Decentralize your identity verification and authentication.

Instantly comply with privacy regulations and empower your users to be trusted across any platform. Tykn’s Product Suite lets you quickly integrate decentralized identity tech into your app or web-based user journeys.

  • Mobile or Web Wallet where your users will store their Verifiable Credentials.
  • APIs or Web Portal to issue & manage credentials.
  • No developer team? No problem. We’ll customize it to suit your needs.

Join world leading organisations that use Tykn's REST APIs to verify and authenticate their users

Tried & True

We spent the past 5 years developing decentralized identity components for major international organisations. These proven components are now available to you. Battle tested for demand and functionality.

Instantly comply with privacy regulations

Tykn’s Mobile SDK creates a decentralized identity wallet inside your app. This is where your users will store their verified data. No PII will be stored on your servers or the cloud. Only in the users’ apps.

  • Tykn’s system uses advanced cryptography to ‘watermark’ the credentials you issue. Making any data or document become tamper-proof Verifiable Credentials.
  • Users store these credentials, fully encrypted, in your app. Only they can access the data. Only they decide who the data gets shared with.
  • Verifiable Credentials can be trusted across any platform. When a user presents a credential, the verifier can instantly check the blockchain to confirm the credential’s cryptographic watermark and verify the credentials’ authenticity.

SDKs available in React Native, Native Android (Java) and Native iOS (Swift).

Trusted by the UNDP in Turkey

”Tykn's solution, the Digital Wallet, could facilitate and accelerate work permit and approval processes for refugee entrepreneurs by keeping all verified documents in one place. The Digital Wallet is certainly a tool to benefit when minimizing the manual verification processes of documents issued by multiple stakeholders.”

United Nations Development Programme

The Web Wallet

Easily integrate a Verifiable Credentials wallet into your existing user journeys without the need for your users to download a mobile app.

  • Through one simple REST API you can issue and verify Verifiable Credentials from your existing system.
  • Users store those credentials, fully encrypted, in a personal cloud vault that can only be accessed and managed by the user. Only they decide who the data gets shared with.
  • You and your whitelisted partners can request the data directly from the users. Users can share it with two taps on their phones.
Trusted by the Istanbul Chamber of Commerce

``We still use pen and paper and do a lot of paperwork to issue these documents. By digitising this process we can quickly and easily complete these tasks. It's very easy!``

Istanbul Chamber of Commerce Representative

No developers? No problem.

Tykn has more than 4 years of experience helping clients build and deploy custom decentralized identity solutions. From startups to governments to international NGOs. 

Join us for a free consultation so that our team can better understand your needs and advise you on what options are best for your business.

Also available:

  • Off-the-shelf Issuer & Verifier Web Portal and Mobile Wallet App. Go from account setup to issuing your first Verifiable Credential in less than 5 minutes. Whitelabel it with your branding.
  • 3rd party integrations with ID & Document verification tools.
  • Custom user journeys.


Tykn Mobile Wallet Demo

Mobile Wallet Product Demo [Video]

Bryan, Tykn’s Product Lead, demonstrates how to create a issue and verify credentials using our off-the-shelf Admin Portal and Mobile Wallet app.

Tykn Web Wallet Demo

Web Wallet Product Demo [Video]

Tykn’s Product Lead, Bryan, demonstrates the Web Wallet.

Tykn Web Wallet Architecture

The Web Wallet's Architecture

This guide explains the flow of issuance and verification of Verifiable Credentials using Tykn’s REST API.

Why Tykn

Quick Implementation

Launching a decentralized identity-based product is difficult. Taking up to 6 months just to onboard developers to the technology. We built all the components you need so you don’t have to.

Proven Solution

Our technology is trusted by organisations such as The United Nations Development Programme and the Turkish Ministry of Foreign Affairs.

Don't Worry About The Code

No dedicated dev team? No problem! Tykn built everything you need so that you can just focus on your users’ experience.

Interoperable & No Vendor Lock-in

All our technology is open-source and based on W3C standards (the same people that brought us the url standard).

