Digital Identification and Authentication on Blockchain

Decentralized digital identity on Blockchain.


Sovereign digital identity system, based on the AlastriaID model, based on Blockchain technology.

Different technologies are used to shape the service, using as a basis the decentralization of the user identifier in a Blockchain network.

Decentralized digital identity on Blockchain

Decentralized digital identity on Blockchain

Blockchain and Alastria

With the Alastria Network, the main network in Spain, a public network, the existence of Smart Contracts allows certain business processes to be carried out in it.

Smart Contract Model

The system will have created and deployed in the network a Smart Contract that will allow the creation of users against this contract, each user created will be an instance of execution of the contract.

Lear more about DID - Download PDF
Basic premises
  • Easy to use and integrate.
  • Secure to avoid impersonation.
  • Fast and efficient.
  • Compliance with Royal Decree 3/2010. National Security Scheme (ENS).
  • Aligned with eIDAS 2, in the framework for theEuropean Digital Identity“. 
  • Compliance with RGPD.

Check rates for bulk or specific shipments


DefinitiveID Technology



  1. Process start (USER): Users focus their wallet app (from the entity) on the QR shown on the web (issuer entity) and the process is triggered (credentials request).
  2. Issuance of credentials (ENTITY): Create licenses (credentials).
  3. Credentials Acceptance (USERS): The credentials are registered in blockchain and ready for multiple uses.

Sports Club

Online shopping

Public Administration


Tickets Shows

Creation of decentralized identities

  • No user’s personal data can be stored in the public Blockchain, none, not even encrypted.
  • The Enrollment process in Blockchain must generate a universal identifier for the user (DID), this identifier must be recorded in the blockchain, so that it is invariable over time and no one can manipulate it.
  • From the user identifier there can be no inference of user data.
  • The user password matching process must be performed from a network node, but the password cannot be stored in the network, not even its hash.










They trust in Wise Security Global