# Underlying Modules

The zkMe Protocol is built on a modular architecture organized around three functional pillars: **Secure, Underwrite,** and **Gate.** Each pillar addresses a distinct stage of the identity and trust lifecycle, from protecting raw data to issuing verifiable credentials to authorizing agent execution.

This page provides a high-level map of all underlying modules and their relationships. For a narrative overview of how these pillars work together, see the [Architecture Overview](/hub/how-works/architecture.md).

<figure><img src="/files/mKsSqiLHbwynQAaN32CL" alt=""><figcaption><p>zkMe Architecture v2</p></figcaption></figure>

{% hint style="info" %}
**Note:** This diagram reflects a legacy architecture. An updated version incorporating the latest setup is in progress.
{% endhint %}

***

## Identity Infrastructure

The Identity Infrastructure modules provide the foundational cryptographic and storage layer that protects user data throughout its entire lifecycle. These modules ensure that sensitive information never leaves the user's control and that all operations occur in privacy-preserving environments.

<table><thead><tr><th width="270.71875">Module</th><th>Description</th></tr></thead><tbody><tr><td><a data-mention href="/pages/PJXVg6WY3BJmBfUHiv0R">/pages/PJXVg6WY3BJmBfUHiv0R</a></td><td>Purpose-built Layer 1 EVM-compatible blockchain (CometBFT PoS + EVMOS) serving as the settlement and persistence foundation for all identity operations. Provides instant finality, sub-second block times, and a Decentralized Storage Provider network optimized for credential payloads.</td></tr><tr><td><a data-mention href="/pages/o5SSNX9sDYwphgFAcwh6">/pages/o5SSNX9sDYwphgFAcwh6</a></td><td>The SSI model underpinning zkMe, including the evolved role definitions (Credential Issuer, ZKP Issuer, Holder, Verifier, Regulator), the zkMe SBT, and the zkMe App (MPC-based SSI wallet).</td></tr><tr><td><a data-mention href="/pages/LML1W5eTUQFeh1LmmkzZ">/pages/LML1W5eTUQFeh1LmmkzZ</a></td><td>The <code>did:zkme</code> specification, on-chain DID Registry smart contract, CRUD operations, and DID Document resolution.</td></tr><tr><td><a data-mention href="/pages/m4fOGTqZi9hQL5OxAiMy">/pages/m4fOGTqZi9hQL5OxAiMy</a></td><td>Encrypted secrets management combining TEE-based key hierarchy with threshold encryption (EC-ElGamal), decentralized credential storage on IPFS, and the data recovery procedure for regulatory compliance.</td></tr><tr><td><a data-mention href="/pages/f35ffdG0aa8TTzBKrzoA">/pages/f35ffdG0aa8TTzBKrzoA</a></td><td>Fully Homomorphic Encryption using the CKKS scheme, enabling computation on encrypted facial feature vectors for privacy-preserving DID creation (Face-to-DID).</td></tr><tr><td><a data-mention href="/pages/ZLerOKZiiLOaghojUycc">/pages/ZLerOKZiiLOaghojUycc</a></td><td>Privacy-preserving ePassport verification using NFC chip reading, Active Authentication, and zero-knowledge proof generation from ICAO 9303 data.</td></tr><tr><td><a data-mention href="/pages/MPIrpl18CtFcUr3n3dl3">/pages/MPIrpl18CtFcUr3n3dl3</a></td><td>Zero-Knowledge Transport Layer Security for trustless extraction and attestation of Web2 data (bank accounts, credit scores, government records) without exposing raw session content.</td></tr><tr><td><a data-mention href="/pages/ntNN2rwFAnwNtrVd2Z6w">/pages/ntNN2rwFAnwNtrVd2Z6w</a></td><td>On-chain contract suite including zkMe Mint, Delegate, Verify &#x26; Certify contracts, with deployment addresses across all supported chains.</td></tr></tbody></table>

***

## Credential System

The Credential System is the core issuance and verification infrastructure for all zkMe credentials. It transforms raw identity data into trustless, privacy-preserving, and reusable verifiable credentials anchored on-chain.

<table><thead><tr><th width="244.6328125">Module</th><th>Description</th></tr></thead><tbody><tr><td><a data-mention href="/pages/W65KJZ9MjLTqFBYJjz4k">/pages/W65KJZ9MjLTqFBYJjz4k</a></td><td>System overview, design goals, the Issuer-Holder-Verifier trust triangle, system architecture (4-layer model), credential data model (W3C VC), Claim Tree and commitment model, full credential lifecycle (issuance, verification, revocation, expiration), and cryptographic assumptions.</td></tr><tr><td><a data-mention href="/pages/d6tRIsT26ysfJWhHvUkI">/pages/d6tRIsT26ysfJWhHvUkI</a></td><td>Fine-grained privacy control allowing Holders to reveal only specific credential fields via the SD operator. Supports 14 query operators for range matching, set membership, and field extraction. Gas-optimized on-chain verification via circuitQueryHash compression.</td></tr><tr><td><a data-mention href="/pages/lqy5IoZwUUh5MOPIYBGN">/pages/lqy5IoZwUUh5MOPIYBGN</a></td><td>Batch verification of up to 10 queries across multiple credentials in a single proof (LinkedMultiQuery10). Cross-chain identity portability via Delegated Proofs bound to secondary addresses or AI agent DIDs.</td></tr><tr><td><a data-mention href="/pages/T4yM5WNiPJULaV1LsRAU">/pages/T4yM5WNiPJULaV1LsRAU</a></td><td>Nullifier-based uniqueness enforcement for "one person, one action" guarantees. Unified authentication supporting both BabyJubJub keys and standard Ethereum wallet signatures. Unified SIG/MTP circuit.</td></tr><tr><td><a data-mention href="/pages/oBuvDcDDLHpY44jpgyUf">/pages/oBuvDcDDLHpY44jpgyUf</a></td><td>The "Verify Once, Prove Anywhere" paradigm, cross-chain credential portability via Delegate smart contracts, and lifecycle management for reusable credentials.</td></tr><tr><td><a data-mention href="/pages/nBMLaHWcG5quqLsTZ7jG">/pages/nBMLaHWcG5quqLsTZ7jG</a></td><td>Credentials optimized for AI agent consumption, featuring cryptographic delegation, machine-readable schemas, and automated proof generation.</td></tr></tbody></table>

