Three products under a single API

Vault
Secure Data Storage
  • End-to-end data encryption, with unique encryption keys managed by the vault owner.
  • Request and exchange items securely and privately.
  • Guard against correlation when data is exchanged, with a Universally Unique Identifier (UUID) assigned for each data value.
  • Delegate access to a trusted third party.
Learn more
Credentials
Verifiable Credentials
  • Create a VC ecosystem by onboarding Issuers, Verifiers, and Holders.
  • Issue and verify VCs by developing custom credentials and presentation requests.
  • Guarantee authenticity of ecosystem actors via cryptographic proofs.
  • Implement VC workflows built on global standards.
Learn more
Wallet
Decentralised ID, Digital Assets, Web 3
  • A user-friendly interface that can be implemented as both a mobile and cloud wallet application.
  • Create secure connections with Issuers and Verifiers.
  • Securely import and manage digital assets from trusted Issuers via one application.
  • Respond to requests for credentials from trusted Verifiers.
Learn more

Supported by core components

Keys
Encryption Key Management
Generate, manage and deploy keys to encrypt and protect data at rest, in transit and when exchanged.
  • Keypair – Public-key cryptography used for secure data exchange
  • Key Encryption Key (KEK) – Key used to encrypt/decrypt data encryption keys and keypairs
  • Data Encryption Key (DEK) – Key used to encrypt/decrypt user data
Data and key architecture designed for non-correlation, with all attributes encrypted with a Universally Unique Identifier (UUID).

Provisioning UUIDs provides the foundation for Web3 applications where business rules and value drivers can be aligned to single identifiers.
Read docs →APIs →
ATOM
Authorisation Tenant & Organisation Manager
ATOM proves the authorisation and security rights for issuing Verifiable Credentials and deploying Enterprise Vaults.
  • Onboard and authorise tenants to implement their credential security policies
  • Enable authorised tenants to onboard and manage organisations and their users
  • Manage security rights in the context of requests, issuance, verification and revocation to ensure separation of concerns
ATOM provides fine grained control for authorised administrators to manage other authorised actors within a trusted ecosystem.

Embed security, rights management, audit and governance in enterprise Credentials and Vault connections with ecosystem participants including customers.
Read docs →APIs →
Exchange
P2P Encrypted Connections & Sharing
Enable peer-2-peer connections for trusted data exchange (receiving and sending) between data eco-system participants.
  • Connections include people, organisations or things (IoT devices, wearables)
  • Connections enable data to be modified, updated, deleted and on-shared depending on business rules
  • All connections approved by customer acceptance process to mitigate fraud, spamming and unauthorised marketing
Connections provides the foundation for trusted data exchanges between approved participants.

A separate secure data exchange enclave is generated for all data sharing including unique keys to guard against correlation and aid progressive disclosure.
Read docs →APIs →
Events
Events, Audit & Notifications
Record events for audit purposes or program for notifications. Every user account is unique; therefore, the event ledger is a unique digital twin of all the events approved or requested by the user.
  • The events ledger is an immutable record of actions such as type of event, the subject and time stamp of when it occurred
  • Events can include records for create, update, delete, view, milestones, stop, pause, resume, connect, share and request
  • Events can also record the device in use to aid in fraud management or identity theft
Events can be programmed to trigger notifications, either within the Vault, or trigger notifications in other applications.

Notifications can be used to inform users of pending actions, updates and changes to their data including when a connection is requested or approved.
Read docs →APIs →
Tokens
Web3 Token Services
Support a wide range of Web3 business applications across loyalty, verification, audit, authentication and micro-payments.
  • Deploy new micro-transaction business models to support billing and payments
  • Integrate Token services such as the Hedera Token Service
  • Support the discovery and visualization of tokens in your ecosystem
Collaborate directly with customers to help them build digital assets from music to art and financial services.

Use tokens to reward, incentivise or help customers offset their carbon emissions. Integrate digital assets such as Tokens, programmable money and NFTs across new Web3 applications.
Docs & APIs Coming soon
“The hallmark of future proof organisations will be the willingness to share the data it collects about its customers directly with its customers for mutual value”
– Katryna Dow, Founder & CEO Meeco

Start building in our Sandbox now

Experience all components of SVX via our user-friendly Portal

  • Issue, verify and revoke credentials
  • Create connections between organisations and wallet holders
  • Manage administrators
  • Create applications for easy integration
Get started in our Sandbox

Comprehensive support documentation

  • Guides and information about our API are publicly available
  • Documentation includes:
  • High level concept information
  • Platform guides
  • Swagger documentation
  • Supporting tools
View Documentation
Talk to us