TRIS Activation
TRIS Activation
TRIS Activation is the process of issuing a verifiable, privacy-preserving identity for Humans, Organizations, and AI Agents. Activation establishes: (1) a TRIS ID + DID document, (2) the verification tier, and (3) eligibility to participate in the trust economy under role-appropriate permissions.
All raw credentials and proofs remain off-chain. Only hashed commitments and epoched credential tiers are anchored for verifiability.
1) Activation Overview
Human
zk-KYH / zk-KYC (ID only / ID + AML)
@username (pseudonymous)
Build and earn credibility; submit & disclose selectively
Organization
zk-KYB (Side A + Side B)
tris.org:<handle>
Validate, enforce, and anchor institutional policies
AI Agent
zk-KYA (Registrant co-sign + fingerprint)
tris.ai:<handle>
Operate with verified accountability under a Registrant
2) Human Activation
Goal: establish uniqueness/identity without exposing PII; preserve pseudonymity by default.
zk-KYH
Confirms “one human = one TRIS” with zero-knowledge uniqueness proof.
zk-KYC (ID only)
Verifies government-issued identity (no AML); PII never leaves the prover.
zk-KYC (ID + AML)
Adds AML screening + liveness for regulated contexts.
Pseudonymity & Handle Rules
Humans appear as
@handle; legal names are never published by Tythe.Handles are globally unique and mapped to TRIS via commitment proofs.
Visibility of any attribute is governed by user-controlled disclosure.
Activation Flow (Human)
Wallet connection → nonce signing (SIWE/OAuth2.0-PKCE).
Select verification tier (zk-KYH / KYC / KYC+AML) and complete proof.
Issue TRIS ID + DID; initialize Trovebook; enable DISC eligibility.
Outputs
TRIS ID (DID), verification tier, Trovebook created (private), DISC eligibility active.
3) Organization Activation
Goal: verify organizational legitimacy across on-chain control and off-chain presence without revealing sensitive internals.
zk-KYB Requirements
Side A (Ownership): Smart Contract Ownership or Treasury Wallet Signature or Tythe Challenge.
Side B (Presence): DNS or GitHub or Twitter (via zkTLS/Reclaim).
Identifier & Protection
Organizations are addressed as
@<handle>.orgto prevent impersonation.Legal entity metadata is never exposed by default.
Activation Flow (Org)
Submit Side A + Side B proofs.
zk-KYB verified; TRIS issued with
.orgsuffix.Organization registered; Validator & Policy tooling unlocked (post-verification).
Outputs
TRIS ID (Org), Vetted status, access to Validator Hub / Compliance Center.
4) AI Agent Activation
Goal: bind an Agent to a responsible Registrant with an auditable behavioral fingerprint.
Requirements
Registrant: a verified Human or Organization co-signs the registration.
Behavioral Fingerprint: salted hash over agent metadata, action schema, and Registrant TRIS.
zk-KYA: verifies authenticity and binding without revealing internals.
Identifier & Protection
Agents are addressed as
@<handle>.ai; provenance is explicit via Registrant linkage.
Activation Flow (Agent)
Registrant initiates agent registration and co-signs.
Generate behavioral fingerprint + zk-KYA proof.
Issue Agent TRIS + DID; initialize read-only Trovebook for behavioral traces.
Outputs
TRIS ID (Agent), Registrant binding, DISC eligibility (agent class), visibility controls.
5) Activation Evidence & Privacy
Proof artifacts (raw)
Off-chain (encrypted storage)
None
Credential tier state
Off-chain bundle + credentialsRoot
Epoched inclusion (tierBitmap; no PII)
DID & keys
TRISRegistry
DID hash + key references (no PII)
Scores/Metrics
DISC off-chain + metricRoot/scoreRoot
Epoched inclusion (active metrics only)
Note: AP checks rely on off-chain attestation bundles with Merkle proofs to credentialsRoot (tierBitmap), not raw documents.
6) Re-verification, Refresh, and Revocation
Proof Refresh
Triggered by user; rotates credential epoch
Admin-initiated or policy-driven
Registrant-initiated; fingerprint can roll
Key Rotation
Yes (TRISRegistry)
Yes (TRISRegistry)
Yes (TRISRegistry)
Revocation
User-initiated or BAD-Status enforcement
Org-initiated or BAD-Status enforcement
Registrant-initiated or BAD-Status enforcement
Visibility Controls
Per-metric / per-report disclosures
Policy visibility scope
Registrant + agent scope
7) Failure Cases & Safeguards
Duplicate Attempts: zk-KYH prevents multi-TRIS issuance for the same human.
Mismatched Ownership (Org): Side A proof fails → activation halted with receipt.
Unbound Agent: No valid Registrant co-signature → activation rejected.
Stale Credentials: AP checks reference epoch; stale
tierBitmapfails strict policies until refreshed.BAD Status: Can suspend disclosure, disable AP eligibility, and block policy participation pending resolution.
8) Activation Outputs (Summary)
Human
TRIS ID + DID, verification tier
Trovebook (private), DISC eligibility, selective disclosure
Organization
TRIS ID (.org), Vetted status
Validator Hub, Access/Validation Policies, compliance tooling
AI Agent
TRIS ID (.ai), Registrant binding
Behavioral trace visibility, DISC eligibility (agent class)
9) Principles (Design Constraints)
Privacy First: No PII on-chain; all disclosures are user/role-scoped.
Role Integrity: Verification type determines permissions, not reputation.
Auditability by Epoch: Credential tiers and scores are verifiable against weekly roots.
Minimal On-Chain Logic: Contracts anchor identity and state roots only; all computation is off-chain.
Last updated
Was this helpful?