***

## Agent Trust Gateway

The Agent Trust Gateway is the authorization and policy enforcement layer for AI agents. It mediates all interactions between autonomous agents and external resources, ensuring that every agent action is backed by a verified human identity, constrained by user-defined policies, and executed inside a hardware-secured enclave.

<table><thead><tr><th width="228.61328125">Module</th><th>Description</th></tr></thead><tbody><tr><td><a data-mention href="/pages/0woRBBo2YnaWzOzO8P4z">/pages/0woRBBo2YnaWzOzO8P4z</a></td><td>Core positioning, architectural components (TEE Enclave, Policy Engine, Credential Verifier, Protocol Adapters), and the high-level trust flow.</td></tr><tr><td><a data-mention href="/pages/J1wX5oMRHA6tgswBDLHk">/pages/J1wX5oMRHA6tgswBDLHk</a></td><td>The complete 8-step session lifecycle from initiation through TEE ingress, credential verification, policy evaluation, optional human-in-the-loop authorization, context provisioning, execution proxying, to audit logging.</td></tr><tr><td><a data-mention href="/pages/ILcCUPggXSlTCoqHd5hU">/pages/ILcCUPggXSlTCoqHd5hU</a></td><td>Native protocol adapters including MCP, APF/x402, W3C VC/DID, ERC-8004, OIDC4VP, zkTLS, and PASETO.</td></tr></tbody></table>

***

## Client-Side Tools

The following tools provide user-facing interfaces for interacting with the zkMe Protocol. For integration guides and SDK documentation, see the Getting Started section.

<table><thead><tr><th width="204.8828125">Tool</th><th>Description</th></tr></thead><tbody><tr><td><a href="https://app.zk.me/">zkMe App</a></td><td>The MPC-based SSI wallet for mobile credential management, featuring OCR document scanning, facial recognition, ZKP generation, and SBT minting. </td></tr><tr><td><a href="/pages/uM38jWO7esNbmysVnRHn">zkMe SDK</a></td><td>JavaScript SDK for embedding credential verification into web applications.</td></tr><tr><td><a href="https://dashboard.zk.me">zkMe Dashboard</a></td><td>Management interface for Verifiers to configure verification profiles, define business eligibility rules, and access analytics. </td></tr><tr><td><a href="/pages/RNWJoxfT8FefhmffencP">zkMe API</a></td><td>RESTful API for programmatic access to KYC and KYT verification services. </td></tr></tbody></table>

***

## **Available as Independent Services**

The technology stack behind the zkMe Protocol is commercially available for external organizations to license, deploy, and operate independently. Customers can acquire any single module, any combination across pillars, or a complete pillar as a turnkey technology product.

<table><thead><tr><th width="191.88671875">Pillar</th><th>Commercially Available Technology</th></tr></thead><tbody><tr><td><strong>Identity Infrastructure</strong></td><td>8 modules available for independent licensing. See <a href="/pages/1CAXSjcjAgs34CGjSf5k#commercially-available-technology">Identity Infrastructure: Available as Independent Services</a> for the full catalog and acquisition models.</td></tr><tr><td><strong>Credential System</strong></td><td>6 capabilities available for independent licensing. See <a href="/pages/VocXj0Kcynl2ks1gIbyk#commercially-available-technology">Credential System: Available as Independent Services</a> for the full catalog and acquisition models.</td></tr><tr><td><strong>Agent Trust Gateway</strong></td><td>7 capabilities available for independent licensing. See <a href="/pages/0woRBBo2YnaWzOzO8P4z#commercially-available-technology">Agent Trust Gateway: Available as Independent Services</a> for the full catalog and acquisition models.</td></tr></tbody></table>

{% hint style="success" %}
All modules support flexible engagement models including technology licensing for self-hosted deployment, managed service with pay-as-you-go or committed-use pricing, and full white-label solutions. Contact the zkMe team at <contact@zk.me>.
{% endhint %}


---

# Agent Instructions: Querying This Documentation

If you need additional information that is not directly available in this page, you can query the documentation dynamically by asking a question.

Perform an HTTP GET request on the current page URL with the `ask` query parameter:

```
GET https://docs.zk.me/hub/how-built/modules.md?ask=<question>
```

The question should be specific, self-contained, and written in natural language.
The response will contain a direct answer to the question and relevant excerpts and sources from the documentation.

Use this mechanism when the answer is not explicitly present in the current page, you need clarification or additional context, or you want to retrieve related documentation sections.
