Seeruvia White Paper

Adoba Yua
14 min readAug 12, 2020

Seeruvia White Paper. By Adoba Yua.

Seeruvia is a single platform that allows individuals to share, verify and accept information and Identities across a single platform.
In this day and age, there is the prevalent theme of privacy. With Seeruvia, customers
are able to control their privacy in a transparent and concise manner.

Individuals are able to control their personal and private data all from one source, so not only does this grant privacy and clarity, but it also removes the hassle of people having no access to their data, rather they now control it all from one platform.
Think about the individual going to their DPS to renew their driver’s license. The

individual might forget one or two documents, but with Seeruvia the individual is able to retrieve the missing documents immediately and give it to the DPS attendant. Being able to control and access all your documents from one platform comes with many advantages. The key with Seeruvia is that each member of the network has access to their own personal chain.
This personal chain may contain various transactions that hold data, documents, and information that they choose to hold. It is like your own personal file folder that you carry anywhere and can use anywhere.

Verified Data & Documents.

Allowing any individual verify their confidential data and documents is very abusive practice. There are some things we can claim to be true, but how are we so sure that individual attends the educational institution he claims to attend? We cannot believe this information unless it comes from a reliable

source. The process of verifying information is often a long and dragged
out process. Is there a way to make it shorter? Could we automate the process and make it easier for everyone? Yes, we can.




Ledger & Transaction Locks.
Each account has its own individual chain. This is a very key distinction for our network to run.
Each account controls its own chain and has access to it, they are able to
share transactions and receive transactions in their chain.
There may be multiple transactions involved
in the chain, the chain contains blocks which contains the transactions of the chain. Blocks in the chain contain and maintain transactions. It is key to understand not every block may be involved in a transaction, for example, Alice might want to send a proof of insurance to Bob, but Alice doesn’t want Bob to send the transaction to anyone else. Alice is able to put a lock on the transaction which would
prevent Bob from sending the proof of insurance to anyone
else. The transaction may now exist in only Bob and Alice’s chain. This is an added

level of security to ensure that information and data that is not to be shared with others is unpermitted. This also prevents multiple levels of fraud, because that transaction is locked, Bob can in no form claim that proof of insurance as his, apart from the fact that his name is unlikely to be in that transaction, the signature of Alice ensures it is Alice’s proof of insurance and may not be used by anyone else without permission, and then we add the fact that Bob cannot share or send the proof of insurance with anyone else fraud is unlikely.

Wallet

Each individual is given a wallet which is headed by the address of the wallet. The wallet of the individual is secured by a side encryption.
The password of the individual is the key of the wallet, the password is not stored anywhere else or known by any other individual except the owner of the wallet. Your wallet contains your public and private keys which are used to sign off on transactions, this ensures that it is indeed you who is making the transactions.

The wallets are available in two fashions, Desktop, Web and Mobile Wallet. This ensures that users are able to share information across the three major platforms that are widely used today.

Privacy

There are various steps taken to ensure the privacy of the members of the network is intact.
One is shared data which permits the people in the transaction to make available what they want. The details of the transaction are not available to anyone but the people partaking in the transaction. Just like bitcoin transactions, Seeruvia transactions are open for everyone to see but, the information of the transaction may not be viewed by any parties except the sender and recipient of the transaction.

The most key part of the transaction is the data field which contains the key contents

of the transaction. Only through wallet access can that be viewed. In essence, only the sender and recipient have or had the block containing the transaction in their chain which exists in their wallet, this means only they have access to it.

UTXO. (SCANNING)

We use UTXO’s to scan an individual chain. This is key to find certain information within the chain of an account. We might like to know if a student has a transaction that confirms that they are in fact a student, with UTXO we can print out the values of a transaction and confirm this.
Another example is when we look at the chain of an institution. We might like to know if a student does, in fact, attend a university, if we have permission, we could find out if there is a transaction that confirms that the student does attend that institution. This has very many use cases, financial institutions could use it to track payments and verify them, and others could use it to validate their smart contracts. Could be used to check if a transaction does infect exist or if an account actually has what they claim they do. Someone may claim they made a payment they did not make, the scanning helps validate this. If I own a business that gives out free meals to students, on a certain day a student could forget to bring their ID, but how could the student prove to me their student status? There are multiple methods for the student to verify this with me including sending or sharing a proof to my address, but it is possible that the student has forgotten their phone as well. With permission, I could scan the student’s chain for a verified proof that the individual is intact a student, the process would take seconds, be secure and enable me to know that the individual is intact a student.

P2P Proof Of Payment Verification

Had to consider that there are far too many people around the world who may need some sort of verification with instances we can’t confirm manually or automatically. The P2P Proof / Verification is very important.
2 Main Cases.

