The Login Experience
When you sign in with Google, Apple, Facebook, or a passkey, you’re using zkLogin - a Sui technology that creates a blockchain identity from your existing account. No seed phrases. No private keys to manage. Your social login becomes your crypto identity.Zero-Trust Custody
This is the core innovation that makes Umi different. When you create your account, two “dWallets” are created using Ika’s Distributed Key Generation (DKG):- Your key share - Encrypted with your passcode, stored in the Ika network
- Network key share - Held by Ika validators
- You provide your share (by entering your passcode)
- The network provides its share
- Together they produce a signature via Multi-Party Computation
- Neither party ever sees the complete key
- Umi can’t steal your funds - we never have the complete key
- Ika can’t steal your funds - they only have half
- You’re always in control - nothing happens without your passcode
Multi-Curve Support
Your dWallets use standard cryptographic curves to generate addresses on any chain: SECP256K1 dWallet:- Ethereum, Bitcoin, Zcash, Tezos
- Arbitrum, Optimism, Base, Polygon, Avalanche
- Any EVM-compatible chain
- Solana, Cardano, XRP, Sui, IKA
- Any chain using Ed25519 signatures
Sui as the Coordinator
Sui is the “brain” that coordinates everything:- Account state - Your Umi Signer lives on Sui
- Policy enforcement - Signing rules execute as Sui smart contracts
- Transaction coordination - Signing requests flow through Sui
- Containers - Cross-chain asset claims are Sui objects
- Verifiability - Everything is indexed and auditable
The Umi Signer
Your Umi Signer is a Sui object that:- Holds capabilities to request signatures from your dWallets
- Enforces your configured signing policies
- Manages which addresses/agents can request signatures
Signing Policy Rules
Your Umi Signer can enforce multiple rules. Here’s how they work: Main Rules (OR logic):| Rule | Purpose |
|---|---|
| Authorization | Whitelist addresses that can request signatures |
| Beneficiary | Enable inheritance after inactivity period |
| Lock | Completely disable signing (emergency) |
| Rule | Purpose |
|---|---|
| Spending Limit | Cap USD per transaction (TEE-enforced) |
| Timelock | Require cooldown between signatures |
| Quota | Limit signatures per time window |
| 2FA | Require second factor approval |
Hot Potato Pattern
Signing requests use Sui’s “hot potato” pattern:- Create a
SigningRequestobject - Request must visit each configured rule
- Each rule adds a
Receiptif conditions pass - Only when all receipts are collected can the dWallet be borrowed
- The signing request must be consumed - it can’t be dropped or stored
Signing a Transaction
Here’s the complete flow when you send a transaction:Step 1: Build Transaction
You specify what you want to do (swap, send, stake, etc.). Umi builds the raw transaction bytes for the target chain.Step 2: Policy Enforcement
The signing request goes through your Umi Signer:- Authorization rule checks if the requester is whitelisted
- Stackable rules validate their conditions:
- Spending limit checks transaction value
- Timelock checks time since last signature
- Quota checks signature count in current window
- 2FA checks for approval (if required)
- Each passing rule adds its receipt
Step 3: TEE Validation (for spending limits)
If you have spending limits configured, a Trusted Execution Environment:- Receives the raw transaction bytes
- Parses the transaction (supports EVM, Solana, Sui, Bitcoin, etc.)
- Extracts actual recipient and amount
- Fetches USD value from price oracles
- Validates against your limit
- Signs an attestation with timestamp and nonce
Step 4: Distributed Signing
With all receipts collected:- Your key share is decrypted (using your passcode)
- Ika network’s share participates
- MPC produces the signature without combining shares
- The complete key never exists
Step 5: Broadcast
The signed transaction is submitted to the destination chain. Umi handles chain-specific formatting and submission. From your perspective: confirm, enter passcode (if needed), done.Gas Abstraction
Every blockchain requires gas fees in its native token. Umi abstracts this away completely.How Gas Credits Work
- Deposit - Send any supported token to your gas balance
- Convert - Your deposit is converted to USD-denominated credits
- Transact - When you send a transaction, Umi pays gas in native tokens
- Debit - Your credit balance is debited the USD equivalent
Umi’s Gas Infrastructure
Behind the scenes, Umi maintains:- Gas accounts - Secure keypairs for each supported chain
- Auto-refill - Accounts refill from USDC treasury when low
- Balance monitoring - Continuous checks ensure accounts stay funded
- Cross-chain refills - Treasury on Solana bridges to other chains as needed
What You Can Deposit
- SUI or USDC directly on Sui
- Any token from any chain (converted via cross-chain swap)
- Other stablecoins at market rates
Cross-Chain Containers
Containers are Sui objects that wrap dWallet capabilities with asset claims:- Unified view - See all assets in one place
- Composability - Containers can interact with Sui DeFi
- Trading - Transfer ownership of multi-chain wallets
- Programmability - Build logic around wallet access
AI Agent Integration
AI agents can operate your wallets within strict boundaries:Agent Architecture
Hosted Agents:- Umi generates a Sui keypair for the agent
- Agent address is added to your authorization whitelist
- All signing goes through Umi’s infrastructure
- Agent has its own keypair
- API returns unsigned transaction bytes
- Agent signs and broadcasts independently
Agent Execution Flow
- Agent builds transaction parameters
- Transaction submitted to Umi execution service
- TEE validates against your policies
- If valid, TEE signs attestation
- On-chain contract verifies attestation
- dWallet produces signature
- Transaction broadcast to target chain
Agent Boundaries
Even a compromised agent cannot:- Exceed per-transaction spending limits
- Exceed daily spending caps
- Send to blocked addresses
- Bypass approval thresholds
- Modify its own permissions
Technical Architecture
Why This Architecture
Security through distribution:- No single point of failure
- No single party with complete access
- Policies enforced trustlessly on-chain
- One login for everything
- One balance for gas
- Familiar social auth
- Custom policies per user
- Agent automation within boundaries
- Composable with Sui DeFi

