SlideShare a Scribd company logo
1 of 86
Download to read offline
Decentralized Identifiers (DIDs)
fundamentals
IdentityBook.info special
twitter.com/IdentityBookHQ
SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/
Drummond Reed
W3C DID specification
co-author
Chief Trust Officer Evernym
Markus Sabadello
W3C DID specification
co-author
Founder Danube Tech
1. Empower global SSI communities
2. Open to everyone interested in SSI
3. All content is shared with CC BY SA
SSIMeetup.org
Alex Preukschat @SSIMeetup @AlexPreukschat
Coordinating Node SSIMeetup.org
https://creativecommons.org/licenses/by-sa/4.0/
SSIMeetup objectives
17 May 2018
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Introduction
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
You can understand DIDs at four progressively deeper levels.
The Superficial Level:
What is a DID?
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
URIs, URLs, and URNs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● URLs locate resources on a network
● URNs are persistent names for a resource that
will never change no matter its location
● A DID is functionally a URN that in many cases
can be resolved into one or more URLs
The four core properties of a DID
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The Functional Level:
How DIDs Work
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
"For digital identifiers, the usefulness
comes just not from the identifier
itself, but from how it can be used
by applications designed to consume
that particular type of identifier.”
DIDs, DID documents, and DID subjects
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
A typical DID document contains:
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● One or more public keys (or other verification methods) that can be
used to authenticate the DID subject during an interaction
● One or more services associated with the DID subject that can be
used for interaction via protocols supported by those services
● Additional metadata such as timestamps, digital signatures and
other cryptographic proofs, or metadata related to delegation and
authorization
Example DID Document
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
{
"@context": "https://www.w3.org/ns/did/v1",
"id": "did:example:123456789abcdefghi",
"authentication": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123456789abcdefghi",
"publicKeyBase58" : "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}],
"service": [{
"id":"did:example:123456789abcdefghi#vcs",
"type": "VerifiableCredentialService",
"serviceEndpoint": "https://example.com/vc/"
}]
}
DID Methods
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● DIDs are not created and maintained in a single type of database or network
like most other types of URIs
● DID methods all support the same basic functionality but they differ in how
that functionality is implemented
DID Resolution
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● The process of obtaining the DID document associated with a DID
● Rather than thinking of DID resolution as a protocol, it should be considered
an abstract function or algorithm
DID URLs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● DIDs are powerful identifiers by themselves, but they can also be used as the
basis for constructing more advanced URLs rooted in a DID
● This is like how http/https URLs can consist of more than just a domain name
● DID URLs enable an "identifier space" for additional resources associated
with the DID
Example DID URLs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
did:example:1234/
did:example:1234#keys-1
did:example:1234;version-id=4#keys-1
did:example:1234/my/path?query#fragment
did:example:1234;service=hub/my/path?query#fragment
Comparing DIDs with Domain Names
Decentralized Identifiers (DIDs) Domain Names
Globally unique Globally unique
Persistent Reassignable
Machine-friendly identifiers (i.e., long character
strings based on random numbers / cryptography)
Human-readable names
Resolvable using different mechanisms defined by
the applicable DID method
Resolvable using the standard DNS protocol
Associated data is expressed in DID documents Associated data is expressed in DNS zone files
Fully decentralized namespaces without delegation Hierarchical, delegatable namespaces based on
centralized root registries for top-level domain
names (TLDs)
Cryptographically-verifiable Verifiable using DNS security extensions (DNSSEC)
Fully under the control of the DID controller Ultimately controlled by ICANN and the registry
operator for each DNS TLD
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Comparison with other persistent identifiers
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Types of DIDs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
● Ledger-based DIDs: The "original" category of DID methods involves
a blockchain or other DLT
● Ledger Middleware (“Layer 2”) DIDs: Adds an additional storage
layer “on top” of the base layer blockchain
● Peer DIDs: Exists only within a relationship between a limited number
of participants
● Static DIDs: Can only be created and resolved, but not updated or
deactivated
● Alternative DIDs: Do not fall into any of the other categories
The Architectural Level:
Why DIDs Work
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
“Since it was first conceived, PKI has one
hard problem at its very core. It is not a
problem with cryptography per se, i.e., with
the math involved with public/private keys or
encryption/decryption algorithms. Rather it is
a problem with cryptographic infrastructure,
i.e., how we can make public/private key
cryptography easy and safe for people and
