SlideShare une entreprise Scribd logo
1  sur  86
Télécharger pour lire hors ligne
Decentralized Identifiers (DIDs)
fundamentals
IdentityBook.info special
twitter.com/IdentityBookHQ
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
Drummond Reed
W3C DID specification
co-author
Chief Trust Officer Evernym
Markus Sabadello
W3C DID specification
co-author
Founder Danube Tech
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
17 May 2018
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Introduction
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
You can understand DIDs at four progressively deeper levels.
The Superficial Level:
What is a DID?
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
URIs, URLs, and URNs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● URLs locate resources on a network
● URNs are persistent names for a resource that
will never change no matter its location
● A DID is functionally a URN that in many cases
can be resolved into one or more URLs
The four core properties of a DID
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The Functional Level:
How DIDs Work
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
"For digital identifiers, the usefulness
comes just not from the identifier
itself, but from how it can be used
by applications designed to consume
that particular type of identifier.”
DIDs, DID documents, and DID subjects
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
A typical DID document contains:
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● One or more public keys (or other verification methods) that can be
used to authenticate the DID subject during an interaction
● One or more services associated with the DID subject that can be
used for interaction via protocols supported by those services
● Additional metadata such as timestamps, digital signatures and
other cryptographic proofs, or metadata related to delegation and
authorization
Example DID Document
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
{
"@context": "https://www.w3.org/ns/did/v1",
"id": "did:example:123456789abcdefghi",
"authentication": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123456789abcdefghi",
"publicKeyBase58" : "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}],
"service": [{
"id":"did:example:123456789abcdefghi#vcs",
"type": "VerifiableCredentialService",
"serviceEndpoint": "https://example.com/vc/"
}]
}
DID Methods
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● DIDs are not created and maintained in a single type of database or network
like most other types of URIs
● DID methods all support the same basic functionality but they differ in how
that functionality is implemented
DID Resolution
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● The process of obtaining the DID document associated with a DID
● Rather than thinking of DID resolution as a protocol, it should be considered
an abstract function or algorithm
DID URLs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● DIDs are powerful identifiers by themselves, but they can also be used as the
basis for constructing more advanced URLs rooted in a DID
● This is like how http/https URLs can consist of more than just a domain name
● DID URLs enable an "identifier space" for additional resources associated
with the DID
Example DID URLs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
did:example:1234/
did:example:1234#keys-1
did:example:1234;version-id=4#keys-1
did:example:1234/my/path?query#fragment
did:example:1234;service=hub/my/path?query#fragment
Comparing DIDs with Domain Names
Decentralized Identifiers (DIDs) Domain Names
Globally unique Globally unique
Persistent Reassignable
Machine-friendly identifiers (i.e., long character
strings based on random numbers / cryptography)
Human-readable names
Resolvable using different mechanisms defined by
the applicable DID method
Resolvable using the standard DNS protocol
Associated data is expressed in DID documents Associated data is expressed in DNS zone files
Fully decentralized namespaces without delegation Hierarchical, delegatable namespaces based on
centralized root registries for top-level domain
names (TLDs)
Cryptographically-verifiable Verifiable using DNS security extensions (DNSSEC)
Fully under the control of the DID controller Ultimately controlled by ICANN and the registry
operator for each DNS TLD
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Comparison with other persistent identifiers
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Types of DIDs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● Ledger-based DIDs: The "original" category of DID methods involves
a blockchain or other DLT
● Ledger Middleware (“Layer 2”) DIDs: Adds an additional storage
layer “on top” of the base layer blockchain
● Peer DIDs: Exists only within a relationship between a limited number
of participants
● Static DIDs: Can only be created and resolved, but not updated or
deactivated
● Alternative DIDs: Do not fall into any of the other categories
The Architectural Level:
Why DIDs Work
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
“Since it was first conceived, PKI has one
hard problem at its very core. It is not a
problem with cryptography per se, i.e., with
the math involved with public/private keys or
encryption/decryption algorithms. Rather it is
a problem with cryptographic infrastructure,
i.e., how we can make public/private key
cryptography easy and safe for people and
organizations to use at scale.”
The following slides walk you
through the narrative we present
in this part of the chapter
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
24
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The PKI Trust Triangle
25
Controller
Private
Key
Public Key
Controls Publishes
Cryptographic binding
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public Half
MUST be shared
The PKI Trust Triangle
26
Controller
Private
Key
Public Key
Controls Publishes
Private Half
Must NOT be shared
Cryptographic binding
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The problem lies right here
27
Controller
Private
Key
Public Key
Controls Problem spot
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
28
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
This half is NOT the problem
29
Controller
Private
Key
Public Key
Controls
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
30
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
This half is the problem
31
Controller
Private
Key
Public Key
Controls
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
32
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
33
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The real PKI Trust Triangle
34
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
35
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
36
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Problem Spot #1
37
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
38
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Problem Spot #2
39
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
40
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
42
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
43
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Digital Identifiers
Type Challenges with Strong Binding
Phone Number Reassignable, limited #, hard to register
IP Address Reassignable, spoofable, hard to register
Domain Name Reassignable, spoofable, DNS poisoning
Email Address Reassignable, spoofable, weak security
URL Dependent on a Domain Name
X.500 Dist. Name Hard to register
X.500 Certs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
45
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
46
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
47
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
48
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
49
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
50
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
51
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public Key Certificate Signed by a CA
52
Private
Key
Public Key
Controls Publishes
Controller
Identifies
Identifier
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
53
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
55
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Self-Certifying Identifiers
56
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Identifier
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
57
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
58
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public key-to-identifier binding
59
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
60
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Identifier-to-controller binding
61
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
62
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
63
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
65
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
66
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Generation of the original key pair and DID
67
DID
Private
Key1
Public Key1
Controls Publishes
Controller
Generates
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
68
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Publishing the original DID document
DID
Private
Key1
Public Key1
Controls Publishes
Controller
Generates
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
70
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Publishing the updated DID document
71
DID
Private
Key2
Public Key2
Controls Publishes
Controller
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
72
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
73
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
75
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
76
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Example: a DID for a newborn
DID
Private Key Public Key
Controller
IdentifiesKnows
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
78
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
79
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Discovery of service endpoint URLs
DID
Private Key Public Key
Controller
URL
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The Semantic Level:
What DIDs Mean
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
A brief history of addresses
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
“What new communications network function-
ality do DIDs enable that could not be done
before? The short answer is that DIDs were
invented to support both the cryptographic
trust and the human trust required for the
four-layer architecture of any trust network
based on the Trust over IP stack introduced
in Chapter 5 and shown again here.”
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Questions?
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).

