MeCentral

The convenience of a click-button app, the validation of blockchain/DID, and the security of a zero-knowledge vault— with your choice of self-custody or hybrid custody.

mecentral.org — Company mecentral.io — Platform mecentral.ai — Authenticators / AI mec.cx & mec.bz — Chain Anchors

See how it works

Problem

Digital life is fragmented, repetitive, and risky

  • Every lender, employer, and provider asks for the same documents again and again.
  • Users lose control; data sprawls across portals and inboxes.
  • Institutions wrestle with verification, fraud, and compliance.

Today’s workflow

  1. Collect PDF/ID/Paystubs
  2. Email / Upload multiple times
  3. Manual verification steps
  4. Delays + Errors + Security risk

Solution

One encrypted vault. One click to approve.

Store once in MeCentral. Approve requests. Share just enough via proofs, not PDFs.

Click-to-Approve Role-based Disclosure Audit Trail

Outcome

  • Faster mortgages, onboarding, healthcare intake
  • Safer with zero-knowledge & least-privilege data
  • Cheaper for institutions; fewer manual verifications

Flow

Requester → MeCentral → You → Authenticators → Proofs

User-Centric Flow

  1. Requester submits data request to mecentral.io.
  2. You receive a push on MeCentral app → Approve/Deny/Limit.
  3. Authenticators (banks, employers, gov, healthcare) validate facts.
  4. Proofs: Share zero-knowledge attestations or redacted docs as needed.
  5. Audit: Immutable receipt anchored on mec.cx / mec.bz.

Data Minimization

  • Provide answers (Yes/No/Range) instead of raw values when possible.
  • Share derived facts: “Income ≥ $X”, “Employment active on date”.
  • Escalate to document share only if required by policy/law.

Core Stack

  • DID & Verifiable Credentials: user identity and attestations
  • Zero-Knowledge Proofs (ZK): reveal only what’s necessary
  • E2E Encryption: keys controlled by user (self or hybrid custody)
  • mec.cx / mec.bz: blockchain anchors for audit & receipt integrity

Assurance

Trust without overexposure

All approvals produce a tamper-evident receipt hashed and anchored to chain. Institutions verify proof-of-integrity without seeing the vault contents.

Control

Paranoid-friendly by design

  • Self-custody (keys on device/ledger) or Hybrid custody (HSM + recovery)
  • Role-based disclosure per request, with reusable policy templates
  • Granular revocation & expiration on every share

Examples

  • Mortgage: share ZK proof of income + limited credit facts
  • Employment: share verified W-2 data; mask SSN
  • Healthcare: share insurance eligibility; hide birthdate

For Consumers

Instant approvals. Private by default.

  • One vault. One click.
  • Proofs, not paperwork.
  • Always-on audit receipts.

Value

Stop hunting PDFs. Stop oversharing. Own your timeline of approvals and revoke access anytime.

For Institutions

Trusted data, lower risk, faster cycles

  • Fraud-resistant proofs and source-verified attestations
  • Reduced ops cost; fewer manual checks
  • Audit-ready with chain-anchored receipts

Integration

  • Standards: OIDC, OAuth2, W3C VC/DID, FAPI
  • SDKs & Webhooks for request → approve → proof
  • Policy controls for KYC/AML/GLBA/HIPAA regimes

Opportunity

Identity, finance, health, and beyond

Beachheads

  • Mortgages & lending
  • Employment & payroll verification
  • Insurance eligibility

Expansion

  • University admissions
  • Travel/visa applications
  • Taxes & public services

Be the center of your digital life

Build with us. Pilot with us. Approve with one click.

Contact: founders@mecentral.org Docs: mecentral.org/docs Platform: mecentral.io

Back to start

Appendix

Domain & Role Map

Core

  • mecentral.org — Company site, docs, pitch
  • mecentral.io — Platform (vault, approvals, partner APIs)
  • mecentral.ai — Authenticators / AI services

Anchors & Shortlinks

  • mec.cx — Chain anchor endpoint A (TX/receipt registry)
  • mec.bz — Chain anchor endpoint B (redundant/geo)
  • mec.link — Human-friendly request links

Security Controls

  • Device-bound keys (TPM/Secure Enclave)
  • HSM-backed hybrid custody with Shamir recovery
  • ZK range & membership proofs
  • End-to-end encryption; forward secrecy

Compliance Ready

  • Privacy by design (data minimization)
  • Consent receipts (anchored)
  • Regional data residency options
  • Audit APIs for regulated industries