Keyring Network | Docs
  • INTRODUCTION
    • About Us
    • Our Solution
    • Use Cases
  • USER GUIDE
    • 1. Choose a Policy
    • 2. Onboard
      • Keyring Connect
      • Keyring Pro
    • 3. Create a Credential
    • FAQ
      • What is my onboarding status?
      • How to manage multiple entities?
      • What is Keyring's business model?
      • How to create credentials x-chain?
  • INTEGRATION STEPS
    • 1. Create a Policy
      • Connect Policy Builder
    • 2. Integrate to User Flow
    • 3. Permission smart contracts
  • PROTOCOL GUIDE
    • Sandbox
      • Keyring Connect
      • Keyring Pro
    • Data Flow
      • Data Collected
      • Data Storage
    • Smart Contracts
  • RESOURCES
    • Links
    • Get in Touch
    • Brand Assets
    • Data Policies
  • Onboarding Requirements
    • Keyring Pro
      • FalconX
    • Keyring Connect
Powered by GitBook
On this page
  1. INTRODUCTION

Use Cases

We unlock scale with reusable data. Connect to huge pools of verified users in one click.

PreviousOur SolutionNext1. Choose a Policy

Last updated 3 months ago

KYC'd lending pools

Attract institution-friendly capital and prevent hacks.

Confidential pools

Ensure full privacy of users transacting with ZK.

Compliant ERC20s

Wrappers so compliance rules travel with the asset.

Airdrops

Sybil or KYC proof for secure distribution.

RWA secondary trading

Open up secondary trading to already-KYC'd users.

Identity attestations

For DEXes, wallets, travel rule, AI agents...