Verifiable Credentials

Simplify user onboarding and verification with secure digital credentials that make any data user-permissioned.

VCs are a standards-based format for businesses to attest to user information and securely verify it without needing to recollect it. We’re using VCs to simplify a spectrum of verificsations spanning from age and address proofs to full KYC and ACH validation.


Verifiable Credentials are globally-recognized standards for making sensitive data interoperable, secure, and user-permissioned.

Standards-first

Developed in conjunction with organizations like the Worldwide Web Consortium (W3C),  verifiable credentials can represent all of the same information that a physical credential represents with the added benefits of secure, digital signatures and provenance-preserving metadata that make them more secure, tamper-proof, and flexible than traditional verification methods.

Instant

Credential verification happens in milliseconds using messaging and authentication standards built on best-in-class security measures including OIDC and OAuth2.0.

Composable

Verifiable claims can be collected, shared, and verified in flexible combinations to meet your assurance requirements

Unphishable

Just like our authentication methods, Verifiable Credential are strictly permissioned and only accessible by the intended recipient during an authenticated session

Data-minimizing

Verifiable Credentials are not all-or-nothing. Individual data points can be shared to satisfy lower-assurance use cases. Alternative, zero-knowledge and predicate proofs can be used to satisfy requirements like age or residency without sharing the explicit data.

High Fidelity

The VC model presents all the relevant information, metadata, evidence, and risk information you need in a single bundle so you can get to decisioning up to 98% faster than traditional verifications

Secure, privacy-preserving, and user-permissioned data formats

Issue

Aggregate

Share

Verify

Default

Simple to implement via API, SDK, and hosted flow

We've abstracted away low level configuration by focusing on the data, sources, and business rules needed to fulfill robust verification as simply as possible

Layer “roots of trust”

Validate identity attributes from multiple sources in a single interaction to corroborate information to meet your risk needs.