How the IDU system works
The user enters information as a specific data format into the system, and this format will depend on the desired system access. When the user enters the specific mandatory information, only one result is returned. This is a requirement as per the API documentation and the data source providers. The individual’s electronic consent must be captured and recorded before an enquiry is completed. Without the user selecting the consent flag, the search cannot proceed.
Clients access the service via HTTPS to receive an authorisation token and to submit their request.
Once the client has entered the data, a search will be performed against all of the requested data sources.
The client receives the results that are scored depending on the validated databases.
Any failed search will return a specific error code highlighting a reason why the search may have failed.
Our system is deployed on a proven and trusted solution. Data Zoo realises the requirement to meet specific response times, service levels and redundancy capabilities. As such, this configuration best serves our needs by providing nearly infinite scalability and rapid deployment. We use only the very best encryption methodologies for data in transit (connections I/O) and at rest (in disk for database or general storage). Only approved customers can access the Data Zoo services.
Application and delivery
The system is made available through various application delivery options to suit the diverse nature of today’s organisations, such as Secure Web-based access, Secure Batch processing via; Web-based access or Integration services and Secure API (Application Programming Interface).