Torram - Documentation v1.1
  • START HERE
  • โšกIntroduction
  • ๐ŸŽ’Background
  • *๏ธQuick Links
  • Torram's Bitcoin Native Solutions
    • ๐Ÿ”ฎDecentralized Oracle Network (DON)
    • ๐Ÿ“‡Interoperability with Bitcoin: The Role of Relayers
    • โš™๏ธDecentralized Indexer Network
  • ๐Ÿ‘๏ธBitcoin Oracles 101
  • USE CASES
    • ๐Ÿš€Key Use Cases
      • Bitcoin Native Stablecoins
      • Real-World Assets (RWA) Tokenization
      • Prediction Markets and Event-Based Finance
      • Crypto-Native Applications and DeFi Tooling
  • GOVERNANCE
    • ๐Ÿช™Tokenomics
    • ๐ŸšจAudits
  • RESOURCES
    • ๐Ÿ“šPMF Case Study
    • ๐Ÿ“‘Network Design & Token Exploration
    • ๐Ÿ—๏ธRisks & Barriers
  • ARCHITECTURE
    • ๐Ÿ‘จโ€๐Ÿ’ปTechnical Diagram
  • DEVELOPERS
    • โญGetting Started
    • ๐Ÿ”ŒAPI
    • ๐Ÿ“•References
Powered by GitBook
On this page
  • E-signatures
  • Biometrics
  • Credentials
  • Domain Name Services
  • Account Security
  1. USE CASES
  2. Key Use Cases

Identity & Authentication

E-signatures

E-signatures have become an increasingly popular way to obtain signatures on documents. They have modernized the signature process and helped companies avoid the costly overhead of obtaining a hand-written physical signature. With signatures being the most common way to authorize contracts, itโ€™s a necessity that oracles give smart contracts access to leading e-signature companies like DocuSign.

Biometrics

Another verifiable way to authorize is through biometric data, such as a fingerprint or a retinal eye scan. Since biometrics are uniquely identifiable to a specific person, they can be an effective way to verify someoneโ€™s identity as long as there is a reliable database or source to cross-reference it against. Oracles can both deliver the biometric data to the network and connect it to different off-chain databases to verify authenticity.

Credentials

Using trusted hardware and/or advanced cryptography, Chainlink oracles securely handle the private account information of external systems and applications. This enables smart contracts to directly verify credentials, such as whether someone has the proper amount of funds or possesses a specific security key. Once Chainlink oracles relay the confirmation on-chain, the smart contract can trigger execution and settlement of funds. Bringing credentials on-chain can also be especially effective for verifying inputs before exchanging valuable assets.

Domain Name Services

Blockchains still have a steep learning curve for many people, particularly around dealing with long hexadecimal addresses. In order to improve user experience, oracles are being used to help transform hexadecimal addresses into human-readable names like โ€œhello.cryptoโ€.

Account Security

Two-factor authentication (2FA) is another method a user can leverage to secure their online accounts, requiring an additional layer of verification beyond a username and password. This increase of security prevents unauthorized access to confidential information, as well as preventing the transferring of funds without multiple verifications. With oracles, smart contracts are able to be enhanced with 2FA functionalities, directly protecting a userโ€™s cryptocurrency holdings.

Last updated 1 year ago

๐Ÿš€