Valididy extends applications to ensure

real world truths

can be securely created, stored, shared, and trusted in the

digital world.

Provenance Trianglemore_vert

ensures data origins are cryptographically known

Provenance Triangleclose

ValidIDy creates a strong virtual triangle joining a piece of personal data (i.e. an attribute aka claim or identity assertion) to an individual, via an authentication device under their control. A ValidIDy capsule is a form of digital certificate, issued via ValidIDy web services by or on behalf of an Attribute Authority, and bound to a private key securely held within the device controlled by the end user. Proof of possession of a ValidIDy capsule means that the indivdual has the attribute in question, has been vouched for by the authority, and has used the attribute with express consent.

Valididy digitally captures the truth of

verified credentials

and embeds them into tamperproof

Data Capsules.

Data Capsulemore_vert

cryptographic envelope for validated data

Data Capsuleclose

A cryptographic envelope for data, a ValidIDy capsule cryptographically encapsulates discrete pieces of personal information or attributes, sealing in the provenance of each. Data capsules are carried safely in personal hardware devices (mobile phones, smartcards, crypto tokens, or IoT devices). Each capsule proves where its attribute came from and the authority that vouched for it. When a capsule is used to digitally sign a transaction, it indelibly ties the attribute to the transaction payload, and assures the receiver that the attribute has been under the positive control of its owner. ValidIDy capsules are a form of standard public key certificate, and leverage fully mature, industrial-strength PKI technologies and services.

Unsplashed background img 2

ValidIDy focuses on providing security and privacy enhancing solutions for indivduals and businesses as co-equal peers engaged in transactions. Truth is core to establishing relationships based on trust. Relationships should simply be between two parties without intermediaries.

More Security More Privacy More Cost Effective
Ensures provenance of individuals, Devices, Sources of truth Works off-chain Zero business process impacts
Works off-line Removes intermediaries Standards based, no lock-in, Mature Technology stack
Cannot be counterfeited Minimizes information disclosure Proves possession of credentials

Unsplashed background img 2

ValidIDy

Data Protection Platform
  • Enables software developers to securely and privately encapsulate personal attributes
  • Data Capsules are branded cryptographically sealed envelopes for verified attributes
  • Data Protection Engine includes a digital capsule wallet, capsule scanner, and capsule mint
  • Issued by sources of truth and conveying verified personal information
  • Data Capsules are a tamper proof 'currency of truth'.

Mint

For a Source of Truth to issue capsules
  • Cryptographically sealed capsules
  • Identity proofing via integration to internal and external systems
  • Deployed in the cloud or on-prem.

Wallet

For Individual capsule Personal Data Store
  • Prove your bona fides with data capsules
  • Exchange Mobile to Mobile with no intermediaries
  • Simple enrollment through the ValidIDy Mint.

Scanner

For Relying Party to consume a capsule
  • Proof of Provenance
  • Shows the Individual, the Device, and the Source of Truth
  • Verify data capsules in low or zero network environments.
Interested in branded ValidIDy Wallets for your customers?
Interested in the ValidIDy Scanner to prove client credentials and qualifications?
Interested in providing attestations via ValidIDy Mint?
Let us know mail

Solving BIG problems

Unsplashed background img 2
Workplace and security credentials more_vert
The Reference implementation of ValidIDy is a digital credential wallet developed under contract for the U.S. Department of Homeland Security, known as Mobile Device Attribute Validation (MDAV).

Mobile Device and Attribute Validation close

The Reference implementation of ValidIDy is a digital credential wallet developed under contract for the U.S. Department of Homeland Security, known as Mobile Device Attribute Validation (MDAV). The app allows First Responders attending emergency situations to prove their bona fides in the field. First Responders must usually present permits, licenses or certifications on plastic or paper cards. Mobile technology has long been a possibility for digital credentials, but integrity and authenticity - in other words, provenance - has been missing until now.

Here is some more information about this product that is only revealed once clicked on.

Government and Healthcare more_vert
Several recent breaches have exposed the Social Security Numbers and other identifiers of essentially all Americans. ValidIDy can protect people against having their stolen IDs used behind their backs.
Government and Healthcare Identities close

Several recent breaches have exposed the Social Security Numbers and other identifiers of essentially all Americans. ValidIDy can protect people against having their stolen IDs used behind their backs. It is not necessary to re-issue identifiers. The trick is to be able to tell "original" ID numbers from illicitly used copies.

ValidIDy can be used in multiple form factors – smart phones, smartcards, PCs or other personal devices – to protect any government issued data, including health identifiers, driver licenses, proof of age or immigration status.

Open banking
more_vert
Open Banking and related open data reforms are requiring financial institutions to remove barriers for customers to move their personal data (credit scores, transaction history, loan performance and so on) onto other financial services providers.
Open Banking close

Open Banking and related open data reforms are requiring financial institutions to remove barriers for customers to move their personal data (credit scores, transaction history, loan performance and so on) onto other financial services providers. With the loss of friction comes new security and privacy responsibilities, and new onus on the provenance of financial data. As information flows through open data supply chains, we need to know where it’s come from, who has given consent for it to flow, and the intended purpose for its disclosure

Partners

Unsplashed background img 3

Contact Us

Les Chasen United States of America les.chasen@valididy.com@lchasen
Bruce Goldsmith Australia bruce.goldsmith@valididy.com
Steve Wilson Austraila steve.wilson@valididy.com @steve_lockstep

Follow us on social media: