We built our identity network from the ground up with the advancements in technology and regulation in mind. Our goal was to build a system that worked today but that exceeded the security and privacy standards worldwide.
Because Identity Solutions can verify a known identity of a user it becomes nearly impossible to attempt to takeover an account. We use various methods of security, starting with secure onboarding that includes phone/email verification, biometrics, liveness checks, device and location signals, document verification, and historical transaction history (reputation) to verify user identities.
Identity Solutions uses a private, permissioned blockchain to record every transaction. This provides a distributed, immutable, auditable transaction history on a solid data persistence layer.
We use standards such as W3C DIDs, Verifiable Credentials, and NFTs and the meta-data is portable across different blockchains. This allows for customer flexibility.
Use of strong PKI cryptography eliminates the need for passwords, one-time generated passcodes, or any other type of shared secret that's vulnerable to hackers. We use a private key that is stored securely by the end user hardware to digitally sign and authenticate transactions.
Every transaction includes a one-time token (OTT) that is generated by the Identity Solutions network after the user is authenticated. The token is verified by the relying party before approving the transaction.
Keys are rotated as needed based on security requirements to ensure fresh key pairs on both sides and further reduce hacking attempts.
We enjoy speaking with customers regardless of whether they buy a solution from us. Each use case is different and we'd love to work with you to ensure you have the exact system you need.