Contenu connexe

Tendances

OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36Torsten Lodderstedt
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxFIDO Alliance
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementPrabath Siriwardena
 
Future-proofing Authentication with Passkeys
Future-proofing Authentication with PasskeysFuture-proofing Authentication with Passkeys
Future-proofing Authentication with PasskeysNordic APIs
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)Torsten Lodderstedt
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)Torsten Lodderstedt
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...SSIMeetup
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
次世代 KYC に関する検討状況 - OpenID BizDay #15
次世代 KYC に関する検討状況 - OpenID BizDay #15次世代 KYC に関する検討状況 - OpenID BizDay #15
次世代 KYC に関する検討状況 - OpenID BizDay #15OpenID Foundation Japan
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...SSIMeetup
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorialssuser3993f3
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Heather Vescent
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)Torsten Lodderstedt
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityEvernym
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...Torsten Lodderstedt
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
The European Union goes Decentralized
The European Union goes DecentralizedThe European Union goes Decentralized
The European Union goes DecentralizedTorsten Lodderstedt
 

Tendances (20)

OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36OpenID for Verifiable Credentials @ IIW 36
OpenID for Verifiable Credentials @ IIW 36
 
IBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptxIBM: Hey FIDO, Meet Passkey!.pptx
IBM: Hey FIDO, Meet Passkey!.pptx
 
Blockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access ManagementBlockchain-based Solutions for Identity & Access Management
Blockchain-based Solutions for Identity & Access Management
 
Future-proofing Authentication with Passkeys
Future-proofing Authentication with PasskeysFuture-proofing Authentication with Passkeys
Future-proofing Authentication with Passkeys
 
Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)OpenID 4 Verifiable Credentials + HAIP (Update)
OpenID 4 Verifiable Credentials + HAIP (Update)
 
OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)OpenID for Verifiable Credentials (IIW 35)
OpenID for Verifiable Credentials (IIW 35)
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
Peer DIDs: a secure and scalable method for DIDs that’s entirely off-ledger –...
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
次世代 KYC に関する検討状況 - OpenID BizDay #15
次世代 KYC に関する検討状況 - OpenID BizDay #15次世代 KYC に関する検討状況 - OpenID BizDay #15
次世代 KYC に関する検討状況 - OpenID BizDay #15
 
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
Decentralized Key Management (DKMS): An Essential Missing Piece of the SSI Pu...
 
