Schema
A schema comprises two primary components:
API requests required based on verification conditions
Grammar paths from the API responses for extracting the fields needed for verification
Assertion for the verification
Here is a example regarding the TikTok:
The request looks like:
The response looks like:
The verification involves checking whether the account creation date is prior to August 2023(timestamp is 1690848000000).
So the schema looks like:
The nullifier
is a required element in the schema, serving to indicate a unique identifier for the user in the data source. It is the witness and will be hashed with a random number generated by MPC in zk circuit to ensure the nullifier's value remains undisclosed to the validator. Developers can use the hash of nullifier to prevent Sybil attacks.
In zkPass dev center, we have preset schemas for user to choose and config. Developers have the flexibility to design their own personalized schemas and seamlessly integrate them into their projects. Further details can be found in the Custom Schema section, providing comprehensive information on how to create and implement customized schemas for your specific needs.
Last updated