Where we are. Where we're going.
Provn is building the identity infrastructure layer for the post-AI era. Here's what's live, what's next, and what's on the horizon.
KYC/KYB API — Provn Verify
LiveUnified identity and business verification through a single API.
- —NIN verification
- —BVN verification
- —CAC business registration lookup
- —Address verification
- —Phone number verification
- —Sanctions & PEP screening
- —Continuous monitoring with webhooks
- —Developer SDKs and dashboard
Compliance & Audit
LiveNDPR-compliant infrastructure with built-in data protection.
- —Cryptographically signed audit trails
- —Data residency controls
- —Regulatory reporting
Identity Wallet — Provn Passport
BuildingA mobile wallet that puts individuals in control of their identity.
- —Local on-device credential storage
- —Selective disclosure via zero-knowledge proofs
- —W3C Verifiable Credentials & Decentralized Identifiers
- —BBS+ signatures and SD-JWT support
- —QR code, NFC, and deeplink credential sharing
- —Granular consent management and ephemeral access
Provn Auth — SSO & Authentication
BuildingPasswordless, privacy-preserving authentication.
- —ZKP-based single sign-on
- —FIDO2 / Passkey support
- —Device attestation and biometric liveness
- —Progressive trust levels
Provn Guardian — AI Identity Agent
PlannedAn autonomous AI agent protecting your identity around the clock.
- —Dark web monitoring for PII exposure
- —Breach detection and instant alerts
- —SIM swap and account takeover detection
- —Behavioral anomaly detection
- —Automatic access revocation on threat detection
Trust Score
PlannedA composable, transparent reputation system.
- —Multi-signal trust composition from independent attestations
- —Progressive trust levels (basic → verified → fully assured)
- —Cross-border trust portability
- —Synthetic identity detection
Proof of Personhood
PlannedCryptographic proof that you are a real human.
- —Biometric-bound verifiable credentials
- —Liveness attestation without biometric storage
- —Content provenance stamps (C2PA standard)
- —Authorship proofs for documents, media, and code
Age Verification
PlannedZKP-based age checks for platforms and services.
- —Prove "over 18" without revealing any other data
- —Zero data retention
- —High-volume, low-latency architecture
Machine Identity
PlannedIdentity infrastructure for AI agents, IoT devices, and APIs.
- —Verifiable credentials for AI agents
- —IoT device attestation
- —Scoped, expiring, revocable API authentication
- —Corporate digital signatures
Advanced Cryptography
PlannedNext-generation privacy infrastructure.
- —Fully Homomorphic Encryption for verification on encrypted data
- —Trusted Execution Environments (Intel SGX, ARM TrustZone, AMD SEV)
- —HSM/KMS integration and Bring Your Own Key
- —Accumulator-based credential revocation
Compliance-as-Code
PlannedAutomatic regulatory compliance across jurisdictions.
- —Pre-built policy packs: NDPR, GDPR, CCPA, POPIA
- —Multi-jurisdiction data residency enforcement
- —Automated compliance reporting
Digital Estate
PlannedIdentity lifecycle management for incapacity and inheritance.
- —Dead man's switch with configurable rules
- —Time-locked credential sharing
- —Designated heir credential transfer
- —Automated notification and revocation
Credential Issuer Network
VisionA global network of credential issuers and verifiers.
- —Government agencies issuing verifiable NIN, TIN, passports
- —Universities issuing verifiable degrees and transcripts
- —Professional bodies issuing verifiable certifications
- —Banks issuing verifiable account and credit attestations
Global Trust Portability
VisionCross-border identity that works everywhere.
- —Nigerian credentials accepted by European fintechs
- —eIDAS 2.0 trust framework mapping
- —Expansion across Africa: Ghana, Kenya, South Africa
- —Global credential marketplace