How It Works
Solident simplifies access by combining biometric verification and pattern unlock into one seamless flow. The process is designed to feel natural, yet it is cryptographically secure at every step.
"From face to pattern to access — all in seconds."
1. Enrollment
The user scans their face once to create an encrypted biometric template.
A personal pattern is set on a 3x3 grid, with at least four connected points.
Both the template and the pattern hash are stored securely.
2. Authentication
When logging in, the device performs a local face scan.
If the scan matches the encrypted template, the user is then asked to enter their pattern.
The entered pattern is hashed and compared with the stored hash.
Security should feel invisible, but always present when you need it.
3. Session token issuance
Once both face and pattern are validated, a session token is created.
This token can be used to sign into decentralized applications without revealing biometrics.
Tokens expire automatically to reduce risk of hijacking.
4. Transaction flow
For everyday actions, face verification may be enough.
For sensitive actions like withdrawals, swaps, or approvals, both face and pattern are required.
This flexible model balances usability and security.
5. Recovery
If the device is lost or replaced, the user restores access using an encrypted recovery key.
The recovery key re-links the biometric template and pattern hash without exposing them.
This ensures that identity is permanent, even if hardware is not.
End-to-end flow
Enroll face and pattern
Encrypt and store securely
Local verification on login
Issue session token after both checks
Use token to interact with DeFi apps
Protect sensitive actions with step-up checks
Recover identity with recovery key if needed
Solident makes identity simple for the user, but impossibly difficult for attackers.
Last updated