Verifiable credentials are cryptographically secure digital proofs containing any identity data, issued to users’ biometrically secured device wallets. They contain important information about the issuer, who it was issued to, specific identity attributes, and expiration, ensuring the provenance of the credential and a chain of trust. Verifiable credentials are used for any data that necessitates real-time verification.
How Do Verifiable Credentials
Benefit My Business?
Selfie capture, document authentication, and photo matching multiple times are expensive. Verifiable credentials eliminate the need for redundant identity verifications, while still maintaining top-level security.
Credentials help eliminate honeypots and reduce the amount of sensitive, personal data you collect and store. They also ensure user consent and privacy, helping you meet regulatory frameworks.
Reduce frustration by making it simple for users to securely verify their identity, authenticate, and authorize with one click, swipe, or biometric capture.
Centralized credential management
Built-in consent and privacy
Automated issuance
Easy embedding into wallets and apps
Creating Credentials
Verifiable credentials consist of a defined dataset that you want verified in real-time and/or shared by users. They also include information related to the issuing terms, like the expiration date. Credentials must meet specific standards to be stored in a device wallet.
Storing Credentials
To use a credential, users must first have a way of storing it on their device. They need to pair their account with a compatible wallet app on their device. When a user meets the issuance rules they are auto-issued the credential.
Issuing & Managing Credentials
By defining issuance criteria and associated rules, you determine who is eligible to receive the credential and the terms for revocation. To make management simple and turnkey and to meet regulatory frameworks, credential issuance and usage must be tracked in a central administrative portal.
New or
Authenticated
User
Identity
Verification
Collate Verified
3rd Party
Attributes
Assign “Minted”
Attributes
Issue & Sign
Credential
Provision the
Credential to
User’s Wallet
New or
Authenticated
User
Identity
Verification
Collate Verified
3rd Party
Attributes
Assign “Minted”
Attributes
Issue & Sign
Credential
Provision the
Credential to
User’s Wallet
Any identity, affiliation, eligibility, or attribute can be included within a credential across the workforce, B2B, and consumer digital experiences. For example, sharing secure information (and access to that information) through the supply chain or earning special travel status with one airline and sharing that status with a car rental company for a discount. Additional examples of credentials include:
Mobile Drivers License and National ID Card
University Degree and Professional Certifications
Proof of Insurance and Healthcare Card
Loyalty Programs and Benefits Sharing
Employment Status
Membership Status
Entitlements
The credential owners, your users, must consent before credentials can be shared, including whether the full credential or only some data is shared. They also are physically present when the credential is shown and verified, so they understand who they are sharing it with.
The credential owners, your users, must consent before credentials can be shared, including whether the full credential or only some data is shared. They also are physically present when the credential is shown and verified, so they understand who they are sharing it with.
Easily combine identity verification with a credential issuing service to reduce repeated verifications, improving user experience. Users can share their credentials with other organizations to quickly and effortlessly prove who they are. Issuing and verifying credentials reduces the costs associated with repeat verifications, managing and storing PII and attributes, and mitigating identity fraud.
Digital User Presents Verifiable Credential in Device Wallet
Organizations Verify User’s Credential
User is Verified, Authenticated, and Authorized Instantly
Digital User Presents Verifiable
Credential in Device Wallet
Organizations Verify
User’s Credential
User is Verified, Authenticated,
and Authorized Instantly
When using credentials alongside user identity verification and access management, a new form of identity management emerges that is an attractive choice for enterprises. Decentralized Identity (DCI) can also help merge physical and digital experiences, as it puts users in control of their own data and whom it is shared with.
Identity management completely reimagined with Decentralized Identity
Start Today
Contact Sales
See how Ping can help you deliver secure employee and customer experiences in a rapidly evolving digital world.
Request a FREE Demo