filancore Ankrypt: Control who and what can access your IoT ecosystemss
Pioneering access management with self-sovereign identity for airtight authentication and tailored authorization.
Why does your organization need filancore Ankrypt?
Each IoT device could open the door to cyber risks if not properly protected. By using self-sovereign identities in a decentralized framework, filancore Ankrypt ensures each device has verifiable, portable credentials — boosting cross-platform interoperability and safeguarding your network from end to end.
The key capabilities of
filancore Ankrypt
Frequently asked questions (FAQ)
Can the authentication be used for any devices, systems and users?
Absolutely. filancore Ankrypt supports SIOPv2, OID4VCI, and OID4VP, allowing nearly any device or user to authenticate under these standards. All that’s needed is the ability to handle cryptographic keys and store them securely. If a device is too limited, another device can step in to manage these processes.
Why are passwords not needed?
Our Authentication operates on an automated challenge-response process and uses verifiable credentials, eliminating the need for passwords. In machine-to-machine scenarios, authentication is fully automated, while in human-to-machine cases, users can select which of their own credentials to use for login or verification.
How does ‘Bring Your Own Identity’ (BYOID) work in my ecosystem?
If someone or something already has a self-sovereign identity, they can plug right in. Because SSI operates in a wider network, identities are recognized across multiple platforms, eliminating the extra steps of creating new IDs each time.
How is user privacy protected?
Privacy is baked in: with self-sovereign identities, users decide what information to disclose. Because there’s no central storage of personal data, the risk of large-scale breaches is drastically reduced.