Family COnnect
Family COnnect

The FTC’s January 2026 workshop on age verification marked a turning point in how online age assurance is understood. For years, the digital ecosystem relied on a fragile assumption: that age could be managed through self-declaration, static age gates, or single, one-size-fits-all checks.
That assumption no longer holds.
What the workshop made clear is that age assurance is no longer a policy question alone. It is an architectural one. The focus has shifted from whether platforms should seek better age signals to how they can do so at scale in a way that respects consumers’ privacy, security, and civil liberties .
One of the strongest themes at the FTC workshop was the need to take a risk-based, proportional approach to age verification. Platforms now operate across jurisdictions with different legal thresholds, enforcement models, and risk profiles. Users arrive with different capabilities, documentation, and constraints.
In that environment, a one-size-fits-all approach to age verification is not just insufficient, it is exclusionary and brittle. When a method fails, users are blocked. When laws change, systems break. When edge cases arise, platforms are forced into poor tradeoffs between safety, privacy, and access.
Age assurance needs to work for real users, in real markets, under real regulatory requirements.
This is where orchestration becomes essential.
At k-ID, orchestration means managing a user-centric waterfall with a variety of age verification methods, rather than forcing every user through the same check. A low-friction method such as on-device facial age estimation can be offered first, with clearly defined fallback options (such as presenting an ID or payment card) available when that method is unavailable, inappropriate, or unsuccessful.
The selection, sequencing, and availability of these methods are governed by policy, not hard-coded assumptions.
Orchestration is how age verification is made proportionate and inclusive. It allows platforms to establish age using multiple concrete methods while avoiding lock-in to a single technique or provider. Most importantly, it ensures that an originating age outcome can be reached for the widest possible set of users.
Once age has been established through an orchestrated process, a second problem immediately appears: repetition.
Without a way to carry a valid age signal forward, users are forced to repeat age verification every time they encounter a new service or product. This creates unnecessary friction, increases costs for platforms, and drives the accumulation of sensitive personal data across the ecosystem.
Solving age assurance at scale requires separating two distinct steps:
This is where interoperability becomes crucial.
AgeKeys are not an age verification method. They do not determine age, estimate age, or collect identity data. Instead, they provide a privacy-preserving way to store and reuse the outcome of an orchestrated age verification process.
After a user completes an age check using any supported methods, the resulting age signal can be stored as an AgeKey. Built on the global FIDO2 standard developed by the FIDO Alliance and W3C, AgeKeys leverage passkey technology to allow users to store, own, and present their proof of age with a matter of seconds.
Similar to a real-world “18+” wristband one might receive at a physical venue, the AgeKey credential stores only the user’s age signal, and no information that reveals the owner’s identity. Platforms who rely on AgeKeys receive only a pass/fail for the age criteria they set for their service. They do not receive documents, biometric data, or persistent identifiers.
This distinction is critical. Orchestration determines how age is established. AgeKeys make that established age reusable.
A major concern raised during the FTC workshop was the risk that age assurance systems could evolve into mechanisms for tracking users or centralizing sensitive identity data.
AgeKeys are designed to avoid that outcome.
Because AgeKeys store age credentials rather than identity, the same age credential can be presented across services without creating a cross-platform profile. Designed around open protocols and double-anonymity principles, AgeKeys avoids data exposure and preserves privacy.
The AgeKey credential itself is governed by policy. It can expire, require periodic re-verification based on risk level, or be reported and revoked if it is later discovered to be fraudulent. This is how reuse becomes compatible with privacy, rather than a threat to it.
AgeKeys have already been used millions of times across participating services, significantly reducing friction compared to traditional age verification methods while strengthening privacy protections. The approach has gained momentum across the industry, with major platforms such as Meta committing to join the OpenAge Initiative and make AgeKeys available to users in 2026, alongside identity verification leaders including Socure, Persona, Incode, and Veratad.
As Rick Song, CEO at Persona, noted:
“As regulatory expectations rise globally, platforms need age assurance that is accurate, privacy-respecting, and interoperable by design. OpenAge provides a practical framework for reusable age signals that can be deployed across real-world systems without adding friction.”
These design choices are not theoretical. They reflect the practical realities discussed at the FTC workshop.
k-ID was built to orchestrate multiple age verification methods because no single method can serve every user or every jurisdiction. OpenAge was launched to ensure that reusable age credentials could operate within a neutral, interoperable framework. AgeKeys are offered to all k-ID clients because reusable age credentials are foundational infrastructure, not a premium feature.
Together, these components address the full lifecycle of age assurance:
The next phase of age assurance is being defined by systems that establish age proportionately, support diverse users, and allow verified outcomes to be reused without surveillance.
That is the new architecture of digital trust.