organizations to use at scale.”
The following slides walk you
through the narrative we present
in this part of the chapter
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
24
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The PKI Trust Triangle
25
Controller
Private
Key
Public Key
Controls Publishes
Cryptographic binding
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public Half
MUST be shared
The PKI Trust Triangle
26
Controller
Private
Key
Public Key
Controls Publishes
Private Half
Must NOT be shared
Cryptographic binding
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The problem lies right here
27
Controller
Private
Key
Public Key
Controls Problem spot
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
28
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
This half is NOT the problem
29
Controller
Private
Key
Public Key
Controls
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
30
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
This half is the problem
31
Controller
Private
Key
Public Key
Controls
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
32
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
33
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The real PKI Trust Triangle
34
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
35
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
36
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Problem Spot #1
37
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
38
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Problem Spot #2
39
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Identifies
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
40
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
42
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
43
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Digital Identifiers
Type Challenges with Strong Binding
Phone Number Reassignable, limited #, hard to register
IP Address Reassignable, spoofable, hard to register
Domain Name Reassignable, spoofable, DNS poisoning
Email Address Reassignable, spoofable, weak security
URL Dependent on a Domain Name
X.500 Dist. Name Hard to register
X.500 Certs
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
45
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
46
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
47
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
48
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
49
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
50
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
51
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public Key Certificate Signed by a CA
52
Private
Key
Public Key
Controls Publishes
Controller
Identifies
Identifier
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
53
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
55
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Self-Certifying Identifiers
56
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Identifier
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
57
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
58
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Public key-to-identifier binding
59
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
60
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Identifier-to-controller binding
61
Identifier
Private
Key
Public Key
Controls Publishes
Controller
Publishes
Generates
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
62
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
63
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
65
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
66
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Generation of the original key pair and DID
67
DID
Private
Key1
Public Key1
Controls Publishes
Controller
Generates
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
68
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Publishing the original DID document
DID
Private
Key1
Public Key1
Controls Publishes
Controller
Generates
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
70
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Publishing the updated DID document
71
DID
Private
Key2
Public Key2
Controls Publishes
Controller
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
72
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
73
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
75
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
76
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Example: a DID for a newborn
DID
Private Key Public Key
Controller
IdentifiesKnows
Publishes
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
78
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
79
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
Discovery of service endpoint URLs
DID
Private Key Public Key
Controller
URL
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
The Semantic Level:
What DIDs Mean
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
A brief history of addresses
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
“What new communications network function-
ality do DIDs enable that could not be done
before? The short answer is that DIDs were
invented to support both the cryptographic
trust and the human trust required for the
four-layer architecture of any trust network
based on the Trust over IP stack introduced
in Chapter 5 and shown again here.”
https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info
Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
Questions?
SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).

