Shocard How it Works overview

How It Works

The first step in establishing one’s identity is to create a ShoCard ID.

ShoCard allows users and enterprises to establish their identities with one another in a secure, verified way so that any transaction–whether it’s to login, share personal information, or complete a financial transaction–can be accomplished quickly, seamlessly and with peace of mind.

Creating a ShoCard ID can be done either through our App, or a company or entity can build in our technology into their existing Apps via our SDK (Software Development Kit).


CREATING AN IDENTITY

User downloads the app to create a ShoCard ID.

User takes a picture of a valid, government issued ID.

ShoCard then extracts the personal information from these IDs.

The user confirms the data and then self-certifies.

For security, the user creates a passcode.(can also use fingerprint scan capabilities on their phone)

The information is encrypted and saved on the phone

ShoCard Uses industry-standard private/public key encryption techniques.

The app then takes further security measures to obfuscate the data. (it “hashes” and “digitally signs” the data)

ShoCard’s servers writes the hashed, signed data onto the blockchain.

This information is not available in any readable form to ShoCard or to

SHARING INFORMATON

The user decides to share her personal information with a third party.(financial institution, cable company,…etc)

She initiates an identity verification “handshake” with the 3rd party.(via the blockchain)

The information is placed in a fully encrypted data “envelope.” Only the intended recipientis able to decrypt.

In this scenario, not even ShoCard can access the information that is being sent as the encrypted envelope is completely opaque to all parties except the intended recipient.

The identities of both parties are confirmed. (through validation of the data shared, the sender’s public key and the signature-hashes on the blockchain).

THE END RESULT:A guaranteed verified transaction between user and enterprise.

Want the detailed technical version?

For a more granular look at this workflow download our white paper.

Download our white paper

Certifying a User’s Credentials

The Certification process can be done as part of a third party’s “Know Your Customer” process.

With permission the user’s ID credentials are verified for authenticity.

The user may be asked further questions to verify they are, in fact, who they say they are.

As a final security step the third party may review the information in the App.

Once an authoritative 3rd party (such as a financial institution, government or other trusted entity) “Certifies” the user’s ID, all other future parties can reference this certification and be assured that the information provided by user through the App is, in fact, accurate and belongs to them.

Below are examples of how this can work

The ShoCard SDK

Companies that already offer their own mobile apps to their customers can easily integrate ShoCard’s core features into their apps using ShoCard’s Software Development Kit.

learn more about the shocard sdk

Contact us to learn more about customizing our solution to fit your enterprise needs.