1Kosmos Solutions for the Public Sector

  • 1Kosmos CSP (Credential Service Provider)

    The 1Kosmos privacy by design credential service modernizes identity enrollment and authentication, empowering government agencies with heightened security measures to combat phishing and fraudulent activities aimed at citizens and residents.

    The CSP is industry-certified and provides modern, low friction, app or appless self-service identity verification (e.g., IAL2) and authentication (e.g., AAL2) journey anywhere, anytime, and on any device. The resulting credentials are stored in a secure web or app-based wallet and under complete control of the resident.

    After identity verification and enrollment, residents will authenticate via any deployed authentication method, which could include phishing resistant methods like FIDO passkeys, device biometrics, and 1Kosmos LiveID, and legacy methods such as push message, email/SMS/Token, and more.

    Residents will readily utilize their reusable credentials to access services plus securely manage and share their PII data, simplifying privacy, compliance, and overall management for agencies.

    The 1Kosmos CSP managed service replaces slow, error prone manual processes and significantly reduces IT management and overhead costs. The result enables organizations to eliminate honeypots of data and to focus scarce resources on the efficient delivery of services to the people who are entitled to receive them.

    Learn More

  • 1Kosmos BlockID Verify

    1Kosmos BlockID Verify

    1Kosmos BlockID Verify digitally transforms user onboarding with convenient self-service identity verification, an architectural advantage , and serves as a credential service provider meeting NIST 800-63-3 assurance level 2 (IAL2) for KYC / AML mandates, worker eligibility requirements, digital delivery of government and healthcare services and other commercial applications.

    Our #1 rated NIST algorithm for non-bias racial or gender decisioning drives objectivity, equity, and fairness into your identification proofing processes, far outperforming manual, error-prone processes exceeding industry benchmarks to eliminate identity fraud, reduce operating costs, and minimize compliance risk.

    This approach effectively differentiates between users with valid, verifiable identities and imposters hiding behind stolen or synthetic identities while minimizing manual reviews to accelerate new account origination and user onboarding and to give users the speed, convenience and privacy they need.

    Learn More

  • 1Kosmos BlockID Customer / Citizen

    1Kosmos BlockID Customer / Citizen

    1Kosmos modernizes customer / citizen / resident onboarding with self-service KYC identity verification and then provides a convenient, identity-backed digital wallet, an architectural advantage, that customers can use to login, transact and share PII data safely.

    With 1Kosmos, you can differentiate between users with valid, verifiable identities and imposters hiding behind stolen or synthetic identities. Then deliver legitimate users the convenience, speed, and security they want through tailorable onboarding and authentication experiences they’ll enjoy.

    Our solutions for identity verification and passwordless MFA bring a transformational level of trust to each digital interaction, inspiring loyalty and slamming the door shut on fraud to help carve an efficient path to growth. After all, customers / citizens / residents want to be recognized. Cybercriminals don’t. So why treat them the same alienating way with passwords, antiquated 2FA and device-level authentication?

    Learn More

  • ​1Kosmos BlockID Workforce

    1Kosmos BlockID Workforce

    We use real biometrics backed by verified identity, an architectural advantage, to close the gaps in authentication and to give organizations a level of trust and convenience in digital interactions that transforms their business. Why?

    Because the problem and key vulnerability with passwords, biometrics and even social media accounts used for logins is that user identity is inferred, not proven. They all trust blindly that the user logging in is who they claim to be.

    We call this hope-based authentication, and you only need to read your cybersecurity news feed to understand that it’s not working.

    Learn More