More Related Content

What's hot

Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitKaliya "Identity Woman" Young
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksEvernym
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityEvernym
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityHeather Vescent
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?Evernym
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeSSIMeetup
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyTracy Kuhrt
 
分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要Naohiro Fujie
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable CredentialsTorsten Lodderstedt
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityEvernym
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentAnil John
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityClare Nelson, CISSP, CIPP-E
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityEvernym
 
Asset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerAsset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerJongseung Kim
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Evernym
 
MicrosoftのDID/VC実装概要
MicrosoftのDID/VC実装概要MicrosoftのDID/VC実装概要
MicrosoftのDID/VC実装概要Naohiro Fujie
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...SSIMeetup
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Heather Vescent
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSSIMeetup
 

What's hot (20)

Self-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web SummitSelf-Sovereign Identity for the Decentralized Web Summit
Self-Sovereign Identity for the Decentralized Web Summit
 
Digital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For BanksDigital Identity Wallets: What They Mean For Banks
Digital Identity Wallets: What They Mean For Banks
 
The Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized IdentityThe Shift from Federated to Decentralized Identity
The Shift from Federated to Decentralized Identity
 
Introduction to Self Sovereign Identity
Introduction to Self Sovereign IdentityIntroduction to Self Sovereign Identity
Introduction to Self Sovereign Identity
 
What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?What is self-sovereign identity (SSI)?
What is self-sovereign identity (SSI)?
 
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan GeorgeHyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
Hyperledger Aries: Open Source Interoperable Identity Solution – Nathan George
 
OSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger IndyOSCON 2018 Getting Started with Hyperledger Indy
OSCON 2018 Getting Started with Hyperledger Indy
 
分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要分散型IDと検証可能なアイデンティティ技術概要
分散型IDと検証可能なアイデンティティ技術概要
 
OpenID for Verifiable Credentials
OpenID for Verifiable CredentialsOpenID for Verifiable Credentials
OpenID for Verifiable Credentials
 
Verifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & HospitalityVerifiable Credentials for Travel & Hospitality
Verifiable Credentials for Travel & Hospitality
 
Blockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity DeploymentBlockchain R&D to Decentralized Identity Deployment
Blockchain R&D to Decentralized Identity Deployment
 
Zero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital IdentityZero-Knowledge Proofs in Light of Digital Identity
Zero-Knowledge Proofs in Light of Digital Identity
 
Digital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign IdentityDigital Guardianship in Self-Sovereign Identity
Digital Guardianship in Self-Sovereign Identity
 
Asset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game ChangerAsset Tokenization as an Industry Game Changer
Asset Tokenization as an Industry Game Changer
 
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
Why The Web Needs Decentralized Identifiers (DIDs) — Even if Google, Apple, a...
 
MicrosoftのDID/VC実装概要
MicrosoftのDID/VC実装概要MicrosoftのDID/VC実装概要
MicrosoftのDID/VC実装概要
 
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
Introduction to Ion – a layer 2 network for Decentralized Identifiers with Bi...
 
Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019Introduction to Self Sovereign Identity - IIW October 2019
Introduction to Self Sovereign Identity - IIW October 2019
 
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul KnowlesSchema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
Schema Definitions and Overlays for Self-Sovereign Identity (SSI) - Paul Knowles
 
OpenID for SSI
OpenID for SSIOpenID for SSI
OpenID for SSI
 

Similar to Decentralized Identifier (DIDs) fundamentals deep dive

The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...SSIMeetup
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedSSIMeetup
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed SSIMeetup
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedSSIMeetup
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsSSIMeetup
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...SSIMeetup
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)SSIMeetup
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Adam Pennington
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloSSIMeetup
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSISSIMeetup
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackSSIMeetup
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...sparkfabrik
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsLabSharegroup
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funSSIMeetup
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Hacken_Ecosystem
 
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKPennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKAdam Pennington
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vandaVanda KANY
 
Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019Carlo Ferrarini
 

Similar to Decentralized Identifier (DIDs) fundamentals deep dive (20)

The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
The DID Report 1: The First Official W3C DID Working Group Meeting (Japan)- D...
 
Internet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond ReedInternet Identity Workshop #29 highlights with Drummond Reed
Internet Identity Workshop #29 highlights with Drummond Reed
 
Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed Self Sovereign Identity (SSI) Open standards with Drummond Reed
Self Sovereign Identity (SSI) Open standards with Drummond Reed
 
Highlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond ReedHighlights of Internet Identity Workshop #28 with Drummond Reed
Highlights of Internet Identity Workshop #28 with Drummond Reed
 
Blockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain CredentialsBlockcerts: The Open Standard for Blockchain Credentials
Blockcerts: The Open Standard for Blockchain Credentials
 
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
Machine identity - DIDs and verifiable credentials for a secure, trustworthy ...
 
