CIPHER ID provides a self-sovereign system of data authorization and ownership confirmation, thereby granting true control to users. The entire process of ID generation, storage, updation, and other critical operations are fully automated and decentralized in nature, thereby allowing the users operating within the ecosystem to have full control and ownership of any data that may be associated with them. Discrete IDs linked across various ecosystems can have multiple delegates and attributes. In the form of verifiable credentials, entities can make and verify claims in terms of data ownership, access rights, and validation. Since any entity that is part of the network can do this, this makes the CIPHER ID framework a strong contender to build an account mechanism with a high degree of disintermediation.
A few characteristics of CIPHER ID:
Self-sovereignty and management
Ease of use
Cipher establishes a decentralized trust model and a distributed trust delivery system through CIPHER ID and a mechanism that uses verifiable claims. It uses the zero-knowledge proof protocol to assure the privacy protection of verifiable claims. Through CIPHER ID, Cipher will also incorporate various authentication service agencies, and establish multi-source authentication to achieve a more complete picture of the respective entity's identity. Trust Anchor Signing server CNS
In addition to building a trust network that relies on certain central entities, different entities can also build strong trust relationships amongst themselves. Such a credibility based network is generated through mutual authentication between entities. The higher the number of successful authentications, the higher the credibility of a particular entity. High credibility rating would make the entities more reliable and trustworthy, and authentication from a high credibility entity will equate to higher credibility for the said entity.
Some of the main features of the CIPHER ID framework are listed below.
An account mechanism that links to wallet addresses and is supported across the Cipher, Ethereum, and Binance Smart Chain ecosystem on the application layer.
Linking to the respective contracts deployed on the Ethereum, Cipher and BSC chains to facilitate interoperability in the form of off-chain services such as an Oracle. Also, cross-chain communication between the CIPHER ID contracts deployed on Cipher Protocol and the target chain respectively.
Support for assets from multiple chains (Bitcoin, Ethereum, Cipher, etc.)
A reputation score assigned to addresses based on transactional data such as asset ownership, transaction history with smart contracts, etc.
In the context of CIPHER ID, the term
entity refers to the following:
Individuals - Individual users of
Legal entities - Institutions, organizations, enterprises, etc.
Objects - Mobile phones, automobiles,
IoT devices, etc.
Content - Research, creative content, etc.
A CIPHER ID is basically an identifier within the scope of the system. All the entities that are part of the network shall have a Cipher Identifier (CIPHER ID) that identifies and manages it's identity.
On the Cipher blockchain, an entity can correspond to multiple individual IDs, and there need not exist any kind of relationship between the said multiple IDs.
The CIPHER Auth and Signing server services will be deployed on the Cipher mainnet.
A signing server is a back end service that links CIPHER ID from end user to the account system inside an application.
It is normal for traditional businesses to have partially, or fully centralized systems. Thus, keeping such scenarios and use cases in mind, CipherProxy has developed a workaround for centralized systems to integrate and use CIPHER ID.
The ID can be handed back to the user by changing the
owner property of an CIPHER ID from the application to the end user. While conceptually, the CIPHER ID is delegated from the user to the application server host. The terms for this shall be prepared in advance, and the user would then authorize this 'delegation' by accepting the terms.
Technically speaking, the delegated CIPHER ID is able to perform the following tasks:
Perform actions such as registration and login within the system on behalf of the user,
and publishing results to the Cipher mainnet.
Enable the users to take over full control and ownership of their CIPHER ID if they wish to do so.