By clicking "Accept", you agree to the storing of cookies on your device to enhance site navigation, analyze site usage and assist in our marketing efforts. More info

How Decentralized ID works

Decentralized ID allows companies to generate tamper-proof digital credentials containing user information or identifiers. These credentials are stored by the user in a digital ID wallet and enable companies to pinpoint the exact person they’re verifying during onboarding, across multiple clients or siloed internal systems.

Core Components

Verifiable Credentials

Verifiable credentials are digital, cryptographically secured representations of identity information that cannot be modified or corrupted. These credentials are issued by trusted organizations, such as ID companies, governments, financial institutions, or businesses. They ensure authenticity and integrity of the information contained in them, allowing organizations to verify the user’s identity with confidence, without the risk of tampering or fraud.

Digital ID Wallets

Digital ID wallets store and manage verifiable credentials, providing users with control over their identity information. These wallets can be mobile app-based, allowing users to manage their credentials on the go, or cloud-based, offering flexibility depending on your organization’s needs. With digital ID wallets, users can present their credentials securely across different platforms and systems, streamlining the verification process while maintaining privacy and security.

STEP-BY-STEP GUIDE

How Decentralized ID Works

01 Issuance of a Verifiable Credential

When a user completes onboarding with one of your clients or siloed systems, you issue them a digital credential that identifies them. This credential is made tamper-proof using advanced cryptography to ensure security. The credential can include specific personal data, or simply an identifier that links them to your system—it’s entirely customizable to your needs.

02 Credential storage

The digital credential is securely stored by the user, either on your app, your client’s existing app, or in the cloud. This provides users with control over their credentials and ensures they have easy access when needed.

03 Onboarding and credential presentation

When the user later onboards with another one of your clients or siloed systems, they present the credential. During the onboarding process, the user will have the option to sign in using their verifiable credential by scanning a QR code to securely share it. This allows you to instantly recognize and match the user, speeding up the onboarding process.

04 Secure data exchange and privacy

The entire verification process is end-to-end encrypted, ensuring secure data exchange at every step. The user remains in full control of their data and must provide consent before any information is shared.

05 Continuous use across systems

Users can reuse their verifiable credentials across multiple platforms and systems, eliminating the need for repetitive data entry and document submissions. This ensures a seamless and frictionless experience each time.

Unlocking value across industries

Integrating Decentralized ID technology is not about displacing current offerings but enriching them. It easily integrates with existing services, leading to additional revenue streams without disrupting the established business model.

For IDV providers

Quickly identify the exact person you're trying to verify across your clients. Enhanced customer data matching reduces onboarding friction, boosts conversion rates in your clients' acquisition funnels, and elevates your position in their KYC hierarchy.

Learn more

In IAM / CIAM

Enable users to onboard across multiple siloed IAM systems. Reduce friction and eliminate redundant onboarding without needing to centralize or unify systems. Improve user experience and operational efficiency by recognizing users instantly across all platforms.

Learn more

In Biometrics

Tying biometrics to verifiable credentials guarantees that the person presenting the credential is the same one who received it. Verifiable credentials enable secure data transfers without exposing sensitive biometric information, ensuring compliance with user data regulations.

Learn more

Deploy 12x Faster

Why build all the infrastructure yourself? With Dock’s API, you can integrate with your system and data sources to deploy your entire Decentralized ID solution up to 12 times faster than using open-source options.

Learn more

Faster customer data matching, without adding friction

Reduce onboarding friction

When users present verifiable credentials during onboarding, you can instantly confirm they’ve been verified before and accurately match their data. This eliminates repetitive data entry and document submissions, reducing friction for users and streamlining the onboarding process across multiple clients or siloed IAM systems. As a result, the overall user experience and operational efficiency improve.

Streamline customer acquisition for your clients and business partners

Accurate customer data matching through verifiable credentials accelerates the verification process. This reduces delays and drop-offs, ultimately improving conversion rates in your client’s acquisition funnel.

Improve data accuracy and become your client’s preferred provider

Data inaccuracies force 61% of businesses to rely on multiple KYC providers, with 12% using three or more. Businesses are often required to piece together disparate results from different IDVs to make sense of the data. By improving customer data matching with verifiable credentials, you’ll enhance accuracy, eliminate the need for fragmented data reconciliation, and move up in your clients’ KYC hierarchy, positioning yourself as their preferred provider.

Achieve interoperability between clients and siloed systems

For IDV providers with large client bases, verifiable credentials allow seamless onboarding across multiple clients, speeding up both onboarding and data matching. For IAM systems, verifiable credentials enable faster onboarding across siloed systems without the need for complex unification, streamlining operations and reducing friction.

Put users in control of their ID verification

Allow users to own their ID verification experience by storing and reusing their verifiable credentials to onboard with other services. Instead of businesses piecing together fragmented data from multiple providers, users take charge of verifying themselves. This shift places the user at the center of the IDV process, simplifying onboarding and improving accuracy.

Why choose Dock?

Dock has been a pioneer in this space since 2017. Our platform is designed to be easily implemented and scalable, allowing organizations to quickly deploy a decentralized identity solution with minimal development overhead.

Learn more

REST API for core functions

Mobile SDK for wallet deployment

Developer-friendly integration

Create your first Verifiable Credential today

Dock enables IDV providers and IAM systems to verify the same person across multiple businesses or siloed systems. It enables them to easily confirm that a user has been verified before, create a consistent view of that user’s identity and significantly reduce onboarding friction.