project screenshot 1
project screenshot 2
project screenshot 3
project screenshot 4
project screenshot 5
project screenshot 6

Celebrity

Celebrity competition system Social-Fi Project Dapp Project

Celebrity

Created At

ETHGlobal Bangkok

Winner of

Kinto - Kinto Wallet SDK 2nd place

Kinto - Best UI/UX

Project Description

People who want to become influencers participate directly in the influencer competition. It is a dapp system that promotes oneself and competes with people who want to become an influencer using tokens as collateral.

WEB3 system that guarantees reliability and privacy by using decentralized identity authentication (DID) or KYC (identity authentication) technology and provides tentative name Global Mr/Miss screening certification every week (monthly) through popularity voting (competition system).

How it's Made

  1. User Identity Management with DID or On-chain KYC KYC Verification Process: Users complete a trusted identity verification process through ID and facial recognition. This verified information is securely stored on-chain, ensuring that users’ identities are verifiable without compromising their privacy. DID Profile Creation: Users create a profile based on a Decentralized Identity (DID), allowing them to selectively disclose only the necessary information to other users or the platform. This ensures better control over their data privacy.
  2. Use of AA Wallet User Interaction and Transaction Handling: When users interact with the app (e.g., updating profiles, purchasing items, matching with others), the Paymaster contract covers the transaction fees, while EntryPoint triggers wallet operations. The Bundler gathers these actions and forwards them for processing. Secure Data Management: User data is safely managed via the Profile Contract, which stores profile details. The Matching Contract uses advanced algorithms to analyze these profiles and suggests potential matches based on similarity. Email Address Mapping for Verification: When using the AAWallet, a one-to-one mapping with the user's email address is used as an initial layer of identity verification. This allows leveraging the email provider’s verification mechanisms as a first step in confirming user authenticity.
  3. Data Sharing and Management Control Over Information Access: Users have the autonomy to decide whether to share personal information after a match. They can also revoke access at any time, giving them complete control over their data.
  4. Popularity Voting (Competitive Matching) System Algorithm Matching Contract: Utilizes graph theory to analyze the profile data stored in Profile Contracts. It estimates similarity and computes a likability score for users, recommending matches accordingly. Off-chain Indexer for Web 2.0 Integration: The system is designed to integrate partially with Web 2.0 by using an off-chain indexer, making it more efficient and allowing the incorporation of traditional data management methods when needed.
background image mobile

Join the mailing list

Get the latest news and updates