nChain Identity
Back to All
  • nChain Identity user documentation
  • 📑INTRODUCTION
    • Introduction to nChain Identity
    • Why choose nChain Identity?
      • DiD differentiators
    • How does nChain Identity work?
      • Data flows
      • Use cases and applications
    • Standards and regulations
  • 📄nChain Identity Issuers
    • What is an issuer?
    • How to become an issuer?
    • Operating an issuer
    • What do issuers do?
    • Issuer API
      • Overview
      • Getting Started
      • Examples
        • Issue an email credential
        • Revoke a claimed email credential
      • API Documentation
        • Credential Offers
        • Agent
        • Claims
  • 📑NCHAIN IDENTITY VERIFIER
    • What is a Verifier?
    • Operating a verifier
    • How to become a verifier?
    • Verifier API
      • Overview
      • Getting Started
      • Examples
        • Verify an email credential
      • API Documentation
        • Verifiable Presentation
        • Verifying
        • Agent
        • SIOP
        • Templates
  • 📄NCHAIN IDENTITY WALLET
    • What is the wallet for?
    • How to receive a Verifiable Credential?
    • How to share a Verifiable Credential?
  • 📑Privacy and Security
    • Privacy and Security Measures: NChain Identity Services
    • Revocation and data deletion
  • 🗃️SELF-SOVEREIGN IDENTITY KNOWLEDGE
    • Self-Sovereign Identity
    • Actors
    • Decentralized vs Self-Sovereign Identity
    • Key Principles of Self-Sovereign Identity
    • Self-Sovereign Identity – Use Cases
    • Digital Trust
    • Some of the critical components of Self Sovereign Identity
      • Trust over IP
    • Some of the critical components of Decentralise ID
      • A Blockchain Tailored for Decentralized Identity
      • Decentralise Identifiers (DiD)
      • Verifiable Credentials
      • Verifiable Presentations
  • 📑GLOSSARY
    • Glossary
  • 📄FAQs / HELP
    • Help & FAQs
      • What is a digital identity?
      • What is nChain Identity, and how does it work?
      • How is blockchain used in nChain Identity?
      • Compatible Blockchains for nChain Identity.
      • How can my business sign up for nChain Identity?
      • How is nChain Identity different to other identity solutions in the market?
      • Can nChain Identity communicate with other identity solutions?
      • What is nChain Identity doing with my data, and does it act as a data processor or controller?
      • What measures does nChain Identity take to protect user data?
      • What support is available for nChain Identity?
      • Can nChain Identity be integrated into our existing systems?
      • How can I get started with nChain Identity?
      • What countries is nChain Identity available in?
Powered by GitBook
On this page
  • Put users in command of their data.
  • Private!
  • Interoperability and security
  • What does the future look like?
  1. Privacy and Security

Privacy and Security Measures: NChain Identity Services

Put users in command of their data.

The nChain Identity Wallet React Native SDK is designed with composable feature sets, allowing you to activate only the features essential to your needs.

  • Efficiently handle Reusable verifiable credentials. Scan Verification QR Codes and present credentials for streamlined verification. Effectively create and manage Decentralised Identifiers (W3C compliant). Activate Verifier Mode to verify credentials from other users' wallets. Enhance security with the option to enable biometric authentication.

  • Data access management Users' data access is confidential and protected. nChain Identity's technology is purposefully crafted to ensure the security of user data by allowing data to remain securely in their local devices. Access is restricted by password or biometric authentication. Data is encrypted while at rest. Credentials and Verification Requests can only be decrypted by the respective DID owner. Users can create multiple DIDs, offering a versatile approach to data access management, preserving privacy and minimising correlation risks.

  • Secure Data Storage and Access Control: The secure storage of user data on local devices and password or biometric authentication encrypts data at rest. The option to back up data to trusted platforms will also be integrated. Access to credentials and verification requests is restricted to the respective DID owner, enforcing stringent access control measures.

Private!

  • Privacy enhancement Through thoughtful measures, we have significantly elevated the privacy standards within the nChain Identity ecosystem.

  • Restrict verified data to be shared. Our verification process requires the user to sign the information every time the credential is shared. If your signature is not there, the information is not valid. Even if someone duplicates your data, they can't use it in you behalf.

Interoperability and security

  • Efficient Credential Management: The efficient handling of Reusable Verifiable Credentials ensures that sensitive user information is managed seamlessly, limiting exposure during verification processes. This not only streamlines user experiences but also contributes to heightened data privacy.

  • Streamlined Verification Processes: The introduction of Verification QR Codes and the Wallet-to-Wallet verification process ensures that credential verification is conducted swiftly and securely. This streamlined approach minimises the potential exposure of user data, contributing to enhanced privacy protection.

  • DID Correlation Avoidance: Users have the flexibility to create multiple DIDs, enabling them to avoid correlation risks. This approach adds an extra layer of privacy by preventing the correlation of different user identity aspects.

What does the future look like?

  • Zero-Knowledge Proofs and Selective Disclosure: nChain Identity team is working on leveraging Zero-Knowledge Proofs and Selective Disclosure in the verification process to ensure that users can privately verify credentials without disclosing unnecessary information. This cryptographic approach adds an extra layer of privacy to the authentication process.

  • Selective Feature Activation: We are also working on implementing composable feature sets in the nChain Identity Wallet React Native SDK, allowing users to activate only the necessary features selectively. This ensures that user data is exposed only to the extent required for specific functionalities, enhancing overall privacy.

PreviousHow to share a Verifiable Credential?NextRevocation and data deletion

Last updated 8 months ago

📑