LogoLogo
  • 👋Introduction
    • Zion v2
  • 🏗️Zion Protocol Architecture
    • Overview
    • 🆔Decentralized Identifiers DIDs
      • DID Document
      • Service Endpoints
      • Sidetree
      • DID Universal Resource Identifier
        • Short Form URI
        • Long Form URi
      • DID Operations
        • Signing
        • Verification
      • Verifiable Credentials
    • ⚙️Decentralized Web Nodes
      • Messages
        • Basic Message
        • Signed Data
        • Authorization
        • Encrypted Data
      • DWN Requests
    • ⚡Bitcoin Lightning Network
      • Invoices
      • Payments(HTLC)
      • Taro
        • Non fungible Assets
        • Assets
        • Multi-Hop Taro Transfers
        • Asset Exchange
  • 📲Zion Social
    • Zion App
      • DID Account Creation
      • Social Profiles
      • Lightning Wallet
      • Creator Communities
      • Community Posts
    • Guide
  • 💫Web5 Interoperability
    • Why Web5?
    • Future Thoughts
    • FAQs
  • 📧Contact and Media
    • Contact Us
    • Social Media
Powered by GitBook
On this page

Was this helpful?

  1. Zion Protocol Architecture
  2. Decentralized Identifiers DIDs

Verifiable Credentials

PreviousDID OperationsNextDecentralized Web Nodes

Last updated 2 years ago

Was this helpful?

The one drawback to fully decentralized verification system like DIDs is that it lacks the security that centralized can bring verification brings. To solve this, (VC) will be added to DIDs.

Credentials are part of every person's daily life in society. We use credentials such as driver's licenses to show we are legally able to operate a motor vehicle, and for identification purposes when register to vote, fly domestically, and when signing up for Know Your Customer(KYC) verification services. Credentials also used for various membership cards for government services like community pool passes, library cards, and fishing permits. These credentials provide a way for people in society to verify who someone is and to ensure they have the proper authority to do something

are digital credentials that act as digital counterparts to physical credentials. They store all data digitally that a normal credential would.

Example Credential information

  • Personal Identifying Information(photo, name, DOB, physical attributes)

  • The Issuing Authority(governmental body, organization, company, etc)

  • Credential Type(Goverment issued licenses, passport, library card, etc)

  • Unique Identifier(license ID, employee ID, SSN, etc)

  • Evidence to how this credential was derived

  • Credential restraints(expiration date, credential uses and restrictions)

VCs can contain additional data for technologies that can digital sign VCs and that can also enable safeguards against fraudulent credentials. Also, Unlike normal credentials, VCs can be transmitted rapidly allowing for instant use across the web.

How Do VCs authenticate

: A role an entity may take when processing one or more VC and when generating a .

: An entity that transmits VCs to a holder. Examples: government bodies, corporations, member clubs, and more.

: An entity a claim(a request for a VC) is made about. In most cases the Holder is also the Subject, however in some cases a holder may hold VCs for other subjects. An example of this would be a parent holding VCs representing their children's passports or SSNs.

: An entity requesting the processing of a VC. Examples: TSA agents at airports, employers, security personal, and online services.

: A system responsible for the creation and verifications of all VC related data. Registries can provide any data need to process VCs and create .

: A tamper-evident presentation that is encoded so the authorship of the data can be verified cryptographically. Not all Verifiable Presentaions will include all data from VCs, but may choose to include data derived from VCs.

🏗️
🆔
Holder
verifiable presentation
Issuer
Subject
Verifier
Verifiable Data Registry
verifiable presentations
Verifiable Presentations
Verifiable Credentials
Verified Credentials
VC authorization flow