Why does your organization need filancore Ankrypt?

Each IoT device could open the door to cyber risks if not properly protected. By using self-sovereign identities in a decentralized framework, filancore Ankrypt ensures each device has verifiable, portable credentials — boosting cross-platform interoperability and safeguarding your network from end to end.

The key capabilities of
filancore Ankrypt

SSI Device Integration

Our SDK delivers all the self-sovereign identity tools — key handling, identity creation, and credential management — while supporting any hardware you prefer.

Decentralized Authentication

Use decentralized Identifiers (DIDs) for standardized machine-to-machine authentication based on OpenIDConnect (OIDC) standards.

Autonomous Authorization

Verify permissions via verifiable credentials to provide trusted access to your device, systems, applications and other resources with OpenID Connect (OIDC) standards.


Self-Sovereign Identity Management

Allow IoT devices to securely handle their own self-sovereign identity or delegate these tasks to filancore Sentinel instead.

Streamlined Onboarding

Quickly integrate employees, partners and customers to your IoT ecosystem through automated processes. Enable “Bring Your Own Identity” (BYOID) and use interoperable credentials for a smooth, fast setup experience.

Passwordless Login and Interactions

Eliminate passwords by using verifiable credentials for effortless logins, creating frictionless interactions across all IoT devices and systems.

Efficient Authorization

Implement fine-tuned access controls with credential-based permissions, ensuring the right people and devices access the right resources.

Frequently asked questions (FAQ)

Can the authentication be used for any devices, systems and users?

Absolutely. filancore Ankrypt supports SIOPv2, OID4VCI, and OID4VP, allowing nearly any device or user to authenticate under these standards. All that’s needed is the ability to handle cryptographic keys and store them securely. If a device is too limited, another device can step in to manage these processes.

Why are passwords not needed?

Our Authentication operates on an automated challenge-response process and uses verifiable credentials, eliminating the need for passwords. In machine-to-machine scenarios, authentication is fully automated, while in human-to-machine cases, users can select which of their own credentials to use for login or verification.

How does ‘Bring Your Own Identity’ (BYOID) work in my ecosystem?

If someone or something already has a self-sovereign identity, they can plug right in. Because SSI operates in a wider network, identities are recognized across multiple platforms, eliminating the extra steps of creating new IDs each time.

How is user privacy protected?

Privacy is baked in: with self-sovereign identities, users decide what information to disclose. Because there’s no central storage of personal data, the risk of large-scale breaches is drastically reduced.