How It Works

Solident simplifies access by combining biometric verification and pattern unlock into one seamless flow. The process is designed to feel natural, yet it is cryptographically secure at every step.


"From face to pattern to access — all in seconds."


1. Enrollment

  • The user scans their face once to create an encrypted biometric template.

  • A personal pattern is set on a 3x3 grid, with at least four connected points.

  • Both the template and the pattern hash are stored securely.


2. Authentication

  • When logging in, the device performs a local face scan.

  • If the scan matches the encrypted template, the user is then asked to enter their pattern.

  • The entered pattern is hashed and compared with the stored hash.


Security should feel invisible, but always present when you need it.


3. Session token issuance

  • Once both face and pattern are validated, a session token is created.

  • This token can be used to sign into decentralized applications without revealing biometrics.

  • Tokens expire automatically to reduce risk of hijacking.


4. Transaction flow

  • For everyday actions, face verification may be enough.

  • For sensitive actions like withdrawals, swaps, or approvals, both face and pattern are required.

  • This flexible model balances usability and security.


5. Recovery

  • If the device is lost or replaced, the user restores access using an encrypted recovery key.

  • The recovery key re-links the biometric template and pattern hash without exposing them.

  • This ensures that identity is permanent, even if hardware is not.


End-to-end flow

  1. Enroll face and pattern

  2. Encrypt and store securely

  3. Local verification on login

  4. Issue session token after both checks

  5. Use token to interact with DeFi apps

  6. Protect sensitive actions with step-up checks

  7. Recover identity with recovery key if needed


Solident makes identity simple for the user, but impossibly difficult for attackers.

Last updated