Digital Identity

Legal & Compliance

Applying the blockchain ecosystem to the business sector requires that transactions should not be anonymous and digital identity should be sovereign: that is created by the users in the first place and given higher validity by other authoritative identities thanks to digital certificates on the Certification Authority model.

Trinci Blockchain Technology Trinci Blockchain Technology

Extended Identity

According to this principle, humans are not the only actors allowed a digital identity, but so are IoT devices, softwares, robots, and all those systems capable of signing digitally.


A digital signature should initially rely on already known and academically valid protocols (ECDSA, RSA, etc.), but should also leave space to cryptographic innovations: this is in view of the Quantum Era which is going to seriously question the integrity of digital signatures based on the Elliptic Curves and others.

Trinci Blockchain Technology

Signature workflow

Each user should keep their private key and never transfer it to third-party systems.

The user qualifies with their public key in blockchain and can, then, use their private key to sign every transaction to be submitted to the blockchain.

Afterwards, they can use their private key to sign every transaction to be submitted to the blockchain.

Such an operation, which cannot be performed by any other users (as nobody knows the private key of other users), acquires legal validity.

The digital identities of every subject using this methodology are stored in the T.R.I.N.C.I. blockchain to allow the whole ecosystem of users, businesses, robots and IoT devices to last forever, entrusting data governance to the user for life..

Want to get involved?

If you want to become a certified developer and get the node to access the test net, subscribe to the T.R.I.N.C.I. 2.0 Blockchain training and integration course.

Learn more about
T.R.I.N.C.I. 2.0 Blockchain