More Trust. Less Hassle.

Identity.com connects trustworthy individuals with security-minded businesses through verified identities.

How It Works

A user accesses a high-trust website or app.
1.

A user accesses a high-trust website or app.

Identity.com dynamically verifies the user through government-issued ID or out-of-wallet questions.
2.

Identity.com dynamically verifies the user through government-issued ID or out-of-wallet questions.

Verification results are returned to the website or app.
3.

Verification results are returned to the website or app.

Security Matters

Privacy and security are the foundation of protecting sensitive identity data.

Encryption

Encryption


All information is sent over HTTPS using TLS 1.2. Sensitive personal and financial information is stored in encrypted form using individualized data encryption keys.

Encryption

Encryption

All information is sent over HTTPS using TLS 1.2. Sensitive personal and financial information is stored in encrypted form using individualized data encryption keys.

Security Testing

Security Testing


All code is peer-reviewed and automatically tested for vulnerabilities before being deployed. We also engage independent vendors to regularly test the security of our website.

Security Testing

Security Testing

All code is peer-reviewed and automatically tested for vulnerabilities before being deployed. We also engage independent vendors to regularly test the security of our website.

Infrastructure

Infrastructure


We use Amazon Web Services’ world-class infrastructure to ensure reliability and maxium uptime.

Infrastructure

Infrastructure

We use Amazon Web Services’ world-class infrastructure to ensure reliability and maxium uptime.