Who Are You ? What is your Log In Name and Password? Do you use 2FA? Enter your email or phone number and we will send you an authentication code to access this website or document. This verification can be eliminated with Artificial Intelligence (AI), facial recognition, iris recognition and fingerprint recognition with massive databases.

Verify ID is searching for the experts who can create verifiable credentials in a machine readable format.

VerifyID attempts to combine unique features of every human into a verifiable identification ( verifyID ) and display the face scan, with the iris scan with the voice scan, with the fingerprint scan into a single qrcode or machine readable combination that is only available to that one human being. Each scan is commonly available and known to be unique, but by combining all together the result would guarrantee 100% that the person has been verified.

Digital Identity FACTS

Image Recognition Market to Hit $86.32 Billion by 2027 So there are lots of companies in the field.

Digital Identity Solutions market is divided into Biometrics and Non-Biometrics

Digital Identity Solutions is segregated into Single-Factor Authentication and Multi-Factor Authentication

Some of the key players of the global Digital Identity Solutions market include Thales Group, NEC, GBG PLC, Telus Corp., Jumio, Samsung SDS, IDEMIA, Refinitiv, ForgeRock, Vintegris Tech, Duo Security, AU10TIX, Tessi, Imageware Systems, Syntizen, Intesa (IBM), Verisec, Signicat, Smartmatic, Megvii Face++ and RaulWalter.

GDPR Privacy-centric regulations becoming regulated

There are 10 Billion internet-connected devices in 2021

Fortune Bus Insights "The global artificial intelligence (AI) market size was valued at USD$27.23 Billion in 2019 and is projected to reach USD $266.92 Billion by 2027..."

Over 60% of the Global GDP is expected to be digitized by 2022 t.ly/KUMz

Identities anchored on blockchains are inherently safer than identities stored on centralized servers.

VeraCrypt = https://www.veracrypt.fr/en/Home.html VeraCrypt is a free open source disk encryption software

VeraCrypt Endorsement = https://medium.com/asecuritysite-when-bob-met-alice/the-fall-of-truecrypt-and-rise-of-veracrypt-44f910ed5162

GNU Privacy Guard GPG = https://gnupg.org/

Email Self Defence from Software Foundation = https://emailselfdefense.fsf.org/en/


Identity Management (IDM)

We are locating experts in the fields of Facial, iris + Fingerprint technologies who can create a "Verification Chain" format (similar to crypto blockchain) to authenticate & verify who he/she claims to be.

Existing technology uses a mobile phone, computer or to provide an email address or mobile phone number to complete the verification process. VerifyID hopes to create a unique ID token/code issued to only one person and remain with you for your lifetime. Using a QR style code to verify is currently up for debate. The Hitchhiker's Guide to the Online Anonymity is a good read.

Unlike 2FA style authentication, VerifyID code should be machine readable and provided to a camera lens or transferred to a secure server. Your Verify ID may include passport control, driver license details, vehicle ownership, residence verification, voter authentication, medical history, pet imbedded chip, animal tattoo and security limited to only authorities who have permission previously verified as legitimate.

You can store your Verify ID code in various cloud services where only you know how to access and if your Verify ID code is stored on your mobile phone you simply display the code to access your cloud service. If you are using Cryptocurrency you can move funds from one account to another by displaying your Verify ID code without further login required.

There is no need to register. I do NOT collect email address', but if you have specialty info to contribute please pass it along. Doug

Future Details

An unauthorized person can not guess all the scanned material you have provided to Verify ID. Even if a hacker is able to obtain your personal QR code, they will have to access an unknown websites you have registered with and then guess your account name.

Your name and qr code are never held in the same location.

To create a voice scan just say "Hey Google" then say “Verify me” and your voice will be recorded and saved.

For IOS start by saying "Hi Siri" then say “Verify me”.

Verify ID can defeat Internet robots trying to access your account using multi-try probing.

Most systems use a password plus a six-digit verification code sent to you, by phone, text msg or email, to verify your identity phoning your recovery phone number on file. Verify ID uses that same technology, but asks you to send your verified code with all your scans from your Verify ID code.

Clearview AI ( https://clearview.ai ) has been using facial scans from popular social media sites and allowing police officials to run selected citizens past their database of millions of scans to find the location of where the person is located. ( https://bit.ly/2A1gmnK )

Other systems use a FIDO Universal 2nd Factor (U2F) or Titan Security Key ( Bluetooth fob ). Verify ID can use Bluetooth to access a computer, a mobile phone, enter a door with a digital door lock of a garage door with NFC tags or a voice activated personal activation.

Proximity cards ( or prox card is a contact less smart card that only needs to be in the vicinity similar to a TAPable credit card ), without inputting a Personal Identification Numbers (PIN) with a keypad or using Verify ID "Open Sesame" voice command.

Verify ID can unlock wireless connections, Bluetooth activated or NFC-enabled locked technology with verified spoken word and activate Electronic Identity Documents and Keycards with encryption supported Keycards. Using NFC Tags ( Tec Tiles ) can be locked or unlocked. NFC is working toward the Signature Record Type Definition (RTD) to enable expanded uses. New research in DNA, ear prints, voiceprint, blood type will be coming soon.

Artificial Intelligence (AI) Companies

Amelia, The most Human AI

Microstrategy Inc

Identity Verification by Civic = https://www.civic.com/

Microsoft ION Identity = https://identity.foundation/ion/