email footer
- Unsubscribe and set preferences
for bulk mail - How to correctly forget a person's details
- Bulk Emails
- Contracts
- Partner in a contract
- Message patterns
- Groups of contacts
- Order overview for customer groups
- Directory or people and companies
- Contact per person or company
- Quickly available contacts
Finance management
System modules
System management
- moduleclientoptions
- digiSign
- formattedtexts
- System Configuration
- Processes in use
- Client
- Public Client
- Configure gateways for external messages
- E-mails and external communication
- Email messages
- Rules for external messages
- Secure business communication
- Send SMS directly from CRM
- Call directly from CRM
- Documents and files
- Additional functions with files
- Copying and moving files between objects
- Picture presentation
- Public link to the document
- Recent Files
- Dashboard
- Object location on the board
- Client items
- Revisions and comments
- Securing posts and internal discussions
- Translations
- Record Relationships
- Relation types
- sysrole
- User Processes
- System module
- System User
- User administration
- User Administration
- Secure login to the sytem
- Connecting users to VOIP PBX
- Secure Key Wallet
Framework
- frmobjectextension
- introhelp
- introhelp_mobile
- introhelp_aplikace
- versioninfo
- releases
- AyMINE modules and basic types
- cliplink
- introhelp_settings
- introhelp_deleting
- introhelp_dragdrop
- list_filtering
- AyMINE intro
- AyMINE access security
- AyMINE Modules
- Object locks
- System rights
- introhelp_keyshortcuts
- introhelp_shortcuts
- introhelp_icons
- list
- introhelp_generalinfo
- introhelp_objectdetail
- introhelp_objectlist
- introhelp_privateobjectnotes
- AyMINE User Rights Control
- introhelp_dashboard
Secure Key Wallet
- What Is a Cryptographic Data Wallet
- What Does the Secure Key Wallet Secure
- How to Activate the Secure Key Wallet
- FAQ – Frequently Asked Questions
- Frequently Asked Questions About the Secure Key Wallet
- Can Someone Remove Keys from My Wallet?
- Can I Use My Login Password as the Code?
- How Much Does Wallet Security Depend on Password Length?
- The Password Is Labeled as a PIN. Does It Have to Be Numeric?
- Why Is a Fingerprint Not Used?
- Does the Application Store the Wallet Password Anywhere?
- Can I Store Bitcoins in the Secure Key Wallet?
- Secure Key Wallet Security in Detail
- How the Secure Key Wallet Is Secured
A Secure Key Wallet is a tool for securely storing passwords that help keep all company information safe.
What Is a Cryptographic Data Wallet
A cryptographic data wallet, in short a Secure Key Wallet, is a personal storage for keys and passwords that provide access to data vaults. You can use it on all your devices, while its security is reliably ensured.
The Secure Key Wallet stores access codes to data vaults. For each vault you have access to, an unlocking key is required. You receive the key in encrypted form, and it always remains stored in your Secure Key Wallet.
What Does the Secure Key Wallet Secure
The wallet itself allows you to store passwords, but that is not its primary purpose. Its main purpose is the secure management of keys to data vaults. Indirectly, it therefore secures everything that can be stored in vaults – notes, messages, discussions and comments, information, project requests, etc.
Does the Secure Key Wallet Allow File Encryption?
Yes, regular files can be encrypted using end-to-end encryption with the help of keys stored in the Secure Key Wallet.
How to Activate the Secure Key Wallet
To use the wallet, it must be enabled for your organization. If necessary, contact your administrator. You can activate the wallet on a trusted device that you have named and verified.
On the Settings and Security page, you will find the Activate wallet function for your trusted device. After entering your password, the wallet will be activated.
FAQ – Frequently Asked Questions
FAQ – Frequently Asked Questions
Frequently Asked Questions About the Secure Key Wallet
Can Someone Remove Keys from My Wallet?
No one can access your wallet, and no one can remove anything from it without you. A vault administrator can revoke your access to a vault. To access a data vault, you must have the appropriate permissions (granted by the administrator) and the access code.
If the administrator revokes your permission, the key remains in your wallet, but you cannot use it. It is like having a key to a door, but there is also a gate in front of it and you do not have the key to that gate.
