top of page
Dark-Background

G I P
General Identity Protocol

The Future is Networked Identity

AdobeStock_814927980.jpeg
AdobeStock_142036661.jpeg
Dark-Background

GIP

A Networked Identity Solution delivering user-friendly, secure, and cost effective identity solutions.

Empowering Identity Without Trade-offs
 

Why compromise?
You deserve an identity solution that balances security, user experience, and cost-effectiveness ...
without sacrifice.

 

GIP is a cutting-edge networked identity solution that seamlessly blends security with usability. 


No complexity, no friction—just effortless identity.

Dark-Background

About Us

We believe Identity should not be a trade-off. GIP delivers a future-proof solution that ensures security, while providing a seamless user experience.
 

The Problem

Traditional identity solutions
force you to choose:

 

  • Centralised Identity – risky, outdated, and prone to security concerns.

  • Decentralised Identity – relies on insecure devices and defies best practice.

 

Our Solution
Networked Identity:

Instead of reinventing the wheel, we enhance and leverage existing, trusted digital identities held by governments, banks, and institutions. 


It works in Scandinavia and Estonia — why not everywhere?

Blurry Blue

Identity Shouldn’t Be a Trade-Off

Why compromise between security, usability, and cost-effectiveness?

The Future is Networked Identity

GIP is designed to be easy to use, secure, and cost-effective.

No Magic, Just Practical Innovation

Probabilistic techniques such as behavioural biometrics or age inference, rely on guesswork.

AdobeStock_814927980.jpeg
Blurry Blue

Features

A Smarter Approach to Identity

Dark Background

Networked Identity

Reuse your verified credentials from trusted institutions.

Adaptive Security

Protects against fraud without adding complexity.

Multi-Environment Support

Works online, in-person, and even over the phone.

​Scalable & Flexible

Functions across national, industry, and organisational levels.

Named & Anonymous Identity

Choose how you authenticate based on your needs.

OTHER IDENTITY MODELS

Our Thoughts On The Alternatives

Centralised Identity Concerns

Centralised Identity involves storing all personal data in one place, which raises significant privacy and security concerns. Consolidating sensitive information in a single repository could lead to heightened risks of data breaches and misuse. This approach resembles outdated and authoritarian models of data control, which are unlikely to be acceptable or effective in today’s digital landscape.

Decentralised Identity Challenges

Decentralised Identity, on the other hand, contradicts established best practices in data management. While cloud storage is widely recognised as the standard for securing data, Decentralised Identity shifts this responsibility to individual smartphones — devices that are not designed as secure storage solutions. Despite ongoing efforts to make this model viable over the past two decades, the fundamental vulnerabilities of smartphone storage remain unresolved, making this approach unreliable.

AdobeStock_460897822.jpeg
Blurry Blue

How GIP Works

GIP is more than just a protocol — it’s an Identity Ecosystem that connects organisations while ensuring privacy, security, and efficiency.

 

Imagine a world where:

  • You access your bank securely  (Access)

  •  You open an account at a telco  (Relationship)

  •  You verify your age at a bar  (Mediated Access)

 

Each GIP ecosystem operates like a credit card network, ensuring compliance and interoperability.

A GIP Identity Ecosystem

GIP will operate in ecosystems – say one national solution for Age Assurance, one national solution for Opening Accounts, and industry solutions such as a building industry Purchasing Ecosystem.
 

Each ecosystem operates somewhat like a credit card scheme - every organisation has to meet some basic requirements and there is a forum for running the ecosystem.

Half Open Laptop
Dark-Background

REVIEW

AURA INFORMATION SECURITY

In Aura’s opinion, the General Identity Protocol concept, as described to us, offers valuable and worthwhile benefits to facilitate and achieve trust in digital interactions between individuals and entities such as government, commercial, financial, legal or medical providers.

 

Implementing GIP in operational scenarios is expected to require technical, legal and commercial decisions to bring the potential of GIP to light. Assuming these decisions are made with appropriate inputs about information security and risks, GIP potentially provides equivalent or better security and privacy outcomes to those currently existing in

both on-line, telephony-based, and face to face environments. 

bottom of page