Recently Updated Content


Ecosystem Overview

This page includes a breakdown of the Web Standards, Protocols,Open Source Projects, Organizations, Companies, Regions, Government and Policy surrounding Verifiable Credentials and Self Sovereign Identity.

Updated: 2024-02-26 2 minute read

Tags:

Verifiable Credentials with JSON-LD and Linked Data Proofs

Starting with the name, JSON-LD stands for JavaScript Object Notation with Linked Data. JSON-LD is a method of encoding linked data using JSON. The term “JSON-LD Credential” alone is somewhat ambiguous but the way it is colloquially used, it means a W3C Verifiable Credential Data Model compliant ...

Updated: 2023-09-29 4 minute read

Tags:
Data Integrity
JSON-LD
Verifiable Credentials
W3C

Verifiable Credentials with JSON-LD and BBS+ Signatures

BBS signatures were implicitly proposed by Boneh, Boyen, and Shacham (CRYPTO ’04) as part of their group signature scheme, and explicitly cast as stand-alone signatures by Camenisch and Lysyanskaya (CRYPTO ’04). A provably secure version, called BBS+, was then devised by Au, Susilo, and Mu (SCN ’...

Updated: 2023-09-29 7 minute read

Tags:
BBS
Data Integrity
JSON-LD
Verifiable Credentials
W3C

Verifiable Credentials (ZKP-CL) Anoncreds

This credential format was created specifically to leverage the CL Signatures. JSON-JWT and JSON-LD Signatures each have their own way of representing the meaning of the attributes within a VC. JSON-JWT references an IANA registry and assumes a “closed world” authority model based on that authori...

Updated: 2023-09-29 6 minute read

Tags:
Anoncreds
Evernym
Hyperledger Foundation
IBM
IDEMIX
Sovrin Foundation
Verifiable Credentials
W3C
ZKP-CL

Verifiable Credentials with JOSE (JWT) / COSE (CBOR)

Digital proof mechanisms, a subset of which are digital signatures, are required to ensure the protection of a verifiable credential. Having and validating proofs, which may be dependent on the syntax of the proof (for example, using the JSON Web Signature of a JSON Web Token for proofing a key h...

Updated: 2023-09-09 12 minute read

Tags:
COSE
IANA
JOSE
JWT
Verifiable Credentials
W3C

Verifiable Credentials - Literature, Comparisons, Explainer (W3C)

Verifiable credentials (VCs) are the electronic equivalent of the physical credentials that we all possess today, such as: plastic cards, passports, driving licenses, qualifications and awards, etc. The data model for verifiable credentials is a World Wide Web Consortium Recommendation, “Verifiab...

Updated: 2023-08-29 less than 1 minute read

Tags:
Claims and Credentials WG
Credentials Community Group
JSON-LD
VC-WG
Verifiable Credentials
W3C

Verifiable Credentials - Working Groups, Standards and Development

Verifiable credentials (VCs) are the electronic equivalent of the physical credentials that we all possess today, such as: plastic cards, passports, driving licenses, qualifications and awards, etc. The data model for verifiable credentials is a World Wide Web Consortium Recommendation, “Verifiab...

Updated: 2023-08-29 less than 1 minute read

Tags:
Claims and Credentials WG
Credentials Community Group
FIDO
JSON-LD
OAuth
VC-WG
Verifiable Credentials
W3C

Critique and Caution regarding Self Sovereign Identity

It is evident that our ongoing discussions about identity, ethics, bias, privacy and consent revolve around a lot of noise (opinions) but little signal (alignment), but why? Recognising that in 30 years of digital identity, we still lack coherent and coordinated action to make it work for everyon...

Updated: 2023-08-19 8 minute read

Tags:
Caution
Critique
Decentralized Identifiers
Verifiable Credentials

Decentralized Identifiers (DIDs) - W3C

A DID identifies any subject (e.g., a person, organization, thing, data model, abstract entity, etc.) that the controller of the DID decides that it identifies. In contrast to typical, federated identifiers, DIDs have been designed so that they may be decoupled from centralized registries, identi...

Updated: 2023-08-18 less than 1 minute read

Tags:
Credentials Community Group
DIDWG
DIF
Decentralized Identifiers
Evernym
FIMSA
ID2020
IETF
IIW
NIST
RWoT
SRI International
W3C

DID Methods - Various

DID methods are the magic ingredient that gives DIDs their flexibility. Before creating any specific DID, you first choose a DID method, which determines how you perform the create, read, update, and deactivate operations on a DID of that method. Once created, each DID includes the name of its me...

Updated: 2023-08-18 less than 1 minute read

Tags:
51nodes
ABT Network
Aergo
Alastria
ArcBlock
Ardor
BCGov
BIF
BOTLabs
BSC
Baidu
Besu
BiiLabs
Binance
Bitcoin
BlockchainCommons
Blockcore
Blocko
Blockstack
Celo
Ceramic Network
Chainyard
Cloudchain
Commercio
Consensys
Consent
Corda
Cosmos
Credentials Community Group
DID:AERGO
DID:ALA
DID:AVVCYBER
DID:BBA
DID:BID
DID:BNB
DID:BRYK
DID:BTCR
DID:CCP
DID:CELO
DID:COM
DID:CORDA
DID:DID
DID:DOCK
DID:DOGE
DID:ECHO
DID:ELASTOS
DID:ELEM
DID:EMTRUST
DID:EOS
DID:ERC725
DID:ETHO
DID:ETHR
DID:EVAN
DID:FACTOM
DID:GATC
DID:GIT
DID:GITHUB
DID:GRG
DID:HEDERA
DID:HOLO
DID:ICON
DID:INDY
DID:IO
DID:ION
DID:IPID
DID:IS
DID:IWT
DID:JLINC
DID:JNCTN
DID:JOLO
DID:JWK
DID:KEY
DID:KILT
DID:KLAY
DID:LIFE
DID:META
DID:MOAC
DID:MORPHEUS
DID:NEAR
DID:NFT
DID:OBJECT
DID:OCKAM
DID:OMN
DID:ONION
DID:ONT
DID:OP
DID:ORB
DID:PANACEA
DID:PEER
DID:PISTIS
DID:PKH
DID:PTN
DID:SAN
DID:SCHEMA
DID:SELFKEY
DID:SIGNOR
DID:SIRIUS
DID:SOV
DID:STACK
DID:TAG
DID:TANGLE
DID:TRUSTBLOC
DID:TRX
DID:TTM
DID:TWIT
DID:TYRON
DID:TYS
DID:TZ
DID:UNDID
DID:UNISOT
DID:UNS
DID:V1
DID:VAA
DID:VAULTIE
DID:VID
DID:VVO
DID:WEB
DID:WLK
DID:WORK
Decentralized Identifiers
Digital Bazaar
Dock
EOS
ERC725
Echo
Elastos
Element
Email
Ethereum
Evan Network
Evernym
Fabric
Factom
GRGBanking
Gatica
Github
GrgChain
Halialabs
Hashgraph
Holochain
Hydra
Hyland Credentials
IBM
ICONLOOP
IIW
ION
IOP
IOTA
IPFS
Indy
InfoWallet
IoTeX
JLinc
JWK
Jnctn
Jolocom
KILT
Klaytn
MOAC
MediBloc
Metadium
Microsoft
NEAR
Ocean Protocol
Ockam
OmniOne
Ontology
Panacea
ProximaX
Quorum
RChain
RWoT
Raonsecure
SecureKey
SelfKey
SelfKey Identity
Sovrin
Sovrin Foundation
SpaceElephant
Sphereon
SpruceID
Swisscom
TIFAC-CORE
TMChain
TOR
TRON
Teleinfo CAICT
Token.TM
TranSendX
Transmute
Twitter
UNISOT
UNS
VP
Vaultie
VeramoLabs
Veres One
Vivvo
W3C
Weelink
Workday
YLZ Inc
Zilliqa
bryk
cryptonics
hyperledger foundation
lifeID
uPort

