Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.uip.digital/llms.txt

Use this file to discover all available pages before exploring further.

Overview

UIP (Universal Identity Protocol) is a biometric-first identity and signature protocol that replaces passwords, fragmented logins, and traditional document signing with one cryptographically secure, government-verified identity.
One identity. Verified everywhere. Your fingerprint or face becomes your universal authentication method across all digital services.

The problem UIP solves

Identity fragmentation

Traditional systems require users to:
  • Create dozens of username/password combinations
  • Remember and manage multiple credentials
  • Go through different verification processes for each service
  • Repeat identity verification for every new account

Security vulnerabilities

Password-based systems are inherently insecure:
  • Passwords can be stolen, guessed, or phished
  • Weak passwords are common
  • Password reuse creates cascading security risks
  • Two-factor authentication adds friction without solving the core problem

Document signing complexity

Traditional signing processes are inefficient:
  • Print, sign, scan, and email documents
  • Multiple platforms for different types of signatures
  • Unclear legal validity across jurisdictions
  • No permanent audit trail

How UIP works

1

One-time enrollment

Users download the UIP app and complete government ID verification with a live biometric check. This happens once and works everywhere.
2

Biometric authentication

Your fingerprint or face becomes your password. Cryptographic keys are generated and stored securely on your device.
3

QR code or deep link

Businesses create a session via the API and get back a QR code. Desktop users scan it; mobile users tap a deep link. The UIP app opens with the request details.
4

Approve and done

The user reviews the request in the UIP app and approves with their biometric. The business polls the API and receives the verified result instantly.

Core principles

Biometric-first

Your face and fingerprint can’t be stolen, forgotten, or shared. No passwords, no phishable secrets.

Government-verified

Official document verification with live biometric matching ensures real identity.

Global interoperability

One identity that works across borders, governments, and businesses worldwide.

Legally binding

Signatures are cryptographically provable and court-admissible in supported jurisdictions.

UIP vs traditional systems

FeatureTraditional passwordsUIP
SecurityCan be stolen or guessedBiometric — impossible to phish
User experienceRemember complex passwordsJust use your face/fingerprint
RecoveryReset via email/phoneBiometric verification
Multi-factorAdditional frictionBuilt into the biometric scan
Cross-platformDifferent credentials everywhereOne identity for everything

Key benefits

  • No more passwords — your face or fingerprint is your password
  • One-time verification — verify once, use everywhere
  • Instant authentication — sub-second flows
  • Works globally — cross-border identity that works anywhere
  • Simple integration — create session, show QR, poll for result
  • No webhooks required — identify and sign use simple polling
  • Modular design — use only what you need (identify, sign, message, audit)
  • Usage-based pricing — pay only for what you use, no subscriptions
  • REST + JSON — plain HTTPS, no SDK lock-in
  • Reduce costs — eliminate password-reset support overhead
  • Increase security — remove the entire password attack surface
  • Improve UX — frictionless authentication users love
  • Permanent audit trails — immutable proof for any business action

Technology stack

UIP combines modern cryptography, biometric authentication, and government-grade identity verification.

Security features

  • AES-256-GCM encryption — all PII is encrypted at rest
  • ECDSA P-256 signatures — every critical action is signed on-device with the user’s private key
  • Local biometric processing — biometric templates never leave the device
  • Tamper-evident audit records — append-only audit table with invalidation (never deletion)

Biometric technology

  • Fingerprint recognition — with liveness detection
  • Face ID — advanced facial recognition with anti-spoofing
  • Multi-factor by construction — biometric + device possession
  • Anti-fraud — liveness detection prevents photo/video replay attacks

Identity verification

  • Government ID verification — official document checks
  • Live selfie matching — real-time biometric comparison
  • Anti-fraud detection — fraud prevention on the verification vendor side
  • Compliance ready — aligned with global KYC/AML requirements

Real-world applications

Financial services

Account opening, wire transfers, loan applications with instant KYC

Healthcare

Medical consent, prescriptions, sensitive messaging

Legal & contracts

NDAs, employment contracts, documents with court-admissible proof

E-commerce

Age verification, high-value purchases, fraud prevention

Travel & immigration

Border crossings, visa applications, hotel check-ins

Government services

Citizen authentication, benefit claims, official documentation

Enterprise security

Employee authentication, system access, compliance reporting

B2B transactions

Cross-border contracts, partnership agreements, payment authorization

Getting started

Ready to integrate UIP into your application?

Quickstart

Build your first integration in 5 minutes

API Documentation

Explore the complete API reference

Security Architecture

Deep dive into UIP’s security model

Integration Patterns

QR, deep link, and polling patterns