Currently, some public and private organizations have implemented various identification verification solutions to manage identity authentication. The idea of using a third-party identity provider (IdP) to access a relying party (RP) is not new, and both RP and IdP have their benefits as they can only be connected once in a federated identity ecosystem. While the deployed identity brokerage system has provided participants with great utility, it was pointed out that the principles they designed had several security and privacy gaps.