Documentation Index
Fetch the complete documentation index at: https://docs.uip.digital/llms.txt
Use this file to discover all available pages before exploring further.
Overview
UIP (Universal Identity Protocol) is a biometric-first identity and signature protocol that replaces passwords, fragmented logins, and traditional document signing with one cryptographically secure, government-verified identity.One identity. Verified everywhere. Your fingerprint or face becomes your universal authentication method across all digital services.
The problem UIP solves
Identity fragmentation
Traditional systems require users to:- Create dozens of username/password combinations
- Remember and manage multiple credentials
- Go through different verification processes for each service
- Repeat identity verification for every new account
Security vulnerabilities
Password-based systems are inherently insecure:- Passwords can be stolen, guessed, or phished
- Weak passwords are common
- Password reuse creates cascading security risks
- Two-factor authentication adds friction without solving the core problem
Document signing complexity
Traditional signing processes are inefficient:- Print, sign, scan, and email documents
- Multiple platforms for different types of signatures
- Unclear legal validity across jurisdictions
- No permanent audit trail
How UIP works
One-time enrollment
Users download the UIP app and complete government ID verification with a live biometric check. This happens once and works everywhere.
Biometric authentication
Your fingerprint or face becomes your password. Cryptographic keys are generated and stored securely on your device.
QR code or deep link
Businesses create a session via the API and get back a QR code. Desktop users scan it; mobile users tap a deep link. The UIP app opens with the request details.
Core principles
Biometric-first
Your face and fingerprint can’t be stolen, forgotten, or shared. No passwords, no phishable secrets.
Government-verified
Official document verification with live biometric matching ensures real identity.
Global interoperability
One identity that works across borders, governments, and businesses worldwide.
Legally binding
Signatures are cryptographically provable and court-admissible in supported jurisdictions.
UIP vs traditional systems
- Authentication
- Document signing
- Identity verification
| Feature | Traditional passwords | UIP |
|---|---|---|
| Security | Can be stolen or guessed | Biometric — impossible to phish |
| User experience | Remember complex passwords | Just use your face/fingerprint |
| Recovery | Reset via email/phone | Biometric verification |
| Multi-factor | Additional friction | Built into the biometric scan |
| Cross-platform | Different credentials everywhere | One identity for everything |
Key benefits
For users
For users
- No more passwords — your face or fingerprint is your password
- One-time verification — verify once, use everywhere
- Instant authentication — sub-second flows
- Works globally — cross-border identity that works anywhere
For developers
For developers
- Simple integration — create session, show QR, poll for result
- No webhooks required — identify and sign use simple polling
- Modular design — use only what you need (identify, sign, message, audit)
- Usage-based pricing — pay only for what you use, no subscriptions
- REST + JSON — plain HTTPS, no SDK lock-in
For businesses
For businesses
- Reduce costs — eliminate password-reset support overhead
- Increase security — remove the entire password attack surface
- Improve UX — frictionless authentication users love
- Permanent audit trails — immutable proof for any business action
Technology stack
UIP combines modern cryptography, biometric authentication, and government-grade identity verification.
Security features
- AES-256-GCM encryption — all PII is encrypted at rest
- ECDSA P-256 signatures — every critical action is signed on-device with the user’s private key
- Local biometric processing — biometric templates never leave the device
- Tamper-evident audit records — append-only audit table with invalidation (never deletion)
Biometric technology
- Fingerprint recognition — with liveness detection
- Face ID — advanced facial recognition with anti-spoofing
- Multi-factor by construction — biometric + device possession
- Anti-fraud — liveness detection prevents photo/video replay attacks
Identity verification
- Government ID verification — official document checks
- Live selfie matching — real-time biometric comparison
- Anti-fraud detection — fraud prevention on the verification vendor side
- Compliance ready — aligned with global KYC/AML requirements
Real-world applications
Financial services
Account opening, wire transfers, loan applications with instant KYC
Healthcare
Medical consent, prescriptions, sensitive messaging
Legal & contracts
NDAs, employment contracts, documents with court-admissible proof
E-commerce
Age verification, high-value purchases, fraud prevention
Travel & immigration
Border crossings, visa applications, hotel check-ins
Government services
Citizen authentication, benefit claims, official documentation
Enterprise security
Employee authentication, system access, compliance reporting
B2B transactions
Cross-border contracts, partnership agreements, payment authorization
Getting started
Ready to integrate UIP into your application?Quickstart
Build your first integration in 5 minutes
API Documentation
Explore the complete API reference
Security Architecture
Deep dive into UIP’s security model
Integration Patterns
QR, deep link, and polling patterns