Knowledge Base

Your guide to the technologies, standards, and policies shaping modern digital identity services.

clouds-rolling-over-mountains
clouds-rolling-over-mountains
clouds-rolling-over-mountains

Learn About Trust Infrastructure

The cryptographic backbone ensuring security, including PKI, encryption keys, and trust frameworks that establish reliability between issuers and verifiers.

Learn About Mobile Driver’s Licenses (mDLs)

A deep dive into mobile driver’s licenses, covering their functionality, security features, data structure, and adoption in the real world.

Learn About Verifiable Digital Credentials

Explaining the technology behind cryptographically secure credentials, including digital signatures, device binding, and the mechanisms that ensure data authenticity.

Learn About Credential Formats & Standards

A comparison of technical standards like ISO mDL and W3C Verifiable Credentials that ensure compatibility across different systems and jurisdictions.

Learn About Verification Mechanisms

Methods and protocols for checking credential validity, covering online and offline modes, hardware interactions, and the mechanics of proving identity.

Learn About Assurance & Lifecycle Management

Understanding identity confidence levels (NIST IAL) and the complete management of a credential from issuance to revocation and portability.

Learn About Privacy-Preserving Design

Principles and technologies like Zero-Knowledge Proofs and selective disclosure that maximize user privacy and minimize data retention.

Learn About Privacy Risks & Fraud Prevention

Analyzing threats such as synthetic fraud and collusion, along with safeguards like liveness checks and pairwise identifiers to protect users.

Learn About Digital Wallets & Device Security

How digital wallets utilize device hardware like TEEs and Secure Elements to safely store keys and manage user assets.

Learn About Authentication & Access Protocols

The standards enabling secure access and login, including OAuth, OIDC, and Passkeys, and how they differ from authorization.

Learn About Global Ecosystem & Regulations

Key regulations and organizations driving the global landscape, including GDPR, eIDAS, and the bodies setting technical standards.

Learn About Real-World Use Cases

Practical applications of digital identity across industries, from airport security and age verification to government benefits and healthcare.

Safe and secure

SpruceID builds the digital trust infrastructure governments need to modernize securely.

Safe and secure

SpruceID builds the digital trust infrastructure governments need to modernize securely.