We Are Open Cooperative

We’re a collective of independent thinkers and makers helping charities, ethical companies, government departments and educational institutions with sensemaking and digital transformation.

Updated: 2023-08-13 6 minute read

Tags:
Accredible
BCdiploma
Badge List
BadgeCollect
BadgeFactor
BadgeOS
Badgecraft
Badgetree™
Bestr
CanCred.ca
Canvas Credentials
Credly
ForAllRubrics
HPass
Hyland Credentials
Keep Badges Weird
Milestone
NOCTI
Open Badge Factory
Open Badges
Open Recognition
Openbadges.me
Participate
RedCritter
Sertifier
VerifyEd
We are Open

OpenID Connect - OpenID Foundation

OpenID Connect 1.0 is a simple identity layer on top of the OAuth 2.0 protocol. It enables Clients to verify the identity of the End-User based on the authentication performed by an Authorization Server, as well as to obtain basic profile information about the End-User in an interoperable and RES...

Updated: 2023-08-13 less than 1 minute read

Tags:
Auth0
DIF
IETF
Identiverse
OpenID
OpenID Connect
OpenID Japan
Sphereon
SpruceID
Ubisecure

OpenID Foundation

Founded in 2007, the OpenID Foundation (OIDF) is a global open standards body committed to helping people assert their identity wherever they choose. We are global vibrant community where identity peers and thought leaders convene to craft the identity ecosystems of tomorrow.

Updated: 2023-08-12 7 minute read

Tags:
GAIN
Open Banking
OpenID
SSE
Standards Development Org

Linux Foundation Public Health (LFPH) and the Cardea Project

There is no question that the community’s contributions during the height of the pandemic provided enormous benefit – possibly even life-saving. LFPH has represented a unique opportunity for the tech community to start collaborating around an urgent global health need, and we look forward to the ...

Updated: 2023-08-12 4 minute read

Tags:
Cardea
Covid 19
ESSIF
GCCN
Healthcare
Hyperledger Labs
LFPH
Linux Foundation
Public Health Advisory Council
TRAIN

The ID2020 Alliance

The ability to prove who you are is a fundamental and universal human right. Because we live in a digital era, we need a trusted and reliable way to do that both in the physical world and online.

Updated: 2023-08-12 9 minute read

Tags:
Accenture
BLOK
DIAL
FHI360
Gavi
ICC
ID2020
Ideo
Kiva
Mastercard
Mercy Corps
Microsoft
National Cybersecurity Center
Panta Transportation
RWoT
Rockefeller Foundation
Simprints
UC Berkeley
hyperledger foundation
iRespond

Web5: A Decentralized Web Platform

TBD’s open source platform enables developers to build products and services on technologies. We believe an open source model will win in a decentralized, world. TBD’s strategy: build open source, collaborate with the community, and invest in the as a public good to advance the state of decentral...

Updated: 2023-07-05 4 minute read

Tags:
Block
DWeb
GLEIF
TBD
Web3
Web5

Centre Consortium and Verite

We began by launching US Dollar Coin (USDC), a fiat-backed stablecoin and now the second largest stablecoin on the market. The standards we laid out for USDC provide a layer of trust and transparency so that users can operate with security and confidence as we enter a new world of digital payments.

Updated: 2023-07-03 2 minute read

Tags:
Centre
Coinbase
Policy
Web3

Credentials Community Group - W3C

explore the creation, storage, presentation, verification, and user control of credentials. We focus on a verifiable credential (a set of claims) created by an issuer about a subject—a person, group, or thing—and seek solutions inclusive of approaches such as: self-sovereign identity; presentatio...

Updated: 2023-07-03 2 minute read

Tags:
Credentials Community Group
Decentralized Identifiers
ECDSA Cryptosuite v2019
ECDSA Cryptosuite v2020
JWS
Standards Development Org
Tracability
Verifiable Credentials
W3C

Global Legal Entity Identifier Foundation - GLEIF

Established by the Financial Stability Board in June 2014, the Global Legal Entity Identifier Foundation (GLEIF) is tasked to support the implementation and use of the Legal Entity Identifier (LEI). The foundation is backed and overseen by the LEI Regulatory Oversight Committee, representing publ...

Updated: 2023-07-03 10 minute read

Tags:
Amazon
CFCA
Contour
DIZME
DigiCert
Entrust Datacard
Evernym
GLEIF
Government
ICAI India
InfoCert
Policy
RapidLEI
Serto
Standards Development Org
SwissSign
Ubisecure
Verifiable Credentials

The Future of Digital Identity with Self Sovereign ID

Enables sovereignty for individuals over their digital assets and credentials -such as digital passports, digital diplomas, digital property titles, and tokenized currencies such as dollar, euro, pound, or pesos- using digital wallets that can take the form of a mobile app.

Updated: 2023-07-02 4 minute read

Tags:
Future

Interoperability of Self Sovereign Identity Systems

Interoperability moves from theory to reality when companies have meaningful ability to choose. It is predicated on open standards foundations that enable easy movement of data and vendors.

Updated: 2023-07-02 5 minute read

Tags:
Aries
DHS
Danube Tech
INTABA
Indicio
Interop
Open Badges
Transmute

Governments and Decentralized Identity

Modern identity and access management (IAM) came into focus during the late 1930s, when a group of European countries began issuing national ID cards. During this time, creating a more systematic approach for establishing and authenticating the official use of trusted identities emerged.