1. If I owned a software company and a software I released had an access code, our P2P Proof would work very well. When the user is able to buy the code, the user can simply add the key to his blockchain. Now, of course, we would need to know that their key is correct and not just any random code. Unfortunately, we can’t do this ourselves for there will be likely millions of software out there. The software creator could then add the access keys into their chain. When a user purchases an access key for the software, the blockchain then creates a new transaction that takes the key out of their chain into the chain of the person who just bought it.

  1. Private Key Verification.
  2. Imagine an apartment building with 150 tenants. The landlord instead of giving

out keycards or pin numbers could give out his private confirmation.
4. Digital Confirmation: When you buy a good / product from Amazon, you receive

a confirmation email, invoice, receipt stating the good you bought which is essentially your proof of purchase. People don’t carry emails of those around and often at times, they lose it. This is a good ground where the Proof of Payment easily comes in. The email you receive from Amazon confirming your order is your proof of purchase which the blockchain takes and validates its entry so if you wanted to return the good, instead of looking for the email, all you would have to do is provide your public key, this will indeed show that you bought the product you claimed to purchase.

5. When you want to sign in or log in to some websites, they ask you to use your Google, Facebook or some other thing to create an account. Instead of having to go through the whole process of confirming your account and verifying, simply providing your public key would do the trick. As long as your Blockchain confirms you have a Facebook or Google account, then you can immediately use your public key to verify your Google and Facebook accounts to use as a signup/login tool for other websites.

TRANSACTIONS / BLOCKS.

First, we start with the verification of transactions. Not everyone is allowed to make a certain type of transaction, if this happened then anyone could claim something which is untrue. In essence, it is up to the person receiving to decide if they would like to accept it. Private keys are used to verify transactions, for a transaction to go through in my chain it would need to be verified.

For example, if I am on a shoe selling website and I wanted to verify a transaction went through, the transaction would have to be confirmed by either the person receiving the shoe or some acknowledgment by the website. The shipping company may also verify the transaction. This all depends on how the website decides they want to verify transactions, this provides an extra layer of clarity for both parties, one which they both agree upon.

Each transaction contains a block. The contents of the block are up to the people involved in the transaction. There are some set contents of the transaction, but the data field of the transaction is up to the users.
Recipient — The address of the recipient of the transaction.

Sender — The address of the sender of the transaction. Previous — The hash of the previous block.
Hash — The hash of the current block.
Timestamp — The timestamp of the transaction.

Data — This is a data field in a JSON Format.

MULTIPLE TRANSACTIONS.

Transactions may be shared across multiple accounts. A single account may want to complete a transaction with multiple accounts on the network. Each account may now receive the transaction in their personal chain. All involved parties in the transaction do

not have to be aware of each participating party, only the single account making the transaction to the others is aware of the other parties in the transaction. Again this gives an extra level of privacy to all accounts involved in the transaction. The parties in the transaction may request to know everyone involved in the transaction, this is then decided by a consensus.

SHARING TRANSACTIONS.

For an added level of security, it is important that people do not contain information or data you do not want them to permanently keep. Because
a transaction may contain multiple data fields, or a
chain may contain multiple transactions, a user may not want to share every

content. They may not want to permanently share a transaction. They might choose to only share a certain value.

We use UTXO to accomplish this function. With UTXO we are able to retrieve certain values from a transaction at the request of the address of the transaction owner. This is an important feature in regards to privacy, users may not want
certain transaction information in the chain of another person. They may then share details of the transaction giving them another option to confirm and verify information requested by the other party.

SMART CONTRACTS

Smart contracts play a good part of the network. The contracts are modeled around an if-then statement.

Because individuals control their own networks, they are able to set up
their contracts easily. The contract is verified by parties in the transaction. The contract could involve two or more individuals who agree to the terms of the
contract. A contract could involve an entity agreeing to pay out a certain amount of money if it rains at 4 pm on a Tuesday evening. A smart contract could be set up by an apartment building owner charging his tenants for spikes in their electricity usage or plumbing fees.

For a smart contract to work, all sides involved in it have to agree and sign off on it.

DATAFIELD

Perhaps the most important part of the transaction, it is
the data field. The data field contains data in the transaction and it can be just about anything.

It is set in a JSON format which allows the transaction contain multiple inputs. It could contain text, integers, video, audio, & Images.

A data field could contain complex data like student transcript, job seeker resume. The data is set by the individuals partaking in the transactions. With the JSON format, their input could be anything they want.

A transaction could have a set data field of :
data = ‘{“name”: “John Smith”, “hometown”: {“name”: “New York”, “id”: 123}}’

SINGLE SOURCE.

