Skip to content
Verifiable trust infrastructure

Trust,
demonstrable.

Affinity creates spaces where access, membership and evidence are validated without exposing more data than necessary.

Open standards and European alignment

EUDI WalleteIDAS 2.0W3C DIDISO 23220

problem

The hidden cost of identity in silos

Every signup, subsidiary and partner repeats verification and stores copies. Compliance, security and time-to-market costs rise—while end users face friction and the organisation cannot uniformly prove which policy applied to each access.

Fricciones clave

que erosionan la confianza digital

More data is collected than needed

The same attributes are requested again and again, with weak visibility into custody, revocation and purpose.

Access without clear proof

Static permissions or opaque lists make it difficult to show that everyone touching a sensitive resource meets the policy.

Membership does not travel

Roles and membership stay trapped in each silo; trust does not reuse across processes or partners.

Audit and accountability blur

Without verifiable evidence, explaining what happened, who acted and when—for audits or incidents—gets expensive.

solution

Vision: one platform, three value paths

Sellable product today (B2B/B2G/B2C/C2C), standard API integration for partners, and a portable trust network across organisations—without giving up privacy by design or audit-grade traceability.

Layer 1

Operational B2B / B2G / B2C / C2C product

Concrete use cases (B2B / B2G / B2C / C2C): access to sensitive resources, groups with verifiable membership, secure document exchange and evidence with chain of custody. Measurable value in onboarding time, compliance and fraud reduction.

Layer 2

Trust middleware (API & scale)

Issuance and verification with open protocols (OIDC4VCI, OIDC4VP), revocation, policy engine and alignment with European trust frameworks. Integrators add verifiable trust without rebuilding identity on every project.

Layer 3

Trust network across organisations

Membership and attributes as portable credentials, trust graphs across DIDs and federation-style models. Value scales when the same proof works across subsidiaries, partners and services—not only inside one product.

Design principles and technology

Operational privacy

Selective disclosure, pairwise and pseudonymous presentations, revocation and a path to BBS+ and minimally revealing proofs.

Portable trust

Membership, role or attribute as a verifiable credential—not only a field in a database.

Proof-governed access

The policy engine evaluates claims or presentations before granting access.

Evidence and traceability when it matters

Ingestion, integrity, verification and secure storage of sensitive material.

how-it-works

How we deliver: from trust space to proof

A flow commercial, legal and product teams can align on: trust space, credentials, auditable policy and evidence—without relying only on user accounts or static lists.

01

Create the trust space

The organization defines a group with verifiable identity and the initial frame for membership and roles.

02

Onboard people and issue membership

Controlled onboarding and issuance of portable membership or role credentials, revocable under policy.

03

Gate access on verifiable proof

Each sensitive resource requires the agreed presentation; the policy engine allows or denies in an auditable way—not only static permissions.

04

Record and custody evidence

Documentation and incidents stay linked to the group context, with demonstrable integrity and governed access.

use-cases

Where customers and integrators buy

Use cases with clear budget in compliance, operations and UX: groups and consortia, regulated attributes and digital chain of custody—markets driven by EU regulation and privacy expectations.

Membership is proven—not just listed.

Groups and resources with verifiable membership

Communities, associations, teams and consortia: each access can require a membership or role credential, evaluated by policy before opening documents or services. Fewer opaque accounts and clearer traceability of who accesses what, and under which terms.

Validate the attribute—not the full identity.

Attributes and authorizations with minimal disclosure

Age, qualifications, professional eligibility or mandate for a third party: issuance and verification scoped to the necessary claim, with revocation and alignment to European standards. Less legal friction and more control for the holder.

Evidence with demonstrable integrity, provenance and validity.

Digital chain of custody for sensitive processes

Inspections, reports, filings or incidents: material that is signed, encrypted and subject to access policy. Essential for compliance, insurance, homeowner communities and industrial or public-sector settings where the proof matters as much as the content.

Differentiation that procurement, legal and engineering understand

Holder sovereignty over what to disclose; explicit, traceable policies for access; the same verifiable signal reusable across processes and partners—without multiplying silos. Compliance and product align on trust that can be audited, not only declared.

Operational privacy

Selective disclosure and minimal exposure; the holder shares only what policy requires, with revocation when the context allows.

Portable trust

Membership and attributes as verifiable credentials that reuse across flows without rebuilding identity silos.

Access with proof

Access decisions rest on verifiable presentations and explicit policies—not only accounts or lists.

Evidence and traceability

Digital chain of custody for sensitive documentation and incidents, with demonstrable integrity and governed access.

About us

Kisku Ltd (Cyprus) builds Affinity as verifiable trust infrastructure: a stack ready for B2B/B2G pilots, documentation aligned with EUDI/eIDAS and a business model built around SaaS, API consumption and enterprise accounts.

We operate from the EU with a clear ICP: regulated organisations, multi-brand groups and partners integrating digital identity without years of in-house build. We welcome collaboration with investors and accelerators to fund pilots and commercial expansion in Europe.

Founder & CTO

Kisku Ltd · Paphos, Cyprus

Let’s build digital experiences where trust can be seen, audited and demonstrated.