top of page

FAQs

Digital Identity and Authentication cover a huge range of concepts. Below we describe how they are relevant to the twine platform.

What is a digital identity?

The twine platform is built around the digital identities of individuals. Some examples:

  • To shop online, you will very often have to create an account (with name, age, address, etc)

  • Credit reference agencies (e.g. Experian) source information from banks and utility companies, amongst others, to create their own profile

  • Government agencies, who are often the ultimate authority of identity, hold digital records

It is easy to imagine how the average individual has over 250 active digital identities!

What is a re-usable digital identity?

The concept of re-usable digital identity is one that can be used across multiple parties, and more specifically covers the ability for an individual to use the digital identity they have created with one business with another business (rather than creating a new one). Many government agencies and private companies are facilitate this, including dedicated re-usable digital identities.

What is a verified digital identity?

A verified digital identity is one where the attributes have been verified to some degree. Verification comes in many different forms, and often depends on the purpose. For example, it is helpful for a credit reference agency to have individuals verify/confirm that their profile is accurate. However, it is not acceptable for an individual to verify their own DOB when buying alcohol – therefore an online business may review a customer’s driver’s license.

What is authentication?

Authentication is the process of confirming an individual’s ownership of a digital identity, or creating/confirming a secure channel of communication (often between a business and an individual).

In the internet age, the most common form of digital authentication is the password. Ideally only an individual should know their password - therefore, if the individual confirms the correct password, it can be accepted that one is dealing with the correct individual (as opposed to an impersonator).

Authentication is notionally split into three categories; something you know, something you have, and something you are. Passwords fall into the something you know category, alongside things like personal information (e.g. mother’s maiden name). A common form of something you have based authentication is your mobile phone, confirmed with a code sent by SMS. Something you are is equivalent to biometric authentication (e.g. fingerprint or face scanner on a smartphone).

The twine platform

The twine platform bring together digital identity, authentication and payment applications within a single orchestration API, allowing businesses to build solutions tailored to their business needs and customer base.

More questions?

We're here to provide answers.
Don't hesitate to contact us for any inquiries you may have.

Follow us

  • LinkedIn

©2024 by twine 

bottom of page