Updated: 2023-07-02 13 minute read

Tags:
Africa
China
Global
Government
Japan
Korea
Latin America
Policy
Tokyo

Guardianship

Applying the developed models of guardianship, using the flexibility of Verifiable Credentials and the trusted mechanisms of sharing VCs, can provide the ability to add guardianship credentials into the travel process (or not) without breaking the existing approach and complicating the technical ...

Updated: 2023-07-02 4 minute read

Tags:
Delegation
Guardianship
Sovrin Foundation
Trust over IP

Trust over IP Foundation - TOIP

The mission of this Foundation is to simplify and standardize how trust is established over a digital network or using digital tools (whether online or disconnected). The goal is to create a safe and private space for all digital interactions—whether between individuals, businesses, governments, ...

Updated: 2023-07-02 9 minute read

Tags:
Avast
BCGov
Centre
GLEIF
Governance
Interop
KABN Network
OIX
Sovrin Foundation

Introduction to Decentralized Identity

The essence of Decentralized-ID is in creating open standards for a privacy preserving internet-wide identity layer — not owned by any one particular organization, but interoperable between all. It’s impossible to have a conversation about decentralized-id without discussing blockchain, self sove...

Updated: 2023-07-01 8 minute read

Tags:
101
Decentralized Identifiers
Verifiable Credentials

Research, Literature, Reports related to Self Sovereign Identity

provides an overview of the SSI properties, focusing on an in-depth analysis, furthermore presenting a comprehensive collection of SSI properties that are important for the implementation of the SSI system.

Updated: 2023-07-01 18 minute read

Tags:
Literature
Resources

Trust Frameworks, Trust Registries, and Machine Readable Governance in Self Sovereign Identity

The trust infrastructure is concerned with the question of how and why the presented information can be trusted. It defines the rules for all stakeholders and enables legally binding relationships with the combination of governance frameworks, which are built on top of trust frameworks.

Updated: 2023-07-01 9 minute read

Tags:
Governance
Machine Readable Governance
Trust Frameworks
Trust Registries

Digital Wallets and Self Sovereign Identity

SSI and identity wallets will make it easier for citizens, organizations and governments to manage (digital) identities. It will make registrations and transactions across the internet private and secure. It will also make organizations more efficient and effective.

Updated: 2023-07-01 17 minute read

Tags:
User Experience
Wallets

Business [Value, Models, Practice] and Self Sovereign Identity

Self-Sovereign Identity not only presents an opportunity for businesses to build smarter, more secure, and more scalable relationships with customers; but it will enable them to completely rethink how they build trusted digital relationships from the ground up.

Updated: 2023-06-30 12 minute read

Tags:
Business
Markets
Trends

SSI Resources: Directories, Courses, Curated Lists, Blogs, Podcasts and more.

Digital networks have centralized power over identities and information, creating problems for both markets and democracy. Does the solution require more shared agency over data?  What might that look like?  This panel discussion is structured around thought experiments to find solutions to this ...

Updated: 2023-06-30 4 minute read

Tags:
Resources

Data Governance and Self Sovereign Identity

We should absolutely all be taking care of the data that belongs to us, our data that we create, that we have a right to be able to control and share exactly as we choose. But we should also bear in mind the power of that data to help each of us, every day, benefit from the good that can come whe...

Updated: 2023-06-29 14 minute read

Tags:
Data Governance

Personal Privacy and Self Sovereign Identity

But with challenges in the offing and platforms preparing to do battle, we must all support initiatives that support privacy and security, as well as the services that will bolster it. We must expect better and support the solutions that help us do better.

Updated: 2023-06-29 10 minute read

Tags:
Data Privacy
Privacy

Decentralization and Self Sovereign Identity

Decentralization is a commonly misunderstood concept. For example, it is sometimes said that the reason cryptonetwork advocates favor decentralization is to resist government censorship, or because of libertarian political views. These are not the main reasons decentralization is important.

Updated: 2023-06-29 4 minute read

Tags:
Decentralization

The Metaverse in Web3 and Self Sovereign Identity

the first thing you should know about the metaverse, even as it’s still emerging and being defined, is that the time to act is now. The metaverse is expected to contribute USD 3 trillion to global GDP by 2013 and customers will expect immersive and interactive activities and apps from your brand

Updated: 2023-06-28 7 minute read

Tags:
Ethereum
Metaverse
NFTs
Web 3

Non Fungible Tokens (NFT) and Soulbound Tokens (SBT)

avatars (the visualisation of self-sovereign identities) go beyond simply providing users with further ownership and control over their cryptographically secure identities, by offering an end-to-end application ecosystem designed to facilitate the commerce and exchange of digital and physical ser...

Updated: 2023-06-28 7 minute read

Tags:
Ethereum
NFTs
Soulbound Tokens
Web 3

Decentralized Finance, KYC and Self Sovereign Identity

Decentralized finance, or DeFi, is a cryptocurrency area that has recently been attracting significant attention. DeFi refers to financial services using smart contracts. These are automated enforceable agreements that do not need intermediaries, such as banks or lawyers, and use online blockchai...

Updated: 2023-06-28 4 minute read

Tags:
CeDeFi
DeFi
Ethereum
JPMorgan
KYC
KYC-Chain
Opulous
SelfKey
Web 3

Decentralized Autonomous Organizations (DAO) and Self Sovereign Identity

Because DAOs do not have a sovereign above them, and are often explicitly in the business of providing services (like currency and arbitration) that are typically reserved for sovereigns, it is precisely the design of sovereigns (political science), and not the design of corporate governance, tha...

Updated: 2023-06-28 3 minute read

Tags:
DAO
Ethereum
Web 3

United States Governments and Self Sovereign Identity

It would establish a task force to bring together key federal agencies with state and local government representatives to develop secure methods for government agencies to validate identity attributes to protect the privacy and security of individuals and support reliable, interoperable digital i...

Updated: 2023-06-28 17 minute read

Tags:
Austin
Data Privacy
Digital Immigration Credentials
FATF
FTC
IRS
Illinois
New York
Policy
Real World
USA
Utah
Verifiable Credentials
Web3
Wyoming

Web 3 and Self Sovereign Identity

Alice can have a credential issued for a particular purpose, store it in a personal data vault, and only authorize access to that credential when she consents to the interaction. Additionally, Alice controls this credential at all times and can present it to any requesting platform

Updated: 2023-06-27 9 minute read

Tags:
Atala PRISM
Citopia
Civic
Dominium
Elastos
Ethereum
Gitcoin
Web3

uPort: Veramo and Serto

In your application, you must first configure your uPort object with an identifier and a private key (or signer function). There are several ways to instantiate a credentials object. The most common approach is to save a DID and private key on a server for your application and create a credential...

