Security at every layer
From biometric hardware to cryptographic audit trails. Every part of UIP is designed with security and privacy as the foundation.
How UIP protects your identity
Biometric-First
Every action requires fingerprint or face verification. No passwords, no SMS codes, no phishing vectors.
Secure Enclave
Private cryptographic keys are stored in your device's hardware security module. They can never be extracted or copied.
Zero-Knowledge
We verify your identity without accessing or storing biometric data. Your biometrics never leave your device.
Government Verification
Identity backed by official government ID verification through our partner Didit. Legally valid worldwide.
AES-256 Encryption
All data encrypted at rest and in transit. Messages use end-to-end encryption with unique session keys.
On-Device Signing
Digital signatures are created locally on your device using hardware-backed keys, then verified server-side.
AdES cryptographic signatures
Every API action is cryptographically secured with Advanced Electronic Signatures and SHA-256 hashing.
Hardware-Backed Keys
Private keys stored in device Secure Enclave, never exposed or extractable
SHA-256 Document Hashing
Every document and action hashed for integrity verification
On-Device Signing
Signatures created locally, private key never leaves the device
Full Audit Transparency
Document hash, signature, and public key included in every audit record
Permanent, tamper-proof records
Action returns ID
Every auth, signature, or message returns a unique reference ID string
Store ID safely
Save the reference ID in your database or compliance systems as permanent proof
Query for verification
Use the ID to retrieve timestamp, signatory, requester, and full action details
What each reference reveals
Signatory Details
Full name, government ID verification status, biometric authentication time
Precise Timestamp
Exact UTC timestamp, timezone info, duration of signature process
Requester Context
Business organization, authorized representative, document type, action category
GDPR compliant by design
- Users control their own identity data
- Biometric data never leaves the device
- Clear data processing agreements
- Encrypted at rest and in transit
- Right to deletion supported