Frequently Asked Questions (FAQ)
Collection of Common Questions and Answers
-
What is UID?
Answer: UID is a unique blockchain-based identifier used to manage digital identities securely and decentralize. UID allows users to verify their identities without the need for physical documents or other sensitive information.
Example: A user can use UID to open a bank account online, where the bank only requires the UID for identity verification. -
How do I obtain a UID Document?
Answer: A UID Document can be obtained by registering in the e.id application or third-party applications integrated with IDCHAIN. Here are the steps:- Register your identity information through the application.
- The data is verified by the UID Controller.
- The UID Document is created and recorded on the IDCHAIN blockchain.
-
Is my data safe when using UID?
Answer: Yes, your data is safe because it is protected by:- Blockchain: The UID is recorded on the IDCHAIN blockchain, which is immutable and transparent.
- Cryptography: The UID is generated using the Blake2 hashing algorithm, which is resistant to data manipulation.
- Privacy: The system uses a zero-knowledge proof approach to ensure that only the necessary information is shared during the verification process.
-
What is a Verifiable Credential (VC)?
Answer: VC is a verifiable digital proof used to substantiate specific claims without providing personal information. For example, a university can use VC to issue digital certificates for graduating students, which can then be verified by potential employers. -
Who can verify my UID?
Answer: Authorized entities, such as banks, universities, or government agencies, can verify your UID with your consent. The verification process is conducted through the IDCHAIN blockchain, ensuring the authenticity of the UID without disclosing sensitive details. -
What if I want to update the data in my UID?
Answer: You can update your data through the UID Controller. Each update will be recorded on the blockchain, maintaining the integrity and traceability of the data.
Note: Data updates do not replace the existing UID but rather add new related metadata. -
Can UID only be used on IDCHAIN?
Answer: No. UID is designed based on the W3C Decentralized Identifier (DID) standard, allowing interoperability with other blockchain platforms and applications.
Example: UID can be used to access services on other platforms that support the W3C DID standard. -
What are the costs associated with creating a UID?
Answer: The cost of creating a UID depends on the platform you use. Generally, the costs include:- Gas Fee: The fee for recording the UID on the IDCHAIN blockchain. However, users do not need to worry about handling this as it is managed by the system.
- Service Fees: If you are using a third-party application, they may charge additional fees for their services.
-
How do I know that my UID cannot be forged?
Answer: UID cannot be forged because:- Each UID is recorded on the IDCHAIN blockchain, which is transparent and immutable.
- The UID is generated using the Blake2 hashing algorithm, ensuring that each UID is unique and resistant to manipulation.
- UID verification is conducted independently through the blockchain, ensuring data integrity.
-
Can the UID Controller change the UID Document data without the UID Subject's knowledge?
Answer: No. The UID Controller can only update data if you provide explicit consent. Additionally, every change will be recorded on the blockchain, allowing you to monitor all activities related to your UID. -
Is UID compliant with privacy regulations such as GDPR (General Data Protection Regulation)?
Answer: Yes, the UID Protocol is designed to comply with privacy regulations such as GDPR. Some ways in which UID supports compliance with GDPR include:- Right to Control Data: Users have full control over their UID and can decide who has access to their data.
- Data Minimization UID only discloses the minimum information necessary during verification.
- Right to Erasure: Although UID cannot be deleted from the blockchain due to its immutability, associated data can be archived or anonymized to comply with user requests.
-
What happens if I lose access to my e.id Wallet?
Answer: If you lose access to your e.id Wallet, you can recover it using the procedures set by the service provider. Typically, this involves the following steps:- Verifying your identity through other documents or credentials.
- Resetting access to your wallet using recovery keys or additional authentication methods.
- Once access is restored, you can manage your UID again.
-
How can organizations benefit from UID?
Answer: Organizations can leverage UID for various purposes, such as:- Employee Identity Verification: Ensuring the authenticity of employee identities without having to store physical document copies.
- Transaction Security: UID can be used to validate financial transactions or electronic contracts.
- Enhanced Customer Service: With UID, organizations can expedite the authentication process and improve user experience.
-
Does UID support multi-factor authentication (MFA)
Answer: Yes, UID can be integrated with multi-factor authentication systems to enhance security. For example:- First Factor: UID is used as a unique identifier.
- Second Factor: One-time passwords (OTP) or biometric authentication are used to ensure the user is the owner of the UID.
-
What distinguishes the UID Protocol from traditional identity systems?
Answer: The main differences between the UID Protocol and traditional identity systems are:- Decentralization: UID does not rely on a central server, reducing the risk of centralized attacks.
- Privacy: UID allows users to prove their identity without disclosing sensitive data.
- Interoperability: UID supports the global W3C DID standard, making it compatible with various systems.
- Security: By using blockchain and modern hashing algorithms, UID is far more secure than traditional systems.
-
Does IDCHAIN use EVM technology and is it compatible with other blockchains?
Answer: Yes, IDCHAIN supports compatibility with the Ethereum Virtual Machine (EVM), allowing developers to easily run smart contracts and decentralized applications (dApps). The benefits of EVM compatibility include:- Development Flexibility: Developers can leverage a wide ecosystem of tools such as Solidity, Remix, and Metamask.
- Interoperability: IDCHAIN can integrate with other blockchains that support EVM, enabling cross-platform data exchange.
- Cost and Time Efficiency: EVM compatibility reduces the need to rebuild applications from scratch.
-
What are the advantages of IDCHAIN compared to other blockchain platforms?
Answer: IDCHAIN has several key advantages:- Focus on Digital Identity: Unlike many other blockchains, IDCHAIN is specifically designed to manage digital identities with the UID protocol and W3C DID standards.
- Hashing Efficiency: Utilizing the Blake2b hashing algorithm, which offers higher security and speed compared to traditional algorithms.
- EVM Compatibility: IDCHAIN supports the EVM ecosystem, providing ease for developers already familiar with the technology.
-
Can UID be used on other blockchain platforms?
Answer: Yes, UIDs created using the UID Protocol on IDCHAIN can be used on other blockchain platforms that support the W3C DID standard. This ensures interoperability and global adoption across various blockchain ecosystems. -
How does IDCHAIN implement Substrate blockchain technology?
Answer: IDCHAIN uses the Substrate framework, which provides high flexibility for developing custom blockchains with tailored features, such as:- Modularity: Blockchain components can be customized to meet digital identity needs.
- Efficiency: Substrate allows for fast and efficient performance, supporting thousands of transactions per second.
- Active Community: As part of the Polkadot ecosystem, Substrate has extensive developer support and cutting-edge technology.