Updated: 2023-06-27 8 minute read

Tags:
Alastria
Cheqd
Consensys
Credentials Community Group
DIDComm
DIF
ENS
Ethereum
GDPR
GLEIF
LACChain
LibP2P
Metamask
Onfido
PWC
Serto
Sphereon
Spherity
Switzerland
Veramo
Web3
Zug
uPort
uPortlandia

Web3 Explained

participation in governance, self-sovereign identity, content ownership and the freedom to build – are very appealing. In fact, it is hard to see how anybody (other than an incumbent with a turf to defend) could possible argue against any of them.

Updated: 2023-06-27 9 minute read

Tags:
Ethereum
Web3

Africa and Self Sovereign Identity

Three stages have been identified as necessities to accomplish the development of this system: 1. Biometric/demographic registration. 2. Interoperability and security hardening. 3. Biometric modality data analysis/organization/association.

Updated: 2023-06-27 7 minute read

Tags:
Africa
DIDx
Diwala
Farmer Connect
FlexID
GLEIF
Gravity Earth
Indy
Kiva
LEI
Onfido
Policy
Real World
Yoma

Ethereum and Decentralized Identity

Ethereum-based Decentralized Identity Specs, Literature, (d)Apps, and GitHub Repositories.

Updated: 2023-06-26 9 minute read

Tags:
3box
Consensys
ENS
ERC725
Ethereum
Ethereum Enterprise Alliance
Jolocom
Microsoft
Nuggets
OASIS
Serto
Sidetree
Sign in with ETH
Transmute
Veramo
Web3
uPort

Baseline Protocol • EEA Community Projects

The Baseline Protocol is an open source initiative that combines advances in cryptography, messaging, and blockchain to execute secure and private business processes at low cost via the public Ethereum Mainnet. The protocol will enable confidential and complex collaboration between enterprises wi...

Updated: 2023-06-26 4 minute read

Tags:
Chainlink
Consensys
Enterprise Ethereum Alliance
Ernst & Young
Ethereum
Ethereum Foundation
Limechain
Microsoft
OASIS
Provide
Unibright
Web 3

Ceramic - 3box

Designed to be cross-platform and highly configurable, IDX is compatible with all blockchains, wallets, and a wide variety of user and application data storage options including Ceramic, Textile, OrbitDB, Filecoin, IPFS, and Secure Data Stores — so you can seamlessly integrate decentralized ident...

Updated: 2023-06-25 8 minute read

Tags:
3box
Ceramic
DAO
DIF
ENS
Ethereum
Gitcoin
IPID
Web3
Web3Connect
oCap
revocation
uPort

Consensys

ConsenSys is the leading Ethereum software company. We enable developers, enterprises, and people worldwide to build next-generation applications, launch modern financial infrastructure, and access the decentralized web. Our product suite, composed of Infura, Quorum, Codefi, MetaMask, and Diligen...

Updated: 2023-06-25 4 minute read

Tags:
Consensys
DIF
DeFi
Ethereum
ID2020
RWoT
Web3
Zug
uPort
uPortlandia

Bitcoin and Self Sovereign Identity (ION + BTCR)

ION does not rely on centralized entities, trusted validators, or special protocol tokens – ION answers to no one but you, the community. Because ION is an open, permissionless system, anyone can run an ION node, in fact the more nodes in operation, the stronger the network becomes.

Updated: 2023-06-25 7 minute read

Tags:
BTCR
Bitcoin
Blockchain
History
ION
Microsoft
RWoT
XDI

Principles and Characteristics of Self Sovereign Identity

There are a few different ways to approach and describe SSI. What I aim to do is come up with a list of different “SSI Cases” to modularize the treatment of the subject. This will allow each to contribute in the way that makes most sense for themselves, rather than trying to discuss SSI as a whol...

Updated: 2023-06-24 11 minute read

Tags:
History
Laws of Identity
Literature
RWoT
Self Sovereign Identity
UNSDGs
Windhover Principles
lifeID
notes

System Architecture and Self Sovereign Identity

In chaotic systems such as those that the discipline of physics seeks to describe, there is also the concept of the “self-organizing principle,” which dictates a tendency for chaotic systems to organize themselves. While this might be a tendency in physics, organization usually needs a nudge in t...

Updated: 2023-06-23 5 minute read

Tags:
Architecture

Ethics, Human Rights, Sovereignty and Self Sovereign Identity

In a world that is becoming more digital, it is relevant to find some guidelines for organizations to design digital identity more ethically. A universal identity system on the internet is still missing and there are no clear standards for organizations to design digital identity.

Updated: 2023-06-23 8 minute read

Tags:
Ethics
Human Rights
Sovereignty

User Experience and Self Sovereign Identity

Lack of great user experiences is often raised as one of decentralized identity’s (and public blockchain’s) missing ingredients for ubiquitous adoption. However to arrive at usable experiences across the industry, we first need to reach consensus around basic user personas and mental models, then...

Updated: 2023-06-23 7 minute read

Tags:
Relationships
User Experience

Self Sovereign Identity (SSI)

In a nutshell, Self-Sovereign Identity allows individuals to manage their own identities by moving physical credentials to digital devices. An individual will receive a credential from an issuer which will be stored in their digital wallet.

Updated: 2023-06-22 14 minute read

Tags:
Evernym
IIW
Laws of Identity
Learning Machine
RWoT
Self Sovereign Identity
Sovrin Foundation

Market signals, SSI trending, and the road to mainstream adoption.

Three years and one pandemic later, the demand for cryptographically secure, privacy-respecting and machine-verifiable electronic credentials has grown and, as a result, governments are starting to wake up to VC’s potential.

Updated: 2023-06-19 9 minute read

Tags:
Adoption
Trends

LFPH and Covid-19: CCI and Good Health Pass

After initial success with deploying exposure notification apps, LFPH started to host CCI in December 2020 to advance the use of Verifiable Credentials (VCs) and data and technical interoperability of VCs in the public health realm, starting with vaccine credentials.

Updated: 2023-06-18 11 minute read

Tags:
CCI
Cardea
Consensys Health
Dutch Research
Evernym
Good Health Pass
ID2020
LFPH
Linux Foundation
Luxoft
MedCreds
Microsoft
SITA
TNO
Vaccine Credentials
WHO
uPort

Covid-19, Vaccine Passports, Health Credentials, and Self Sovereign Identity

In a lot of places around the world, a COVID passport is simply a paper document. This has led to a couple of expected problems, one to mention is forgery. Paper documents can easily be forfeited, and paper-based COVID passports are no exception.

Updated: 2023-06-18 27 minute read

Tags:
CCI
Digi.me
EU Digital Green
Excelsior Pass Pluss
Good Health Pass
LFPH
Real World
SITA
Vaccine Credentials
WHO

SSI Use-Cases

The general problem statement here is, as you will have noticed, not about proving who you are but about proving what you are. I need to know you have a line of credit, a pilot’s licence or a diploma from a top ten dental school. I do not care who you are

Updated: 2023-06-18 20 minute read

Tags:
Banking
Bots
Business
Career
Climate
Content Attribution
Energy Systems
Events
Gaming
IAM
Loyalty Programs
Property Management
Reputation
Security
Workplace

Supply Chains and Self Sovereign Identity

The digital and physical world are merging more than ever before. As the supply chain becomes more ‘phygital,’ innovative ways of sharing data – like using verifiable credentials – are helping to build more trust with data along the supply chain.

Updated: 2023-06-18 4 minute read

Tags:
GS1
SAP
Supply Chain
Transmute
UNECE
USCBP

MyData

We are entrepreneurs, activists, academics, listed corporations, public agencies, and developers. For years, we’ve been using different words for what we do – MyData, Self Data, VRM (Vendor Relationship Management), Internet of Me, PIMS (Personal Information Management Services) etc, while sharin...

Updated: 2023-06-18 14 minute read

Tags:
AI
Avast
Cozy Cloud
DKMS
Data Governance
GDPR
JLinc
Meeco
MyData
MyDex
OAuth
Verifiable Credentials
eIDAS

Internet of Things (IOT)

Safety and security rests with all involved in authorizing updates, how and when they are applied as well as the right to repair when Things are no longer officially supported. Shared device lifecycle assurance is the basis for verifiable service histories of Things which give data provenance. Wh...

Updated: 2023-06-17 12 minute read

Tags:
Caution
Digital Twin Consortium
Digital Twins
European Commission
IOT
ITN
LFPH
MOBI
Microsoft
Peaq
Sophie Project
Venafi

Education and Self Sovereign Identity

Since most of the educational institutes were facing security crises, new challenges are added to the security system to identify and manage the users’ access to these platforms.The most relevant challenges include but not limited to, legacy identity infrastructure, student lifecycle and users ac...

Updated: 2023-06-16 6 minute read

Tags:
ACE
Azure
DIF
Digitary
Education
Evernym
Fluree
IDRamp
Microsoft
Open Badges
RMIT
Real World
Velocity Network

KYC\AML and Self Sovereign Identity

traditional KYC/AML practices can give way to a more practical framework, where businesses can remain compliant with regulations and collect data without threatening privacy, data security, and breaching data laws.

Updated: 2023-06-16 2 minute read

Tags:
Compliance
Cryptocurrency
KYC
Real World
eKYC

Travel and Self Sovereign Identity

Over time the evolution of DID/SSI is likely to be a travel industry game-changer, enabling travelers to manage their own personal information to maximize personal economic effect and protect personal privacy.

Updated: 2023-06-16 6 minute read

Tags:
Apple
IATA
TOIP
TSA
Travel

Healthcare and Self Sovereign Identity

Most healthcare organizations are and should be, focused on their core business pursuits, such as patient care or processing insurance claims. Information security and identity management is not their core business, yet is a critical factor in compliant, secure business operations.

Updated: 2023-06-16 8 minute read

Tags:
Affinidi
DIZME
Dock
Evernym
Gravity Earth
Healthcare
LFPH
Real World
SMART

European Digital Identity and SSI

By using the European Digital Identity, the user only has to select the necessary documents that are stored locally on his digital wallet to reply to the bank’s request. Then, verifiable digital documents are created and sent securely for verification to the bank, who can then continue with the a...

Updated: 2023-06-15 17 minute read

Tags:
Aries
Catalonia
EBSI
ESSIFlab
EU
Ethereum
Europe
Finland
Germany
IDUnion
Indy
Netherlands
Policy
Spain
Verifiable Credentials
W3C
Zug
eIDAS
uPort

Humanitarian Aid

When forced to flee your home from one moment to the next, grabbing birth certificates, school diplomas, and other papers that prove you are who you say you are might not be the first thing that comes to mind. And without those credentials, everything is more difficult when it comes to starting a...

Updated: 2023-06-15 13 minute read

Tags:
Affinidi
Aid:Tech
Avast
Berkman Klein
Biometrics
GlobalID
Gravity Earth
Human Rights
Humanitarian
Inclusion
Onfido
Trinsic
Tu Delft
Ukraine
World Bank
iRespond

Hyperledger Ursa

Hyperledger Ursa is a shared cryptographic library, it enables implementations to avoid duplicating other cryptographic work and hopefully increase security in the process. The library is an opt-in repository (for Hyperledger and non Hyperledger projects) to place and use crypto. Hyperledger Ursa...

Updated: 2023-06-12 1 minute read

Tags:
ACM
Bitwise
DFINITY
Evernym
Fujitsu
Intel
Kiva
Linux Foundation
Sovrin Foundation
State Street
Ursa
Web3

Hyperledger Indy

Hyperledger Indy provides tools, libraries, and reusable components for providing digital identities rooted on blockchains or other distributed ledgers so that they are interoperable across administrative domains, applications, and any other silo. Indy is interoperable with other blockchains or c...

Updated: 2023-06-12 8 minute read

Tags:
ATB
Accenture
Adoption
Anoncreds
Aries
Blockchain
CULedger
Cisco
Consensys
Ethereum Enterprise Alliance
Evernym
Hyperledger Foundation
IBM
IOT
IOTA
Indy
MyData
RDF
Sovrin Foundation
Truu
Tykn
UNSDGs
Ursa
Verifiable Organizations Network

Hyperledger Aries

One of the architectural components of Indy is called an Agent. This is software that acts on behalf of an identity owner to communicate off-ledger with other Agents. As Agent work continued with the development of message encryption standards, extensible message typing, and common protocols, int...

Updated: 2023-06-12 7 minute read

Tags:
Aries
Bitcoin
Blockchain
DKMS
Indy
Verifiable Organizations Network

Hyperledger Foundation

Hyperledger began in 2015 when many different companies interested in blockchain technology realized they could achieve more by working together than by working separately. These firms decided to pool their resources and create open-source blockchain technology that anyone could use. These far-s...

Updated: 2023-06-12 10 minute read

Tags:
Aries
Ayanworks
BTP
Blinking
Education
Enterprise Ethereum Alliance
Evernym
Fabric
Global
HealthDigit
Indy
Linux Foundation
Microsoft
Oracle
Salesforce
Sawtooth
SecureKey
Sony
Sovrin Foundation
T-Mobile NEXT Identity
Ursa
agreementsolutions

Decentralized Identity Foundation - DIF

A key piece of the decentralized identity equation is how people, organizations, and devices can be identified and located without centralized systems of identifiers (e.g. email addresses). DIF members are actively working on protocols and implementations that enable creation, resolution, and dis...

Updated: 2023-06-12 6 minute read

Tags:
Affinidi
Anonyome Labs
ArcBlock
Aries
Auth0
BCGov
BOTLabs
Beijing Teleinfo Technology
Blockchain
Blockchain Foundry
Blockpass
Blockstack
Bloom Protocol
Burrata
CU Ledger
Centre
Claims and Credentials WG
CollaboGate
Condatis
Consensys Mesh
Credivera
Cybavo
Cyber Securiteam
DIDAuth WG
DIDComm WG
DIF
Danube Tech
Diwala
Earth ID
Enterprise Ethereum Alliance
Fennel Labs
Finema
GS1
Gen Digital
Genoo
Hedera
Hiro
IBCT
ID Ramp
Identifiers and Discovery WG
Identity.com
Infra Blockchain
Input Output
Interac
Interop WG
Iuncta
Keyless
Litentry
Magic Labs
Mattr
Meeco
Metadium
Microsoft
Monokee
Nayuta
Neosfer
Nest(R)
NuID
Nymlab
OneSpan
PassiveBolt
Ping Identity
Polygon Labs
Portabl
Proxy
Qikfox
Resiliant
Sezoo
Silence Laboratories
Sphereon
SpruceID
Standards Development Org
Storage and Compute WG
Superlunar
Switchchord
Taqanu
The Humanized Internet
Torus Labs
Transmute
Trinsic
Trudenty
UNIFY Solutions
UniWorld
Universal Resolver
Validated ID
VelocityCareer Labs
WeBank
Web3 Labs
Workday
YellowDotPink
ceramic
civic
dock
extrimian
iDAKTO
iden3
myDid
nuggets

Sidetree Working Group - DIF

Architecturally, Sidetree-based DID Method implementations are overlay networks composed of independent peer nodes (Sidetree nodes) that interact with an underlying decentralized anchoring system (as illustrated under Network Topology) to write, observe, and process replicated DID PKI state opera...

Updated: 2023-06-12 3 minute read

Tags:
DIF
ION
Sidetree

The Sovrin Foundation

The Sovrin Foundation is a private-sector, international non-profit that was established to govern the world’s first self-sovereign identity (SSI) network.

Updated: 2023-06-12 15 minute read

Tags:
ABSA Group
ATB Financial
Anonyome Labs
Axuall
AyanWorks
Bloqzone
CPQD
Certizen
Condatis
DIDx
DKMS
Danube Tech
Desert Financial Credit Union
Deutsche Telekom AG
Dhiway
Digicert
Evernym
Fetch.ai
Finicity
GDPR
Humanitarian
ID Crypt Global
Indy
InfoCert
MakoLab
Monokee
NEC
OAS Staff Federal Credit Union
One Global
Outlier Ventures
Perkins Coie
ProSapien
RIDDLE&CODE
Regio iT
Royal Credit Union
SICPA
SITA
Sovrin Foundation
The Institute for Internet-Security
Trinsic
Trust Framework
Truu (ID)
Unveil.Social
Veridium
Verifiable Credentials
Verifiable Organizations Network
W3C
esatus AG
iRespond

Identifiers & Discovery Working Group - DIF

Members of the Working Group are engaged in development of protocols and systems that enable creation, resolution, and discovery of decentralized identifiers and names across underlying decentralized systems, like blockchains and distributed ledgers.

Updated: 2023-06-11 8 minute read

Tags:
BTCR
DID:PEER
DIF
Decentralized Identifiers
ERC725
Ethereum
ION
Identifiers and Discovery WG
JSON-LD
Linked Data
Universal Registrar
Universal Resolver

(DID) Authentication Working Group - DIF

The purpose of this working group is to design, recommend and implement authentication and authorization protocols that rely upon open standards and cryptographic protocols using DIDs and DID Documents. Recommendations and development of specifications, protocols, and formats for data structures ...

Updated: 2023-06-11 4 minute read

Tags:
Aries
BCGov
DIDAuth
DIDAuth WG
DIDComm
DIF
Decentralized Identifiers
SOIP
W3C

Secure Data Storage WG - DIF

Secure, encrypted, privacy-preserving storage and computation of data is a critical component of decentralized identity systems. As with identifiers and names must be self-sovereign to the owning entity, a user’s identity data must remain private, only accessible to the entities they allow. DIF m...

Updated: 2023-06-11 1 minute read

Tags:
DIF
Data Hubs
Encrypted Data Vaults
Secure Data Storage
Storage and Compute WG
W3C

California: SSI, Policy, Blockchain, and Vaccine Records

The California Consumer Privacy Act of 2018 (CCPA) gives consumers more control over the personal information that businesses collect about them. This landmark law secures new privacy rights for California consumers, including: - The right to know about the personal information a business collect...

Updated: 2023-06-10 9 minute read

Tags:
CCPA
CPRA
California
Covid 19
IAB
IAPP
Policy
SMART Health Card
Trust Framework
USA

Data Governance Act

EU DATA ACT – MAKING DATA PORTABILITY ACTIONABLE 2022-02-25 MyData

Updated: 2023-06-10 4 minute read

Tags:
Data Governance Act
EU
Europe
MyData
Policy

Governments of Canada

“The adoption of the self-sovereign identity model within the Canadian public sector is still being realized in 2020. It is too early to tell how it will change the technological infrastructure or the institutional infrastructure of Canadian public services.”

Updated: 2023-06-10 7 minute read

Tags:
Alberta
Canada
DIACC
Ontario
PCTF
Policy
Real World
Saskatchewan
UCVDCC
Verifiable Credentials

The Pan Canadian Trust Framework

“The Treasury Board Secretariat of Canada (TBS) and Shared Services Canada (SSC) are seeking a standardized method to issue and rapidly verify portable digital credentials across many different contexts, thereby reducing human judgement error, increasing efficiency and ensuring digital credential...

Updated: 2023-06-09 6 minute read

Tags:
Canada
DIACC
PCTF
Policy
Trust Framework
Verifiable Credentials

Blockchain and Self Sovereign Identity

Traditional identity systems typically suffer from single points of failure, lack of interoperability, and privacy issues such as encouraging mass data collection and user tracking. Blockchain technology has the potential to support novel data ownership and governance models with built-in control...

