In the physical world, credentials like licenses, certificates, ID cards or documents are used to identify humans, enterprises and machines. The Spherity Wallet is the solution to manage any such credentials for entities in the digital world. Issuers, verifiers and holders of such verifiable credentials can use them for any kind of business operation.
Secure and Verifiable
Digital Identities for Business Transactions
Spherity – Cloud Identity Wallet
The Spherity Wallet.
Secures and Verifies all kind of Business and Supply-Chain Operations
Receivers of a credential can prove their authenticity by running a cryptographic verification on the issuer’s signature that is included in every credential. At scale, this automated presentation and verification of credentials establishes a network-effect of trust across a whole ecosystem of digital identities. As a result, enterprises, machines and humans can more readily exchange data and value in a secure and tamper-proof way.
Choose between Identity Wallet as
SaaS or SDK solution
The Spherity Wallet is available as a Software-as-a-Service solution or for deployment on the customer’s infrastructure as SDK.
Developers can simply use Spherity’s APIs to easily connect existing systems or applications to Cloud Identity Wallets as a SaaS solution.
The Spherity Wallet can be integrated as SDK into new or existing mobile applications. This enables individuals (whether employees or end-customers) to sign and manage wallet operations from their mobile devices.
What you can do with Spherity
We provide digital identity cloud solutions for enterprises, machines, algorithms and data
to secure interaction in the digital economy.
Run Digital Identities with Ease
- Control and connect your blockchain-secured human, enterprise, object or machine identity along any value chain.
Increase Interoperability between Systems
- Empower secure and object-related data access from everywhere along a value chain using our digital identity technology.
Designed for Secure and
Verifiable business transactions among enterprises via their digital identities
Every digital identity is cryptographically verifiable, addressable and unique
All transactions between digital identities are interlinked to form powerful audit trails
Digital identities issue, store, present and verify portable credentials
Customers can use our out-of-the box package or cherry-pick features.
Each customer tenant of the Spherity Wallet can be customized to the needs of a specific use case.
Manage the lifecycle of digital enterprise, product and human identities
Transfer ownership of identities and credentials
Use digital identities for secure and tamper-proof business operations
Exchange data and documents as signed credential
Configure and administer robust access control policies using credentials
The interoperable Spherity Wallet is blockchain agnostic, compatible with different types of key management options and can be deployed on cloud, server or device infrastructures. We consult all our customers to configure the identity wallets to the needs of their use case.
- Integration of full DID methods compatible with Hyperledger Indy (Aries), Ethereum, and Quorum.
- Robust and interoperable handling of W3C-compliant DIDs and Verifiable Credentials (VCs), including the capabilities to propose, request, issue, offer and present credentials between all kinds of wallets
An integrated local instance of the Universal DID Resolver for resolution of external DIDs from all platforms and major blockchains registered through the W3C registry process.
The Spherity Wallet is available as a Software-as-a-Service solution or as application SDK.
With the SaaS option developers can simply use Spherity’s APIs to easily connect existing systems or applications to Spherity's Cloud Identity Wallet and use all features .
With the SDK the Spherity Cloud Identity Wallet can be integrated into new or existing mobile applications. This enables individuals (whether employees or end-customers) to sign and manage wallet operations from their mobile devices.
Two options for key management:
- Custodial implementation (SW key stores, cloud HSMs, MPC)
- Non-custodial implementation (e.g. with MPC, customer HSM, smartphone edge, FIPS 140-2 Level 2/3 for Key Management)
- Integration of a database as storage for wallet configurations and credentials (MongoDB // DynamoDB)
- Customer IdP and IAM integration (OpenID connect, oAuth 2.0, SAML 2.0)