BetaYou're exploring an early version of tPay365. Features and content may change as we refine the experience.

Two-Server PII Isolation Architecture

A comprehensive look at how tPay365 separates business logic from personal data across physically isolated infrastructure.

The Problem with Conventional Architecture

Traditional fintech platforms consolidate everything into a single database: authentication credentials, business logic state, personal identifiable information, and payment details. A single vulnerability in any layer compromises the entire dataset. One SQL injection, one misconfigured endpoint, one leaked backup — and every user's bank details, national insurance numbers, and transaction history are exposed simultaneously.

Conventional Single-Server Architecture

Auth + Sessions
Business Logic
PII + Bank Details
Payments + Transactions

A single breach exposes everything: names, bank details, transaction history, and authentication credentials.

tPay365's Split-Key Design

Server A — Business Logic

  • HMAC-SHA256 hashing with HASH_PEPPER
  • Auth, sessions, RBAC, rate limiting
  • CleanPaycheck engine, yield accrual
  • Vault reference storage (not PII)

"Knows what you owe, never who you are"

Server B — PII Vault

  • AES-256-CBC encryption with AWS KMS
  • BACS Standard 18 parser
  • Vault API: store, retrieve, verify, delete, masked, batch
  • Append-only audit log

"Knows who you are, never what you owe"

Communication Protocol

1

Server A initiates request with mTLS client certificate

2

Server B validates certificate + API key (timing-safe)

3

RBAC scope check against API key permissions

4

Operation executed, audit logged with actor and resource

5

Response returned over encrypted channel

Vault Reference Format

vault:{pii_type}:{uuid-v4}

12 Supported PII Types

user_email
user_phone
user_pii
employee_bank
employee_ni
payee_bank
deduction_payee
beneficiary_bank
oauth_tokens
invite_email
billing_email
provider_email

Threat Model

ThreatMitigation
Server A database breachOnly HMAC hashes and vault references. No plaintext PII to steal.
Server B database breachOnly AES-256 ciphertext. No business context to link data to identities.
Network interceptionmTLS + TLS 1.3. Certificate pinning between services.
Insider threatRBAC scoping, append-only audit, no single admin has full access.