High assurance presentations: in-person or digital
Digital first by design, high assurance credentials for use in web and app-based interactions.
Proving personal identity
High assurance credentials where strong confidence in who is presenting the credential is required, e.g. national identity documents or student ID cards.
Sharing personal identification information over the web
Empower credential holders to selectively share personal identity attributes in ways that protect their privacy.
Signing in to websites without a password
Enable users to sign in to websites and systems with a credential they can securely store and manage in a digital wallet.
Combining multiple credentials in a single transaction
Save customers time by creating a single request for information that can automatically and securely combine attributes from multiple credentials. Super convenient for situations where multiple data points are required, such as eKYC, job applications, and any kind of form-filling.
Share authentic information simply
Share digitally, or print out and present in-person even when connectivity is limited.
Create strong confidence in information assurance, content integrity and authenticity of claims.
Physical assets can be tagged with QR codes, providing confidence in the genuine status of provenance and asset attestations.
Digital notarisation for permits
Give partners, contractors, customers, and the public the ability to verify the authenticity of permits, licences and/or any notarized document in real time. Attestations can be revoked at any time.
Prevent fraud and streamline check-in with tickets and passes that can be conveniently verified as genuine. Allow customers to choose whether to print a paper copy or store in Google Pay or Apple Wallets.
Test results and qualifications
Empower employers, agencies, and professionals to verify the authenticity of test results and qualifications by scanning a QR code using a smartphone.
There are infinite possibilities
We’ve mapped the journeys, implementation and integration patterns to make it easy for you. These are just a few examples of what is possible.
- OIDC enabled authoritative source
- Obtain a Credential Directly via Push Flow
- Store a ‘bearer’ credential
- Bulk Issuance of ‘bearer’ credential
Presentation and verification
- Challenge response flows
- API-driven verification
- Multiple credential presentation
- Push notification asynchronous flows
- Obtain credentials via push notification
- Validate identity with genuine presence testing
Keen to discuss the options?
We have credential lifecycle capabilities catering to all roles in your ecosystem and solution journeys which demonstrate how each party interacts.
We can work with you to define your ecosystem and design a fit-for-purpose and flexible set of journeys. Talk to us about a design that’s fit for your needs.