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)The 2nd Official W3C DID Working Group Meeting (The Netherlands)
The 2nd Official W3C DID Working Group Meeting (The Netherlands)
 
Decentralized Identifiers
Decentralized IdentifiersDecentralized Identifiers
Decentralized Identifiers
 
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
Anomali Detect 19 - Nickels & Pennington - Turning Intelligence into Action w...
 
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus SabadelloDID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
DID Resolution: Given a DID how do I retrieve its document? – Markus Sabadello
 
Kiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSIKiva protocol: building the credit bureau of the future using SSI
Kiva protocol: building the credit bureau of the future using SSI
 
Learn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stackLearn about the Trust Over IP (ToIP) stack
Learn about the Trust Over IP (ToIP) stack
 
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
CodeMotion 2023 - Deep dive nella supply chain della nostra infrastruttura cl...
 
Product security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security CertsProduct security by Blockchain, AI and Security Certs
Product security by Blockchain, AI and Security Certs
 
Cheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials funCheqd: Making privacy-preserving digital credentials fun
Cheqd: Making privacy-preserving digital credentials fun
 
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
Dejan Podgorsek - Is Hyperledger Fabric secure enough for your Business?
 
Spring boot-vault
Spring boot-vaultSpring boot-vault
Spring boot-vault
 
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CKPennington - Defending Against Targeted Ransomware with MITRE ATT&CK
Pennington - Defending Against Targeted Ransomware with MITRE ATT&CK
 
Secure 3 kany-vanda
Secure 3 kany-vandaSecure 3 kany-vanda
Secure 3 kany-vanda
 
Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019Hyperledger & blockchain meetup - Milano 23.10.2019
Hyperledger & blockchain meetup - Milano 23.10.2019
 

More from SSIMeetup

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSISSIMeetup
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...SSIMeetup
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentitySSIMeetup
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSIMeetup
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDSSIMeetup
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...SSIMeetup
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcareSSIMeetup
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3SSIMeetup
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersSSIMeetup
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...SSIMeetup
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSISSIMeetup
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolSSIMeetup
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaSSIMeetup
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloSSIMeetup
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenSSIMeetup
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemsSSIMeetup
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterSSIMeetup
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeSSIMeetup
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydSSIMeetup
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSIMeetup
 

More from SSIMeetup (20)

ZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSIZKorum: Building the Next Generation eAgora powered by SSI
ZKorum: Building the Next Generation eAgora powered by SSI
 
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
Anonymous credentials with range proofs, verifiable encryption, ZKSNARKs, Cir...
 
Value proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign IdentityValue proposition of SSI tech providers - Self-Sovereign Identity
Value proposition of SSI tech providers - Self-Sovereign Identity
 
SSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley HughesSSI Adoption: What will it take? Riley Hughes
SSI Adoption: What will it take? Riley Hughes
 
Web5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBDWeb5 - Open to Build - Block-TBD
Web5 - Open to Build - Block-TBD
 
Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...Portabl - The state of open banking, regulations, and the intersection of SSI...
Portabl - The state of open banking, regulations, and the intersection of SSI...
 
PharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for HealthcarePharmaLedger: A Digital Trust Ecosystem for Healthcare
PharmaLedger: A Digital Trust Ecosystem for Healthcare
 
PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3PolygonID Zero-Knowledge Identity Web2 & Web3
PolygonID Zero-Knowledge Identity Web2 & Web3
 
Building SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product ManagersBuilding SSI Products: A Guide for Product Managers
Building SSI Products: A Guide for Product Managers
 
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...Solving compliance for crypto businesses using Decentralized Identity – Pelle...
Solving compliance for crypto businesses using Decentralized Identity – Pelle...
 
The Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSIThe Pan-Canadian Trust Framework (PCTF) for SSI
The Pan-Canadian Trust Framework (PCTF) for SSI
 
Identity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic ProtocolIdentity-centric interoperability with the Ceramic Protocol
Identity-centric interoperability with the Ceramic Protocol
 
The SSI Ecosystem in South Korea
The SSI Ecosystem in South KoreaThe SSI Ecosystem in South Korea
The SSI Ecosystem in South Korea
 
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio AlamilloIntroducing the SSI eIDAS Legal Report – Ignacio Alamillo
Introducing the SSI eIDAS Legal Report – Ignacio Alamillo
 
How to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher AllenHow to avoid another identity nightmare with SSI? Christopher Allen
How to avoid another identity nightmare with SSI? Christopher Allen
 
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systemseIDAS regulation: anchoring trust in Self-Sovereign Identity systems
eIDAS regulation: anchoring trust in Self-Sovereign Identity systems
 
Explaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matterExplaining SSI to C-suite executives, and anyone else for that matter
Explaining SSI to C-suite executives, and anyone else for that matter
 
The Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain NodeThe Hyperledger Indy Public Blockchain Node
The Hyperledger Indy Public Blockchain Node
 
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael BoydStreetcred: Improving the Developer Experience in SSI – Michael Boyd
Streetcred: Improving the Developer Experience in SSI – Michael Boyd
 
SSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business OpportunitySSI: The Trillion Dollar Business Opportunity
SSI: The Trillion Dollar Business Opportunity
 

Recently uploaded

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)Delhi Call girls
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Servicegwenoracqe6
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663Call Girls Mumbai
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...tanu pandey
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.soniya singh
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...singhpriety023
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...tanu pandey
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Call Girls in Nagpur High Profile
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Callshivangimorya083
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...Escorts Call Girls
 

Recently uploaded (20)

Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
WhatsApp 📞 8448380779 ✅Call Girls In Mamura Sector 66 ( Noida)
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl ServiceRussian Call girl in Ajman +971563133746 Ajman Call girl Service
Russian Call girl in Ajman +971563133746 Ajman Call girl Service
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
✂️ 👅 Independent Andheri Escorts With Room Vashi Call Girls 💃 9004004663
 
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...Nanded City ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready ...
Nanded City ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready ...
 
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
Call Now ☎ 8264348440 !! Call Girls in Green Park Escort Service Delhi N.C.R.
 
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting  High Prof...
VIP Model Call Girls Hadapsar ( Pune ) Call ON 9905417584 Starting High Prof...
 
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
(INDIRA) Call Girl Pune Call Now 8250077686 Pune Escorts 24x7
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...Pune Airport ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready...
Pune Airport ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready...
 
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...Top Rated  Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
Top Rated Pune Call Girls Daund ⟟ 6297143586 ⟟ Call Me For Genuine Sex Servi...
 
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
Dwarka Sector 26 Call Girls | Delhi | 9999965857 🫦 Vanshika Verma More Our Se...
 
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Connaught Place ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
@9999965857 🫦 Sexy Desi Call Girls Laxmi Nagar 💓 High Profile Escorts Delhi 🫶
 
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip CallDelhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
Delhi Call Girls Rohini 9711199171 ☎✔👌✔ Whatsapp Hard And Sexy Vip Call
 
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...(+971568250507  ))#  Young Call Girls  in Ajman  By Pakistani Call Girls  in ...
(+971568250507 ))# Young Call Girls in Ajman By Pakistani Call Girls in ...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

