Protocol Design

Technical Infrastructure overview

Identity Layer:

  • DID (Decentralized Identity Identifier): Core identifier for user identity, supporting two DID methods and standards, ensuring interoperability across various platforms.

DID methods;

  1. (XName) A decentralized naming system for on-chain, machine-readable identifiers, like, Ethereum wallet addresses, content hashes, and metadata. ERC-721 NFT.

  2. (XHS) Adaptive Proof of Humanity (PoH), a biometric verification system. XHS Scoring is currently off-chain.

  • Omnichain Primary Name Resolver: Enables cross-chain domain name resolution, mapping human-readable domain names to DIDs, enhancing user convenience.

Cross-chain messaging protocols in use;

Axelar enables secure cross-chain communication for Web3, allowing development of interchain dApps beyond a single chain. Utilizing proof-of-stake, it provides robust security similar to Ethereum, Polygon, and Cosmos, enabling seamless interaction with any asset or application across chains with a single click.

LayerZero V2 is an open-source, immutable messaging protocol for creating omnichain, interoperable applications.

  • Multichain Registrar: Facilitates the registration and management of DIDs across multiple blockchains, improving availability and fault tolerance.

  • Multi-suffix Controller: Supports various domain name suffixes to cater to personalized needs of diverse users.

  • Verifiable Credentials: Provides capabilities for issuing, storing, and verifying verifiable claims, enriching the dimensions of identity information.

Data Collection and Computation Layer:

  • Biometric Verification: Integrates biometric technologies such as facial recognition, fingerprints, and voiceprints to enhance the security and accuracy of identity authentication.

Current biometric methods implemented for verification;

  1. 3D Facial mapping and liveness testing. (Regula & Facetec are XStar third party providers)

  • Social Linkage: Verifies and enriches identity information through social relationship links, such as friendships and work relationships.

  1. Referral System, facilitates friends to join & verify.

  • Social Graph Analysis: Utilizes social graph analysis algorithms to assess users' influence, activity, creditworthiness, etc.

  1. X/Twitter & Discord engagement analysis.

  • Events Data Collector: Gathers data on users' online and offline event participation to understand their behaviors and preferences.

  1. Utilizing Luma wallet collection at events to verify peoples wallet addresses that attended in person events.

  • Multi-dimension Computation: Analyzes multi-dimensional data (identity, social, behavior, reputation, etc.) to generate comprehensive user profiles.

  1. XHS Score.

Data Storage Layer:

  • Distributed Storage: Implements distributed storage solutions on Arweave (Stage 2) to ensure data security, reliability, and decentralization.

  • Encryption and Access Control: Encrypts sensitive data for storage and protects user privacy through flexible access control mechanisms and DID-based authorization. While in Stage 3 a Trusted Executable Environment (TEE) controls and ZKProofs are used to encrypt and privatize user information.

  • Data Backup and Recovery: Establishes data backup and recovery mechanisms in Stage 4 (only at the user level, no third party or XSTAR has access to recovery) to enhance data reliability and availability.

  • Data Indexing and Querying: Implementation of an efficient data indexing and querying mechanism to facilitate data retrieval and usage across all supported networks.

Execution Layer:

  • Smart Contracts: Utilizes smart contracts on each network (cross-chain messaging protocol dependent) to implement business logics related to identity and data created with XNAME and in stage 2, XHS.

  • Decentralized Applications (DApps): Builds identity & DNS applications based on the capabilities of the identity and data layers, such as explorers, airdrop management platforms etc.

  • SDK and API: Provides easy-to-use APIs to help developers quickly build and integrate identity and data-related functions, available here.

Last updated