Set up a Verification Request and send the Verification QR Code to your users. Users scan it with their wallets, and the credentials' authenticity is verified in seconds.
Verifiers can import the Verification QR Code to their wallets to enable Wallet-to-Wallet Verification. Users can scan the Verification QR Code directly from the Verifier’s wallet, and the Verifier will receive immediate confirmation of the Credential’s authenticity.
Verify on the web
Display the Verification QR Code on the web using a URL that users can scan with their ID Wallets.
Embed a Widget on your site that automatically displays the Verification QR Code for users to scan with their ID Wallet apps.
When submitting a credential for verification, users can prove something about themselves without revealing the data contained in the credential. For example, a user can prove she is over 18 without revealing her birthdate or age. Dock enables this through a cryptographic technique called Zero-Knowledge Proofs.
When users submit a credential for verification, they can share one attribute in the credential without submitting the entire credential. For example, a student could share the name of his university from his Student Card without sharing his name or student number.
Regulations such as GDPR require the minimization of data processing. This means that organizations are obligated to only use, collect, or access data necessary for the intended operation. Through the use of privacy-preserving techniques such as Zero-Knowledge Proofs and Selective Disclosure, you'll be able to access only the minimum data necessary from your users. Ensuring you're compliant with data regulations and reducing the risk of potential data breaches.
Credentials issued through Dock are portable. Dock's technology is built on W3C open standards such as Verifiable Credentials and Decentralized Identifiers. This ensures that users can store their credentials on any digital wallet that adheres to these standards and that any stakeholder, wherever they are in the world, can verify the authenticity of the data as long as their verification system adheres to these standards.