Universal Identity Protocol

Biometric-first, self-sovereign identity and signature protocol. Enable your business to authenticate and sign any digital action without passwords or centralized control.

Biometric Security

Mobile-only authentication with fingerprint and face recognition

Global Compliance

Government ID verification and legally binding signatures

Simple Integration

Easy API integration with QR code authentication flow

Don't have a UIP identity yet?

Download the UIP app and follow the instructions to create your business identity

Three Powerful APIs

Everything you need to implement biometric identity, instant signing, and secure messaging in your applications.

Identify API

Authenticate users with biometric verification. Get verified identity information and age verification for your applications.

Biometric authentication
Verified identity information
Age and location verification

Sign API

Instant biometric document signing. Replace DocuSign with legally binding signatures powered by verified identity and biometric authentication.

Instant signature requests
Legally binding documents
Verified identity proof

Message API

Send secure, encrypted messages to users. Include documents, request signatures, and control notification priority levels for different use cases.

Encrypted messaging
Document attachments
Signature requests
Priority notification levels

Endless Possibilities

Each API endpoint is modular and composable. Mix and match to create any identity, verification, or signing workflow you can imagine.

Consumer Applications

Passwordless Registration

Replace email/password flows with biometric UIP accounts. One sovereign identity, no passwords to manage.

Age & Location Verification

Verify age for digital platforms, clubs, events, or gambling sites. Restrict access by country for compliance.

High-Value Transactions

Secure cryptocurrency exchanges, stock trades, or property purchases with biometric confirmation.

Healthcare Consent

Medical procedures, organ donation, or clinical trial participation with verified, legally binding consent.

Travel & Immigration

Visa applications, border crossings, or hotel check-ins with government-verified identity proof.

Business & Enterprise

Employee Authentication

Secure internal systems with biometric auth. Save $70 per employee on password resets and credential recovery.

Contract Signing

Instant NDAs, employment contracts, vendor agreements, or partnership deals with verified signatures.

Compliance & Auditing

SOX compliance, financial audits, or regulatory reporting with tamper-proof identity verification.

Financial Services

Loan applications, account openings, wire transfers, or investment approvals with KYC compliance.

Client Communication

Secure messaging for sensitive project updates, confidential reports, or client deliverables.

B2B & Cross-Border

International Trade

Cross-border contracts, import/export agreements, or customs documentation with verified business representatives.

Partnership Verification

Verify business owner identities for joint ventures, acquisitions, or strategic partnerships before signing.

Supply Chain Authentication

Verify supplier identities, authenticate product certifications, or validate quality control signatures.

Payment Authorization

Large B2B payments, invoice approvals, or multi-signature treasury operations with executive verification.

Legal Documentation

Cross-border litigation, international arbitration, or multi-jurisdictional contracts with verified legal representation.

Why Choose Modular Identity?

Composable

Mix and match APIs to create custom workflows for any use case

Self-Managing

We handle renewals, verification, and all identity lifecycle management

Cost Effective

Eliminate password management costs and reduce support overhead

Get Creative

These are just the beginning. With modular APIs, verified identities, and biometric signatures, you can build anything. What will you create?

Start Experimenting

Need Access to Sensitive Data?

Tier 0 Access provides enterprise-grade access to sensitive user information including personal numbers, detailed identity data, and enhanced verification details for critical business operations.

Financial Services

KYC compliance, anti-money laundering, credit assessments requiring full identity verification

Healthcare

Patient identification, insurance verification, medical records requiring verified personal information

Government agency? Head here instead for dedicated government solutions.

Enhanced Security Requirements

Tier 0 Access requires additional compliance verification, enhanced security measures, and is subject to strict audit requirements. Only approved enterprises with legitimate use cases are granted this level of access.

Request Tier 0 Access

Permanent Audit Trail

Every action returns a unique reference ID. Store these IDs and query UIP anytime to retrieve immutable proof of who did what, when.

How Audit Records Work

Simple, powerful, and legally binding. Every UIP action generates an audit record you can verify forever.

1

Action Returns ID

Every authentication, signature, or message returns a unique reference ID string

2

Store ID Safely

Save the reference ID in your database, contracts, or compliance systems as permanent proof

3

Query for Verification

Use the reference ID to query UIP and retrieve timestamp, signatory, requester, and action details

Unique Reference Generation

Every UIP action creates a unique reference ID that proves the action occurred. These IDs are your keys to accessing permanent audit records.

Unique reference generation
One ID per action
Impossible to forge or guess

Legal Verification

Query UIP with any stored reference ID to retrieve court-admissible evidence including verified identity, exact timestamp, and action details.

Government ID verified signatories
Precise UTC timestamps
Court-admissible evidence

Audit Query System

Present any reference ID to UIP's verification system and instantly retrieve who signed, when they signed, and who requested the action.

Instant ID verification
Signatory identity details
Requester organization info

Permanent Storage

UIP maintains permanent records tied to each reference ID. Your audit trail never expires, ensuring compliance and legal protection forever.

Permanent record retention
Tamper-proof storage
Global accessibility

What Each Reference ID Reveals

Query any reference ID to retrieve complete details about the action, participants, and context.

Signatory Details

Full name, government ID verification status, biometric authentication time, UIP public key

Precise Timestamp

Exact UTC timestamp of action, timezone info, duration of signature process, session details

Requester Context

Business organization, authorized representative, document type, action category, IP geolocation

Business Applications

Contract Verification

Store signature reference IDs in contracts themselves. You can verify authenticity by querying UIP with the embedded ID.

Financial Audit Trails

Save transaction approval reference IDs in your accounting system. You can provide auditors with verified signatory and timestamp data.

Employee Authentication Logs

Store login reference IDs in security logs. You can provide HR or investigators with verified access details.

Compliance Documentation

Store audit reference IDs in your compliance systems. Query UIP to retrieve verified identity and signature details when needed.

Legal & Evidence

Court Evidence

Present verified signature details as evidence in litigation. Use reference IDs to retrieve court-admissible documentation from UIP.

Dispute Resolution

Resolve "who signed when" disputes instantly. Query the reference ID to get irrefutable proof of signatory and timestamp.

Regulatory Investigations

Provide investigators with verified documentation from UIP. Use reference IDs to retrieve detailed audit records.

Insurance Claims

Include signature reference IDs in insurance documentation. You can provide insurers with verified signature details when processing claims.

Never Lose Track Again

With UIP's comprehensive audit trail, every business action is permanently recorded and verifiable. Build trust, ensure compliance, and sleep soundly.

Enable Audit Trail

Simple, Usage-Based Pricing

Pay only for what you use. No subscriptions, no hidden fees.

Identify API

$0.01

per successful authentication

Biometric authentication
Verified identity information
Age verification
Global compliance

Signature API

$0.03

per successful signature

Instant biometric signing
Legally binding documents
Verified identity proof
Cross-border compliance

Message API

$0.05 without attachment
$0.10 with attachment

per message (both support signature)

End-to-end encryption
Document attachments (20MB)
Signature requests
Priority notification levels

Need Enterprise Solutions?

Volume pricing, dedicated support, and custom implementation for large organizations. Get personalized pricing based on your needs.

Contact Sales