Hyperledger Indy tutorial
Hyperledger Indy tutorialHyperledger Indy tutorial
Hyperledger Indy tutorial
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)OpenID Connect 4 SSI (DIFCon F2F)
OpenID Connect 4 SSI (DIFCon F2F)
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
How to Build Interoperable Decentralized Identity Systems with OpenID for Ver...
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
The European Union goes Decentralized
The European Union goes DecentralizedThe European Union goes Decentralized
The European Union goes Decentralized
 

Similaire à Decentralized Identifier (DIDs) fundamentals deep dive

The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyTracy Kuhrt
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Adam Pennington
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackSSIMeetup
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...sparkfabrik
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Hacken_Ecosystem
 

Similaire à Decentralized Identifier (DIDs) fundamentals deep dive (20)

The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger Indy
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
 
Spring boot-vault
Spring boot-vaultSpring boot-vault
Spring boot-vault
 

Plus de SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDSSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3SSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersSSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaSSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeSSIMeetup
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSIMeetup
 

Plus de SSIMeetup (20)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
 

Dernier

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.soniya singh
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Standkumarajju5765
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxellan12
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebJames Anderson
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$kojalkojal131
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 

Dernier (20)

Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Model Towh Delhi 💯Call Us 🔝8264348440🔝
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Pratap Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Shahpur Jat Escort Service Delhi N.C.R.
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night StandHot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
Hot Call Girls |Delhi |Hauz Khas ☎ 9711199171 Book Your One night Stand
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptxAWS Community DAY Albertini-Ellan Cloud Security (1).pptx
AWS Community DAY Albertini-Ellan Cloud Security (1).pptx
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark WebGDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
GDG Cloud Southlake 32: Kyle Hettinger: Demystifying the Dark Web
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Sukhdev Vihar Delhi 💯Call Us 🔝8264348440🔝
 
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
Call Girls Dubai Prolapsed O525547819 Call Girls In Dubai Princes$
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 

