Web Log In
At Blerify, Points of Verification (POVs) are a key tool that enables third parties, such as organizations or merchants, to securely and efficiently verify verifiable credentials issued under international standards like ISO 18013-5 (for mobile driver’s licenses) or W3C Verifiable Credentials. These POVs act as interaction points where digital credentials can be validated in real-time, ensuring their authenticity, integrity, and validity.
POVs are designed to integrate seamlessly into existing systems, such as web applications, mobile apps, or e-commerce platforms, allowing organizations to verify credentials quickly and reliably. This is especially useful in scenarios where it is necessary to validate a user’s identity, permissions, or any other attribute contained in a digital credential.
Why a POV is Ideal for Organizational Login Systems
Enhanced Security:
A POV verifies the authenticity of digital credentials using cryptographic signatures and blockchain technology, ensuring that only legitimate credentials are accepted.
This reduces the risk of fraudulent logins, such as phishing attacks or stolen credentials, since the credentials are tied to the user’s identity and cannot be easily forged.
User Privacy:
POVs support selective disclosure, meaning users only share the information necessary for login (e.g., proof of identity or age) without revealing unnecessary personal data.
This aligns with privacy-by-design principles, ensuring compliance with regulations like GDPR.
Seamless User Experience:
Users can log in by simply presenting their digital credentials (e.g., from a mobile wallet) instead of remembering complex passwords or going through multi-factor authentication (MFA) processes.
This creates a frictionless login experience, improving user satisfaction.
Interoperability:
POVs are compatible with global standards like ISO 18013-5 (for mDLs) and W3C Verifiable Credentials, making them suitable for organizations that operate across different regions or industries.
This ensures that the login system can work with a wide range of digital credentials issued by trusted entities.
Real-Time Verification:
POVs perform real-time checks on the status of credentials, such as whether they have been revoked or expired.
This ensures that only valid and up-to-date credentials are accepted for login.
Customizable Verification Policies:
Organizations can configure POVs to enforce specific login policies, such as:
Requiring credentials from trusted issuers (e.g., government-issued IDs or corporate credentials).
Verifying specific attributes (e.g., age, role, or membership status) to grant access to certain resources.
Reduced Password Management Overhead:
By replacing traditional username/password systems with credential-based logins, organizations can eliminate the costs and risks associated with password management, such as password resets or breaches.
Scalability:
POVs are designed to handle high volumes of verification requests, making them suitable for organizations of all sizes, from small businesses to large enterprises.
How a POV Works in a Login System
User Presents Credential:
The user attempts to log in by presenting a digital credential (e.g., an mDL or verifiable credential) from their mobile wallet or app.
POV Verification:
The POV verifies the credential by:
Checking the cryptographic signature to ensure it hasn’t been tampered with.
Validating the issuer’s legitimacy (e.g., confirming it was issued by a trusted government or organization).
Checking the credential status (e.g., ensuring it hasn’t been revoked or expired).
Attribute Verification:
The POV verifies specific attributes required for login, such as:
Identity: Confirming the user is who they claim to be.
Role or Membership: Ensuring the user has the necessary permissions to access the system.
Login Approval:
If the credential and attributes are valid, the POV approves the login request, granting the user access to the system.
Notification:
Both the user and the organization receive a notification confirming the successful login.
Benefits of Using a POV for Organizational Login
Strong Authentication: Replaces weak passwords with secure, cryptographically signed credentials.
Fraud Prevention: Reduces the risk of unauthorized access through credential verification.
Privacy Protection: Users only share the minimum required information.
User Convenience: Simplifies the login process by eliminating the need for passwords or complex MFA.
Compliance: Helps organizations meet regulatory requirements for identity verification and data protection.
Scalability: Supports high volumes of login requests, making it suitable for large organizations.
Last updated