Zentity Demo Platform

Seamless Identity
Built for Trust

Six real-world scenarios, one cryptographic answer. Each demo satisfies a different compliance obligation through the same architecture: zero-knowledge proofs, FHE encryption, and decoupled authorization — with no personal data stored.

A Zentity account is required to try the demos. New here? Start with the overview

Velocity Private
Trusted Finance

Customer Due Diligence

EU anti-money laundering rules require tiered identity verification for account opening. Zentity satisfies CDD obligations through cryptographic proofs and selective name disclosure, without storing documents.

Step-Up Auth
NOVAX
Global Markets

Crypto-Asset KYC

MiCA requires crypto exchanges to verify customer identity and nationality for sanctions compliance. Zentity proves nationality through zero-knowledge proofs, with no document upload or retention.

Zero-Knowledge Proofs
Vino Delivery
Fine Goods

Double Anonymity

French law requires age verification with double anonymity: the site learns only a yes/no age result, and the verification provider never learns which site was visited.

Pairwise Pseudonymity
Relief Global
Humanitarian Aid

Humanitarian Verification

Humanitarian aid requires identity verification to prevent duplicate claims, but centralized databases endanger vulnerable populations. Zentity proves eligibility with minimal disclosure and zero data retention.

Data Minimization
VeriPass
Digital Credentials

Selective Disclosure

eIDAS 2.0 mandates that users control exactly which attributes they share. Receive one verifiable credential, then selectively disclose different claims to different verifiers.

SD-JWT VCOID4VCI
Aether AI
Personal Shopping Agent

Agent Authorization

AI agents act on your behalf but need explicit authorization for sensitive actions. CIBA lets the agent request approval via a backchannel — you approve on your own device, and the agent completes the purchase.

CIBADecoupled Auth

How it works

1

Connect

The user signs in with their Zentity identity.

2

Verify

Zentity verifies the requested claims cryptographically.

3

Access

The user gains access, and no personal data touches your servers.

Get started

Each scenario authenticates through your Zentity account via OAuth. Sign up once, then explore all six demos.