Verification Methods
Digital ID supports three verification methods, each with different security levels and use cases.
Visual Verification
How It Works
Display your digital ID card and compare the photo and employee details with the person presenting it.
Use Cases
- Quick identity checks
- Face-to-face verification
- Service user verification
- Informal checks
Security Level
Basic - Relies on visual comparison and photo matching. No automated verification or logging.
QR Code Verification
How It Works
- Display your digital ID card
- The QR code contains a time-limited verification token
- Scan the QR code using any QR scanner or the verification page
- The system validates the token and displays verification results
Use Cases
- Online verification
- Remote checks
- Automated systems
- Service providers
- Bank transactions
Security Level
High - Time-limited token (5 minutes), cryptographically secure, logged, and validated.
Token Expiry
QR code tokens expire after 5 minutes to prevent replay attacks. The token automatically refreshes when you view your ID card.
Internet Requirement
The person scanning your QR code needs internet access to validate the token on the verification server. You (the ID card owner) can display your QR code offline, but if the token expires, you'll need internet to refresh your ID card page and get a new QR code.
Supplementary Verification Methods
In addition to QR codes, the system supports NFC and BLE (Bluetooth Low Energy) as supplementary verification methods. These are optional features that work alongside QR codes.
NFC Verification
How It Works
- Activate NFC on your device
- View your digital ID card
- Tap your device to write the verification token to an NFC tag
- Or use NFC-enabled verification systems
Browser Support
- Chrome on Android (version 89+)
- Edge on Android (version 89+)
- Not supported: iOS Safari, Firefox, desktop browsers
Use Cases
- Contactless verification
- Door access systems
- Automated checkpoints
- Meeting attendance
Security Level
High - Time-limited token (5 minutes), contactless, logged, and validated.
BLE (Bluetooth Low Energy) Verification
How It Works
- Activate BLE on your device
- View your digital ID card
- Share the verification URL via Bluetooth
- Verifier device receives the verification token
Browser Support
- Chrome on Android and Desktop
- Edge on Android and Desktop
- Not supported: iOS Safari, Firefox
Use Cases
- Proximity-based verification
- Bluetooth-enabled access systems
- Device-to-device verification
Security Level
High - Time-limited token (5 minutes), proximity-based, logged, and validated.
Note
QR codes remain the primary verification method as they work on all devices and browsers. NFC and BLE are supplementary features for specific use cases and device combinations.
Public Verification Page
The public verification page allows anyone to verify employee identity:
- Visit the verification page
- Scan the QR code or enter the employee reference
- View the verification results
What Information Is Shown
- Employee name
- Employee reference
- Organisation name
- Verification status
- Card expiration status
Privacy
The verification page only shows information necessary for identity verification. Personal contact details are not displayed.
Verification Results
When a verification is performed, the system checks:
- Token validity
- Token expiration (must be less than 5 minutes old)
- Card revocation status
- Employee active status
- Organisation membership
Audit Trail
Every verification attempt is automatically logged with comprehensive details for compliance and security monitoring.
What Gets Logged
Each verification attempt records:
- Timestamp: Exact date and time of verification
- Verification Method: Visual, QR code, NFC, or BLE
- Result: Success, failed, expired, or revoked
- Employee Details: Name and reference number
- Verifier Information: Who performed the verification (if logged in) or "Public Verification"
- IP Address: Network location of the verification
- Device Information: Browser and device details
- Failure Reason: Detailed notes if verification failed
Admin Verification Logs Interface
Administrators can access the Verification Logs page from the Organisation menu to:
- View All Logs: See every verification attempt in your organisation
- Filter Results: Filter by date range, employee, verification type, or result
- Export Data: Download logs as CSV files for compliance reporting
- Search History: Quickly find specific verifications using filters
Compliance Ready
The audit trail provides complete documentation for regulatory compliance, security audits, and quality assurance reviews. All verification attempts are permanently logged and cannot be modified.
Privacy
Verification logs are only accessible to organisation administrators. Personal contact details are not included in logs, maintaining privacy while ensuring security.