Data Flows
This section provides a comprehensive overview of the key data flows within the Zyphe platform. These flows demonstrate how user data is securely managed, verified, and shared while maintaining privacy and compliance with regulatory requirements.
Overview
Zyphe's data flows are designed around the principles of decentralized identity, user sovereignty, and privacy-by-design. Each flow ensures that users maintain control over their personal data while enabling secure verification and sharing with authorized parties.
Core Data Flows
🔐 User Vault Creation
The foundational flow that establishes a user's secure digital identity. This process creates a personal online datastore (vault) where user data is encrypted, sharded, and distributed across decentralized storage using advanced cryptographic techniques.
Key Features:
- Threshold + Polynomial (TH + P) encryption
- Data sharding across multiple nodes
- User consent and permission management
- UUID generation for unique identification
✅ User Verification Flow
The standard KYC (Know Your Customer) verification process that validates user identity and issues verifiable credentials. This flow supports documents from 190+ countries and can include separate document verification and liveness detection steps.
Key Features:
- Multi-country document verification (190+ countries)
- Active liveness detection (separate step)
- Portrait matching between document and live selfie
- Verifiable Credential (VC) issuance
- Secure data encryption and storage
⚡ One-Click KYC
An innovative flow that enables users to reuse previously verified credentials across different companies, eliminating the need for repeated verification processes.
Key Features:
- Credential reuse across companies
- Access grant system
- Metadata-based eligibility checking
- Passwordless authentication support
🤝 KYC Passport
A powerful feature that allows organizations to securely share verified KYC data with partner organizations, enabling seamless data access across trusted ecosystems without requiring users to repeat verification.
Key Features:
- Partner organization invitations
- User consent management for data sharing
- Cryptographic access grants for partners
- Flow-specific data sharing
- Invite lifecycle management (accept/reject/revoke)
🏢 Company Dashboard
The flow that enables companies to access user data through a secure dashboard interface, ensuring proper authorization and user consent.
Key Features:
- Company authentication
- User permission verification
- Secure data retrieval
- Access control management
🛡️ Authority Check
A compliance-focused flow that handles legal requests for data access from authorities while maintaining user privacy and ensuring legitimate access.
Key Features:
- Legal request verification
- Hash-based data referencing
- Authority legitimacy checking
- Regulatory compliance
🗑️ Data Deletion
The "right to be forgotten" flow that ensures users can request complete deletion of their data while respecting legal retention requirements.
Key Features:
- User-initiated deletion requests
- Retention obligation evaluation
- Access revocation
- Automated compliance checking
Data Flow Principles
All Zyphe data flows adhere to these core principles:
- User Sovereignty: Users maintain full control over their data and identity
- Privacy by Design: Data protection is built into every flow from the ground up
- Decentralized Storage: Data is distributed across multiple nodes for enhanced security
- Cryptographic Security: Advanced encryption ensures data remains secure
- Regulatory Compliance: All flows comply with relevant data protection regulations
- Transparency: Clear visibility into how data is processed and shared
Technical Architecture
The data flows leverage a sophisticated technical architecture including:
- Decentralized Storage: Distributed data storage across multiple nodes
- Threshold + Polynomial Encryption: Advanced cryptographic techniques
- Verifiable Credentials: Standards-compliant digital credentials
- Access Grants: Cryptographic authorization mechanisms
- Metadata Management: Efficient data discovery without compromising privacy
Getting Started
To understand how these flows work together, we recommend starting with the User Vault Creation flow, which establishes the foundation for all other data interactions. Then explore the User Verification Flow to understand how identity verification works, followed by the One-Click KYC flow to see how verified credentials can be reused across different services. For organizations looking to share verified data with partners, the KYC Passport flow demonstrates how to create trusted ecosystems with secure data sharing.