(3.10) A KYC proposal

Hello, Pioneers! I’m [name], and I’m Sally H.
Hello, everyone! The topic of today’s speech is 
how to solve the KYC authentication problem.  
We have proposed a free solution which is 
designed for Chinese mainland and precinct,  
and we can design solutions for other 
regions in the future for discussion.
At present, a real person KYC needs to pay a 
certain fee once, and it does not support ID card  
verification in some areas, especially 
in Chinese mainland. Therefore, we put  
forward a KYC solution, hoping to help the 
Core Team’s KYC verification problems. 
If possible, we are willing to develop 
third-party KYC verification software.
Regarding the proposal, we mainly talk about 
four aspects: 1) working principle, 2) workflow  
and the logical algorithm, 3) verification fee 
and distribution, and 4) user privacy and security.
Working principle of third-party 
KYC verification software, PiKYC  
First, zero knowledge proof. Second, decentralization.
Advantages of PiKYC software verification: 
completely free, protect a personal privacy,  
random matching to avoid cheating, and 
distributed verification with high accuracy. 
According to the principle of the security circle,  
five people are randomly selected as 
verifiers and the three of them are valid verifiers.
PiKYC verification workflow: This is 
the KYC verification workflow chart, including  
the verification entry, I want to verify, and 
become a verifier, a total of three large modules.
Verification process and logic algorithm: Next, 
let’s look at the verification process and logical  
algorithm. First, look at the authentication portal. 
There are two authentication portals- one is to  
enter the authentication program from the profile 
and the other is to enter the authentication  
program from the third-party application 
platform. PiKYC verification software is an  
independent third-party verification program. The 
verification data is completely open to the CT.
How to be a verifier? We don’t have 
a centralized verification agency. 
It’s totally decentralized verification. So who 
can be the verifier? The verifier needs to meet the  
following four conditions: 1) the verifier must 
be a Pi user, 2) the verifier must pass KYC, 
3) the verifier must pass Alipay real-
name authentication, 4) the Core Team  
finally determines who can become the verifier.
I want KYC verification.
If a Pioneer wants to start KYC verification, he needs to fill in personal details and ID information first. 
The users will need to fill in ID information, 
Alipay account number and Pi username,
personal basic information, which includes name, gender, email address, telephone number, etc.
The system randomly pops up five Alipay accounts.  
The prover adds five Alipay accounts as friends.
Verifier working procedures
After the prover submits personal information, 
add the verifier as Alipay friend,
after both parties become friends,
the verifier confirms whether the prover is a real-name Alipay user
and takes screenshots to save the evidence,  
then the verifier submits real-name information, 
and the system starts automatic verification.
This verification principle is 
based on the zero knowledge proof principle.  
A prover only provides the 
minimum personal information,  
and the verifier can confirm 
whether the prover is a real person.  
The personal privacy of the prover is well 
At the same time, all verifiers are the  
trailblazers of random matching of the system, 
which belongs to the distributed verification.
Verifier screenshots: the real-name information 
of the prover
The picture on the left shows Alipay’s real person user who has passed the real-personal authentication.  
The picture on the right is a non-Alipay real user 
who has not passed the real-person authentication.
Prover takes a screenshot of his real name 
The prover opens the Alipay real-name verification center page,
takes a screenshot, and sends it to the verifier. 
the verifier confirms that the prover has 
uploaded the ID card and passed the Alipay face verification,
indicating that it has passed. 
The verifier uploads the screenshot, and the system  
automatically starts verification.
This algorithm effectively prevents someone from buying someone  
else’s id card and bank card on the internet 
to pass the real name verification of Alipay.
Brief introduction of PiKYC verification process 
Prover provides his real name and ID information.  
Verifier submits information to determine whether 
prover has passed Alipay real-person verification.  
The system automatically captures the screenshot 
information submitted by the verifier and verifies it  
with information submitted by the prover.
The system checks the information submitted by the first three verifiers.
The basic logic is zero knowledge proof and decentralized KYC verification.
Why use Alipay real-person authentication?
Alipay is an independent third-party payment institution  
with 1.5 billion users worldwide.
Alipay real-person authentication category
ID card recognition  
plus face recognition plus eye pattern recognition 
ID card recognition plus own bank card recognition
KYC verification Fees and Allocation  
The prover needs to pay 10pi for 
successful verification.
The top three verifiers who assisted the prover to successfully verify were awarded a 3 Pi, 2 Pi and 2Pi. 
The cost allocation needs to be approved by 
the Core Team, and it is currently pending.  
Data privacy and protection
The Core Team regularly samples and the reviews data
Software source code uploading Core Team
After the Mainnet goes online, we will delete our user data.
Thank you for watching!
This is our KYC proposal, welcome to discuss,   
please correct if it is inappropriate. Thank 
you! Best wishes to all Pioneers!

Leave a Reply

Your email address will not be published. Required fields are marked *