Web3ID

Team Name

Web3 Enjoyers

Timeline

Spring 2024 – Summer 2024

Students

  • Edward Alkire
  • Abhisek Kumar Jha

Abstract

Create and share “digital identities” with selective disclosure of Personally Identifiable Information (PII). This includes support for attestations verified by the service and associated with the user using cryptographic signature verification and immutable public blockchain history.

Background

The problem with treasury management and salary agreements in the prevailing financial system is the lack of transparency and the accompanying trust assumptions. Consider a non-profit organization like Wikipedia, which misleads users into believing they wouldn’t exist without regular donations. Their operational costs are relatively small, and they have hundreds of millions of dollars in assets, enough to operate indefinitely without additional donations. More credible charities could benefit from transparent treasury management, attracting donations by proving their need and history of appropriate fund management.

Salary agreements are another area where trust is abused in the current financial system. Employees must trust their employer’s brand to compensate them as expected. This becomes problematic when companies mismanage funds or go bankrupt, leaving employees without due compensation. Relying on reputation is also a challenge for startups trying to attract talent. Even if a startup offers a competitive salary, prospective employees are asked to take a risk on a company with no established reputation or trust that the startup will have the funds to pay them long-term.

Traditional salary agreements are prone to human error and emotional biases, potentially leading to disputes and legal intervention. For example, the average wrongful termination settlement is $40,000. Traditional salary agreements are burdened by unpredictability and unnecessary costs, whether legally related or due to human nature.

That is why we are building a system to create and share digital identities with selective disclosure of PII, including support for attestations verified by the service to be associated with the user using cryptographic signature verification and immutable public blockchain history

Project Requirements

  • Functional Requirements
    • User Interface: Intuitive and user-friendly design for ease of access.
    • Account Management: Support account creation and secure login for individuals and organizations.
    • Financial Data: Real-time aggregation and historical insights of on-chain financial data.
    • Search and Sharing: Publicly searchable accounts with options for sharing.
  • Technical Requirements
    • Frameworks: Used Next.js
    • Security: Implemented encryption and access control
  • Non-Functional Requirements:
    • Performance: Ensure scalability, responsiveness, and high availability.
    • Usability: It complies with accessibility standards.
    • Compliance: It adheres to the GDPR
  • Additional Considerations:
    • Proper Documentation: It provides the user with all the user and technical documentation.
    • Support: It offers customer support and future updates.

Design Constraints

  • Accessibility: The design must meet web accessibility standards to ensure usability for all users, including those with disabilities. 
  • Cost/Economic: The project must be cost-effective, considering both development and ongoing maintenance expenses. 
  • Schedule: Adhere to project timelines to ensure timely delivery and implementation. 
  • Usability: Ensure the application provides a user-friendly experience that complies with accessibility standards. 
  • Security: Implement robust encryption and multi-factor authentication to safeguard user data. 

Engineering Standards

  • Authentication & Encryption/Security Standards: Adhere to established security protocols for authentication and encryption to ensure data protection. 
  • Common Engineering Standards: Follow relevant standards such as IEEE and ISO for best practices in engineering and development. 
  • Programming/Web Dev Standards: Comply with industry standards for coding and web development to ensure quality and consistency. 
  • Building Codes: Ensure compliance with applicable building codes and standards for web accessibility. 
  • OSHA Compliance: Adhere to Occupational Safety and Health Administration (OSHA) guidelines to ensure safe practices during development and deployment. 

System Overview

Client Layer

User Interface:
This layer provides the interface for users to interact with the Smart Pay application. It includes web pages and forms for creating and managing smart contracts, viewing organization information, checking on-chain events, and accessing user-specific data.

Web3 Wallet: 
Users can connect their Web3 wallet to the application, allowing them to securely manage their cryptocurrency funds and interact with the blockchain.

Server Layer

Database: 
Manages user account authentication, user profile storage, payment history, and other session-related data. It stores information that is not suitable for storage on the blockchain. 

Account Service: 
Responsible for managing user accounts, including user registration, login, and profile management. 

Web Controller: 
Handles incoming requests from the user interface, processes them, and interacts with other services and the blockchain layer as necessary. 

Authorization Service: 
Ensures that users have the necessary permissions to access certain features and data within the application. 

Blockchain Indexing Service: 
Interacts with the blockchain layer to index and retrieve data from smart contracts and on-chain events. It improves application performance by storing and processing blockchain data in a format that is easily accessible to other components. 

Layer diagram for the Web3ID Project

Results

No Results Posted Yet.

Future Work

  • We plan to establish standards and APIs for cross-platform and jurisdiction integration. 
  • We will design intuitive interfaces and educational resources for better user understanding and management. 
  • We will perform security audits and continuous monitoring for vulnerabilities and their mitigation. 

Project Files

Closeout Materials

References

https://www.w3.org/TR/did-core

https://www.w3.org/TR/vc-data-model-2.0

Steven McDermott