This documentation serves as an overview for integration with Bridge Protocol’s Identity Platform. The platform provides seamless enterprise adoption functionality such as:
The Identity Report provides validation of an applicant’s address, date of birth (DOB), name and mortality by cross referencing a range of verified databases. Additional options for United States compliance, include request for Social Security number through the full 9 or last 4 digits.
The Document Report is composed of data integrity, visual authenticity and police record checks. The system checks most recent identification documents and checks for discrepancies. A human verification is required when the image is obscured, blurry or cropped.
The Bridge Protocol has compliance capabilities for over 165 countries, using standard and express checks.
A standard check requires an applicant to enter their information via our applicant form.
An express check bypasses this process and requires all the applicant’s information be provided by the client application.
Bridge Protocol facilitates interaction between Bridge Users, Trusted Verification Partners and integrated Network Partners. This combination creates a robust, scalable and secure digital identity authentication platform.
By integrating with the Bridge Protocol Network, third party services satisfy their compliance requirements by establishing eligibility of the user; all while the user still maintains anonymity and total control of their personal data.
The Bridge Passport is the key to authentication, authorization, and data verification on the Bridge Protocol Network. Users can purchase a passport from Bridge Protocol with TOLL and provide their own key pair (Bring Your Own Key) to establish their own secure and personal digital identity on the platform.
This passport can be used to authenticate with third parties to provide anonymous access to their services, as well as allow third parties to determine the authorization level of the user via the Bridge Authorization Profiles associated to the passport. Bridge Passports also contain an associated NEO blockchain address to facilitate payment of fees in TOLL, allowing the user to take advantage of Initial Coin Offerings (ICO) that require NEO transactions and provide robust supplemental data verification functionality via the blockchain.
Bridge Passports can only be created via the Bridge platform, but the keys that establish digital identity are created and managed by the end user. The only control Bridge maintains over a passport is the right to revoke a passport if the address is deemed to be a bad actor and a risk to the security and integrity of the platform.
In the future, Bridge Protocol will offer functionality to allow users to use hardware based key storage devices to protect their Bridge Keys and use them on the platform. It is important to note that Bridge does not store or ever have access to the user’s Bridge Keys, Associated NEO Address, or Bridge Authorization Profiles.
All keys and data are exclusively managed and stored by the user.
The Bridge Passport creation process allows the user to bring their own keys and to associate a NEO address that they control. The process:
Bridge Authorization Profiles are created for the user using the set of verified claims received from the Bridge Trusted Verification Process and stored as part of the user’s Bridge Passport. These profiles can be furnished to third parties integrated with the Bridge Protocol Network to anonymously establish the user’s authorization levels to the third-party platform and services.
Bridge Authorization Profiles each have a different purpose and scope, and also have a default expiration depending on type. Further flexibility is offered to third party authorization partners to define their own accepted expiration windows depending on their organizational compliance requirements.
Once created, the Bridge Authorization Profile has no personally identifiable data, and is encrypted so only the associated Bridge Passport can decrypt and view the data.
At current, the Bridge Authorization Profile types are focused around age verification and KYC compliance requirements.
The current profiles offered by the Bridge Protocol Network MVP:
The Bridge Authorization Profile creation process takes place after a user has successfully completed Bridge Trusted Verification process and received their set of signed verified claims from the partner.
To create a Bridge Authorization Profile, the user:
Bridge Authorization Profiles are stored, managed and transported by the user directly to the integrated third-party platform or service. Bridge Protocol never has access to the data payload, the encryption keys, or has any involvement in the transport of a Bridge Authorization Profile from user to third party verifier.
To use a Bridge Authorization Profile to determine authorization with a network integrated third party service provider, the user:
Bridge Trusted Verification Partners are network partners that offer Know-Your- Customer (KYC) and Anti-Money-Laundering (AML) claims verification services to the users on the network. The claims that are verified by these third parties enable users to create one or more Bridge Authorization Profiles. These profiles enable the user to interact with third parties that are integrated with the Bridge Authorization Platform to establish anonymous authorization to their services.
The premiere verification partner on the Bridge Protocol Network is Bridge KYC (provided by Bridge Corp, powered by Onfido). In the future, organizations will be able to integrate with the network as a Bridge Trusted Verification Partner and receive TOLL in exchange for the verification services they provide to the network.
The Bridge KYC currently supports all required verification checks to produce the set of verified claims that Bridge Protocol requires for the user to be able to create all of the Bridge Authorization Profile types available on the network today.
The Bridge KYC supports both express and standard check capabilities for over 165 countries that include (but are not limited to) the following verifications:
* In the event that there are discrepancies in identification documents or visual authentication issues with image quality, human verification may also be required to verify the requested claims.
The Bridge KYC claims verification process allows the user to securely provide their personal data to our KYC provider (Onfido) and send Bridge Protocol the set of verified claims that will allow the user to create their desired Bridge Authorization Profiles on the network.
The claims verification process:
* Details about the data retention and security policies for the user data submitted in the application process can be found here: https://onfido.com/gb/security/
Integration with the Bridge Protocol Network allows third parties such as Exchanges, ICOs, and websites to take advantage of robust authentication, authorization, and data verification services to ensure compliance. Bridge Protocol provides API documentation, SDK libraries, and sample projects to Bridge Network Partners to empower them quickly and seamlessly integrate Bridge Protocol Network functionality into their platform or service.
The Bridge Authentication Platform enables the user to authenticate with the Bridge Protocol Network using their Bridge Passport and interact with network services such as Bridge Trusted Verification and Bridge Authorization Profile creation services. In the future, the platform will be available to third parties to allow for Single Sign On (SSO) and anonymous authentication to their platforms and services.
The Bridge Authorization Platform allows third parties to determine eligibility and grant authorization to their platform or service while still maintaining data security and anonymity to the user requesting access.
Once integrated with the Bridge Protocol Network, the process for a partner to evaluate authorization levels using a Bridge Authorization Profile:
Download the PDF
Bridge ProtocolApril 25, 2019
Bridge ProtocolApril 14, 2019
Bridge ProtocolApril 10, 2019
© 2019 Bridge Protocol. All rights reserved.