One platform. One credential.
Every touchpoint.
Document verification, biometric authentication, multi-format credential issuance and verification, digital wallets, and cross-ecosystem governance. Indicio Proven® integrates all these in a single platform that you can quickly deploy without ripping and replacing your infrastructure. Proven scales from small business to country border and national ID. Standards-native, interoperable, and privacy preserving.
How it works
Issue, hold, present, verify
A Verifiable Credential is a tamper-proof, cryptographically signed digital credential held on a person’s device. Think of it as a sealed container: you can’t alter the contents without breaking the seal, and you can always verify who sealed it.
An organization verifies identity documents and biometrics and then issues a cryptographically-signed credential to the person’s mobile device. Indicio’s Issuer Agent software is quick to implement and easy to use.
The person stores the credential in a digital wallet on their phone. They control it. They consent to share their data. Organizations can also hold Verifiable Credentials in organizational wallets. Devices can be issued with credentials.
When proof is needed — at a border, a bank, an employer — the person shares their data or selected attributes from it. In person via NFC or BLE. Remotely via QR code or OpenID4VP. Always with explicit consent.
The verifier checks the cryptographic signature, confirms the issuer is trusted, and validates the data hasn't been tampered with. Instantly. No need to call back to the issuer. No data is stored.
Both sides authenticate before any data is shared. The holder confirms the verifier is who they claim to be. The verifier confirms the credential is genuine. Mutual trust backed by cryptography.
Platform
Everything you need in one solution
Onboard issuers, configure credential schemas, integrate with trust registries, and issue credentials in any format — all from a single agent that can be monetized.
- Multi-format issuance from one agent
- Configurable credential schemas
- Trust registry integration
- Issuer onboarding workflows
- Revocation management
Credentials stored on the holder’s device, protected by biometric authentication. White-label the wallet or embed credential functionality into your existing app via the SDK.
- White-label wallet or SDK embed
- Biometric-protected storage
- Selective disclosure
- Conversational credential exchange
- Offline presentation support
Verify credentials from any compliant wallet — including Apple, Google, and EUDI wallets. Mobile verifier apps, web-based verification, kiosk and POS integration. Verification can be monetized.
- Cryptographic signature validation
- Issuer authentication via trust lists
- Third-party wallet acceptance
- Mobile, web, and kiosk verifiers
- Revocation status checking
mdoc/mDL (ISO 18013-5/7), SD-JWT VC, W3C VC, JSON-LD, AnonCreds, VC-JWT, Open Badges 3.0, DTC Type 1 & 2, IATA One ID
OpenID4VCI, OpenID4VP, DIDComm, BLE, NFC, Wi-Fi Aware, QR & barcode exchange
NFC chip reading, OCR, MRZ scanning, VIZ validation, QR & barcode, ISO 39794 & 19794:2005. Face capture, liveness detection, 1:1 and 1:N matching.
X.509 certificate chains, DIF Credential Trust Establishment, Trust Over IP registry protocol, DEGov framework. Protocol-agnostic.
Integration
Three paths to deployment
Proven drops into your existing infrastructure. No rip-and-replace. Choose the integration path that fits your architecture, combine them, or choose to verify only.
Standard HTTP API calls and webhook events interact with the Proven agent on your server, connect to your data systems, and start issuing and verifying credentials. Follows standard REST conventions.
Everything needed to issue, hold, and present credentials from within your mobile app. Full credential lifecycle, document validation, biometric capture, and conversational credential exchange embedded in your brand.
A complete, pre-built digital wallet application branded to your identity. Deploy a fully-functional credential wallet without building from scratch. Ideal for fast time-to-market.
Bring Your Own Biometrics
Biometric verification
…without biometric storage
Authenticated biometrics are bound to the credential on the holder’s device. Relying parties verify the person — face, fingerprint, iris, voice — without having to store their biometric data.
IN-PERSON VERIFICATION
Face biometric at a border, gate, or branch
The holder presents their credential. A real-time liveness check captures their face. The verifier’s software compares the liveness capture to the authenticated biometric sealed in the credential without extracting or storing the biometric data.
REMOTE VERIFICATION
The customer presents their voice credential. They speak. The verifier’s software checks the digitally-signed credential data for source and integrity, then compares the live voice to the authenticated biometric, replacing knowledge-based authentication entirely.
No centralized biometric database to breach. Simplifies data protection compliance.
The biometric is bound to a specific device and cryptographic key. A synthetic face or voice can't replicate that binding.
Face, fingerprint, iris, voice — any biometric modality can be authenticated and sealed into a credential.
Built for
Deployed across industries
Digital Travel Credentials (DTC-1 and DTC-2), IATA One ID, airline check-in through border crossing and beyond. Country-scale deployments live today.
Learn more →Reusable KYC credentials, biometric-bound payment authentication, compliant onboarding for digital assets and DeFi.
Learn more →Verifiable I-9 documents, portable work authorization, real-time visa status. The identity layer for AI-speed immigration compliance.
Learn more →National ID credentials, digital driver's licenses, e-visa issuance, citizen services. EUDI-compatible, ICAO-aligned.
Learn more →Verifiable transcripts, professional certifications, Open Badges 3.0. Portable academic and professional achievements.
Learn more →Verifiable Credentials for AI agents and autonomous systems. Authenticate before access, delegate authority, maintain compliance trails.
Learn more →See it working with your use case.
Bring your architecture, your requirements, your constraints. We'll map them to the platform, walk through the integration path, and show you what a proof of concept looks like.
Book a session →