Crayonic develops hardware module to secure digital identity. We refer to it as Crayonic Identity Core or CIC . CIC hardware module is running Crayonic Identity OS firmware which will soon be open sourced. These two technologies combined are the basis for all identity projects within our company and soon it will be available to any one wishing to develop projects where secure identity plays a major role. This technology is protecting identities in all types of digital interactions: person-to-person (P2P) , person-to-machine (P2M), machine-to-machine (M2M).
Read further about technical details on Crayonic Pen - our flagship product built on top of CIC that fully utilizes its machine learning algorithms in combination with cryptography to protect digital identity of a person. For machine-to-machine use case, please see our case study in IOT identity section.
Crayonic Pen uses Crayonic Identity Module for use cases where very strong proof of personal identity is required in digital transactions. With the following core features:
1) an identity stored within CC EAL 5+ certified secure element of CIC,
2) strong local triple factor authentication with implicit liveness detection,
3) secure storage, secure input (handwritten secrets), and secure output (built-in display),
our technology goes beyond the minimum requirements of EU eIDAS regulation on Qualified Signature Creation Device. After the finalised eIDAS QSCD certification, we will release our next generation of CIC module and Crayonic Pen. Thus enabling EU eID support to all projects that need strict KYC compliance, especially in regulated verticals and e-government.
Security plays a crucial role in authentication as it is directly responsible for creating digital trust between digital identities. In our experience, the hardest parts of authentication process is the part of tying a physical identity with the digital identity in a trusted and highly secured manner.
Triple factor secure identity binding allows trusted transactions between people, and between people and things with maximum security, privacy and trust achievable using today’s technologies. We combine certified secure elements with machine learning, variety of secure cryptographic functions, key storage and derivations, and multitude of IO drivers for variety of sensors. On top of this, we are implementing out-of-the-box secure peer-to-peer networking stack as well to support authentication scenarios with a large variety of common IOT devices using standard local radio links as authentication via "cloud" round trips is often not ideal in many personal and IOT interactions.
Security works only when it's simple and transparent to the end user.
However, other important assumptions are behind our design concepts as well, such as: digital identity is highly personal and must be as close to the end user as possible, people know how to protect simple personal things (keys, wallet) but don’t know how to protect personal data in more complex devices (phone, notebook).