
Humanity
Humanity 价格转换器
Humanity 信息
Humanity 市场
Humanity 支持的平台
H | ERC20 | ETH | 0xcf5104d094e3864cfcbda43b82e1cefd26a016eb | 2025-06-12 |
关于 Humanity
ZK Biometric Proofs: The protocol uses palm recognition—a biometric modality with high uniqueness and low forgery rates—to establish that each participant is a real, unique human. This biometric data is converted into hashed representations and processed using ZKPs to generate identity attestations without revealing raw data.
zkEVM Infrastructure: Deployed on a ZK rollup for scalability and privacy, Humanity Protocol leverages Polygon CDK to maintain composability with Ethereum while ensuring cost-efficient operation.
Sybil Resistance Mechanism: By enforcing that each palm scan corresponds to a single identifier, the system ensures one-human-one-identity constraints. Palm signatures are locally encrypted and compared to prevent duplicates using zkML (zero-knowledge machine learning).
Trusted Execution and Verifiers: Decentralised verifiers known as zkProofers validate the biometric claims. These nodes stake H tokens and are rewarded for uptime, accuracy, and fraud detection, ensuring a self-regulating ecosystem.
Decentralised Identity (DID) Layer: The protocol issues cryptographically secured DIDs that can be used across dApps and Web3 services, making Humanity Protocol a foundational identity layer for permissionless systems.
The H token is the native utility token of the Humanity Protocol and underpins its economic and security models. It is used in the following capacities:
Verification Utility: Applications that require identity confirmation (e.g. social media, voting, airdrops, or DeFi platforms) pay fees in H to verify users via the Humanity identity layer.
Staking for zkProofers: Verifiers in the network stake H tokens as a form of economic security. Misbehaviour or false validation results in stake slashing, aligning incentives with network integrity.
Network Governance: Token holders can vote on upgrades to the biometric algorithms, validator incentives, integration policies, or parameter adjustments within the protocol.
Reward Distribution: Users who verify their identity through the protocol, refer others, or participate in consensus mechanisms can receive H tokens as incentives.
Anti-Sybil Economic Layer: By attaching economic cost (via H) to participation and verification attempts, the protocol deters spam and Sybil behaviours effectively.