Decentralized Identifier (DIDs) fundamentals deep dive

  • 1. Decentralized Identifiers (DIDs) fundamentals IdentityBook.info special twitter.com/IdentityBookHQ SSIMeetup.orghttps://creativecommons.org/licenses/by-sa/4.0/ Drummond Reed W3C DID specification co-author Chief Trust Officer Evernym Markus Sabadello W3C DID specification co-author Founder Danube Tech
  • 2. 1. Empower global SSI communities 2. Open to everyone interested in SSI 3. All content is shared with CC BY SA SSIMeetup.org Alex Preukschat @SSIMeetup @AlexPreukschat Coordinating Node SSIMeetup.org https://creativecommons.org/licenses/by-sa/4.0/ SSIMeetup objectives 17 May 2018
  • 3. https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
  • 4. Introduction SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). You can understand DIDs at four progressively deeper levels.
  • 5. The Superficial Level: What is a DID? SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 6. URIs, URLs, and URNs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● URLs locate resources on a network ● URNs are persistent names for a resource that will never change no matter its location ● A DID is functionally a URN that in many cases can be resolved into one or more URLs
  • 7. The four core properties of a DID SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 8. The Functional Level: How DIDs Work SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 9. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). "For digital identifiers, the usefulness comes just not from the identifier itself, but from how it can be used by applications designed to consume that particular type of identifier.”
  • 10. DIDs, DID documents, and DID subjects SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 11. A typical DID document contains: SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● One or more public keys (or other verification methods) that can be used to authenticate the DID subject during an interaction ● One or more services associated with the DID subject that can be used for interaction via protocols supported by those services ● Additional metadata such as timestamps, digital signatures and other cryptographic proofs, or metadata related to delegation and authorization
  • 12. Example DID Document SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). { "@context": "https://www.w3.org/ns/did/v1", "id": "did:example:123456789abcdefghi", "authentication": [{ "id": "did:example:123456789abcdefghi#keys-1", "type": "Ed25519VerificationKey2018", "controller": "did:example:123456789abcdefghi", "publicKeyBase58" : "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV" }], "service": [{ "id":"did:example:123456789abcdefghi#vcs", "type": "VerifiableCredentialService", "serviceEndpoint": "https://example.com/vc/" }] }
  • 13. DID Methods SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● DIDs are not created and maintained in a single type of database or network like most other types of URIs ● DID methods all support the same basic functionality but they differ in how that functionality is implemented
  • 14. DID Resolution SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● The process of obtaining the DID document associated with a DID ● Rather than thinking of DID resolution as a protocol, it should be considered an abstract function or algorithm
  • 15. DID URLs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● DIDs are powerful identifiers by themselves, but they can also be used as the basis for constructing more advanced URLs rooted in a DID ● This is like how http/https URLs can consist of more than just a domain name ● DID URLs enable an "identifier space" for additional resources associated with the DID
  • 16. Example DID URLs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). did:example:1234/ did:example:1234#keys-1 did:example:1234;version-id=4#keys-1 did:example:1234/my/path?query#fragment did:example:1234;service=hub/my/path?query#fragment
  • 17. Comparing DIDs with Domain Names Decentralized Identifiers (DIDs) Domain Names Globally unique Globally unique Persistent Reassignable Machine-friendly identifiers (i.e., long character strings based on random numbers / cryptography) Human-readable names Resolvable using different mechanisms defined by the applicable DID method Resolvable using the standard DNS protocol Associated data is expressed in DID documents Associated data is expressed in DNS zone files Fully decentralized namespaces without delegation Hierarchical, delegatable namespaces based on centralized root registries for top-level domain names (TLDs) Cryptographically-verifiable Verifiable using DNS security extensions (DNSSEC) Fully under the control of the DID controller Ultimately controlled by ICANN and the registry operator for each DNS TLD SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 18. Comparison with other persistent identifiers SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 19. Types of DIDs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). ● Ledger-based DIDs: The "original" category of DID methods involves a blockchain or other DLT ● Ledger Middleware (“Layer 2”) DIDs: Adds an additional storage layer “on top” of the base layer blockchain ● Peer DIDs: Exists only within a relationship between a limited number of participants ● Static DIDs: Can only be created and resolved, but not updated or deactivated ● Alternative DIDs: Do not fall into any of the other categories
  • 20. The Architectural Level: Why DIDs Work SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 21. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). “Since it was first conceived, PKI has one hard problem at its very core. It is not a problem with cryptography per se, i.e., with the math involved with public/private keys or encryption/decryption algorithms. Rather it is a problem with cryptographic infrastructure, i.e., how we can make public/private key cryptography easy and safe for people and organizations to use at scale.”
