a good thing!
Decentralized Identity is Here
PingOne Neo gives control of identity data back to your users. It lets you issue verified credentials such as government IDs and college transcripts, as well as memberships and certifications to digital wallets. Users can then share that information with businesses that require it.
Digital services today often require verified information about users to do business. PingOne Neo makes getting those verified credentials from their trusted source to the business that needs them simple and secure. Here’s how it works:
Request
A user requests a verifiable credential from a business that has verified information about them (an issuer). This process can be initiated by a business that requires the credential (a verifier) by having the user scan a QR code when the information is needed.
Create
The issuer provides a credential that is cryptographically signed and verifiable using distributed ledger technology.
Store
The verifiable credential is automatically added to the user’s digital wallet.
Present
The user can then share the credential data with the business that requires it (the verifier). Optional data is highlighted and not mandatory so the user is always in full control of what gets shared.
Digital services today often require verified information about users to do business. PingOne Neo makes getting those verified credentials from their trusted source to the business that needs them simple and secure. Here’s how it works:
Request
A user requests a verifiable credential from a business that has verified information about them (an issuer). This process can be initiated by a business that requires the credential (a verifier) by having the user scan a QR code when the information is needed.
Create
The issuer provides a credential that is cryptographically signed and verifiable using distributed ledger technology.
Store
The verifiable credential is automatically added to the user’s digital wallet.
Present
The user can then share the credential data with the business that requires it (the verifier). Optional data is highlighted and not mandatory so the user is always in full control of what gets shared.
Verify Credentials
Request the verified information that you require from users to do business and validate that information directly with the source.
Secure Users
Reduce the possibility of transaction fraud and account takeovers by ensuring the person behind the credential really is who they claim to be.
Eliminate Risk
Gather, store, and protect only the user data you need, eliminating sensitive information that malicious actors are after.
Increase Privacy
Digital credentials allow users to share only necessary identity information for a specific transaction, confirmation of age instead of date of birth.
Verify Credentials
Request the verified information that you require from users to do business and validate that information directly with the source.
Secure Users
Reduce the possibility of transaction fraud and account takeovers by ensuring the person behind the credential really is who they claim to be.
Eliminate Risk
Gather, store, and protect only the user data you need, eliminating sensitive information that malicious actors are after.
Increase Privacy
Digital credentials allow users to share only necessary identity information for a specific transaction, confirmation of age instead of date of birth.
Decentralized identity is an approach to identity management that allows users to control their identity information. Issuers (businesses who have verified information about users) can issue verifiable credentials to be stored in a digital wallet that a user controls. That user can then present those credentials to verifiers (businesses that require those verified credentials to do business).
Decentralized identity is an approach to identity management that allows users to control their identity information. Issuers (businesses who have verified information about users) can issue verifiable credentials to be stored in a digital wallet that a user controls. That user can then present those credentials to verifiers (businesses that require those verified credentials to do business).
A verifiable credential consists of any attribute(s) that can be attached to a person. It contains important information about the person, including the issuer, who it was issued to, specific identity attributes, what they have access to, when the credential expires, and cryptographic proof of the credential's provenance. Examples of verifiable credentials include:
A verifiable credential consists of any attribute(s) that can be attached to a person. It contains important information about the person, including the issuer, who it was issued to, specific identity attributes, what they have access to, when the credential expires, and cryptographic proof of the credential's provenance. Examples of verifiable credentials include:
Verifiers can request specific credentials from users as they interact with their digital properties. This can be done through a QR code or via email. Businesses who have the requested information (issuers) can then cryptographically create those credentials and issue them to be stored in a user’s digital wallet. Wallets can include:
Verifiers can request specific credentials from users as they interact with their digital properties. This can be done through a QR code or via email. Businesses who have the requested information (issuers) can then cryptographically create those credentials and issue them to be stored in a user’s digital wallet. Wallets can include:
All credentials are tied to a real-life identity. This way, you know that the user interacting with your brand is a real-life human who has the attributes reflected in the credential. This is accomplished through:
All credentials are tied to a real-life identity. This way, you know that the user interacting with your brand is a real-life human who has the attributes reflected in the credential. This is accomplished through:
Face Liveness
Users are prompted to provide a selfie that is passively checked for liveness using ISO-certified technology.
Document Authentication
Users scan the front and back of their government ID using their mobile device’s camera and the ID’s authenticity is checked using over 150 weighted analyses and machine learning algorithms.
Identity Verification
The live selfie is compared to the photo of the user on the government ID and the results are linked to the user’s identity record.
Businesses that use verifiable credentials reduces the need to collect and store massive amounts of personally identifiable information for even the smallest of transactions. Any user data they do collect is user-approved.
Businesses that use verifiable credentials reduces the need to collect and store massive amounts of personally identifiable information for even the smallest of transactions. Any user data they do collect is user-approved.
PingOne Neo
Coming 2023