LogoLogo
  • Introduction
  • Getting Started
  • SenseCrypt Server
    • Starting the server
    • Configuration
    • Licensing and Authorization
    • Using the Swagger Docs page
    • Authorization
    • Using a JWT Token for Mobile Authorization
    • Getting information about your license
    • SenseCrypt eID
      • Generating your first SensePrint eID QR
      • Generating a raw SensePrint
      • Decrypting a raw SensePrint
      • Parsing a SensePrint
    • SenseCrypt Face PKI
      • Configuration
      • Accessing your Root Certificate
      • Generate your first Face Certificate
      • Verifying a Face Certificate
      • Encrypting Data/Keys using a Face Certificate
      • Face Decrypting Data/Keys
      • Face Signing
      • Face Signature Verification
    • Accessing the server for testing
    • Liveness Image Requirements
  • SenseCrypt Mobile SDKs
    • Licensing
    • Authorization for Online SDKs
    • Liveness and Face Capture
    • Android SDK
    • iOS SDK
  • Conclusion
  • FAQ & Search
  • Appendix
    • Privacy Preserving Biometric Verifiability
    • Principles of Privacy Preserving Face Verification
    • Foundational vs Functional eID
Powered by GitBook
On this page

Was this helpful?

Export as PDF
  1. SenseCrypt Server

SenseCrypt eID

Foundational eID functionality

In this section, we detail four main methods of creating/verifying foundational eID:

  1. Generating an eID QR code - this generates a QR code containing a raw SensePrint.

  2. Generating a raw SensePrint - this generates the raw bytes contained in an eID QR code. These bytes can then be stored on alternative media such as an NFC card or in a database.

  3. Decrypting a raw SensePrint - this decrypts the metadata contained in a raw SensePrint using the eID holder's face.

  4. Parsing a SensePrint - In addition to metadata encrypted with the eID holder's face, a SensePrint can also contain metadata that can be read without the user's face. This data is still stored encrypted within a SensePrint but since it is not encrypted using the user's face, we call it cleartext_data. Parsing a SensePrint also reveals information whether a Liveness check is required to decrypt it and whether an additional password is required to decrypt it.

PreviousGetting information about your licenseNextGenerating your first SensePrint eID QR

Was this helpful?