Home Page 2017-11-07T18:57:23+00:00

Download the latest version of the Trusted Key App:

  • Effortless Access
  • Simple Setup
  • Rock Solid Security
  • Total Control

Learn more here. See the full Trusted Key App user guide here.



Users hate passwords and enterprises know they can’t be trusted any more. Passwords are a pain to use and easy to hack or simply purchase on the dark web. What is needed is a new authentication solution that is easy to use, much more secure and works across both mobile apps and web sites. Trusted Key’s authentication system meets all these requirements and more.

Learn More

Know Your Customer

Banks, healthcare providers, transportation, and shared economy service providers now live in a world in which they must enroll new customers AND verify their identity without ever meeting them face-to-face. Trusted Key provides a frictionless, secure, re-usable, and privacy-preserving way for users to bring online their real-world government-issued identity documents (such as driver’s license or passport) and easily and securely use them to verify their identity to any app or service provider.

Learn More

Fraud Prevention

Card-Not-Present fraud is estimated to be a $5b problem globally[1] that is growing 25% annually. This trend is driven by the prevalence of completely valid credit card data available on the dark web and the relatively weak authentication schemes now being used by retailers and card issuers. Trusted Key provides a strong authentication solution for CNP transactions that conclusively validates users to Relying Parties while also protecting the user’s privacy.

[1] RSA – Jan. 2017

Learn More

Document Signing

Current document signing services, while convenient and easy to use, can only prove that a document was signed, not who actually signed it. This makes current digital signature solutions unsuitable for certain transactions for which reliable authentication is required. Trusted Key improves the effectiveness of digital signature solutions by providing users with a strong cryptographic identity which they can use to digitally sign documents and embed that identity into the document itself.

Learn More

Secure SSH Key Management

Trusted Key Secure SSH Key Management allows users to authorize use of their SSH key using their mobile phone making it highly secure and easy-to-use. The use of SSH keys has a wide range of applications for developers and enterprises managing services or Git repositories.

Learn More


Mobile Centered

The Trusted Key solution turns a user’s mobile phone into the singular device with which they can securely establish their identity and authenticate themselves to any any app or service. Trusted Key leverages the Trusted Execution Environment, biometric (e.g. fingerprint) authentication, and hi-res photo capabilities on modern mobile phones to enable the most robust security, yet with a radically simple user interface.

Learn More

Cryptographically Secured

Trusted Key uses strong cryptography to securely identify and authenticate users. Utilizing PKI,  secure Trusted Key Credentials and Tokens, and cryptographic challenge-response based authentication, the Trusted Key system eliminates passwords entirely, and as a result eliminates entire categories of attacks that hackers currently use to breach even the most secure systems.

Learn More

Blockchain Backed

Trusted Key uses blockchain technology to eliminate the need for a central repository of authentication credentials. In the Trusted Key system, user Credentials and Identity Tokens are registered on a blockchain so they can be independently verified and managed without users or service providers having to depend on a single centralized entity to maintain them.

Learn More

Latest Trusted Key Blog

Authenticated Identity with Trusted Key and Auth0

Click on the right side image to check out the Trusted Key guest post on Auth0's blog. In the post we detail how to implement Authenticated Identity using the Trusted Key Digital Identity Wallet together with Auth0's powerful back-end, and user management capabilities. Any conversations around real-life identity are likely to generate strong opinions. I personally believe that most people will easily embrace using a secure verified digital identity to make everyday tasks easier and more convenient such as setting up a bank account or participating in government services. Where the arguments usually start however is when real-life identity [...]

November 7th, 2017|