Skip to main content

Architecture Overview

The architecture of Interstellar’s secure Web3 account system is built on a modular, TEE-native design, optimized for mobile-first use cases. All core logic is executed within trusted environments using Integritee-based Substrate runtimes, ensuring strong guarantees of confidentiality, integrity, and attestation.

Layered Design

The system is organized into four primary functional layers:

  • Account Abstraction Layer (AA Layer)
    Manages user identity and registration flows, including support for Pure Proxy-based root accounts, SE-attested mobile proxy accounts, and registration of recovery items such as NFC tags or VCA tokens (secure file for cloud backup)

  • Authentication Layer
    Provides on-device authentication and trusted action validation (including transaction validation) via the Secure Element. It includes the AUTH extrinsics and implements the TAVP protocol, enforcing DSP-SCA compliance by validating user input (e.g., biometric unlock + randomized keypad) directly within the TEE.

  • Recovery Layer
    Implements a flexible, threshold-based recovery mechanism using combinations of NFC tags and VCA-based secure backup files. Recovery flows are handled entirely within the trusted execution environment, without reliance on external services or seed phrases.

  • VCA System Layer
    Defines the execution model for Visual Cryptographic Authentication Tokens — one-time-use programs generated from a master circuit and executed on the user's device. Each VCA Token displays a randomized keypad and a transaction- or action-specific message, which is never stored in memory and rendered only through garbled circuit logic. The output is signed using a Secure Element–derived random input, allowing the TEE to verify correct execution. This system serves as the trusted, privacy-preserving execution layer for both authentication and recovery flows.

Secure Mobile Integration

Mobile interactions are designed to be cryptographically verifiable. Keys are generated within the Secure Element and registered on-chain using attestation flows. The system is compatible with WebAuthn / Passkey standards at the cryptographic level, while remaining fully decentralized and interoperable.

Execution Environment

All logic runs within an Integritee enclave, enabling:

  • Remote attestation of operations
  • Confidential state transitions
  • Cryptographic integrity for identity and transaction workflows

This ensures that user data, credentials, and account actions are verifiable, private, and resistant to client-side compromise.


This high-level architecture serves as the foundation for the components delivered in Milestone 1 and documented in the following sections.