Pages:
Author

Topic: [ANN] UBIC:The cryptocurrency providing UBI for the masses using the E-Passport - page 7. (Read 18227 times)

jr. member
Activity: 114
Merit: 2
I added the fee table and I hope the calculation is correct.
https://ubic.network/fees/
jr. member
Activity: 114
Merit: 2
Thank you. I will try it out.
jr. member
Activity: 81
Merit: 1
I added the /kyc endpoint. It currently only supports anonymous authentication and is "untested".
The request to the endpoint is a base64 string of the following serialized structure:
Code:
struct KycRequestScript {
    uint8_t mode;
    std::vector passportHash;
    std::vector addressPublicKey;
    std::vector challenge;
    std::vector challengeSignature;
    std::vector ldsHashes;
    std::vector dg1; // written information
    std::vector dg2; // facial image
}

Anonymous authentication is mode 0 and the fields ldsHashes, dg1 and dg2 remain empty.
Once submitted and if matching to a genuine UBIC identity the response is something like this:
Code:
 {
    "success": true,
    "dscID", "45f73ea89b9....";
    "currencyID", 1;
    "expiration": "1723966935",
    "passportHash": "78eb67aa55de5..."
}
jr. member
Activity: 81
Merit: 1
I want to improve the Block Explorer and am trying to create the mobile app. In both cases it would be very useful if there was an API call that would return the current transaction fee per byte.  Can this be done? Smiley

I added a new endpoint /fees it will return you something like this:
Code:
{
    "description": "Fees for 1MB (1000 bytes)",
    "fees": {
        "1": "19400000",
        "2": "191400000",
        "3": "20200000",
        "4": "151900000",
        "5": "11000000",
        "6": "747900000",
        "7": "55600000",
        "8": "3192100000",
        "9": "22900000",
        "10": "155500000",
        "11": "84000000",
        "12": "294000000",
        "13": "155100000",
        "14": "10600000",
        "15": "21500000",
        "16": "12700000",
        "17": "1000000",
        "18": "13000000",
        "19": "22700000",
        "20": "24500000",
        "21": "73600000",
        "22": "104200000",
        "23": "3200000",
        "24": "100000",
        "25": "100000"
    }
}

The numbers represent a currency by it's ID. The values are the fees for 1MB and expressed in base units.
So to get the fee per byte you have to calculate Value / (1000 * 1000000).

I am also trying to integrate a KYC endpoint but this will take a little bit more.
jr. member
Activity: 114
Merit: 2
I want to improve the Block Explorer and am trying to create the mobile app. In both cases it would be very useful if there was an API call that would return the current transaction fee per byte.  Can this be done? Smiley
jr. member
Activity: 81
Merit: 1
I wonder what would happen if you would fork the narrative of ubic whitepaper with a second whitepaper presenting ubic mainly as future KYC-blockchain, which gives away utility-tokens for free to user to grow faster.

I will think about it. The KYC and E-Voting protocols could indeed deserve their own whitepaper.
What I currently have in mind regarding KYC is the following procedure:
 - Using his smartphone the user scans a QR code that contains a URL + a challenge + a flag that indicates what data are needed.
 - The user sees the domain where the information will be send and what will be send.
 - The user scans the NFC chip of his passport again.
 - The information are send to the URL given in the QR code.
 - The UBIC core software is used to verify the KYC request.

From a more technical perspective:
 - When registering your passport to get a UBI reward you publish your UBIC address, the signed hash of the passport and a non-transferable proof of signature for the signature on the passport hash.
 - The signed hash is in fact the hash of the hashes for every "file" contained on the passport.
 - There are 2 relevant "files" DG1 (the MRZ containing almost all written information) and DG2 (containing the facial image)
 - So there could be 3 authentication modes:
   - Anonymous (is used on the UBIC blockchain), it doesn't reveal any personal information.
   - written information (Passport number, date of birth, date of expiry, document type, first name, last name).
   - Facial image
- The verification is done by verifying that the hash of the personal information (DG1 or DG2) match with the signed passport hash. From there it is straightforward to verify that this signed hash match with the one of the UBI receiving address.

these are good ideas, thank you for sharing them!

How do you imagine the utility token in context of KYC and voting? Does the KYC-Request burns a certain amount of tokens? For example your relative share of UBIC that you recieved within the last 100 Blocks?

KYC and e-voting don't have to necesserly take place on the blockchain. The blockchain is only required to verify that public key X is indeed a unique individual.
So there is no need to pay for these services.
newbie
Activity: 48
Merit: 0
There are many projects that want to provide KYC solutions. The two projects I have heard of are uPort and Civic, they are both relying on "identity validators", according to them those validators can be banks or other institutions.
I could imagine that UBIC could also become a validator in their system. What do you think?

Yes, UBIC could give a cool validator for a lot of projects. I wonder how people opposing the idea of basic income would react when they realize that they actually get payed for using ubic for KYC instead of having to pay.
newbie
Activity: 48
Merit: 0
I wonder what would happen if you would fork the narrative of ubic whitepaper with a second whitepaper presenting ubic mainly as future KYC-blockchain, which gives away utility-tokens for free to user to grow faster.

