July 2015


Munich, Germany



With IDEE, businesses can increase their conversion, monetize data and provide password-less authentication to their customers, partners, suppliers, and employees.

A software company which has developed a completely private ecosystem that makes identification and authentication processes secure, compliant and convenient for both businesses and their customers.

With IDEE a user can check out without entering data, they can reuse their already established digital identity. Or users can sign up for a service without passwords, which means they can also login without passwords. Applications range across different use cases and industries.

IDEE’s ecosystem leverages the user’s secure element on their smartphone or PC, cryptography and blockchain technology to create digital identities that the user can exchange, businesses can trust, and hackers cannot steal.

USERS can re-use their trusted identity to instantly sign-up, checkout and transfer identity attributes with just one click on their smartphone.

BUSINESSES can trust the identityprovided by the user, increase conversion and also monetize existing data, while being compliant with regulations.

Features of IDEE:

Trusted Data Sources: Businesses can re-purpose KYC performed by other regulated businesses.

Authenticity & Zero Knowledge: IDEE ensures the authenticity of the user and integrity of our SDK. IDEE has zero-knowledge of the user’s private data.

Private Data: Unlike token-based solutions or social media platforms, users authorize data exchange, businesses manage, monetize, and own data.

Hardware based protection: The secure element of your smartphone protects the private key.

No Single Point of Failure: A fully distributed architecture ensures that when IDEE’s servers are compromised, the users are not.

Integrity: Blockchain ensures the integrity of the identity attributes.

IDEE’s solution prevents phishing attacks; with IDEE there is no one-time password to phish. IDEE ensures that every access request is authentic and identity (request origin) of the service provider can be independently verified and trusted by the user authenticator prior to approving a login request.