The key is automatically removed from your wallet when you unlock the Secure Key Wallet yourself. After unlocking, the application verifies:
- Whether new keys are waiting to be added to the Secure Key Wallet
- Whether any keys have become invalid because the administrator has revoked access to the vault
Can I Use My Login Password as the Code?
The system never stores passwords in an unencrypted form. From the system’s perspective, it makes no difference if you use the same password. However, we strongly discourage this. Doing so reduces your security on your side – if you log in to AyMINE in front of someone, they may capture your password and then gain access to both the system and the wallet. If you use a different code for the wallet, this risk is eliminated.
How Much Does Wallet Security Depend on Password Length?
As with any password, if someone gains the ability to attempt a brute-force attack, a shorter password may eventually be guessed. Even though it can only be used on your unlocked device, a short password creates risk. The system does not allow passwords shorter than 6 characters.
The Password Is Labeled as a PIN. Does It Have to Be Numeric?
Access to the wallet is labeled as a PIN specifically to avoid confusion with the system login password. The PIN/password can consist of any characters, including diacritics and special characters; you are not limited to numbers.
Why Is a Fingerprint Not Used?
The password is the code the Secure Key Wallet uses for decryption. Without the password, it cannot be opened. Therefore, you must enter it consistently on every device.
A fingerprint verifies your identity, but the code itself cannot be derived from it. It can therefore never serve as a password for decrypting content. (If some applications claim otherwise, they are not encrypting with your unique password.)
Mobile phones from reputable manufacturers allow you to store a password after entering it into the password field and protect it with a fingerprint. Many laptops offer the same function. You can then open the Secure Key Wallet easily using your fingerprint. However, do not forget your password. When accessing from a new device, you will need to enter it.
Does the Application Store the Wallet Password Anywhere?
While the wallet is unlocked in the application, a decoding string is stored in the application’s memory, but it is never stored in a way that makes it accessible outside the application. It is automatically removed when you are not using access to encrypted data. The application then locks itself and removes the Secure Key Wallet password. To use it again, you must re-enter the password.
The login PIN is never transmitted from your device – see more below in the security section.
Can I Store Bitcoins in the Secure Key Wallet?
The Secure Key Wallet can only be used for keys to data vaults and possibly your own passwords. However, in AyMINE you can create your own data vaults and store any data in them – in principle, even bitcoins. Please note that AyMINE and data vaults are not designed for storing cryptocurrencies, and the operator is not liable for any potential damages.
Secure Key Wallet Security in Detail
Secure Key Wallet Security in Detail
How the Secure Key Wallet Is Secured
Security Overview
- It is always protected by strong encryption resistant even to quantum attacks
- It is opened only for the purpose of using a stored key
- It is synchronized between the user’s trusted devices. Synchronization always transfers the wallet in a locked state
- The wallet code is always used locally on the device and is never transmitted anywhere (not even in encrypted form)
Security Details
Encryption
The Secure Key Wallet is encrypted using very strong AES 512 encryption. It is fully resistant even to quantum attacks. There is no known way to break the encryption without knowledge of the code.
Password Strength
Security naturally also depends on password complexity. The password you enter to access the wallet is extended multiple times using unique codes tied to your account, login credentials, and your company account. Knowing your password alone is not sufficient for someone to use the Secure Key Wallet unless they are also using your account.
Account protection itself is secured by two-factor authentication and the requirement to register a device as secure and trusted (third verification step). Without these steps, it is not possible to activate the Secure Key Wallet.
Physical Location
The Secure Key Wallet is stored on your device in encrypted form. If you do not use the device for more than one day, it is automatically removed. It is automatically downloaded from the server after successful verification.
If someone steals your device, they cannot access the wallet without the access codes. If they attempt a brute-force attack, access will be blocked. Additionally, you can block the device from any other trusted device, making access to the wallet completely impossible on that device.
Secure Handling of the Key
Your personal key is never transmitted over the Internet and is never stored anywhere – not even in encrypted form. Therefore, it cannot be obtained through network interception or any server-side procedure.
What is transmitted over the Internet between the device and the server is the encrypted Secure Key Wallet. However, it can only be decrypted on your device.