mobility management - Autobahn scale

Identity wallets for the future of mobility

The electrified, shared and autonomous urban mobility of the near future will be built on a network of humans, cars, sensors, service providers, fleet operators and regulators.

Spherity creates Digital Twins for all entities in the mobility ecosystem and provides an identity wallet to manage them. All the claims issued and relevant information (rental terms, payment options, and access controls, for instance) are organized in an intuitive identity wallet. This way, service providers can manage their data, transfer ownership, or aggregate multiple vehicles to a fleet quickly and simply. Humans can rent or access vehicles by presenting verified credentials, so that humans and service providers don’t need to run inconvenient and redundant authentication processes.

Our Digital Twins are created by integrating Spherity’s APIs to the existing backend and on-boarding systems of other identity verification providers. Spherity provides existing business applications with its identity wallet.

Audit trails for supply chain management

Today’s supply chains are complex and opaque, with countless layers of subcontractors and siloes between materials and manufactured product. Manufacturing requirements, production specifications, and design parameters can be combined to form a “prototypical” Digital Twin even before a physical prototype of a product has been created. This digital twin is a permanent, addressable and verifiable object, that stores data about how the object was designed, assembled, tested, transported, deployed, operated or decommissioned.

Along the life-cycle of the Digital Twin, suppliers, auditors, machines, workers, freight forwarders, algorithms, and IT systems “sign” data about their role in the process securely.  These upstream participants, even if they are anonymous or secretive between one another, sign all their data with cryptographically verifiable digital identities, allowing regulators and end-consumers all the visibility they need into the history of a given product or item.

Based on this traceable and granular identification system for all players in the supply chain and the cyber-physical link between products and their Digital Twins, Spherity creates an immutable and tamper-proof data chain of all transactions. Spherity connects existing IT systems in supply chain processes and links their data via service endpoints to the Digital Twins. This next-generation data environment brings a new level of auditability and visibility, yet respects decentralization and data portability principles for a more open and interoperable data-rich future.

supply chain management - international port scale

Overview of use cases by industry supported by our identity and Digital Twin solutions


Benefits of a Digital Twin

Example applications


Digital Twins of cars capture vehicle lifecycle data (e.g. mileage, engine or maintenance data) that can be shared; identities of mobility ecosystem partners allow seamless mobility transactions.

  • Lifecycle of cars and audit trails for fleet operators or insurance providers
  • Access control, insurance and invoicing for peer-to-peer (p2p) carsharing


Digital Twins monitor and gather machine, production line and raw materials data along the manufacturing process in a cryptographically secure way.

  • Digital lifecycle management with audit trail for products as value-added service for customer


Digital Twins capture, visualise and optimise the material flow in value chains; they also store and share signed business process information and regulatory documents.

  • Privacy-preserving data exchange in Supply Networks
  • Improved exchange of credentials in 3rd party risk management


Digital Twins of wind turbines enable predictive maintenance; sensor data from smart meters enable trusted business transactions.

  • Data audit trails for smart meter data
  • Automated settlement of power purchase agreements


Digital Twins map a patient’s health data from different hospitals and mobile health devices for monitoring.

  • Healthcare pass for privacy-preserving exchange of sensitive health data
  • Consent management in clinical trials