...
- an open identity network providing DIDs, VCs to any registered client
- real-time revocation verifications through DID-comm protocol
- Based on Indy open-source identity platform from Hyperledger
- 3 separate networks run by stewards that operate nodes
- The networks are governed by the Sovrin foundation
- https://sovrin.org/the-sovrin-alliance/
References
Reference_description_with_linked_URLs_______________________ | Notes______________________________________________________________ |
---|---|
Digital Identity Concepts | |
Identity Management security concepts | |
m TOIP Trust Over IP | |
pssig-210312-Self Sovereign Identity in Govtech for Financial & Healthcare Inclusion gdoc | |
identity-use-cases-info. gdoc | |
LFS172x - Introduction to Hyperledger Sovereign Identity bc.docx | |
Hyperledger Identity Working Group-paper.docx - 2018 | |
DID Articles - technology and use cases | |
Top 15 Blockchain Identity Platforms of 2024 article | |
Key Concepts
we are digital twins - we exist in both physical and digital worlds with identities
Potential Value Opportunities
...
Potential Challenges
Candidate Solutions
Top 15 Blockchain Identity Platforms of 2024 article
exploring these pioneering platforms, we aim to illuminate the significant advantages and transformative potential of blockchain identity in our increasingly digital lives.
youtube on digital identity concepts
digital id is based on email, phone or issued user profiles now before DIDs, VCs
DIDs issued are independent of most organizations ( from governments or identity service authorities instead ) and stored in digital wallet services
Credentials can be issued by anyone and stored in your wallet
How DIDs and VCs work in 5 seconds
When access or authorization needed to a service, organization or resource, the verifier organization issues a challenge to prove the holders of digital ID and the related VCs from the issuers to gain access to authorized resources and services.
Privacy is protected because the holders don't need to supply PII ( Personal Identifying Information ) which is private, just present the DIDs and VCs instead to the verifier appropriate for the use case ( "am I old enough to drink in this bar?").
This process in based on strong cryptographic digital objects and governance services with automated verifications
Simple use case for a student verifying their id online for a university access
for improved reliability, the digital wallet, identity & credentials can be paired with a physical ID card with a QR code as a backup option for alternate access
TOIP - Trust Over IP - defines 4 layers for both the digital identity processes and the goverance of those processes ensuring integrity and trust
"Trust fuels the World and we are low"
Step-by-step guide for Example
...