Product

The identity verification ecosystem trades in attestations marked as blockchain transactions to verify credentials. Identity.com does not trade in personal information. This increases security, focuses on privacy and enables decentralization.

New Attestations for Verified Credentials

The process of verifying End User credentials is a one-time, high touch exercise, where the user needs to be actively involved and present proofs for Validators to verify that they are who they say they are. Once the process is complete, they present both the credential and the attestation to Requesters without having to reverify. Requesters pay every time a valid attestation is presented.

1. Presentation Request

  • Requester

    Requester

    Asks for personal information and attestations in the form of verifiable credentials.

  • Empty Credential Wallet

    Empty Credential Wallet

    Receives the request and is unable to provide adequate attestations. It contacts a Validator to obtain verifications.

2. Issue Request

  • Empty Credential Wallet

    Empty Credential Wallet

    Sends personal information to a trusted validator, along with other verifications, like face recognition and selfie checks.

  • Validator

    Validator

    Receives personal information and additional checks and, if valid, issues the attestation on the blockchain, sends it to the Credential Wallet, and removes the PII.

3. Credential(s) Presentation

  • Verified Credential in Credential Wallet

    Verified Credential in Credential Wallet

    Presents attestations and credentials to the Requester in exchange for access to services.

  • Requester

    Requester

    Receives personal information, attestations, verifies attestations against the Blockchain and provides access to services if valid.

Reusable Attestations for Verified Credentials

Reusability comes from the immutable aspect of blockchain transactions. Validators issue attestations once for a credential type and they can be reused multiple times until revoked or expired. Valid attestations carry a fee every time they are presented.

1. Presentation Request

  • Requester

    Requester

    Asks for personal information and attestations in the form of verifiable credentials.

  • Existing Verified Credential

    Existing Verified Credential

    Presents attestations and credentials to the Requester in exchange for access to services.

  • Existing Verified Credential

    Existing Verified Credential

    Sends the Requester the verifiable credential information – PII and attestations.

  • Requester

    Requester

    Receives personal information, attestations, verifies attestations, and provides access to services if valid.

Practical Application of Standards

Identity.com is built on W3C and DIF standards such as Verifiable Credentials and DIDs (decentralized identifiers) to enable interoperability between types of Requesters, Validators, and Credential Wallet providers.

ID Requesters - User

User - ID Validator

  • Governed by Presentation Requests
  • Governed by VCRV and a Validation Protocol
  • Requests verifiable credentials & attestations from a Credential Wallet. Can be a set or a subset within the Credential Wallet.
  • User, through the Credential Wallet, will request a verified credential to be validated
  • Requester has opportunity to choose type of Validator they accept attestations from
  • User, through the Credential Wallet, will retrieve the status of the VCRV on mobile device and also retrieve the VCR itself with the attestation, if successful
  • Users, through the Credential Wallet, can withhold or hand out verifiable credentials & attestations
  • Verifiable Credentials Request is built adhering to W3C and DID standards

Types of Verifiable Credentials

  • Anonymous

    Anonymous

  • Email

    Email

  • Phone

    Phone

  • National & International ID

    National & International ID

  • Corporate & NGO ID

    Corporate & NGO ID

  • Accredited Investor Status

    Accredited Investor Status

  • Current Address

    Current Address