Decentralized Identifier (DIDs) fundamentals deep dive

  • 1. Decentralized Identifiers (DIDs) fundamentals IdentityBook.info special twitter.com/IdentityBookHQ SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/ Drummond Reed W3C DID specification co-author Chief Trust Officer Evernym Markus Sabadello W3C DID specification co-author Founder Danube Tech
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives 17 May 2018
  • 3. https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
  • 4. Introduction SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). You can understand DIDs at four progressively deeper levels.
  • 5. The Superficial Level: What is a DID? SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 6. URIs, URLs, and URNs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● URLs locate resources on a network ● URNs are persistent names for a resource that will never change no matter its location ● A DID is functionally a URN that in many cases can be resolved into one or more URLs
  • 7. The four core properties of a DID SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 8. The Functional Level: How DIDs Work SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 9. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). "For digital identifiers, the usefulness comes just not from the identifier itself, but from how it can be used by applications designed to consume that particular type of identifier.”
  • 10. DIDs, DID documents, and DID subjects SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 11. A typical DID document contains: SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● One or more public keys (or other verification methods) that can be used to authenticate the DID subject during an interaction ● One or more services associated with the DID subject that can be used for interaction via protocols supported by those services ● Additional metadata such as timestamps, digital signatures and other cryptographic proofs, or metadata related to delegation and authorization
  • 12. Example DID Document SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). { "@context": "https://www.w3.org/ns/did/v1", "id": "did:example:123456789abcdefghi", "authentication": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "Ed25519VerificationKey2018", "controller": "did:example:123456789abcdefghi", "publicKeyBase58" : "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV" }], "service": [{ "id":"did:example:123456789abcdefghi#vcs", "type": "VerifiableCredentialService", "serviceEndpoint": "https://example.com/vc/" }] }
  • 13. DID Methods SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● DIDs are not created and maintained in a single type of database or network like most other types of URIs ● DID methods all support the same basic functionality but they differ in how that functionality is implemented
  • 14. DID Resolution SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● The process of obtaining the DID document associated with a DID ● Rather than thinking of DID resolution as a protocol, it should be considered an abstract function or algorithm
  • 15. DID URLs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● DIDs are powerful identifiers by themselves, but they can also be used as the basis for constructing more advanced URLs rooted in a DID ● This is like how http/https URLs can consist of more than just a domain name ● DID URLs enable an "identifier space" for additional resources associated with the DID
  • 16. Example DID URLs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). did:example:1234/ did:example:1234#keys-1 did:example:1234;version-id=4#keys-1 did:example:1234/my/path?query#fragment did:example:1234;service=hub/my/path?query#fragment
  • 17. Comparing DIDs with Domain Names Decentralized Identifiers (DIDs) Domain Names Globally unique Globally unique Persistent Reassignable Machine-friendly identifiers (i.e., long character strings based on random numbers / cryptography) Human-readable names Resolvable using different mechanisms defined by the applicable DID method Resolvable using the standard DNS protocol Associated data is expressed in DID documents Associated data is expressed in DNS zone files Fully decentralized namespaces without delegation Hierarchical, delegatable namespaces based on centralized root registries for top-level domain names (TLDs) Cryptographically-verifiable Verifiable using DNS security extensions (DNSSEC) Fully under the control of the DID controller Ultimately controlled by ICANN and the registry operator for each DNS TLD SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 18. Comparison with other persistent identifiers SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 19. Types of DIDs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● Ledger-based DIDs: The "original" category of DID methods involves a blockchain or other DLT ● Ledger Middleware (“Layer 2”) DIDs: Adds an additional storage layer “on top” of the base layer blockchain ● Peer DIDs: Exists only within a relationship between a limited number of participants ● Static DIDs: Can only be created and resolved, but not updated or deactivated ● Alternative DIDs: Do not fall into any of the other categories
  • 20. The Architectural Level: Why DIDs Work SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 21. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). “Since it was first conceived, PKI has one hard problem at its very core. It is not a problem with cryptography per se, i.e., with the math involved with public/private keys or encryption/decryption algorithms. Rather it is a problem with cryptographic infrastructure, i.e., how we can make public/private key cryptography easy and safe for people and organizations to use at scale.”
  • 22. The following slides walk you through the narrative we present in this part of the chapter SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 23.
  • 24. 24 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 25. The PKI Trust Triangle 25 Controller Private Key Public Key Controls Publishes Cryptographic binding SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 26. Public Half MUST be shared The PKI Trust Triangle 26 Controller Private Key Public Key Controls Publishes Private Half Must NOT be shared Cryptographic binding SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 27. The problem lies right here 27 Controller Private Key Public Key Controls Problem spot SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 28. 28 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 29. This half is NOT the problem 29 Controller Private Key Public Key Controls SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 30. 30 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 31. This half is the problem 31 Controller Private Key Public Key Controls SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 32. 32 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 33. 33 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 34. The real PKI Trust Triangle 34 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 35. 35 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 36. 36 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 37. Problem Spot #1 37 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 38. 38 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 39. Problem Spot #2 39 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 40. 40 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 41.
  • 42. 42 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 43. 43 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 44. Digital Identifiers Type Challenges with Strong Binding Phone Number Reassignable, limited #, hard to register IP Address Reassignable, spoofable, hard to register Domain Name Reassignable, spoofable, DNS poisoning Email Address Reassignable, spoofable, weak security URL Dependent on a Domain Name X.500 Dist. Name Hard to register X.500 Certs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 45. 45 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 46. 46 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 47. 47 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 48. 48 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 49. 49 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 50. 50 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 51. 51 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 52. Public Key Certificate Signed by a CA 52 Private Key Public Key Controls Publishes Controller Identifies Identifier SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 53. 53 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 54.
  • 55. 55 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 56. Self-Certifying Identifiers 56 Private Key Public Key Controls Publishes Controller Publishes Identifier Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 57. 57 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 58. 58 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 59. Public key-to-identifier binding 59 Identifier Private Key Public Key Controls Publishes Controller Publishes Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 60. 60 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 61. Identifier-to-controller binding 61 Identifier Private Key Public Key Controls Publishes Controller Publishes Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 62. 62 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 63. 63 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 64.
  • 65. 65 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 66. 66 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 67. Generation of the original key pair and DID 67 DID Private Key1 Public Key1 Controls Publishes Controller Generates Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 68. 68 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 69. Publishing the original DID document DID Private Key1 Public Key1 Controls Publishes Controller Generates Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 70. 70 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 71. Publishing the updated DID document 71 DID Private Key2 Public Key2 Controls Publishes Controller Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 72. 72 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 73. 73 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 74.
  • 75. 75 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 76. 76 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 77. Example: a DID for a newborn DID Private Key Public Key Controller IdentifiesKnows Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 78. 78 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 79. 79 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 80. Discovery of service endpoint URLs DID Private Key Public Key Controller URL SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 81. The Semantic Level: What DIDs Mean SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 82. A brief history of addresses SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 83. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). “What new communications network function- ality do DIDs enable that could not be done before? The short answer is that DIDs were invented to support both the cryptographic trust and the human trust required for the four-layer architecture of any trust network based on the Trust over IP stack introduced in Chapter 5 and shown again here.”
  • 84.
  • 85. https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
  • 86. Questions? SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).