GET mID™ Digital Identity Solution
GET mID™ Digital Identity Solution provides a high assurance identity on a user’s mobile device, represents a convenient, secure and instant alternative to traditional physical identification documents, and utilizes formidable data encryption algorithms and communication security measures to combat fraud and reduce identity theft and the consequences thereof.
GET mID allows organizations across a multitude of sectors – including education, enterprise, retail and finance – as well as public institutions to issue high-assurance digital identification. Authentication is instant, and the security specifications of stored identities are configurable to meet ICAO, ISO and AAMVA standards, thus laying the foundation for a wide range of online identity-based services.
GET mID Authentication App gives relying parties the ability to inspect and verify a mobile ID for instant validation and authentication with the identity provider. It is enhanced with an automated process that can be performed on a wide variety of devices, from sophisticated e-gates and workstation terminals to standard NFC and Bluetooth- enabled smartphones and tablets.
Strong security model for production of mobile IDs
Completely encrypts all data communications and utilizes transport keys to prevent unauthorized access.
Supports a variety of cryptographic protocols,
Including Elliptic Curves, RSA, etc. Specific cryptographic procedures can be loaded securely during the initialization phase, based on customer requirements.
Cryptographic ciphers ensure confidentiality.
PII data in transit and at rest is secure and available only to authorized users.
Extended access control and access protection procedures
Secure against unauthorized access.
PII data integrity during transit and in storage.
Unique anti-skimming procedure prevents unauthorized reading of the mID by brute-force attacks.
Compliance with the most stringent identify security standards
Enables interoperability and ensures security by complying with ISO/IEC 18013 and AAMVA configurations.
High level of authentication assurance
Multi-factor identity verification process and the use of electronic signatures assure authenticity. Fingerprints and other sensitive data can also be stored.
Supports upgrade flexibility as needed:
Changes are completely encrypted, security tested, and qualified