Recovery system
Devices can be lost, stolen, or replaced. With traditional wallets, this often means losing access forever. Solident introduces a recovery system that preserves identity without exposing sensitive data.
"Losing a device should never mean losing your identity."
1. Recovery Key Creation
During initial setup, Solident generates an encrypted recovery key.
The key contains only encrypted data pointers, never raw biometrics or plain patterns.
Users are instructed to back it up offline or in a secure storage method of their choice.
2. Secure Backup
Recovery keys can be stored on:
Hardware devices (USB, secure chip, cold wallet)
Offline paper or QR backup
User’s encrypted cloud drive
The system emphasizes user ownership — no central authority holds a copy.
3. Restoration Process
When moving to a new device, the user imports their recovery key.
The device requests a fresh face scan and pattern input.
If both match the expected encrypted template and hash, the wallet and identity are restored.
4. Safeguards
Recovery keys are useless alone: they require biometric and pattern verification to unlock.
Even if a recovery file is stolen, it cannot be used without the rightful user.
Integrity checks confirm the key has not been tampered with before restoration.
Key Principles
No central reset: Users, not companies, control recovery.
Privacy-preserving: No raw biometric data is stored in recovery keys.
Permanent identity: Ownership remains intact across devices and over time.
The recovery system ensures that Solident identities are durable, portable, and always user-controlled, even in the face of lost or compromised devices.
Last updated