Verified identity decentralized with blockchain technology.
Civic’s Secure Identity Platform (SIP) uses a verified identity for secure registrations and logins on web and mobile apps without the need for usernames or passwords.
User authentication is a growing security threat that organizations face today. With identity theft and data breach numbers reaching new heights every year, businesses pay millions of dollars to ensure that the transactions on their servers are authentic. Hackers steal identities and impersonate valid customers, racking up thousands of dollars of fraudulent charges.
Authenticate without the need for traditional physical IDs, knowledge-based authentication, username/password, and two-factor hardware tokens. Here are some of the services and solutions we are launching with our Civic Business Customers, but many more are under development.
Through our decentralized architecture with the blockchain and biometrics on the mobile device, our platform provides secure registration and login without a username, password, third-party authenticator, or physical hardware token.
Keys are generated by a third-party wallet, providing a firewall between Civic and users’ keys
Identity data is fully encrypted in the app on the user’s device and can be accessed with biometrics
Public identifier for the authenticating authority, hashed identity data, and a flag indicating the data is still valid
New account creation can be simplified by providing verified identity data with the Civic app. While this service may sound similar to Facebook Login, Civic’s Secure Private Sign-up (SPS) and Secure Private Login (SPL) offers both privacy of data transactions and greater trust in user identity.
By utilizing SPS, you can rest assured that new accounts are created by the true owner of the identity data. Civic’s SPL enables you to allow your users to log in to your web and mobile apps without a username or password. SPL provides a better user experience and multi-factor authentication without weak passwords, password reset vulnerabilities, and the hassle of legacy two-factor authentication.