Hello, Pioneers! I’m [name], and I’m Sally H.
Hello, everyone! The topic of today’s speech is
how to solve the KYC authentication problem.
We have proposed a free solution which is
designed for Chinese mainland and precinct,
and we can design solutions for other
regions in the future for discussion.
At present, a real person KYC needs to pay a
certain fee once, and it does not support ID card
verification in some areas, especially
in Chinese mainland. Therefore, we put
forward a KYC solution, hoping to help the
Core Team’s KYC verification problems.
If possible, we are willing to develop
third-party KYC verification software.
Regarding the proposal, we mainly talk about
four aspects: 1) working principle, 2) workflow
and the logical algorithm, 3) verification fee
and distribution, and 4) user privacy and security.
Working principle of third-party
KYC verification software, PiKYC
First, zero knowledge proof. Second, decentralization.
Advantages of PiKYC software verification:
completely free, protect a personal privacy,
random matching to avoid cheating, and
distributed verification with high accuracy.
According to the principle of the security circle,
five people are randomly selected as
verifiers and the three of them are valid verifiers.
PiKYC verification workflow: This is
the KYC verification workflow chart, including
the verification entry, I want to verify, and
become a verifier, a total of three large modules.
Verification process and logic algorithm: Next,
let’s look at the verification process and logical
algorithm. First, look at the authentication portal.
There are two authentication portals- one is to
enter the authentication program from the profile
and the other is to enter the authentication
program from the third-party application
platform. PiKYC verification software is an
independent third-party verification program. The
verification data is completely open to the CT.
How to be a verifier? We don’t have
a centralized verification agency.
It’s totally decentralized verification. So who
can be the verifier? The verifier needs to meet the
following four conditions: 1) the verifier must
be a Pi user, 2) the verifier must pass KYC,
3) the verifier must pass Alipay real-
name authentication, 4) the Core Team
finally determines who can become the verifier.
I want KYC verification.
If a Pioneer wants to start KYC verification, he needs to fill in personal details and ID information first.
The users will need to fill in ID information,
Alipay account number and Pi username,
personal basic information, which includes name, gender, email address, telephone number, etc.
The system randomly pops up five Alipay accounts.
The prover adds five Alipay accounts as friends.
Verifier working procedures
After the prover submits personal information,
add the verifier as Alipay friend,
after both parties become friends,
the verifier confirms whether the prover is a real-name Alipay user
and takes screenshots to save the evidence,
then the verifier submits real-name information,
and the system starts automatic verification.
This verification principle is
based on the zero knowledge proof principle.
A prover only provides the
minimum personal information,
and the verifier can confirm
whether the prover is a real person.
The personal privacy of the prover is well
protected.
At the same time, all verifiers are the
trailblazers of random matching of the system,
which belongs to the distributed verification.
Verifier screenshots: the real-name information
of the prover
The picture on the left shows Alipay’s real person user who has passed the real-personal authentication.
The picture on the right is a non-Alipay real user
who has not passed the real-person authentication.
Prover takes a screenshot of his real name
information
The prover opens the Alipay real-name verification center page,
takes a screenshot, and sends it to the verifier.
the verifier confirms that the prover has
uploaded the ID card and passed the Alipay face verification,
indicating that it has passed.
The verifier uploads the screenshot, and the system
automatically starts verification.
This algorithm effectively prevents someone from buying someone
else’s id card and bank card on the internet
to pass the real name verification of Alipay.
Brief introduction of PiKYC verification process
Prover provides his real name and ID information.
Verifier submits information to determine whether
prover has passed Alipay real-person verification.
The system automatically captures the screenshot
information submitted by the verifier and verifies it
with information submitted by the prover.
The system checks the information submitted by the first three verifiers.
The basic logic is zero knowledge proof and decentralized KYC verification.
Why use Alipay real-person authentication?
Alipay is an independent third-party payment institution
with 1.5 billion users worldwide.
Alipay real-person authentication category
ID card recognition
plus face recognition plus eye pattern recognition
ID card recognition plus own bank card recognition
KYC verification Fees and Allocation
The prover needs to pay 10pi for
successful verification.
The top three verifiers who assisted the prover to successfully verify were awarded a 3 Pi, 2 Pi and 2Pi.
The cost allocation needs to be approved by
the Core Team, and it is currently pending.
Data privacy and protection
The Core Team regularly samples and the reviews data
Software source code uploading Core Team
After the Mainnet goes online, we will delete our user data.
Thank you for watching!
This is our KYC proposal, welcome to discuss,
please correct if it is inappropriate. Thank
you! Best wishes to all Pioneers!