SSI Middleware MiFID II Aligned GDPR Art. 25

Verifiable Credentials. For Financial Services.

The compliance layer that verifies users once and unlocks every gated financial service — without storing personal data.

OHNexus Protocol globe
566+
Tests passing in production
38
Protocol issues shipped
€0
Personal data stored
eIDAS 2.0
EU regulatory aligned

The compliance stack is broken.
We remove the root cause.

The problem
KYC performed repeatedly

Every financial service repeats the same identity checks. Users submit the same documents to every provider.

Personal data stored everywhere

Raw documents, passports, and biometric data sit in siloed provider databases — each a breach waiting to happen.

No interoperability between providers

Compliance signals don't travel. A verified user at provider A remains unverified at provider B.

Regulations misaligned with architecture

GDPR mandates data minimisation. Most compliance stacks are architecturally incapable of it.

The OHNexus solution
Verify once, access everywhere

A single verifiable credential unlocks every compliant service in the ecosystem — no re-verification required.

Zero raw data stored

Only claim keys are persisted. No JWT payload, no PII, no biometric data — by architecture, not by policy.

Portable across any provider

W3C-standard verifiable credentials move with users. Open protocol; no lock-in to any issuer or platform.

GDPR-compliant by design

Privacy by default — GDPR Art. 25 enforced at the data model layer, validated by independent legal review.

Three steps. One credential lifetime.

01 / VERIFY

Issue a verifiable credential

A trusted issuer — your KYC provider, a regulated authority, or the OHNexus platform itself — issues a W3C Verifiable Credential to the user's self-sovereign identity wallet. Cryptographically signed. Tamper-proof.

02 / PRESENT

Present to any service

The user presents a Verifiable Presentation to any OHNexus-connected service. The protocol verifies the cryptographic proof in real time — no database lookup, no third-party call required.

03 / ACCESS

Access is granted on-chain

Eligibility outcomes are anchored on-chain. The execution record is immutable. Service providers get compliance proof without ever seeing the user's raw credentials.

Three layers. Strict separation.

Layer 1

Verification

Cryptographic verification of W3C Verifiable Credentials and Presentations via a dedicated verifier service. Raw JWT payloads are never stored — only a SHA-256 hash for audit correlation. Issuer trust is validated against a permissioned registry.

did:key OID4VP Ed25519 SHA-256 audit hash
Layer 2

Eligibility

Every service defines its own credential requirements — type, issuer, claim values, expiry. The eligibility engine evaluates all mandatory requirements in a single pass and writes a deterministic GRANTED or DENIED outcome. No caching. No stale state. Always a fresh evaluation at invocation time.

Claim-value matching Expiry enforcement Multi-credential
Layer 3

Execution

On AUTHORIZED, the protocol calls the publisher's provider API and optionally issues a platform-signed Verifiable Credential to the user's wallet. Execution is anchored on-chain via the ServiceRequests contract — creating an immutable compliance record. Provider endpoints receive no user credential data, no claim values, no PII.

On-chain anchor Auto-issued VC Zero PII forwarded

Built for two sides of the same market.

01

Financial Service Publishers

Fintechs, asset managers, regulated data providers

  • Publish gated services without building your own KYC infrastructure
  • Define credential requirements once — the protocol enforces them at every invocation
  • Receive compliance-grade access proofs without seeing user documents
  • Auto-issue verifiable credentials to verified users post-execution
  • Full audit trail anchored on-chain per execution
02

Verified End Users

Retail investors, institutional participants, regulated individuals

  • Complete identity verification once — reuse across every connected service
  • Credentials stored in your browser-native SSI wallet, never on our servers
  • Selective disclosure — share only what each service requires
  • Sessions expire automatically; no persistent access without re-verification
  • Portable identity across platforms via open W3C standards
⚖️
GDPR Art. 25
Privacy by design and by default. Data minimisation enforced at the architecture layer, validated by independent legal review.
📋
MiFID II
Credential gates map directly to MiFID suitability and appropriateness requirements. Eligibility outcomes are auditable.
🔐
eIDAS 2.0
W3C Verifiable Credentials aligned with the EU Digital Identity Wallet framework. Ready for ARF-compliant issuers.

Engineered for production compliance.

Browser-native SSI wallet
Ed25519 keypairs generated in-browser via Web Crypto API. Non-extractable CryptoKey — private keys never leave the device.
did:key identity
Deterministic DID derivation from Ed25519 public key. No registry, no gas, no dependencies. Verifiable anywhere.
OID4VCI + OID4VP
Industry-standard credential issuance and presentation protocols. Compatible with any W3C-compliant SSI wallet.
High-performance backend
Memory-safe API server with all business logic tested in isolation. No raw credentials stored at any layer. Privacy-first by architecture.
AWS production infrastructure
Fully managed cloud deployment. Terraform-provisioned. Least-privilege access throughout. HTTPS enforced end-to-end.
On-chain execution anchoring
Every authorised execution generates an immutable on-chain record. Service providers receive cryptographic compliance proof — no user data forwarded.

What exists today.

Completed

Protocol core — 566 tests passing

Full Verify–Eligibility–Execution stack implemented in Rust. AWS-free unit tests. Trait-backed architecture throughout.

Completed

Browser-native SSI wallet

Ed25519 did:key generation, OID4VCI credential issuance, OID4VP presentation — all in-browser. No custodial wallet.

Completed

On-chain execution anchoring

ServiceRequests contract deployed and live. Every AUTHORIZED invocation anchored with a cryptographic execution ID.

Completed

Publisher service lifecycle

End-to-end: draft wizard → validate → publish → credential-gated invocation → auto-issued VC to user wallet.

In progress

Pilot publisher onboarding

First regulated service publishers being onboarded. Credential type taxonomy being extended for MiFID use cases.

Planned

Production launch

GDPR DPA registration, production AWS environment, eIDAS-aligned credential schema finalisation.

Component Status
Verification Engine Live
Eligibility Service Live
Execution & Issuance Live
SSI Browser Wallet Live
Publisher Dashboard Live
On-chain Anchor Live
Oracle Runner Dev
Production Planned

The financial system runs on trust. But trust today means handing over your passport to every gatekeeper. We built OHNexus so that proof of trust becomes portable — held by the user, verified by math, never stored by anyone.

Nikolay Gyuneliev — Founder, ØHNexus Protocol
Nikolay Gyuneliev
Founder, OHNexus Protocol

Join the protocol.
Early access is limited.

We're onboarding a small group of regulated financial service providers and institutional participants. Tell us about your use case.

Response within 48 hours
No commitment required
NDA available on request
Direct founder access during pilot

The identity layer
financial services deserves.

Privacy-preserving. Cryptographically verifiable. Built on open standards. OHNexus is the middleware between who you are and what you can access.

Request Early Access