Solution

Self-sovereign identity with verifiable claims, the road to a new world.

On the Internet,
nobody knows you're
a Dog
The Internet was designed to connect machines, not people. It was not designed with interoperable identity systems. Every identity you use online does not belong to you. We just ‘rent’ identities from each of the websites or apps we use.

When you sign up to a website, they ask you for the information so that it can start to associate data with you. But the tragedy is even the global identifiers that websites use, such as your email address, are not owned by you. The email address "you@gmail.com" is owned by Google. That's mean you do not have control over your identity.

A siloed identity may have worked in the early days of the Internet, but we have billions of people now online, problems such as fraud are overgrowing. Data breaches continue to occur almost daily, often because siloed identity creates massive troves of data attractive to hackers.
Self-Sovereign Identity for

People

Will help people manage their mess of usernames and passwords, handle personal information scattered across the Internet, prevent them from Identity theft from weak passwords and protect their data not to be sold without our consent.

Self-Sovereign Identity for

Organization

$3.7 trillion in fraud related expenses annually for the organization. Our solution will help the organization to protect the data breaches.

Self-sovereign identity, and How it works.

A self-sovereign digital identity is an identity that’s created and managed by you, the user. It has all of the credentials you need to interact in the digital and physical world, without relying on a centralized organization or authority.


This proof of ownership of the public key is the mechanism owners use to prove that a self-sovereign identity is theirs.


When people around the world become owners of their information, this can be a catalyst to a new set of business models allowing entirely new ways to interact. 

10 Principles of Self-Sovereign Identity

These principles attempt to ensure the user control that’s at the heart of self-sovereign identity.


However, they also recognize that identity can be a double-edged sword. Thus, an identity system must balance transparency, fairness, and support of the commons with protection for the individual.

EXISTENCE
CONTROL
ACCESS
PERSISTANCE
TRANSPARENCY
PORTABILITY
INTEROPERABILITY
CONSENT
MINIMALIZATION
PROTECTION
The Usecase
  • Text Hover
The university issues a verification claim to Bob that he graduated from the university.
  • Text Hover
Bob shares this claim to the company as part of a job application.
  • Text Hover
Without having any connection to or interaction with the university, the company instantly and cryptographically verifies that Bob’s claim is signed by the university and has not been revoked.
Bob got a job, where the company does not have to waste time checking Bob's educational documents.