How Humanity Protocol Works
Last updated
Last updated
Humanity Protocol is building out a global infrastructure for human-based Self-Sovereign Identities (SSI), referring to decentralized identity models that provide users with full control and autonomy of their own identity data.
To make this a reality, Humanity Protocol uses advanced palm recognition technology to create a Sybil-resistant network of humans. This is done using Proof-of-Humanity (PoH), and it keeps personal data entirely confidential due to the implementation of Zero-Knowledge (ZK) Proofs.
Think of Proof of Humanity as a decentralized identity verification system designed to ensure that individuals interacting within a network or platform are real human beings, not bots or duplicates. Once verified, individuals are added to a public registry, typically secured on a blockchain, ensuring transparency and accountability.
At Humanity Protocol, you are able to verify humanness in a non-invasive and privacy-preserving manner using your palm.
We will break down how this works into 4 key topics:
Enrolment: Users verify their uniqueness by scanning their palm, which results in the issuance of a unique human credential on the Humanity Protocol blockchain and securing a digital identifier called Human ID.
Identity Validators: Trusted entities that validate private data submitted by users and issue Verifiable Credentials (VCs) when the data is proven valid by the identity validators.
ZK Proofers (also known as "Verifier Nodes"): Focused on validating user credentials, ZK Proofers are nodes tasked with cryptographically verifying the validity of the Verified Credentials (VCs). ZK Proofers conduct the verification process by receiving and verifying the correctness of a Zero Knowledge Proof for the VC associated with a Human ID.
Verified Credentials: Digital certificates issued on the blockchain that confirm a user's human status or any form of credential tied to their identity. For example, proving one's human status, KYC credentials, employment history, or educational credentials. To prove validity of a VC, humans generate and submit a ZK Proof of their VC to the ZK Proofers.
To begin, users receive a Human ID by visiting testnet.humanity.org.
They can then participate in Enrolment, which has two distinct steps:
1) Enrolment: Allows users to verify their humanness through a palm print scan using their Android or iPhone apps that they will download on their mobile devices. During this process, users' palm prints are captured, and their uniqueness is verified using a machine learning model, providing them with a basic level of uniqueness verification.
2) Activation: Full enrolment requires using a physical palm scanner known as a Humanity Scanner, which captures both palm print and vein patterns using advanced infrared technology. This process offers a more secure and thorough verification, but it's currently only available at select in-person events (announced via and ).
The entire process is quick, easy, and non-invasive.
Identity Validators are responsible for checking the private data submitted by users and issuing VCs when the data is proven valid by them. Since Identity Validators are ultimately accountable for the authenticity of the issued VCs, they must be highly trustworthy and follow strict security measures.
In Phase 1, Humanity Protocol will serve as the sole Identity Validator. During this phase, the focus will be three separate VCs: Human ID registration, enrolment VC via palm print scanning, and proving humanity via specialized hardware for palm scanning.
The issuance of VCs related to human palm print and palm vein will require Humanity Scanners, which are special hardware that interested parties can purchase online via our website soon. Humanity Scanners will be generating revenue for the hardware owners as the protocol will reward them for onboarding new humans into the Humanity Protocol network. They will include the palm vein scanner, which uses infrared light to take pictures of one's palm. We will be publicly announcing more information about how you can purchase a Humanity Scanner shortly.
In Phase 2, a broad set of Identity Validators will be added to the Humanity Protocol. These Validators, including accredited institutions (e.g., universities attesting to student graduations), will have the right to issue VCs in their respective domains. Identity Validators will be governed by a DAO which overseas the Humanity Protocol ecosystem.
Identity Validators must stake $HP tokens as part of the process to ensure the integrity and security of the system. More information about the staking mechanism will be available in the coming months.
Verifiable Credentials (VCs) are digital certificates that confirm various aspects of a user's identity or status. Issued after verification, these credentials are stored on the blockchain and controlled entirely by the user.
As mentioned earlier, VCs also represent different aspects of enrollment into Humanity Protocol. For example, one proves receipt of a decentralized ID, and one confirms the uniqueness of a palm print (or vein scan) in the Humanity Protocol.
They may also represent nearly any other form of credential or verification.
Beyond Proof-of-Humanity, other possible types of VCs include:
KYC Credentials
Employment Credentials
Educational Credentials
Proof of Residency
Financial Identity
One potential use case involves a human-to-human stablecoin payment solution that maintains regulatory compliance, such as AML, while ensuring the privacy of the user's identity on the public blockchain. With Humanity Protocol, Verifiable Credentials could be issued to prove KYC compliance and eligibility for sending or receiving stablecoins, enabling fast transactions while keeping personal information fully confidential.
Other examples of VCs include age verification, professional credentials, health credentials, social media verification, membership credentials, and much more.
Crucially, users retain full control over their VCs, deciding who can access their credentials and under what circumstances. These VCs can then be quickly and securely verified without revealing personal data due to the implementation of Zero-Knowledge Proofs.
See the below for other possible VCs:
ZK Proofers, also known as Verifier Nodes, verify user credentials in the Humanity Protocol. They validate any VCs in a privacy-preserving manner and receive $HP tokens as compensation.
Verifying a VC is done by leveraging Zero-Knowledge cryptography, a cryptographic technique where a statement can be proven as truthful without revealing any specific information about the statement or knowledge itself. In the context of Humanity Protocol, ZK Proofers can verify that any given VC is valid, while not having access to any underlying user data. This guarantees that personal information remains fully confidential.
This approach not only safeguards user privacy but also encourages broader participation in the verification process by enabling a decentralized network of Humanity zkProofers.