Skip to content

elastos/Elastos.DID.Method

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

37 Commits
 
 
 
 
 
 
 
 

Repository files navigation

Elastos DID Method v0.3

This document is the Elastos DID Method Technical Specification. It is published and maintained by the Elastos Foundation. Its aim is to explain the general data model and format of Elastos DID, as well as related operations. In the future, Elastos Foundation will continue to upgrade this document so that it reflects the latest state of development of the Elastos DID technology.

Abstract

On the current internet, identification systems are centralized, with most of these systems being offered by Internet service giants. Under these market circumstances, the public is forced to trust these commercial internet services (be it a company, organization, or other bodies). The process is simple: the company collects user data, while simultaneously taking on the responsibility of securing the data. On the surface, the problem does not seem apparent to most. Yet the issue of data security consistently arises in centralized identity systems revealing their inherent flaws and the risks they present to users with little alternative. Identity breaches are extremely serious. In centralized identity systems, individuals do not have control over their personal information, and in a worst case scenario, services have been known to maliciously leak or share personal information without the user's knowledge.

After the development of blockchain technology, the proposition of a blockchain-based decentralized ID system, where digital identities would no longer be provided by centralized commercial services, but rather be recorded on the decentralized blockchain began to arise. In this new decentralized system, digital identity is under the complete control of the user, and no longer relies on the former control that centralized organizations have over data. DID can also be verified and used for multiple scenarios, such as identity verification and data encryption.

DID is completely under the control of the DID subject, without reliance on any centralized registration body, commercial identity provider, or organization issuing certificates. The DID is described in the DID documents. Each DID document includes at least two items: encryption materials and verification methods. The encryption materials integrated with the verification methods provides a set of identify verification mechanisms (such as a public key, anonymous biological identification agreement, etc.), with other optional parts that can be used according to the needs of the application and of the user.

Specifications

Specification Link
Method EN CN
Resolve EN CN
Verifiable Claims EN CN

DID SDK

Language Link
Java Elastos.DID.Java.SDK
Swift Elastos.DID.Swift.SDK
Native Elastos.DID.Native.SDK

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

No packages published