Reading Fat Protocols by Joel Monegro of Union Square Ventures, he talked about how the “Relationship between protocols and applications is reversed in the blockchain application stack” Stating that the value lies in the shared protocol layer. He talked about how having the shared data layer

was extremely important, he explained that “By replicating and storing
user data across an open and decentralized network rather than
individual applications controlling access to disparate silos of information. We cut the

barriers to entry for new players and create a more vibrant and competitive ecosystem of products and services on top”. This could have proved to be a big issue, but essentially the design puts more control in the hand of the consumers than the producers. A user of the blockchain chooses who to share this data with

and so does the producer, in a sense, it leaves everyone happy.

A single blockchain wallet for a single user can contain all the ID and
Data they might need, and if they want more, they simply
request more. A person might not want certain people to see his credit score, but
he might want one or two insurance companies to have access to
it. The person might change his mind or may be required to make available his credit score, the switch would be seamless and easy. This completely eliminates the need for a middleman in any capacity.

The need for eliminating non-co-operating services is very important, that is why it is essential for the consumer to have a certain amount of power.

Think of Medical records, two medical institutions might be unwilling to coöperate when it comes to a patients data, but that is unnecessary. The patient is protected with the blockchain because the patient chooses who to share that data with, he can
easily share it with the medical institution that needs it. This means, he does
not need any sort of permission from the other medical institution, this eliminates
the need for the first medical institution in the transaction.

USE CASES

There are plenty of use cases that we know and there are plenty more that may be found out later in the future.

Just about any individual, business, or
enterprise may use Seeruvia for their various use cases.

Could users use this platform as their own personal storage space? A teacher at an educational institution might decide to share and store class notes on Seeruvia. Class mates may decide to share and pass notes along it as well, storing important information relating to the class. Its decentralized structure means they are able to access it from just about anywhere as well.

Individuals may use it to store personal data and information on their chain and use it as proof or share and send it to others

that may need the information they have. A doctor may provide a prescription to
an individual and send it to their chain, the individual may now use their chain to pick up their prescription at the local drug store.
A company doing freelance would use the platform to confirm and track the work done by the freelancers, the people hiring would use the smart contracts to ensure that
their work is complete they way they want to and also provide incentives.
A music streaming service could also use it to provide smart contracts to
their musicians, the musicians could decide how they would like to be paid,
an artist could have a clause stating he was paid based on the performance of

a certain song or the reviews it got on the streaming platform, it gives more options to the service site and the artists. That is an advantage of Seeruvia; it is open for everyone to agree on whatever they like, leaving little to no room for disagreements.

is a major use case of Seeruvia, can I verify that the person wanting a discount is a student or a veteran?

With it is very easy to do so, businesses could decide what they deem verifiable or not. Businesses might want to know if an employee worked at a certain place,
the employee could have this verified document in his chain stating that he did
indeed work there. Businesses could also use it for sales in many different ways.

The metro station could decide to sell tickets online and when a
customer purchases a ticket it goes to their blockchain wallet, with the private key of the metro station as the signature, it is easy to verify that the ticket is indeed
valid. The metro station could use UTXO to see if the ticket is a daily or a weekly pass, they could easily see if the ticket is expired as well. The ticket use cases could stretch across many things, Flight tickets, Hotel bookings, Rental services, Car payments, Private and Bank Loans and
more.

These are all parameters that business could easily set as their method of operation. An online seller could decide to use Seeruvia for running their business,
in this case, they may equip a contract agreed upon by
both sellers, they might decide to show clarity in everything done in which the blockchain records from the moment it is shipped to the moment it arrives.
All this gives a sense of modesty and leaves people feeling more safe with their transactions online. There are many use cases for individuals
and businesses to use Seeruvia, some may even be unexplored for years to come, but the features, clarity, simplicity, and structure of Seeruvia should make it attractive to people.

FINANCIAL USE

There are some use cases when it comes to finance with Seeruvia and methods of payment people may use.
As we continue to move into the digital age and away from the old methods of payment, could Seeruvia with its simplicity somehow make payments easier? Looking through the various API’s of banks across the world, there is no doubt that Seeruvia could make payments easier for members of the network, not only that but also serve major financial functions as well.

There is a very unique case with the proof of payment and how it could be used for financial use.
1. Bank Ties : When signing up for websites on a free trial, they ask for your credit card information and some more information. Where we come in this case is fairly simple, if you have your credit card information stored and verified in the blockchain, all you have to do is provide your public key and use your private key to verify that it is you to sign up for the trial of the website. If your blockchain
2. Apple Pay or any sort of digital payment method.

3. Payments — There is an open alley here for the use of payments.

Conclusion.

What we have here is a single platform that enables members of the network share and verify information amongst themselves.
It is a secure and private method to do so, giving the members of the network power over their content and data. It also makes the sharing of data and important information much easier, members of the network have so many use cases to use and discover. A member of the network may even decide to create their own private mail server between them, an individual and even a group of people.

The structure of the network is moved on by its simplicity and ease of use. It was designed for both individuals and businesses to use, the structure is going to ensure its usability for a very long time.
Thank You.

--

--