Introduction to Hypersign

iEddydavid
3 min readJul 16, 2021

Hypersign is a classic decentralized identity and access management infrastructure that works on the Issuance-verification model for the enterprise. Additionally, it leverages the core technological subsidiaries such as Public Key Infrastructure (PKI) and blockchain. It provides passwordless authentication and also authorization and verification services that amalgamate in few minutes and is harmonious with legacy IAM systems at a reasonable price-point.

In Hypersign, when it comes to the notion of the insurance-verification model, we have three (3) essential stakeholders.

  • The end-users access the services and hold their data.
  • The issuer verifies the user data and issues credentials based on the identity provider.
  • The Verifier verifies the credentials.

The function of the Hypersign protocol is to distribute the responsibility of issuance, holding, and verification among the essential stakeholders.

How the chain of command work.

The user shares personal data with the issuer. The issuer verifies and issues a verifiable credential in the form of a cryptographically signed document back to the user.

Essential contents of the verifiable credential

· User data

· Digital signature of the user.

At this stage, the issuer does not need to store the user data, as it is now possible to act as a stateless server. Alternatively, the issuer can store data for recovery or future purposes in an encrypted form.

This verifiable credential can be stored in any user-agent like a cloud agent or a mobile device to which only they have access. Thus gives control of personal data to the end-user.

The user can now present this credential to the Service Providers in a peer-to-peer fashion without notifying either the producer or the issuer when they want to use the service.

Furthermore, this provides a sense of privacy to the end-user, so he doesn’t have to be worried about being tracked or traced. The end-user has to attach his digital signature to the document before sharing the verifiable credential.

The Service Provider can obtain user data from verifiable credentials and verify digital signatures of the user with that of the Identity Provider.

The multi-signature is to be sure that it’s not just the right user but also the owner of the documents. The digital signatures also ensure the integrity of the document.

The service provider can also verify the digital signatures on the credentials the end-user gives independently- not making a verification request to the issuer or IDP. This assists in scaling the system, as the IDP doesn’t have to be available when it’s time for verification.

The verification process and issuance verification become less tasking as Hypersign provides a classic decentralized identity and access management structure. The chain of command becomes shortened. The core of technological subsidiaries is leveraged. All these are made possible with the Hypersign control.

Follow us on our platforms to learn more about us and stay updated!

🌎 Website: https://hypersign.id/
🐦 Twitter: https://twitter.com/hypersignchain
📢 Telegram Channel: https://t.me/hypersignchain
🔔 Telegram Announcement Channel: https://t.me/hypersign_ann

--

--