I will think about it. The KYC and E-Voting protocols could indeed deserve their own whitepaper.
What I currently have in mind regarding KYC is the following procedure:
 - Using his smartphone the user scans a QR code that contains a URL + a challenge + a flag that indicates what data are needed.
 - The user sees the domain where the information will be send and what will be send.
 - The user scans the NFC chip of his passport again.
 - The information are send to the URL given in the QR code.
 - The UBIC core software is used to verify the KYC request.

From a more technical perspective:
 - When registering your passport to get a UBI reward you publish your UBIC address, the signed hash of the passport and a non-transferable proof of signature for the signature on the passport hash.
 - The signed hash is in fact the hash of the hashes for every "file" contained on the passport.
 - There are 2 relevant "files" DG1 (the MRZ containing almost all written information) and DG2 (containing the facial image)
 - So there could be 3 authentication modes:
   - Anonymous (is used on the UBIC blockchain), it doesn't reveal any personal information.
   - written information (Passport number, date of birth, date of expiry, document type, first name, last name).
   - Facial image
- The verification is done by verifying that the hash of the personal information (DG1 or DG2) match with the signed passport hash. From there it is straightforward to verify that this signed hash match with the one of the UBI receiving address.

these are good ideas, thank you for sharing them!

How do you imagine the utility token in context of KYC and voting? Does the KYC-Request burns a certain amount of tokens? For example your relative share of UBIC that you recieved within the last 100 Blocks?
jr. member
Activity: 114
Merit: 2
There are many projects that want to provide KYC solutions. The two projects I have heard of are uPort and Civic, they are both relying on "identity validators", according to them those validators can be banks or other institutions.
I could imagine that UBIC could also become a validator in their system. What do you think?
jr. member
Activity: 81
Merit: 1
I wonder what would happen if you would fork the narrative of ubic whitepaper with a second whitepaper presenting ubic mainly as future KYC-blockchain, which gives away utility-tokens for free to user to grow faster.

I will think about it. The KYC and E-Voting protocols could indeed deserve their own whitepaper.
What I currently have in mind regarding KYC is the following procedure:
 - Using his smartphone the user scans a QR code that contains a URL + a challenge + a flag that indicates what data are needed.
 - The user sees the domain where the information will be send and what will be send.
 - The user scans the NFC chip of his passport again.
 - The information are send to the URL given in the QR code.
 - The UBIC core software is used to verify the KYC request.

From a more technical perspective:
 - When registering your passport to get a UBI reward you publish your UBIC address, the signed hash of the passport and a non-transferable proof of signature for the signature on the passport hash.
 - The signed hash is in fact the hash of the hashes for every "file" contained on the passport.
 - There are 2 relevant "files" DG1 (the MRZ containing almost all written information) and DG2 (containing the facial image)
 - So there could be 3 authentication modes:
   - Anonymous (is used on the UBIC blockchain), it doesn't reveal any personal information.
   - written information (Passport number, date of birth, date of expiry, document type, first name, last name).
   - Facial image
- The verification is done by verifying that the hash of the personal information (DG1 or DG2) match with the signed passport hash. From there it is straightforward to verify that this signed hash match with the one of the UBI receiving address.
newbie
Activity: 48
Merit: 0
I wonder what would happen if you would fork the narrative of ubic whitepaper with a second whitepaper presenting ubic mainly as future KYC-blockchain, which gives away utility-tokens for free to user to grow faster.
jr. member
Activity: 81
Merit: 1
I just added the Document Signing Certificates for March and April. Passports issued during these two months should work now.
jr. member
Activity: 81
Merit: 1
Looks like a classical port scan. I don't think UBIC was targeted.
jr. member
Activity: 114
Merit: 2
Wow, I had a look at the WARNING log file and looks like some people are already trying to steal some coins.

Code:
[WARNING 1523786429] (58471) Unallowed API request from IP:183.208.179.228
[WARNING 1523821586] (58471) Unallowed API request from IP:183.208.179.228
[WARNING 1524448885] (70549) Unallowed API request from IP:59.63.206.169
jr. member
Activity: 81
Merit: 1
If you are using a firewall make sure that port 1334 is open or TCP connections.
This can be ensured by running:
Code:
sudo ufw allow 1334/tcp 

Also your log files might getting huge.You can delete them by running:
Code:
sudo rm -rf /var/ubic/LOGS/*.txt
jr. member
Activity: 114
Merit: 2
Do not have NFC usb scanner to register passport. Waiting for a mobile app.

From where are you from?
newbie
Activity: 78
Merit: 0
Do not have NFC usb scanner to register passport. Waiting for a mobile app.
jr. member
Activity: 114
Merit: 2
Has some one else here already tried to register his passport?
jr. member
Activity: 114
Merit: 2
Just after I registered my passport my SSD died, luckily it's still readable.
Where can I find my wallet keys to save then?
If you lose your keys is it possible to recover your coins using your passport?

did you recover your wallet keys?

Yes  Wink
newbie
Activity: 48
Merit: 0
Just after I registered my passport my SSD died, luckily it's still readable.
Where can I find my wallet keys to save then?
If you lose your keys is it possible to recover your coins using your passport?

did you recover your wallet keys?
Pages:
Jump to: