Comment on page
Attribute represented as a name-value pair.
- belongs to a Classification Scheme
- has a parent Classification Node, unless it is the root node
- has property
- has property
- has property
- has property
A document that is used to guarantee the structure, and by extension the semantics, of the set of claims comprising a Verifiable Credential. A shared Credential Schema allows all parties to reference data in a known way. See reference here.
The defining properties of the resulting Credential. Credential Templates generally include:
- template name
- associated credential schema
- Issuer URL
- Issuer logo
- styling information (background and text colour)
URIs that associate a DID subject with a DID document allowing trustable interactions associated with that subject. DIDs have been designed so that they may be decoupled from centralized registries, identity providers, and certificate authorities. Specifically, the controller of a DID can prove control over it without requiring permission from any other party.
Required in the process of generating or re-generating a Passphrase Derived Key. Derivation Artefacts include:
- Number of iterations
- Derived key
The entity identified by a DID and described by a DID Document. DID subjects include:
- physical entities
- digital entities
An umbrella term for technologies that provide distributed, append-only storage mechanics based on a consensus algorithm. Blockchain and hashgraph technologies are included under the term DLTs.
Same as PKI, but does not require a centralized authority to provide authenticity.
A group of organizations, users, and things that interact within a particular environment to achieve a (common) goal.
A system of communication where only the users communicating can read the messages. It prevents data from being read or secretly modified, other than by the true sender and recipient(s). The messages are encrypted by the sender (via the use of encryption keys), they are stored, encrypted, by the recipient, and are decrypted (read) by the recipient with another set of keys.
A role within SVX. End-users, including Wallet Holders, partake in the exchange and sharing of data with Issuers and Verifiers. Via the use of Meeco’s Wallet application, they are able to, but not limited to:
- Register with Tenants
- Connect with Organizations
- Import credentials
- Import and respond to Presentation Requests
DID which is self-contained or generative, does not need to be represented in VDR.
A role an entity can perform by asserting claims about one or more subjects, creating a verifiable credential from these claims, and transmitting the verifiable credential to a holder. See reference here.
JSON is an open standard file format and data interchange format that uses human-readable text to store and transmit data objects consisting of attribute-value pairs and arrays. It is a common data format with diverse uses in electronic data interchange, including that of web applications with servers.
JSON Web Token is a proposed Internet standard for creating data with optional signature and/or optional encryption whose payload holds JSON that asserts some number of claims. The tokens are signed either using a private secret or a public/private key.
A process where at least two parties exchange cryptographic key(s) with the intention to use it/them for encryption or authentication.
A pair of private key(s) and public key(s) that are mathematically linked to each other. Public keys are used to encrypt data, and the private key of the keypair is used to decrypt that data. This is known as asymmetric encryption.
A component within SVX. The Keystore enables users to store and manage their cryptographic keys. This is where the Data Encryption Keys, Public/Private Keypairs, and the Key Encryption Key are stored along with the Derivation Artefact. All of the stored keys are encrypted with the KEK, except for the KEK itself, which is encrypted with the Passphrase Derived Key. No encryption is done in the Keystore; the Cryppo library aids in creating and using keys. Additional information can be found here.
An entity within SVX. An Organisation belongs to a Tenant and is managed by one or more Organisation Administrators.
A role within SVX. Organisation Administrators are individuals (users) who have administrator access and permissions to operate an Organisation. An Organisation Administrator is responsible for the actions that take place within their Organisation, including:
- Issuing credentials
- Verifying credentials
- Revoking credentials
- Creating and managing Connections
A string of words that are used to authenticate a user when accessing a digital service or system. Passphrases are considered more secure than passwords as they are harder to decipher.
PBKDF2key. To generate or re-generate this key, a passphrase and derivation artefacts are required. Derivation artefacts include:
- Number of iterations
- Derived key length
In the current iteration of our
Secret Keyauthentication and passphrase derivation, the number of keys
Number of iterationsand
Derived key lengthare static, and the Salt is pulled from the Secret Key.
Identifiers/attributes that may serve to uniquely identify a subject of the information.
Presentation Definitions are objects that articulate what proofs a Verifier requires. These help the Verifier to decide how or whether to interact with a Holder. Presentation Definitions are composed of inputs, which describe the forms and details of the proofs they require, and optional sets of selection rules, to allow Holders flexibility in cases where many different types of proofs may satisfy an input requirement. See reference here.
Presentation Requests are transport mechanisms for Presentation. Presentation Requests can take multiple shapes, using a variety of protocols and signature schemes not refined in this specification. They are sent by a Verifier to a Holder. Defining Presentation Requests is outside the scope of this specification. See reference here.
A secret key in asymmetric cryptography used for decrypting ciphertext to plaintext.
Infrastructure distributing cryptographic public keys based on a chain-of-trust, which is built around centralized authorities (entities issuing Root Certificates).
A public key linked directly to a specific entity, used to encrypt plaintext into ciphertext, which can only be decrypted with the corresponding Private Key.
An entity that relies upon the subscriber's credentials, typically to process a transaction or grant access to information or a system.
In cryptography and computer security, a root certificate is a public key certificate that identifies a root certificate authority (CA). Root certificates are self-signed and form the basis of an X.509-based public key infrastructure (PKI). See reference here.
In symmetric cryptography, a secret key (or "private key") is a piece of information or a framework used to decrypt and encrypt messages. Each party taking part in a transaction that is intended to be private possesses a common secret key. See reference here. The secret key is a component of the authentication flow. The format for version 1 is as follows:
usernameis generated by the server, and the
saltis a 256-bit randomly generated key, which is base58 encoded and has a hyphen (-) at each 6th character. The salt component is created on the client and stored securely by the user. It is used to generate:
The permissions an individual user or a computer application holds to read, write, modify, delete, or otherwise access a computer file; change configurations or settings, or add or remove applications. See reference here. Within SVX, one can differentiate between two types of security rights:
A token that contains security rights assigned to a user or agent, which can be used as proof that it can perform certain actions.
A Share is created when a user grants access to one of their Items to another user that they have Connected with. The Item is re-encrypted with a Data Encryption Key and shared with the recipient of the Share. An Item you have received via a Share can be shared with another user, but you cannot alter any of its Slots. Only the original creator of the Item can update the Share, other than deleting it. Detailed documentation can be found here.
A Slot is the smallest data entity in the Vault. An Item is made up of Slots, which are defined by the
nameproperty. Each Slot has a
label, and a
value. Slots are able to be shared after two users have made a Connection with each other. Note that the API does not return the
encrypted_value. The API will not allow storing any unencrypted data in either
encrypted_value. Slot values are always stored in an encrypted form, and only the user can decrypt and read them. Once encrypted and serialized, a Slot value of "BMW" would look something like this:
"encrypted_value": "Aes256Gcm.2hDl.LS0tCml2OiAhYmluYXJ5IHwtCiAgQWQwSThDZk5qRnFycmFuMAphdDogIWJpbmFyeSB8LQogIDJXVklzbUxOSWVoOHZIVDB1ZzBtZVE9PQphZDogbm9uQQo=". Slots are typed, but the values cannot be checked to match the given type, as the API does not have decrypted keys for these items. Example Slot types are:
attachmentNotice that new types cannot be created;
key_valueshould be the default type used.
A collection of software development tools in one installable package. They facilitate the creation of applications by having a compiler, debugger, and sometimes a software framework.
See Private Key.
A principal of a Credential. It can be a person, organization, thing, or entity.
A term used within SVX but is identical to Verifiable Presentation.
A role within SVX. Tenant Administrators are individuals (users) who have administrator access and permissions to operate a Tenant. A Tenant Administrator is responsible for the actions that take place within their Tenancy, including:
- Onboarding, managing and governing Organisations.
- Registering and managing End-users.
A Tenancy is operated by an enterprise/company, referred to as a Tenant and consists of Organisations, and End-users.
A Uniform Resource Identifier is a unique sequence of characters that identifies a logical or physical resource used by web technologies. URIs may be used to identify anything, including real-world objects, such as people and places, concepts, or information resources such as web pages and books.
A number assigned to any type of data set or attribute to make it uniquely identifiable.
A verifiable credential is a tamper-evident credential that has authorship that can be cryptographically verified. Verifiable credentials can be used to build verifiable presentations, which can also be cryptographically verified. The claims in a credential can be about different subjects. See reference here.
(and so on for the remaining terms)
In the context of decentralised identity, is a place where Decentralised Identifiers (DIDs) can be anchored to.
A tamper-evident presentation encoded in such a way that authorship of the data can be trusted after a process of cryptographic verification. Certain types of verifiable presentations might contain data that is synthesized from, but do not contain, the original verifiable credentials (for example, zero-knowledge proofs). See reference here.
See Presentation Request.
The defining properties of the resulting Presentation Request. Verification Templates generally include:
- template name
- purpose (reason for requesting the specified Credential(s))
- Credential Schema(s)
Verification Templates can be used repeatedly to form the basis of many different Presentation Requests.
A well-known key link directly to a specific entity. Used to confirm signatures. Technically, it is a public asymmetric key.
Software that enables the wallet’s controller (the end-user or Wallet Holder) to generate, store, manage and protect cryptographic keys and Verifiable Credentials. It allows the person to take actions (e.g. accept and present credentials) and setup peer-to-peer communication.
In cryptography, a zero-knowledge proof or zero-knowledge protocol is a method by which one party can prove to another party that a given statement is true while the prover avoids conveying any additional information apart from the fact that the statement is indeed true.
A system that has no knowledge (by using end-to-end encryption) of the data value, whilst allowing metadata to be accessible to the service. Metadata might include a data label (such as "street_name"), or classifications (such as "home").
Last modified 25d ago