The Architecture of Trust
Without Credentials
No passwords. No seed phrases. No stored secrets. Every layer of the FPB stack is designed to eliminate the credential attack surface entirely.
Three pillars of credential-free security
Temporary Secret Keys
Private keys exist only in memory for the duration of a signing operation. They are never written to disk, never stored in a database, and never transmitted. Once the signature is complete, the key material is securely erased. There is nothing to steal, nothing to phish, and nothing to lose.
- Keys generated on demand via dMPC
- Exist only during signing — wiped after
- Replaces hardware security modules (HSMs)
- No seed phrases, no recovery emails
Consensus Recovery
Account recovery is handled by a distributed Guardian network. Guardians attest to your identity using hardware-secured biometrics. No personal data is exchanged — only cryptographic proofs. A configurable M-of-N threshold ensures that no single Guardian can compromise your account.
- Hardware biometric attestation
- No personal data collected or stored
- AI deepfake immune — hardware-bound proof
- Configurable M-of-N threshold
Policy Engine
Every rule that governs your account is a smart contract deployed on-chain. Spending limits, vendor whitelists, velocity controls, and approval workflows are all enforced deterministically. No human can override the protocol. No internal memo can change the terms.
- On-chain rule enforcement
- Per-account spending limits and velocity controls
- Vendor whitelists and approval workflows
- Full audit trail, publicly verifiable
From device to chain
Device Bound
Keyless WEB3 Wallet
Keyless WEB2 Auth
Decentralized Escrow
Cross Chain Exchange
On-chain infrastructure
Cross-Chain Multi-sig
Transactions can require signatures from multiple chains simultaneously. Native support for EVM, Solana, and Cosmos ecosystems.
Logic Engine
Smart contract-based rules engine that evaluates every transaction against account policies before signing.
dMPC
Distributed Multi-Party Computation splits key material across independent nodes. No single party can reconstruct a key.
The credential-free infrastructure layer
FPB is built on WiKey’s patented technology for eliminating passwords, seed phrases, and stored secrets across Web2 and Web3 applications. The same infrastructure secures both human and AI agent accounts.