User Verification Flow
-
Perform KYC: The user begins by submitting their personal data required for KYC. This typically involves two steps: first, taking a picture of their identity document for document verification, and then performing a liveness check to prove they are a real person who matches the document. This is a standard compliance process to verify the identity of the users (documents from 190+ countries are supported).
-
Perform KYC: Zyphe takes the submitted data and performs the necessary checks to verify the user’s identity.
-
Create User Vault: Once the verification is complete, a user Vault is generated
-
Encrypt and upload user data: Zyphe's backend then encrypts the user's data for security.
-
Issue an interoperable VC: After the data is securely encrypted, a Verifiable Credential (VC) is issued. VCs are digital certificates that use cryptography to provide a secure and tamper-evident way for a claim to be represented and verified. In our case, the VC is a hash that can be minted in every chain if needed.
-
Encrypt and upload VC: The verifiable credential is then encrypted and stored securely in the user vault, along with the personal information that has been used to generate it.