Updated: 2023-06-09 6 minute read

Tags:
Authenteq
Civic
Datum
Identiverse
Microsoft
NIST
ProCivis

BCGov - Government of British Columbia Canada

“Digital technologies are transforming the way British Columbians live, work and play. To meet their changing expectations, government’s transformation is also underway. It’s about using modern tools and technologies to deliver the services people want and maximizing the power of data to improve ...

Updated: 2023-06-09 7 minute read

Tags:
Aries
Canada
IIW
Indy
Orgbook
Policy
Real World
Trinsic
Trust Framework
Trust over IP
Verifiable Organizations Network
W3C

PICOs: Persistent Compute Objects

every pico is serverless and cloud-native, presenting an API that can be fully customized by developers. Because they’re persistent, picos support databaseless programming with intuitive data isolation. As an actor-model programming system, different picos can operate concurrently without the nee...

Updated: 2023-06-09 3 minute read

Tags:
IOT
PICO

Biometrics and Self Sovereign Identity

Instead of putting PII and biometrics in the same database, we need to put them in different places, but prove that there’s a link between the holder of a biometric cred and the holder of other PII.

Updated: 2023-06-09 4 minute read

Tags:
Biometrics

Switzerland

The preliminary draft of the federal law declared the purpose of the E-ID to be to ensure “secure identification by means of E-ID among private individuals and with authorities”. The protection of the personality and fundamental rights of individuals is to be provided by the following principles

Updated: 2023-06-09 4 minute read

Tags:
Europe
Policy
Switzerland

United Kingdom

The government is committed to realising the benefits of digital identity, without creating ID cards. Earlier this year we published a draft of the UK digital identity and attributes trust framework. This document sets out what rules and standards are needed to protect people’s sensitive identity...

Updated: 2023-06-09 7 minute read

Tags:
Digital Staff Passport
Europe
NHS
Policy
Real World
UK

European Blockchain Services Infrastructure (EBSI) and the eSSIF

The European Blockchain Services Infrastructure aims to deliver EU-wide cross-border digital public services using blockchain technology. The EBSI will materialize as a network of distributed nodes across Europe (the blockchain), leveraging an increasing number of applications focused on specific...

Updated: 2023-06-09 7 minute read

Tags:
CIMEA Naric
DXCTechnology
Danube
EBSI
ESSIF
EU
Education
Europe
GDPR
Identyum
Interop
Policy
Real World
Thales
VIDChain
ValidatedID
Walt ID

NGI - ESSIF Lab

The context of the eSSIF-Lab vision can be found in articles 8-10 of the European Convention on Human Rights (ECHR), that state the rights of individuals regarding their privacy, and their freedoms to collect, process, store, and express information in a self-sovereign fashion, i.e. in a way that...

Updated: 2023-06-08 11 minute read

Tags:
EBSI
ESSIF
EU
Europe
GDPR
Interop
NGI
eIDAS

eIDAS - European Electronic Identification and Trust Services

This Regulation seeks to enhance trust in electronic transactions in the internal market by providing a common foundation for secure electronic interaction between citizens, businesses and public authorities, thereby increasing the effectiveness of public and private online services, electronic b...

Updated: 2023-06-08 17 minute read

Tags:
EU
EUDI Framework
EUDI Wallet
Europe
Policy
Trust Framework
eIDAS
eIDAS Bridge
eIDAS2

Australia

There is a lot more work to be done and plenty of consultations to undertake, but we understand that as we increasingly rely on digital technology as part of our everyday lives, the government has a responsibility to ensure we can offer a digital ID system that is voluntary, efficient and meets p...

Updated: 2023-06-07 3 minute read

Tags:
Australia
Australian Payments Network
Policy

Digital Identity New Zealand

Our government is embarking on a journey to create A Digital Strategy for Aotearoa that seeks to respond to the social, economic, education and cultural opportunities from digital technology, along with the risks that these technologies can bring.

Updated: 2023-06-07 4 minute read

Tags:
Aotearoa
DINZ
DISTF
New Zealand
Policy

India

Another functional question that needs to be resolved concerns how we communicate the value of data stewardship as an ideal, and relatedly the value of data itself. Given the unequal relationships between technology companies and people, the fact that data is a valuable resource that can be used ...

Updated: 2023-06-07 5 minute read

Tags:
Aadhaar
Hyperledger
India
Orgbook
Policy

Welcome to Decentralized-ID.com!

What began as a collection of links in a README file on GitHub, has grown to become the single largest web-directory of information related to Self Sovereign Identity.

Updated: 2023-06-07 1 minute read

Tags:

Zug ID

Zug leveraged uPort, a decentralized identity platform to create the world’s first live implementation of a self-sovereign government-issued identity project on the Ethereum blockchain, along with the city of Zug, the Institute for Financial Services Zug (IFZ) of the Lucerne University, along wit...

Updated: 2023-06-05 7 minute read

Tags:
Aries
Consensys
Crypto Valley Association
Ethereum
Europe
Policy
ProCivis
Real World
Switzerland
Zug
uPort

Digital Identification and Authentication Council of Canada - DIACC

The Digital Identification and Authentication Council of Canada, known as the DIACC, is a non-profit coalition of public and private sector leaders committed to developing a Canadian framework for digital identification and authentication. The framework is intended to enable Canadians to complete...

Updated: 2023-06-05 26 minute read

Tags:
100101075
1Kosmos
2Keys
ATB
Affinity Credit Union
Applied Recognition
Arucc
Auth0
BCGov
BMO
Boloro
C1
CCUA
CDIC
Canada
Canada Health Infoway
Canadapost
Celero
Cibc
Convergence
DI
DIACC
Desjardins
Digidentity
Equifax
Equitable Bank
FIDO
Folio
ForgeRock
Gambit
Get Group
Hypersecu
IBM
IDC2018
ISO 18013-5
IdentityNorth
Identos
In fidem
In-Sec-M
Ingenico
Interac
Jumio
LD
Libro
Ltsa
Manulife
Mastercard
Mavennet
Modohr
Newbruns
Northern Block
Notarius couleur
OARO
One span
Onfido
Ontairo
Outlier
PCTF
Payments Canada
Peer Social
PlaceSpeak
Plurilock
Policy
Pragma
Prodigy
Quartech
RBC 1
Safran
Saskatchewan
SecureKey
Securefact
Simeio
Smart species
Stash
Supercluster
Td
Telus
TreeFort
Trulioo
Trust Framework
UXP Systems
Vallid
Vancity
Vivvo
Vlinder
Worldreach
Yoti
iComply
iProov

Exchange Protocols - CHAPI, VC Api, WACI…

data model and HTTP protocols to issue, verify, present, and manage data used in such an ecosystem.

