Skip to main content

Overview

UIP (Universal Identity Protocol) is a biometric-first, self-sovereign identity and signature protocol that replaces passwords, fragmented logins, and traditional document signing with one cryptographically secure, government-verified identity.
One identity. Verified everywhere. Your fingerprint or face becomes your universal authentication method across all digital services.

The Problem UIP Solves

Identity Fragmentation

Traditional systems require users to:
  • Create dozens of username/password combinations
  • Remember and manage multiple credentials
  • Go through different verification processes for each service
  • Repeat identity verification for every new account

Security Vulnerabilities

Password-based systems are inherently insecure:
  • Passwords can be stolen, guessed, or phished
  • Weak passwords are common
  • Password reuse creates cascading security risks
  • Two-factor authentication adds friction without solving the core problem

Document Signing Complexity

Traditional signing processes are inefficient:
  • Print, sign, scan, and email documents
  • Multiple platforms for different types of signatures
  • Unclear legal validity across jurisdictions
  • No permanent audit trail

How UIP Works

1

One-Time Enrollment

Users download the UIP app and complete government ID verification with a live biometric check. This happens once and works everywhere.
2

Biometric Authentication

Your fingerprint or face becomes your password. Cryptographic keys are generated and stored securely on your device.
3

QR Code or Deep Link

Businesses create a session via the API and get back a QR code. Desktop users scan it; mobile users tap a deep link. The UIP app opens with the request details.
4

Approve and Done

The user reviews the request in the UIP app and approves with their biometric. The business polls the API and receives the verified result instantly.

Core Principles

Self-Sovereign

You own your identity. Your data stays on your device, encrypted and under your control.

Privacy-First

Zero-knowledge architecture. We can verify your identity without storing your personal data.

Biometric Security

Your face and fingerprint can’t be stolen, forgotten, or shared. Ultimate security.

Government-Verified

Official document verification with live biometric matching ensures real identity.

Global Interoperability

One identity that works across borders, governments, and businesses worldwide.

Legally Binding

Signatures are cryptographically provable and court-admissible in any jurisdiction.

UIP vs Traditional Systems

FeatureTraditional PasswordsUIP
SecurityCan be stolen or guessedBiometric - impossible to steal
User ExperienceRemember complex passwordsJust use your face/fingerprint
RecoveryReset via email/phoneBiometric verification
Multi-FactorAdditional frictionBuilt into biometric scan
Cross-PlatformDifferent credentials everywhereOne identity for everything

Key Benefits

  • No more passwords - Your face or fingerprint is your password
  • One-time verification - Verify once, use everywhere
  • Instant authentication - Sub-500ms authentication flows
  • Complete privacy - You own your data, zero-knowledge architecture
  • Works globally - Cross-border identity that works anywhere
  • Simple integration - Create session, show QR, poll for result
  • No webhooks needed - Identify and Sign use simple polling
  • Modular design - Use only what you need (auth, sign, messaging)
  • Usage-based pricing - Pay only for what you use, no subscriptions
  • Comprehensive docs - Complete API reference and integration guides
  • Reduce costs - Save $70 per employee on password resets
  • Increase security - Eliminate password-related breaches
  • Improve UX - Frictionless authentication users love
  • Ensure compliance - GDPR, SOX, and regulatory compliance built-in
  • Permanent audit trails - Immutable proof for any business action

Technology Stack

UIP uses cutting-edge cryptography and biometric technology to ensure maximum security while maintaining user privacy.

Security Features

  • AES-256 Encryption - Military-grade encryption for all data
  • Zero-Knowledge Architecture - We never see your personal data
  • Local Biometric Processing - Biometrics never leave your device
  • End-to-End Encryption - All messages and signatures fully encrypted
  • Tamper-Proof Records - Immutable audit trail for all actions

Biometric Technology

  • Fingerprint Recognition - 100% accuracy with liveness detection
  • Face ID Technology - Advanced facial recognition with anti-spoofing
  • Multi-Factor - Biometric + device possession inherently multi-factor
  • Anti-Fraud - Liveness detection prevents photo/video attacks

Identity Verification

  • Government ID Verification - Official document verification
  • Live Selfie Matching - Real-time biometric comparison
  • Anti-Fraud Detection - Advanced fraud prevention systems
  • Compliance Ready - Meets global KYC/AML requirements

Real-World Applications

Financial Services

Account opening, wire transfers, loan applications with instant KYC compliance

Healthcare

Medical consent, prescriptions, HIPAA-compliant messaging

Legal & Contracts

NDAs, employment contracts, legal documents with court-admissible proof

E-Commerce

Age verification, high-value purchases, fraud prevention

Travel & Immigration

Border crossings, visa applications, hotel check-ins

Government Services

Citizen authentication, benefit claims, official documentation

Enterprise Security

Employee authentication, system access, compliance reporting

B2B Transactions

Cross-border contracts, partnership agreements, payment authorization

Getting Started

Ready to integrate UIP into your application?

Quickstart

Build your first integration in 5 minutes

API Documentation

Explore the complete API reference

Security Architecture

Deep dive into UIP’s security model

Platform Delegation

Build platforms that act on behalf of businesses