top of page

Privacy & Security: How Mobile IDs Protect Your Personal Information

group of people looking at phones

The increasing use of mobile IDs for identification creates a natural concern: how safe is my personal data? We understand these concerns and want to assure you that mobile ID systems developed by Scytáles are data protection and security-oriented from the start. Our mobile ID solutions use advanced security measures to guarantee that your information is secure, and at the same time, it provides better control and transparency than traditional paper IDs.


Addressing Privacy Concerns

When compared to physical IDs, which have all our information on them, mobile IDs typically store only a limited set of data. This lowers the risk of personal data exposure during the validation phase. Furthermore, mobile IDs frequently include “selective disclosure” that allows you to choose specific information to share with a verifier, giving you more control over your privacy.


Security Measures for Mobile IDs

Mobile ID systems use strong encryption to protect your data when saved on your device and when communicating with validation servers. This encryption scrambles your data, making it illegible to unauthorized users who do not have the right decryption key. Additionally, IDs on a mobile device frequently use Multi-Factor Authentication (MFA) which adds more security since the user must provide an extra verification step other than just a password. Ultimately, mobile ID systems are also operated under the regulations and compliance frameworks which help the systems to be in compliance with the strict data protection and privacy legislations.


Comparison to Traditional IDs

  • Remote lock and disable - If you lose your phone, you can simply disable your mobile ID remotely. This prevents any unauthorized access and misuse of your personal data.

  • Security: Mobile IDs incorporate advanced security features like encryption and biometrics (e.g., fingerprint or facial recognition) and are issued with Level of Assurance High (same level as Passports), making them significantly more resistant to fraud than traditional IDs. A digital identity is constantly updated based on the information available from each digital transaction, which makes it dynamic and continually and continuously more secure every time it is used.

For a deeper analysis of the comparison between traditional IDs with Mobile IDs check the post The Future of Identification: Mobile IDs vs Traditional IDs.


User Control and Transparency

Mobile IDs, like the ones developed by Scytáles, empower you to have more control over your personal information:

  • Control over shared information - You decide which data you want to share during the validation process. Do you need to prove you are an adult? Just share that you are over 18 or 21, no one needs to know when your birthday is unless you want them to.

  • Access to logs and transaction history - Available logs tell you who has accessed your mobile ID and why, which provides greater transparency and peace of mind.


The Importance of User Awareness

While mobile IDs are secure, user awareness and responsible practices are crucial for maintaining strong security:

  • Use strong passwords and keep the phone software up-to-date

  • Be careful about providing personal information to people or organizations you do not know

  • Report any suspicious activity related to your mobile ID


Conclusion


Scytáles technology available as SDKs

  • Can be implemented in just under 6 weeks

  • Can be easily integrated with the currently implemented solution and act as an add-on

  • By having a high level of assurance validation, you can ensure the identity of your users

  • Checking in using the mobile validator ensures the person accessing the services is who they say they are

  • Ensure the privacy of your guests by requesting only the data you need

  • Compliance with KYC, AML, GDPR and eIDAS 2.0 regulations, as well as with ISO 18013 parts 5 and 7

  • Compliant with the European Digital Identity Architecture and Reference Framework (the European Digital Identity Wallet of which Scytáles are the technology developers), ISO 18013 part 5 and part 7 driving licences and mobile IDs

  • Compliant with OID4VCI, OID4VP and SIOPv2, where DIF JWT VC Presentation Profile uses OID4VP as the base protocol for the request and verification of W3C JWT VCs, and uses SIOPv2 for user authentication; while NIST (National Cybersecurity Center of Excellence) plans to implement reference implementation for OID4VP to present mdocs/mDL

  • Fully certified solutions

  • To cater to diverse needs, we offer different pricing solutions and business models. Our transparent policy ensures that you have the flexibility to choose the option that aligns best with your organization's requirements.




Scytáles, Your Trusted ID Verification Provider

At Scytáles, we are thrilled to share groundbreaking developments in digital identity that are set to revolutionize the way we authenticate and interact remotely online and face-to-face.


Proven track record: Implementors of the first full ISO 18013-5 compliant Mobile Driver’s License program in the US in the State of Utah and technology providers of the European Digital Identity Wallet (EUDI Wallet) which will soon be rolled out to more than 440 million European citizens, with our technology being broadly used across the globe.


Expert Representation in several standardization bodies: Scytáles represents Sweden as an expert through the Standardization Body (SIS) SIS/TK 448 and Task Force 14 on mDL within ISO/IEC 18013-5 ISO/IEC JTC1/SC17/WG10.


Global leaders in mobile IDs: Scytáles is the leading developer of ISO-Mobile Driving Licenses, Mobile IDs and Derived Mobile IDs as a complement to Security Printed Documents and Validation mechanisms.


Providers of the most comprehensive validation solution: Our Mobile Validator is built focused on privacy, allowing for all validation scenarios, in real-time in online and offline modes, over the counter and over the web/remotely.


High level of Assurance identification at our core: Our product portfolio showcases the different solutions we offer the market for secure, interoperable and trustworthy identification credentials.

bottom of page