Recovery system

Devices can be lost, stolen, or replaced. With traditional wallets, this often means losing access forever. Solident introduces a recovery system that preserves identity without exposing sensitive data.


"Losing a device should never mean losing your identity."


1. Recovery Key Creation

  • During initial setup, Solident generates an encrypted recovery key.

  • The key contains only encrypted data pointers, never raw biometrics or plain patterns.

  • Users are instructed to back it up offline or in a secure storage method of their choice.


2. Secure Backup

  • Recovery keys can be stored on:

    • Hardware devices (USB, secure chip, cold wallet)

    • Offline paper or QR backup

    • User’s encrypted cloud drive

  • The system emphasizes user ownership — no central authority holds a copy.


3. Restoration Process

  • When moving to a new device, the user imports their recovery key.

  • The device requests a fresh face scan and pattern input.

  • If both match the expected encrypted template and hash, the wallet and identity are restored.


4. Safeguards

  • Recovery keys are useless alone: they require biometric and pattern verification to unlock.

  • Even if a recovery file is stolen, it cannot be used without the rightful user.

  • Integrity checks confirm the key has not been tampered with before restoration.


Key Principles

  • No central reset: Users, not companies, control recovery.

  • Privacy-preserving: No raw biometric data is stored in recovery keys.

  • Permanent identity: Ownership remains intact across devices and over time.


The recovery system ensures that Solident identities are durable, portable, and always user-controlled, even in the face of lost or compromised devices.

Last updated