Your company is sitting on a gold mine of verified user data. Unum ID lets you put that gold to use. It transforms your mobile app into a virtual ID card that stores a user's data securely on their device. This empowers the user to easily prove who they are to sign up for new services. You'll earn revenue from relying parties and become essential to your users far beyond your main line of business.
Crucially, a user's data is only shared with their full consent. Unum ID's Encrypted Domain architecture ensures ultimate privacy and security.
Avoid slow, expensive identity verification processes. People who want to sign up for your service already have verified identity data with other organizations. With Unum ID, you can request that data to instantly onboard those users, for a fraction of the usual cost.
Watch the speed comparison video below to see just how lightning fast sharified identity truly is.
The magic of Unum ID is that we coordinate sharing of verified identity data, but we never have access to the data. A user's data is encrypted before it's sent to us, and only the merchant can decrypt it. This is the power of our Encrypted Domain approach.
The diagram above shows an example of how this works. The issuer has added the Unum ID Mobile SDK to its app. When the user shares their data, the SDK encrypts it so that only the relying party can decrypt it. This is done locally, on the user's device, leveraging the trusted execution environment (TEE). The encrypted data is sent to the Unum ID Identity Engine cloud, which routes it to the merchant. The relying party then decrypts the data using the Unum ID Server SDK. This is also done locally, on the relying party's server.
Unum ID uses end-to-end encryption throughout. Standard encryption like TLS applies to the data in transit and at rest, but another layer of encryption ensures that Unum ID never has access to sensitive user data. Only the relying party, which the user explicitly agrees to share their data with, can decrypt that data. We built this solution from the ground up to achieve ultimate privacy and security.
Learn how our technology prevents account takeover attacks like phishing, SIM swapping, and credential stuffing. The short answer? We eliminate shared secrets. There's nothing to intercept.