Security at
every layer.
From biometric hardware to cryptographic audit trails. Every part of UIP is designed with security and privacy as the foundation — never the afterthought.
How UIP protects your identity
Biometric-first
Every action requires fingerprint or face verification. No passwords, no SMS codes, no phishing vectors.
Secure enclave
Private cryptographic keys are stored in your device's hardware security module. They can never be extracted or copied.
Government-verified
Identity backed by live document capture and verification against official issuing authorities. Legally valid worldwide.
AES-256 encryption
All data encrypted at rest and in transit. Messages use end-to-end encryption with unique session keys.
On-device signing
Digital signatures are created locally on your device using hardware-backed keys, then verified server-side.
Tamper-proof audit
Every action returns a permanent, queryable reference ID. Immutable records of who, what, and when.
AdES signatures, end to end
Every API action is cryptographically secured with Advanced Electronic Signatures and SHA-256 hashing.
Hardware-backed keys
Private keys stored in the device Secure Enclave, never exposed or extractable.
SHA-256 document hashing
Every document and action is hashed for integrity verification.
On-device signing
Signatures are created locally — the private key never leaves the device.
Full audit transparency
Document hash, signature, and public key are included in every audit record.
Permanent, tamper-proof records
Action returns ID
Every auth, signature, or message returns a unique reference ID string.
Store ID safely
Save the reference ID in your database or compliance systems as permanent proof.
Query for verification
Use the ID to retrieve timestamp, signatory, requester, and full action details.
What each reference reveals
Signatory details
Full name, government ID verification status, biometric authentication time.
Precise timestamp
Exact UTC timestamp, timezone info, and duration of the signature process.
Requester context
Business organization, authorized representative, document type, action category.
GDPR compliant
by design
- Users control their own identity data
- Biometric data never leaves the device
- Clear data processing agreements
- Encrypted at rest and in transit
- Right to deletion supported
Built for trust.,
Start with the UIP app — create your own verified credential in minutes, then integrate the same protocol into your stack.