Digital Identity Overview
Definition
Digital identity is a set of electronically captured and stored attributes that uniquely describe a person within a given context. Unlike physical identity documents, digital identity can be verified cryptographically, shared selectively, and updated in real-time.
Identity Models
graph TD
A[Identity Models] --> B[Centralized<br/>Single authority controls identity]
A --> C[Federated<br/>Multiple authorities, interoperable]
A --> D[Self-Sovereign<br/>Individual controls own identity]
B --> B1["Examples: Aadhaar, national ID databases<br/>Pros: Comprehensive, authoritative<br/>Cons: Single point of failure, privacy risk"]
C --> C1["Examples: eIDAS, Login with Google<br/>Pros: Interoperability, distributed trust<br/>Cons: Reliance on identity providers"]
D --> D1["Examples: EUDI Wallet, blockchain DID<br/>Pros: User control, privacy, portability<br/>Cons: Recovery challenges, adoption barriers"]
style B fill:#e53935,color:#fff
style C fill:#F57F17,color:#000
style D fill:#2E7D32,color:#fff
Evolution of Digital Identity
| Era |
Model |
Example |
User Control |
| 1990s |
Username + password |
Email accounts |
Minimal |
| 2000s |
Federated login |
SAML, OpenID |
Limited |
| 2010s |
Social login + mobile |
Login with Google/Facebook |
Low (platform controls) |
| 2015+ |
Government digital ID |
Aadhaar, Singpass, eID |
Medium (government controls) |
| 2020+ |
Verifiable credentials |
W3C VCs, EUDI Wallet |
High (user holds credentials) |
| 2025+ |
Self-sovereign identity |
DID + VC + wallet |
Full (user controls everything) |
Digital Identity Components
| Component |
What It Is |
Example |
| Identifier |
Unique reference for the person |
Aadhaar number, DID, email |
| Credentials |
Verified claims about the person |
Age > 18, name = "John", citizen of India |
| Authentication |
Proof that the person is who they claim |
Biometric, OTP, cryptographic signature |
| Wallet |
Where credentials are stored and managed |
EUDI Wallet, phone app |
| Trust framework |
Rules governing who can issue, verify, and accept credentials |
eIDAS, FATF guidance |
Digital Identity for eKYC
| Current eKYC |
Digital Identity eKYC |
| Capture physical document |
Receive digital credential |
| OCR to extract text |
Structured data already available |
| Face match with ID photo |
Biometric bound to credential |
| Database verification API |
Cryptographic signature verification |
| Store document copies |
Store verification proof (no PII needed) |
| Re-verify periodically |
Credential auto-refreshes or re-issues |
Key Takeaways
Summary
- Digital identity is evolving from centralized (governments control) to self-sovereign (individuals control)
- Verifiable credentials are the technical foundation — cryptographically signed claims
- For eKYC, digital identity means: no document capture, no OCR, no face matching — just credential verification
- EUDI Wallet (EU, 2026-2027) and India Stack are the two largest implementations
- The transition will be gradual — physical documents and digital credentials will coexist for years
Related Articles