Security

Security at every layer

From biometric hardware to cryptographic audit trails. Every part of UIP is designed with security and privacy as the foundation.

Architecture

How UIP protects your identity

Biometric-First

Every action requires fingerprint or face verification. No passwords, no SMS codes, no phishing vectors.

Secure Enclave

Private cryptographic keys are stored in your device's hardware security module. They can never be extracted or copied.

Zero-Knowledge

We verify your identity without accessing or storing biometric data. Your biometrics never leave your device.

Government Verification

Identity backed by official government ID verification through our partner Didit. Legally valid worldwide.

AES-256 Encryption

All data encrypted at rest and in transit. Messages use end-to-end encryption with unique session keys.

On-Device Signing

Digital signatures are created locally on your device using hardware-backed keys, then verified server-side.

Cryptography

AdES cryptographic signatures

Every API action is cryptographically secured with Advanced Electronic Signatures and SHA-256 hashing.

Hardware-Backed Keys

Private keys stored in device Secure Enclave, never exposed or extractable

SHA-256 Document Hashing

Every document and action hashed for integrity verification

On-Device Signing

Signatures created locally, private key never leaves the device

Full Audit Transparency

Document hash, signature, and public key included in every audit record

Audit Trail

Permanent, tamper-proof records

1

Action returns ID

Every auth, signature, or message returns a unique reference ID string

2

Store ID safely

Save the reference ID in your database or compliance systems as permanent proof

3

Query for verification

Use the ID to retrieve timestamp, signatory, requester, and full action details

What each reference reveals

Signatory Details

Full name, government ID verification status, biometric authentication time

Precise Timestamp

Exact UTC timestamp, timezone info, duration of signature process

Requester Context

Business organization, authorized representative, document type, action category

Privacy

GDPR compliant by design

  • Users control their own identity data
  • Biometric data never leaves the device
  • Clear data processing agreements
  • Encrypted at rest and in transit
  • Right to deletion supported

Built for trust

Start building with the most secure identity platform.