Keeta Network
  • Introduction
  • Architecture
    • Data Structure
    • Consensus
      • Voting Power
      • Votes
      • Vote Stapling
  • Components
    • Ledger
    • Blocks
    • Nodes
      • Ledger Pruning
    • Accounts
      • Permissions
    • Key Pairs
      • Storing Key Pairs
    • Certificates
      • Creating and Attaching Certificates
  • Security
    • Digital Signatures
    • Post Quantum Readiness
    • Data Integrity
    • Protection From Common Attacks
  • Scalability
    • Benchmarks and Performance Metrics
    • Seperating Nodes from Hardware
    • Eliminating Mempools
  • Features
    • Identity Profiles
      • Utilizing Identity Profiles
    • Native Tokenization
      • Creating Tokens
      • Built-in Rules Engine
    • Anchors
      • Creating an Anchor
  • Applications
    • Public Network
    • Private Sub Network
  • Industry Comparison
    • Keeta Network's Advantage
    • Resolving the Blockchain Trilemma
  • Other Documentation
    • Official Links
    • Tokenomics
Powered by GitBook
On this page
  1. Features
  2. Identity Profiles

Utilizing Identity Profiles

PreviousIdentity ProfilesNextNative Tokenization

Last updated 3 months ago

When a user wants to open a new with an entity on Keeta Network that requires identity verification, they simply need to provide their and the relevant . The business will then instantly validate the provided certificate(s) and open the new account. This allows the business to effectively verify the user's identity and credentials without the need for a lengthy application process.

This system creates a "digital passport", allowing users to carry their verified credentials with them across the Keeta ecosystem in a private and secure manner. It not only simplifies the account opening process but also puts users in control of their own data and privacy. The user only needs to trust one party with their information, which is the CA. Any party that recieves the certificate does not recieve the actualy personal information, but rather a confirmation that the personal information exists and is sufficient for the action on the network. Users' personal information is no longer being stored across a variety of data servers with unknown security.

Moreover, the dynamic nature of these certificates means that if a user's status changes (for example, they move to a new address or obtain a new qualification), this information can be updated in their certificates, ensuring that businesses always have access to the most current and accurate user data when creating new accounts or providing services.

account
public key
certificates
With approved certificates, users can effortlessly engage with a variety of entities, streamlining account creation and service access across multiple sectors.