Tykn for Businesses

If you store any personal data you need to try Ana.

Ana lets you issue and verify your customers’ credentials in a digital tamper-proof way. Allowing you to process personal data without storing it and connect different customer databases without centralising them.

Why risk storing your customer's sensitive PII?

It’s expensive to manage, makes it difficult to comply with regulations and any breach could cost you millions in fines. Tykn’s Ana platform lets you process your customer’s data without the need to manage and store it.

Connect different customer databases.

Tykn’s Ana platform lets you share customer data with your partners in the most privacy compliant way. You’ll improve their onboarding process without the need to invest months in merging customer databases.

Tykn is protecting high stakes sensitive personal data.

For the past 3 years Tykn has been working with organisations such as the Turkish Ministry of Foreign Affairs or the United Nations Development Programme to protect the personal data of some of the most vulnerable populations in the world: refugees.

We're used to making high stakes sensitive data become private and secure.

Our team is composed of subject-matter experts in Cryptography, Distributed (Digital Identity) Systems, Blockchain, Mobile Network Operators, and User Experience Design, formerly holding positions at Thomson Reuters, Dutch Ministry of Interior, Telefonica and many more, all driven by tech innovation for good.

Client Stories

Turkish Ministry of Foreign Affairs and the United Nations Development Programme

Tykn worked with these two organisations to make the Work Permit application process in Turkey become digital, easy and quick! An important step to help improve refugee employability in the country. Accomplishing this meant being able to connect two “unconnected” institutions: the Istanbul Chamber of Commerce and the Ministry of Labour.

The 121 Consortium (an Initiative of The Netherlands Red Cross)

Tykn leads the development of the 121’s Digital Identity Backend. 121 believes a digital identity creation will speed up Cash Based Aid in the future, by allowing people affected to access aid digitally and safely. 121 co-designs with People Affected by disasters, Aid Workers and People Donating, and uses robust and available technology to create the solutions you need.

Frequently Asked Questions

Pricing

Our pricing is built for organisations of all sizes. It depends on the size of your active user base and how many credentials you will verify monthly. Please contact our sales team so they can learn more about your use-case and give you a personalised quote.

Is it GDPR compliant?

Yes. Tykn’s Ana platform helps you put personal data management into the hands of your users. They control their data, who accesses it and who it gets shared with. Everything happens with their consent. Ana also helps you reduce your GDPR compliance risk as you can process sensitive personal data without storing it.

Nevertheless, your own Data Privacy counsel will give you the best compliance advice for your specific situation. While Ana’s features help to enable GDPR compliance, ultimately, it’s up to you and your team to determine if you comply with the GDPR.

 

Do you have an existing UI? Is it possible to white label?

Yes and Yes.
You can use our existing UI for the Ana App and Dashboard.
You can white label our Ana App and Dashboard.
Or you can use our REST APIs to integrate Ana into your existing systems.

What is the underlying technology?

Tykn’s Ana platform leverages Self-Sovereign Identity technology. This technology allows the issuance of tamper-proof digital credentials that are verifiable anywhere, at any time, and the creation of a peer-to-peer encrypted channel where those credentials are exchanged. It also enables users to be in control of their personal data. Deciding and consenting to who accesses it and who it gets shared with.

If you’d like to read more, we wrote this Beginners Guide to Self-Sovereign Identity.

Why is blockchain used?

The 3 pillars of Self-Sovereign Identity are Blockchain, Verifiable Credentials and Decentralized Identifiers.

Distributed Ledger Technology (DLT), commonly simply called “Blockchain Technology”, refers to the technology behind decentralized databases providing control over the evolution of data between entities through a peer-to-peer network, using consensus algorithms that ensure replication across the nodes of the network.

More simply put:

Imagine a book (or ledger) that anyone could obtain, free of charge, where anything written on its pages would be there forever, and at the same time, would be cross-referenced with the other books to check whether what was written to be valid and true; this is the essence of DLT.

In identity management, a distributed ledger (a “blockchain”) enables everyone in the network to have the same source of truth about which credentials are valid and who attested to the validity of the data inside the credential, without revealing the actual data.

Through the infrastructure of a blockchain, the verifying parties do not need to check the validity of the actual data in the provided proof but can rather use the blockchain to check the validity of the attestation and attesting party (such as the government) from which they can determine whether to validate the proof.

For example, when an identity owner presents a proof of their date-of-birth, rather than actually checking the truth of the date of birth itself, the verifying party will validate the government’s signature who issued and attested to this credential to then decide whether he trusts the government’s assessment about the accuracy of the data.

Hence, the validation of a proof is based on the verifier’s judgement of the reliability of the attestor.

By leveraging blockchain technology Self-Sovereign Identity establishes trust between the parties and guarantees the authenticity of the data and attestations, without actually storing any personal data on the blockchain.

This is crucial as a distributed ledger is immutable, meaning anything that is put on the ledger can never be altered nor deleted, and thus no personal data should ever be put on the ledger.

If you’d like to read more, we wrote this Beginners Guide to Self-Sovereign Identity.

 

Do I need to run my own private blockchain/DLT?

No. Unless you really want to.

Although we are blockchain-agnostic, we prefer public permissioned blockchains (like Sovrin) as they follow a global standard that anyone, in any country, can access and use. Security is taken care of by the ledger and there’s a Governance Model already in place.

Running your own private ledger would increase costs for your business. You or Tykn would have to run all the nodes, security and support.

We’d be happy to answer any questions about this. Please contact our sales team.

Is any personal data stored on the blockchain?

No personal data is ever stored on a blockchain. The users’ personal data stays with the users’ on their devices. What is stored on the blockchain is the “signature” of the organisation who issued a credential. Through this “signature” a verifier can trust the source of the credential and its authenticity.

Make your business privacy compliant now

Our Sales Team is happy to answer any questions you might have.
Complete a short 1 min form and we’ll contact you back by email very soon!