Frequently Asked Questions

FAQ Category: Circle-of-Trust

FAQ Categories (Buttons)
  • All
  • Circle-of-Trust (7)
  • Circle Access Desktop (3)
  • Circle Privé (3)
  • Circle Verité (3)
  • Circle Access 360 (1)
  • Circle Access Mobile (1)
  • Circle Guard (1)
  • Circle Vault (1)
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
Read more
How does a Secure Capsule compare to an X.509 certificate
A cert, like X.509, binds an identity to a device; whereas a circle tie is linked to a mobile device via the application. The same cert (and, unless exceptional steps are taken, it must be used on every device generating or reading email for that email address) may be used on many devices. As a […]
Read more
How to Use Circle-of-Trust
To use circle-of-trust, you first need to configure your access policies to trigger zero-trust identity verification. This can be done by adding a policy that requires users to perform multi-factor authentication, or by using another mechanism that supports this feature. Once this is done, users will be prompted to verify their identity, when they attempt […]
Read more
What is the difference between Circle DLT versus Blockchain?
"Blockchain" and "Distributed Ledger Technology" (or "DLT") are too very big buzzwords today that are often misunderstood, or misused. Here is where Circle fits. A Simple Definition to Blockchain Technology Blockchain is a decentralized, distributed and often public database type where data is saved in blocks, such that the hashcode present in any block is […]
Read more
What does it mean when I get the error "Object reference not set to an instance of an object"
This error is due to an issue with the Authentication likely on the server side. This issue can commonly be attributed to an improperly defined API key. To fix this, navigate to your config.php file in your site project files. And keep note of your API Keys. Next, Login to your Circle Console at https://console.gocircle.ai/dashboard/web/login […]
Read more
How Does Circle-of-Trust Benefit Users?
There are many benefits to using circle-of-trust, including: Ability to spoof-proof your actions, events, and data requiring the highest level of security Enable direct identity verification of a user, via other trusted and known users who are cryptographically added to the Circle-of-Trust. Developers can easily integrate the API calls to Circle-of-Trust into their workflows in […]
Read more
How Does Circle-of-Trust Work?
Circle-of-trust is a zero trust identity verification system that uses contextual information to verify the identity of a user. This system is unspoofable, meaning that it cannot be fooled by fake or stolen credentials. It also does not require any external certificate authority, making it more secure than other systems. All operations are performed within […]
Read more