Idanimo LLC, offers its digital identity solution that can be put in place as foundation identity or it can utilize manually issued foundation identity. This comprehensive and state of the art solution consists of following components and it can be customized to the client requirements without compromising security or functionality of Digital Identity. The combination of these components helps establish a comprehensive and secure digital identity. It’s important to strike a balance between security and user convenience to ensure a positive user experience.
Key Components
- Biometric Data: Based upon the client requirements, we can capture and utilize biometric feature including fingerprints, facial image, iris scans or all of three biometric modalities.
- Personal Information: this data acquisition includes demographic textual data that can be captured and will be used as online verifiable personal attributes.
- Verifiable Credentials: These are the digitally verifiable credentials that are issued to the users at the time of onboarding / registration. It can range from traditional username/password to the most modern digital signatures.
- Digital Certificates: Our digital certificate offers Public Key Infrastructure (PKI) that Involves the use of digital certificates to authenticate the identity of users or devices.
- Single Sign on: Our solution comes with single sign on services for participating host systems.
- Digital Wallet: We offer a secure digital wallet for document storage and access to personal information stored on local device.
- Digital Signature: As a value-added service, we offer digital signing of documents for better security and authentication.
- Multi-Factor Authentication (MFA): For more secure and reliable authentication we offer multi-factor authentication. We can customize additional authentication factors depending upon the available resources and target population.
- Consent Mechanisms: Our state-of-the-art consent management regime not only gives users the ability to decide how their information will be used, it also provides them with the ability to manage how much information will be visible to whom.