Simplify KYC/AML compliance.
End-to-end transparency and accountability.
Distributed key management for securing digital assets.
Protect your customers. Build trust by asking for less.
NuID uses public key cryptography and distributed ledger technology to eliminate the need for businesses to store users’ sensitive authentication data. Passwords, security questions, and other authentication data are some of the most-targeted information in enterprise-level hacks. With NuID, your company can validate users’ identities without the costs and risks of traditional authentication.
Unlike centralized authentication methods, our zero-knowledge architecture allows for trustless authentication, which means even we do not have access to users’ private keys.
The NuID protocol is factor-agnostic and built to scale with the increased adoption of biometric, behavioral, and other authentication factors. A modular design allows for flexible multi-factor implementations.
Whether you are looking for internal transparency and accountability solutions, want to enhance user protections while improving experience, or are seeking to secure digital assets with seamless compliance, NuID’s multi-factor and biometric scalability allows your business to move beyond the password.
While the NuID protocol provides for streamlined authentication of users, it further allows them to trustlessly secure any sensitive data using their NuID authentication keys. This solves the primary issue regarding security and custody of crypto-assets and will alleviate difficulties of AML/KYC compliance.
Businesses looking to secure crypto-assets, either for themselves or for clients, face the dilemma of either storing keys locally or entrusting them to a third party. Storing keys for crypto-assets locally introduces risks of asset-loss, limited accessibility, and custody issues. Using cloud-based key management services relinquishes control over those assets.
NuID offers a new way: distributed key management in which users maintain full control of their private keys, accessible anywhere via our trustless and secure authentication protocol.
The NuID client libraries are designed to simplify development in many sensitive aspects of modern services. Stay tuned as the APIs stabilize and this list fills in.
Authenticate and manage user sessions.
Securely store and share.
Transact with NuID.
Attribute sharing, attestations, and validation.
Every time you sign up for a new online service, you're giving it something. Sometimes the requirements are seemingly trivial, like a standard username and password. Other times they ask for more sensitive information, such as your birthdate, phone number, or social security number. That data is tremendously valuable.
You are trusting each service to handle these valuables appropriately: to protect your privacy by maintaining responsible data handling policies, to frequently audit code and infrastructure for security vulnerabilities, and to treat users fairly. Many services uphold these best practices. Many don't.
NuID's trustless authentication workflow aims to address the complexity services face in implementing security best practices. We’re making it easier to do the right thing. Trustless authentication means that only you can register, access, or revoke the digital authentication keys that enable secure and private interactions online. No passwords or sensitive data are shared to prove who you are. It’s simple: only you should hold your keys to the Internet.