Zodor Whitepaper
  • Zodor Whitepaper
  • Introduction
    • Introduction and Highlights
    • The Problem
    • Solution Overview : Zodor
  • Why Zodor?
  • PRODUCTS
    • Zodor Infra
      • Enterprise Onboarding Workflow
    • Zodor Capital
    • Zodor Energy
  • Zodor Infinity
    • How Zodor Infinity Works?
  • User Experience
    • User Onboarding
    • User Interaction Flow
    • Rewards and Loyalty Program
  • System Architecture
    • Overview of the Protocol
      • Maskade Blockchain
      • Masque ID
      • Homomorphic Encryption
      • ECDSA
    • Technical Implementation
    • Smart Contract Structure
    • Security Token Purchase Flow
    • Capital Inflow and Outflow
    • Incentive Program
  • Security and Privacy
    • Tokenization Security Measures
    • Security Measures
  • Tokenomics & Roadmap
    • $ZOD Token
    • Tokenomics
  • Roadmap
  • About us
    • Team
    • Join us
    • Contact Us
  • FAQs
    • Frequently Asked Questions (FAQs)
Powered by GitBook
On this page
  1. System Architecture
  2. Overview of the Protocol

Masque ID

Overview

Masque ID is a decentralized protocol designed to manage on-chain identities for compliant digital assets. It combines on-chain identity proofs with off-chain data storage, optimizing KYC processes while protecting user privacy through encrypted identity proofs.


Key Features

1. Identity

Users manage their identities with attributes such as:

  • Jurisdiction codes

  • Risk scores

  • Compliance credentials

2. Off-Chain Privacy

  • Sensitive data (e.g., passports) is securely stored with trusted KYC providers.

  • Only encrypted identity proofs are published on-chain.

3. Cryptographic Proofs

Tamper-proof attestations validate identity without exposing private data, ensuring authenticity.

4. Claims-Based Verification

  • Compliance claims (e.g., KYC, AML) are managed in the Claim Registry.

  • Claims are linked to user identities for real-time regulatory validation.

5. Dynamic Risk Management

Risk scores are updated dynamically based on user activity, jurisdiction, and compliance status.


Core Processes

Identity Creation

Users submit documents to KYC providers, who validate and issue encrypted identity proofs published on-chain.

Compliance Validation

The Compliance Module queries Identity and Claim Registries for real-time regulatory checks.

Updates and Restrictions

Non-compliant identities and expired claims are dynamically revoked or updated.

PreviousMaskade BlockchainNextHomomorphic Encryption

Last updated 4 months ago