description: Building an extensive set of capabilities for verifiable credential issuance, verification, and storage.
excerpt: >
We’ve designed our products based on a few key principles: extensible data formats, secure authentication protocols, a rigorous semantic data model, industry-standard cryptography, and the use of drivers and extensions to allow modular and configurable use of the platform over time.