πŸ“œ Protocol features

Protocol features - Recovery Protocol features - Guardianship Protocol features - Multi-identity

🌱 Seed apps

Seed apps - Identity app Seed apps - Contacts app Seed apps - Crypto app

βœ… Verification networks

Verification networks - Seed network Verification networks - Independent networks

Protocol

The Universal Identity protocol governs the technical operation of the Universal Identity system. The protocol is designed to operate in a distributed and decentralized manner, using posession of private cryptographic keys as the main proof point of identity control and operation. All the while the protocol also supports features such as recoverability, guardianship and multiple identities with integrated data sharing and privacy.

πŸ›Ά Recovery

Most modern identity systems support methods of recovering from unexpected and undesirable events such as loss of devices or credentials. However these processes often include approval from the same central authority than owns and operates the identity. In the world of decentralized identity, this becomes a new difficult problem that has to be solved again. Most, if not all, other solutions do not do a good job of providing recovery functionality in a usable manner.

In Universal Identity, identity owners can recover access after loss of credentials, device or other unexpected and undesirable events, in a usable manner, because the protocol enforces a few easy mitigation steps when setting up the identity with a desired level of security.

πŸ›‘ Guardianship

In most modern identity systems the same central authority than owns and operates the identity acts as the primary guardian and monitor undesirable event for the right price. In the world of decentralized identity, this becomes a new difficult problem that has to be solved again. Most, if not all, other solutions do not do a good job of providing the guardianship functionality in a usable manner.

In Universal Identity, identity owners can designate trusted people and entities as guardians of their identity and assets in cases of absence, incpacitation, or even death. They are notified when suspicious or malicious event occur, and are in a position to prevent or postpone event completion until fully resolving its correctness. They can also directly act as guardians in case of incpacitation and death based the rules set up by the original owner.

πŸ‘₯ Multi-identity

The system allows you to manage and use all your social circles from one place using multiple identities, with varying privacy preferences, and using the same source information.

While others tout a single public blockchain-based identity, we realize that approach comes with serious limitations to usability and privacy. Universal Identity supports multiple identities, in order to match the way people intuitively understand their multiple identities within multiple social circles. See β€œHow humans understand identity”↗️ for more information about our understanding of multiple identities.

Seed apps

Seed apps meant to kickstart the ecosystem and competition by private businesses. Eventually majority of apps in the market are created and supported by other players in the ecosystem, and powered by the Universal Identity protocol.

πŸ†” Identity app

The primary high security app that interacts with the user by surfacing notifications and requests for user input or confirmations, built by an ecosystem player.

πŸ“‡ Contacts app

The primary app used to search and retrieve contacts, as well as connect with others and add new contacts, built by an ecosystem player.

πŸ’° Crypto app

The primary app used to access public on-chain assets including cryptocurrency, crypto-tokens, Non-fungible tokens (NFTs), and others under the sole control of the user.

Verification networks

🌱 Seed verification network

Seed verification network meant to kickstart the ecosystem and competition by independent verification networks and communities. Eventually majority of the verification networks used in the market are created, governed and supported by other players in the ecosystem, and powered by the Universal Identity protocol.

πŸ’¬ Independent verification networks

Independent verification networks, each with their own brand, worldview, culture, and governance processes, competing for customers. The entities running such networks can be a single private company, a consortium of companies, a government, or a Decentralized Autonomous Organization (DAO).