Skip to main content

A fully decentralized digital identity solution for the future.

BIG ID redefines user experiences by eliminating friction in the authentication process and empowering data sovereignty.

Start building

Start building on BIG ID

Harness the full potential of digital identity

100% decentralized

BIG ID is fully decentralized, as apps built on BigFile store data entirely on-chain. This makes it more secure and fault-tolerant than digital identity solutions hosted on protocols that rely on centralized cloud providers like Amazon Web Services.

User friendly

Instead of using passwords to sign in, users simply unlock their devices with FaceID, TouchID, or passcodes to access their accounts. By unlocking their devices, they authorize the use of a passkey. Built on standardized technology, passkeys make BIG ID more convenient than traditional authentication methods.

Enhanced security

BIG ID eliminates the need for apps to store passwords in a database. When a user creates a BIG ID, they are automatically assigned a public and private key pair. The private key is securely locked in a tamper-proof chip on the user's device, ensuring that it cannot be retrieved by anyone.

Strict privacy

Each time a user creates an account with an app using BIG ID, a unique key pair is generated and managed specifically for that app. This ensures that users can interact with the app without worrying about their data being shared.

Easy integration

BIG ID seamlessly integrates with both Web2 and Web3 apps, deploying cube smart contracts to request authentication and verify user identities.

Integrate BIG ID

Identity solutions for a new era

Seamless authentication

Seamless authentication

BIG ID is built on WebAuthN, a global authentication standard. It eliminates the need for usernames and passwords by replacing them with passkeys—registered devices like smartphones, laptops, or hardware wallets such as YubiKey or Ledger. To authenticate their identity, users simply connect with BIG ID and unlock their device.

Age verification

Age verification

Know your customer

Know your customer

Proof of humanity

Proof of humanity

Academic transcripts

Academic transcripts

A versatile solution for all providers

Enterprises

Simplify authentication and credential sharing to enhance the user experience, while reducing costs and cyberthreats by eliminating the need to store passwords.

Developers

Enhance your app's value by integrating advanced authentication and credential verification tools into your tech stack.

Education

Guarantee the integrity and accuracy of academic records by issuing digital copies of degrees, qualifications, and certificates.

Governments

Offer citizens a decentralized digital identity solution, avoiding the risks of placing their data in the hands of private companies that may host servers in different countries or jurisdictions.

FAQs

Find answers to commonly asked questions about BIG ID.

What’s the problem with Web2 authentication?

Websites typically store usernames and passwords in a database. When a user logs in, their device sends the password to the website, which then checks it against its records. However, databases are increasingly vulnerable to breaches. While encrypting passwords adds an extra layer of security, storing them as plaintext is a poor practice.

To make matters worse, user-generated passwords are often easily hackable. Cybercriminals have an array of tools at their disposal, including spyware, phishing, and brute force attacks, where algorithms use trial and error to guess the correct combination of letters, numbers, and symbols.

What are the challenges with Web3 authentication?

Web3 authentication may appear to be a step forward, but users remain vulnerable due to reliance on a single authentication factor. For example, keys are typically stored on the same device where the crypto wallet is installed. If someone steals or gains access to that device, the user loses control of their wallet.

What exactly is public key cryptography?

Public key cryptography is an encryption method that utilizes a pair of keys to securely encrypt and decrypt messages between two parties. The public key functions like a username and can be shared openly, while the private key, much like a password, must be kept secret.

BIG ID leverages digital signatures, an application of public key cryptography, for the login process. To start, an app sends an authentication request to the user's device. The device takes the request and creates a digital signature using their private key and a cryptographic algorithm. The app then verifies the signature using the user's public key and approves the request.

What ensures the security of BIG ID?

Most modern computing devices contain a TPM (Trusted Platform Module) chip. One of the functions of a TPM chip is storing sensitive information, which in BIG ID's case is a copy of a user's private key. When BIG ID prompts the user to unlock their device, either by entering a PIN code or using biometrics such as fingerprint recognition, the TPM chip creates a new digital signature using their private key.

The user's private key is highly secure due to the virtually impenetrable TPM chip. This chip is embedded in the device's motherboard, and any attempt to tamper with it can result in irreparable damage.

What makes BIG ID private?

In Web2 authentication, a username is typically linked to an email address, which big tech companies use as a unique identifier to track a user's activity. While transparency is a core principle of blockchain technology in Web3, it also allows anyone to trace the transactions of an individual wallet address using a block explorer.

Cryptographic pseudonyms are digital identities that protect a user's privacy online. They have a wide range of applications, from messaging apps to social media platforms and Web3 dapps. With BIG ID, a new pseudonym is generated each time a user logs in, ensuring that apps cannot track their activity.

Get familiar with the BigFile