OUR PRODUCT
The First
Agentic Proof of Control
Every person. Every organization. Every AI agent. Cryptographically trusted
iDen2's Agentic Proof of Control (APoC) framework enables every AI agent operating within an iDen2 ecosystem carries a verifiable delegation credential, cryptographically signed by the human principal, scoped to specific actions and timeframes, and verifiable by any party in the trust chain.
PROBLEM WITH DIGITAL IDENTITY TODAY
Every organization runs its own identity silo. Every verification is a one-time transaction, done and discarded. Every AI agent operates without any cryptographic proof of who authorized it or what it's allowed to do. The result: Billions spent on friction-laden KYC. Deepfake fraud scaling faster than perimeter security. Regulatory exposure from AI systems that can't prove their authority. And users who verify themselves 40 times a year for services that never share a single data point.
iDen2 was built to fix the architecture. Not with a better point-solution, with trust infrastructure: portable, cryptographically verifiable credentials for humans, organizations, and AI agents that work everywhere, every time, once.
Our Vision
"We stand at the threshold of a digital era where your identity is not a password you remember, it is a cryptographic proof you carry. iDen2 is building the infrastructure that makes that true for every person, every organization, and every AI agent they deploy.”

Alfy Louis, Founder
THE FUTURE
Mission

2026
AGENTIC AI PoC
WHY AGENTIC PoC

Marius Scurtescu, CTO
THE PHENIX PLATFORM
CREDENTIALS FACTORY
Mint cryptographically signed, W3C VC 2.0–compliant credentials from any verified identity source. Define credential schemas, set lifecycle policies, and issue reusable digital IDs with a complete issuance and audit trail. Supports SD-JWT, AnonCreds, mdoc, and JSON-LD formats from a single issuance pipeline. Supports: W3C VC 2.0 · SD-JWT · AnonCreds · mdoc / ISO 18013-5 · Open Badges 3.0 Integrates with: existing KYC vendors, government registries, HR systems, and academic record systems
TRUST ENGINE
Real-time credential evaluation across your ecosystem. Validates authenticity, checks revocation status against live registries, and enforces policy compliance at the moment of presentation. Governs which identities are trusted, under what conditions, and for what actions. Powers your Trust Graph: the permissioned, permeable, or permissionless data ecosystem you define. Trust registries: issuer lists, verifier lists, agent authorization lists Policy engine: conditional trust, attribute-based access, time-bound delegation
AI PROOF OF CONTROL
The first production-grade cryptographic authorization layer for AI agents. Every agent action taken on a user's behalf is cryptographically bound to a verified human principal, constrained by a scoped delegation credential, and recorded in a tamper-evident audit trail. Regulators see exactly who authorized what. Enterprises have the compliance record. Users have the control. Delegation credentials: human-to-agent scope assignment, time-bound, revocable Compliance: GDPR, CCPA, and sector-specific frameworks covered by design
ISSUEING AUTHORITY
Enable any organization to become a trusted credential issuer within your ecosystem. Organizations mint unique digital credentials for their holders, employee IDs, professional licenses, healthcare certifications, academic diplomas, and establish their verified authority on your Trust Graph. Credentials issued are reusable across every verifier in your network, reducing verification costs by eliminating repeated checks.
CUSTODY CONTROLS
Give your users full visibility and control over every credential they hold and every consent they've granted. Manage the complete credential lifecycle, from issuance through presentation, delegation, and revocation, with audit trails and user facing consent dashboards. Meets GDPR requirements for withdrawal of consent by design. Enterprise controls: bulk credential management, delegation policies, expiry enforcement.
PROTOCOL BRIDGE
Connects iDen2 to your existing infrastructure. Present a verified credential wherever your systems currently accept a username and password. The bridge runs bidirectionally, your existing systems can also issue and verify credentials through iDen2's pipeline. Outbound: iDen2 credentials presented to any OIDC/SAML-compatible system Inbound: existing identity stores enriched with verifiable credential issuance


Impact
User Verification
Call Center Verification
Agents confirm a caller's identity in seconds via a cryptographic challenge, no KBA, no friction, no spoofing risk.
Compliance
Cross-Border Compliance
Built-in eIDAS 2.0 and ISO 18013-5 alignment lets credentials cross jurisdictions without re-verification — from the EU to the Gulf.
Privacy
Privacy Protection
Your Data, Your Control. Privacy is not about hiding something - it's about having the freedom to be yourself in the digital world:- Zero-knowledge proofs enable identity verification without exposing personal data - Selective disclosure allows sharing only necessary information - Decentralized storage eliminates single points of failure - GDPR-compliant by design, ensuring global privacy standards
Federation
B2B Identity Federation
Share verified identity assertions with partners, regulators, and suppliers without exposing underlying PII, just the facts they need.
Inclusion
Digital Inclusion
Breaking Down Barriers to Digital Services. True digital inclusion means ensuring everyone can participate in the digital economy, regardless of their background or circumstances: - Simplified onboarding processes for underbanked populations - Multi-language support and culturally adapted interfaces - Accessibility features for users with disabilities - Cross-border identity portability for migrants and refugees
Interoperability
Cross-Channel Auth
Consistent authentication across mobile apps, web portals, and branch/in-person interactions, all backed by the same verified credential.
Access
Instant Onboarding
Verify once, onboard everywhere. New employees, customers, or partners walk through a single verification that populates all downstream systems.