  • 22. The following slides walk you through the narrative we present in this part of the chapter SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 23.
  • 24. 24 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 25. The PKI Trust Triangle 25 Controller Private Key Public Key Controls Publishes Cryptographic binding SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 26. Public Half MUST be shared The PKI Trust Triangle 26 Controller Private Key Public Key Controls Publishes Private Half Must NOT be shared Cryptographic binding SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 27. The problem lies right here 27 Controller Private Key Public Key Controls Problem spot SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 28. 28 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 29. This half is NOT the problem 29 Controller Private Key Public Key Controls SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 30. 30 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 31. This half is the problem 31 Controller Private Key Public Key Controls SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 32. 32 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 33. 33 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 34. The real PKI Trust Triangle 34 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 35. 35 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 36. 36 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 37. Problem Spot #1 37 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 38. 38 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 39. Problem Spot #2 39 Identifier Private Key Public Key Controls Publishes Controller Identifies SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 40. 40 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 41.
  • 42. 42 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 43. 43 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 44. Digital Identifiers Type Challenges with Strong Binding Phone Number Reassignable, limited #, hard to register IP Address Reassignable, spoofable, hard to register Domain Name Reassignable, spoofable, DNS poisoning Email Address Reassignable, spoofable, weak security URL Dependent on a Domain Name X.500 Dist. Name Hard to register X.500 Certs SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 45. 45 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 46. 46 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 47. 47 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 48. 48 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 49. 49 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 50. 50 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 51. 51 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 52. Public Key Certificate Signed by a CA 52 Private Key Public Key Controls Publishes Controller Identifies Identifier SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 53. 53 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 54.
  • 55. 55 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 56. Self-Certifying Identifiers 56 Private Key Public Key Controls Publishes Controller Publishes Identifier Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 57. 57 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 58. 58 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 59. Public key-to-identifier binding 59 Identifier Private Key Public Key Controls Publishes Controller Publishes Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 60. 60 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 61. Identifier-to-controller binding 61 Identifier Private Key Public Key Controls Publishes Controller Publishes Generates SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 62. 62 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 63. 63 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 64.
  • 65. 65 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 66. 66 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 67. Generation of the original key pair and DID 67 DID Private Key1 Public Key1 Controls Publishes Controller Generates Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 68. 68 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 69. Publishing the original DID document DID Private Key1 Public Key1 Controls Publishes Controller Generates Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 70. 70 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 71. Publishing the updated DID document 71 DID Private Key2 Public Key2 Controls Publishes Controller Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 72. 72 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 73. 73 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 74.
  • 75. 75 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 76. 76 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 77. Example: a DID for a newborn DID Private Key Public Key Controller IdentifiesKnows Publishes SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 78. 78 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 79. 79 SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 80. Discovery of service endpoint URLs DID Private Key Public Key Controller URL SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 81. The Semantic Level: What DIDs Mean SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 82. A brief history of addresses SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).
  • 83. SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0). “What new communications network function- ality do DIDs enable that could not be done before? The short answer is that DIDs were invented to support both the cryptographic trust and the human trust required for the four-layer architecture of any trust network based on the Trust over IP stack introduced in Chapter 5 and shown again here.”
  • 84.
  • 85. https://www.manning.com/books/self-sovereign-identity and IdentiyBook.info Released under a Creative Commons license. (CC BY-SA 4.0). SSIMeetup.org
  • 86. Questions? SSIMeetup.orgReleased under a Creative Commons license. (CC BY-SA 4.0).