Expert Support

Our team has more than 5 years of Decentralized Identity experience. We’re here for you to stand on our shoulders!

Your Own Branding

Whitelabel our Product Suite and make it yours.

Frequently Asked Questions

Is it GDPR compliant?

Yes. Tykn’s Product Suite helps you put personal data management into the hands of your users. They control their data, who accesses it and who it gets shared with. Everything happens with their consent. Decentralized Identity also helps you reduce your GDPR compliance risk as you can process sensitive personal data without storing it.

Nevertheless, your own Data Privacy counsel will give you the best compliance advice for your specific situation. While Ana’s features help to enable GDPR compliance, ultimately, it’s up to you and your team to determine if you comply with the GDPR.

Do you have an existing UI? Is it possible to white label?

Yes and Yes.
You can use our existing UI for the Mobile Wallet and Portal.
You can whitelabel our Mobile Wallet and Portal.
Or you can use our REST APIs and Mobile SDKs to integrate Decentralized Identity into your existing systems.

What is the underlying technology?

Tykn’s Product Suite leverages Self-Sovereign Identity technology. This technology allows the issuance of tamper-proof digital credentials that are verifiable anywhere, at any time, and the creation of a peer-to-peer encrypted channel where those credentials are exchanged. It also enables users to be in control of their personal data. Deciding and consenting to who accesses it and who it gets shared with.

If you’d like to read more, we wrote this Beginners Guide to Self-Sovereign Identity.

Why is blockchain used?

The 3 pillars of Decentralized/Self-Sovereign Identity are Blockchain, Verifiable Credentials and Decentralized Identifiers.

Distributed Ledger Technology (DLT), commonly simply called “Blockchain Technology”, refers to the technology behind decentralized databases providing control over the evolution of data between entities through a peer-to-peer network, using consensus algorithms that ensure replication across the nodes of the network.

More simply put:

Imagine a book (or ledger) that anyone could obtain, free of charge, where anything written on its pages would be there forever, and at the same time, would be cross-referenced with the other books to check whether what was written to be valid and true; this is the essence of DLT.

In identity management, a distributed ledger (a “blockchain”) enables everyone in the network to have the same source of truth about which credentials are valid and who attested to the validity of the data inside the credential, without revealing the actual data.

Through the infrastructure of a blockchain, the verifying parties do not need to check the validity of the actual data in the provided proof but can rather use the blockchain to check the validity of the attestation and attesting party (such as the government) from which they can determine whether to validate the proof.

For example, when an identity owner presents a proof of their date-of-birth, rather than actually checking the truth of the date of birth itself, the verifying party will validate the government’s signature who issued and attested to this credential to then decide whether he trusts the government’s assessment about the accuracy of the data.

Hence, the validation of a proof is based on the verifier’s judgement of the reliability of the attestor.

By leveraging blockchain technology Self-Sovereign Identity establishes trust between the parties and guarantees the authenticity of the data and attestations, without actually storing any personal data on the blockchain.

This is crucial as a distributed ledger is immutable, meaning anything that is put on the ledger can never be altered nor deleted, and thus no personal data should ever be put on the ledger.

If you’d like to read more, we wrote this Beginners Guide to Self-Sovereign Identity.

Do I need to run my own private blockchain/DLT?

No. Unless you really want to.

Although we are blockchain-agnostic, we prefer public permissioned blockchains (like Sovrin) as they follow a global standard that anyone, in any country, can access and use. Security is taken care of by the ledger and there’s a Governance Model already in place.

Running your own private ledger would increase costs for your business. You or Tykn would have to run all the nodes, security and support.

We’d be happy to answer any questions about this. Please contact our team.

Is any personal data stored on the blockchain?

No personal data is ever stored on a blockchain. The users’ personal data stays with the users’ on their devices. What is stored on the blockchain is the “signature” of the organisation who issued a credential. Through this “signature” a verifier can trust the source of the credential and its authenticity.