Proof of Human
Human Protocol provides a robust and secure solution for verifying genuine human users through the collection and verification of biometric data. This system ensures that only authenticated human users can participate in on-chain activities, effectively mitigating the risk of fraud and Sybil attacks. The Proof of Human solution consists of three main components: biometric data collection and verification, genuine human on-chain credentials (SBT tokens), and biometric data encryption and on-chain storage.
Biometric Data Collection and Verification
Human Protocol employs advanced biometric technologies to accurately and securely collect and verify user data. The key technologies involved include:
Fingerprint and Palm Print Scanning: Utilizing high-resolution scanners, the protocol captures detailed fingerprint and palm print patterns. These unique patterns are used to verify user identities. The reliability of fingerprint and palm print patterns, which are nearly impossible to duplicate, ensures high security in the verification process.
Facial Scanning Technology: The system uses sophisticated facial recognition algorithms to analyze facial features such as the distance between eyes, nose shape, and jawline. It incorporates 3D mapping and infrared scanning to enhance accuracy and prevent spoofing attempts, ensuring that the facial recognition process is both secure and reliable.
Iris Scanning Technology: Iris scanners capture the intricate patterns in the colored part of the eye, which are unique to each individual. Iris recognition is one of the most secure forms of biometric identification due to the stability and complexity of iris patterns over a person’s lifetime.
These biometric technologies ensure a high level of accuracy and security in verifying genuine human users, making it difficult for fraudulent actors to manipulate or bypass the system.
Genuine Human On-Chain Credentials (SBT Tokens)
Upon successful biometric verification, users are issued Soulbound Tokens (SBT). These tokens serve as digital proof of the user’s authenticity and are permanently linked to the user’s identity. Key features of SBT tokens include:
Non-Transferability: SBT tokens are non-transferable, meaning they cannot be sold or exchanged. This ensures that the proof of human identity remains tied to the original verified user.
On-Chain Presence: SBT tokens are stored on the blockchain, providing a secure and immutable record of the user’s verified identity. This facilitates seamless participation in on-chain activities and interactions, ensuring that only verified human users can engage with various blockchain projects and decentralized applications.
Biometric Data Encryption and On-Chain Storage
To protect user privacy, Human Protocol employs advanced encryption techniques to secure biometric data before it is stored on the blockchain. The process involves:
Data Encryption: All collected biometric data is encrypted using state-of-the-art encryption algorithms. This ensures that the data remains confidential and secure, accessible only through authorized verification processes.
Decentralized Storage: Encrypted biometric data is stored in a decentralized manner across the blockchain network. This approach enhances security and resilience, reducing the risk of data breaches or unauthorized access.
The combination of data encryption and decentralized storage ensures that users' sensitive biometric information is protected while maintaining the integrity and reliability of the verification process.
Last updated