Trusted Key’s digital identity platform provides a powerful end-to-end solution, whether you’re an ecosystem of 5 or 300 organizations, 1,000 or 300 Million+ users.

We combined innovative mobile and blockchain technologies into a platform that enables you to:

  • Eliminate centralized repositories of identities and passwords to meet growing regulatory requirements.
  • Build a common identity ecosystem that reduces enterprise risk and enables new digital experiences.
  • Have full control of your ecosystem, including who can participate as an issuing or relying party.
  • Deliver a secure user experience on mobile phones. Leverage our efficient blockchain technology without compromising efficiency.
  • Lead with your own brand by using our white-label solution.

Trusted Key Platform

Trusted Key’s digital identity platform provides a powerful end-to-end solution, whether you’re an ecosystem of 5 or 300 organizations, 1,000 or 300 Million+ users.
We combine innovative mobile and blockchain technologies into a platform that enables you to:

  • Deliver a secure user experience on mobile phones
  • Lead with your own brand by using our white-label solution
  • Build a common identity ecosystem that reduces enterprise risk and enables new digital experiences
  • Have full control of your ecosystem, including who can participate as an issuing or relying party
  • Eliminate centralized repositories of identities and passwords to meet growing regulatory requirements
  • Leverage our efficient blockchain technology without compromising performance

All the Tools Needed to Build Digital Trust

Each component of the Trusted Key’s digital identity platform has been designed from the ground up to power a wide range of industry use cases and enable scaling of digital identity across any ecosystem.

All the Tools Needed to Build
Digital Trust
Each component of the Trusted Key’s digital identity platform has been designed from the ground up to power a wide range of industry use cases and enable scaling of digital identity across any ecosystem.

Core Features

Password-less Secure Login

  • Eliminate need for usernames or passwords
  • Secure Multi-factor authentication

Authenticated Identity KYC

  • Frictionless & secure path to onboard government IDs
  • Plug and play with wide range of 3rd party proofing services

Transaction & Document Signing

  • Request explicit user approval for any type of request
  • Embedded cryptographic signatures for security and chain of trust

Platform Components

Identity Wallet

Trusted Key platform is centered around an “Identity Wallet” mobile application that enables users to create and manage their digital identity.

  • Tools that allow users to easily capture and verify their ID documents and store them securely
  • Simple and secure multi-factor authentication and authorization
  • Easy backup and recovery when changing mobile phones
  • Availability on iOS and Android

SDK

Trusted Key SDK allows organization to easily integrate Trusted Key functionality into their applications and websites.

  • White-labeled mobile SDK for easy integration of key features for iOS and Android
  • Rapid prototyping for generating real-life proof of concepts
  • Easy integration of Relying Party support into any website or application
  • Integration support for major industry platforms

Cloud Identity Services

Trusted Key’s Cloud Identity Services enable Issuing Parties and Relying Parties to interact securely with users’ Identity Wallets and with the underlying blockchain infrastructure.

  • Relying Party Services to support interactions between the Identity Wallet and Relying Parties through OpenID Connect
  • Issuing Party Services for easy claim construction and life-cycle management
  • Claim Management for blockchain registration, transfer, and validity verification of claims

Blockchain

Blockchain is a key component of the Trusted Key platform. It enables management of claims and backup/recovery of Identity Wallets.

  • Registry of user Identity Wallets and issued claims. State changes tracked on blockchain
  • Cloud Identity Services enable developers to build applications without worrying about the underlying details of the blockchain implementation
  • Users can perform backup and self-recovery of their Identity Wallets using the blockchain smart contract in the event of losing or replacing phone

Developer and Admin Portals

Trusted Key’s developer and admin portal serves as a single entry-point for developers to register with Trusted Key in order to build, deploy, and manage applications.

  • Full suite of analytics allowing dev-ops personnel to monitor the usage and health of their applications
  • Developers can register and receive credentials for creating and managing Relying Party and Issuing Party services
  • Extensive documentation on Trusted Key Cloud Services, SDK, sample apps, code snippets, and usage guides

3rd Party Integrations

Trusted Key had integrated with a wide range of 3rd-party IAM service providers and proofing services.

  • Designed with a plug-in architecture and open standard support for easy integration with wide range of 3rd party services
  • Tested support with multiple IAM and proofing vendors
  • Integrated flows for selfies and taking photos of ID documents, which can then be passed to the 3rd-party service for validation

Platform Components

Identity Wallet

Trusted Key platform is centered around an “Identity Wallet” mobile application that enables users to create and manage their digital identity.

  • Tools that allow users to easily capture and verify their ID documents and store them securely
  • Simple and secure multi-factor authentication and authorization
  • Easy backup and recovery when changing mobile phones
  • Availability on iOS and Android

SDK

Trusted Key SDK allows organization to easily integrate Trusted Key functionality into their applications and websites.

  • White-labeled mobile SDK for easy integration of key features for iOS and Android
  • Rapid prototyping for generating real-life proof of concepts
  • Easy integration of Relying Party support into any website or application
  • Integration support for major industry platforms

Cloud Identity Services

Trusted Key’s Cloud Identity Services enable Issuing Parties and Relying Parties to interact securely with users’ Identity Wallets and with the underlying blockchain infrastructure.

  • Relying Party Services to support interactions between the Identity Wallet and Relying Parties through OpenID Connect
  • Issuing Party Services for easy claim construction and life-cycle management
  • Claim Management for blockchain registration, transfer, and validity verification of claims

Blockchain

Blockchain is a key component of the Trusted Key platform. It enables management of claims and backup/recovery of Identity Wallets.

  • Registry of user Identity Wallets and issued claims. State changes tracked on blockchain
  • Cloud Identity Services enable developers to build applications without worrying about the underlying details of the blockchain implementation
  • Users can perform backup and self-recovery of their Identity Wallets using the blockchain smart contract in the event of losing or replacing phone

Developer and Admin Portals

Trusted Key’s developer and admin portal serves as a single entry-point for developers to register with Trusted Key in order to build, deploy, and manage applications.

  • Full suite of analytics allowing dev-ops personnel to monitor the usage and health of their applications
  • Developers can register and receive credentials for creating and managing Relying Party and Issuing Party services
  • Extensive documentation on Trusted Key Cloud Services, SDK, sample apps, code snippets, and usage guides

3rd Party Integrations

Trusted Key had integrated with a wide range of 3rd-party IAM service providers and proofing services.

  • Designed with a plug-in architecture and open standard support for easy integration with wide range of 3rd party services
  • Tested support with multiple IAM and proofing vendors
  • Integrated flows for selfies and taking photos of ID documents, which can then be passed to the 3rd-party service for validation