Our Solution

We remove the hassle of setting, enforcing and maintaining compliance policies.

We offer a full suite of permissioning solutions, from one-stop-shop compliance for regulated entities (Keyring Pro) to light compliance enhancement in a frictionless way (Keyring Connect).

Our framework is designed to:

  1. Standardise the information collected. Via a Domain Specific Language called the Rule Builder, to translate data points into Base Rules.

  2. Make it easily comparable and “reusable” across use cases. Keyring provides a secure and scalable way to share sensitive data — anonymised, in the clear, or with the underlying documents depending on the use case requirements.

    • Keyring Pro: customers typically require users' underlying data to verify and hold. We collect user information and route it via API for verification. Verification can be done by our customer's internal compliance desk or a third-party vendor.

    • Keyring Connect: customers are not heavily regulated and can rely on proof of verification from other platforms. We let users share information from any https-enabled website with a cryptographic proof of authenticity. Think of it like a screenshot of a browser tab with cryptography to prevent fakes and preserve privacy.

  3. Let users prove they comply with the rules. By transforming response data into zk proofs, validated by an attestation service and put on chain in the form of expiring credentials.

Here are the main components:

Connect to any data source and build your own compliance rules.

Once onboarded, users can reuse previously shared information to generate new and easily demonstrate compliance across various use cases (or Policies). Since these Credentials are readable on-chain, the Credentials mapping serves as a dynamic whitelist.

Last updated