Updated: 2023-06-03 less than 1 minute read

Tags:
Bloom
CHAPI
Credentials Community Group
DIF
Human Colossus Foundation
TrustBloc
VC Api
WACI
hyperledger foundation

KERI - Key Event Receipt Infrastructure

An identity system based secure overlay for the Internet is presented. This includes a primary root-of-trust in self-certifying identifiers. It presents a formalism for Autonomic Identifiers (AIDs) and Autonomic Namespaces (ANs). They are part of an Autonomic Identity System (AIS). This system us...

Updated: 2023-06-03 less than 1 minute read

Tags:
DIF
DKMI
GLEIF
KERI
RWoT

Mobile Drivers License (mDL - ISO 18013)

This document establishes interface specifications for the implementation of a driving licence in association with a mobile device. This document specifies the interface between the mDL and mDL reader and the interface between the mDL reader and the issuing authority infrastructure.

Updated: 2023-06-03 less than 1 minute read

Tags:
AAMVA
Digital Bazaar
IETF
INATBA
Kantara Initiative
MATTR
Procivis
SpruceID
iso-18013
mDL

DID Communications (DIDComm) - DIF

Produce one or more high-quality specs that embody a method (“DIDComm”) for secure, private and (where applicable) authenticated message-based communication, where trust is rooted in DIDs and depends on the messages themselves, not on the external properties of the transport(s) used. The method m...

Updated: 2023-06-03 less than 1 minute read

Tags:
Animo
Anonyome
Aries
Aviary
BCGov
Centre
ConsenSys
DIDComm
DIDComm WG
DIF
DSR
Danube Tech
Decentralized Identifiers
Evernym
Hyperledger Foundation
Indicio
Jolocom
MATTR
Microsoft
SICPA
SecureKey
TBD
Transmute
W3C
uPort

World Wide Web Consortium - W3C

First started as an IETF application area at the beginning of 1990, the Web standard stack, given its foreseen volume and applicative nature on top of the Internet protocols, quickly spun off its own forum. The W3C then laid the foundations of the Web with the development of HTML 4 and XML at the...

Updated: 2023-06-03 less than 1 minute read

Tags:
BTCR
Credentials Community Group
Decentralized Identifiers
JSON-LD
Linked Data
Standards Development Org
Veres One
Verifiable Credentials
W3C
WebAuthN

Blockcerts

Blockcerts is an open standard for building apps that issue and verify blockchain-based official records. These may include certificates for civic records, academic credentials, professional licenses, workforce development, and more. Blockcerts consists of open-source libraries, tools, and mobile...

Updated: 2023-06-02 less than 1 minute read

Tags:
BTCR
Bitcoin
Blockcerts
DHS
DID
Ethereum
JSON-LD
Learning Machine
RWoT
Verifiable Credentials

Linked Data and the Semantic Web

The idea behind these principles is on the one hand side, to use standards for the representation and the access to data on the Web. On the other hand, the principles propagate to set hyperlinks between data from different sources.

Updated: 2023-06-02 less than 1 minute read

Tags:
JSON-LD
Linked Data
RDF
RSA
Solid
Veres One
W3C

Web Standards and the Emerging Decentralized ID Stack

If you’re willing to put up with a lot of work for incremental improvements then step up and join a standard. Whether that is a (relatively) fast moving standard group like OASIS (www.oasis-open.org) or a slower but more international group like ISO you will learn. You’ll also benefit from workin...

Updated: 2023-06-01 less than 1 minute read

Tags:
Blockcerts
Credentials Community Group
DKMS
ERC725
Ethereum
FIDO
JSON-LD
Learning Machine
OASIS
OAuth
OIDC
OpenID
RWoT
Schema.org
Verifiable Credentials
W3C
XDI
hyperledger foundation

Object Capability Model

Computer scientist E. Dean Tribble stated that in smart contracts, identity-based access control did not support well dynamically changing permissions, compared to the object-capability model. He analogized the ocap model with giving a valet the key to one’s car, without handing over the right to...

Updated: 2023-05-22 less than 1 minute read

Tags:
Cosmos
JSON-LD
oCap
zCap

GS1 - The Global Language of Business

Gs1 introduced the barcode in 1974. We are a global, neutral, non-profit standards organisation that brings efficiency and transparency to the supply chain. Our standards are proven by industry and can help you achieve your public policy goals. Designed by consensus, our standards are proven, ope...

Updated: 2023-05-20 less than 1 minute read

Tags:
Barcode
Digital Link
Digital Signatures
Enterprise
GS1
Global Standards Management Process
Healthcare
KERI
RFID
Supply Chain

WebAuthN - W3C

The Web Authentication Working Group will develop recommendation-track specifications defining an API, as well as signature and attestation formats which provide an asymmetric cryptography-based foundation for authentication of users to Web Applications. Overall goals include obviating the use of...

Updated: 2023-05-19 less than 1 minute read

Tags:
FIDO
Microsoft
Stranger Labs
W3C
WebAuthN

JSON-LD - W3C

The Semantic Web isn’t just about putting data on the web. It is about making links, so that a person or machine can explore the web of data. With linked data, when you have some of it, you can find other, related, data Like the web of hypertext, the web of data is constructed with documents on...

Updated: 2023-05-19 less than 1 minute read

Tags:
Credentials Community Group
Digital Bazaar
JSON-LD
Linked Data
RDF
Schema.org
Veres One
Verifiable Credentials
W3C

Spruce Systems

SpruceID is an ecosystem of open source libraries to enable user-controlled identity anywhere. Kepler is a decentralized storage system that uses smart contracts to define where your data live and who has access. Enable reusable identity verifications across social media, DNS and more. Enable use...

Updated: 2023-03-31 less than 1 minute read

Tags:
Credible
DID:TEZOS
DIDKit
ENS
Enterprise
Ethereum
Ethereum Foundation
FIDO2
Graph Hack 2022
Kepler
OpenID Connect
Rebase
Sign in with ETH
Tezos
TreeLDR
USA
Web3

Spherity

Spherity’s Digital Twins enable innovative customer journeys across mobility, supply chain transparency, risk assessment, audit trails for data analytics, and many more use cases.Our developers and systems designers combine years of deep research in the emerging decentralized identity space with ...

Updated: 2023-03-30 less than 1 minute read

Tags:
AI
Cloud Identity Wallet
Enterprise
EU
European Data Infrastructure
Healthcare
IDUnion
IOT
ISO 27001
Kuppinger Cole
Legisym
Ontology
Secure Digital Identity Association
Sovrin Steward
Supply Chain

MyDex

As a Community Interest Company we are legally committed to pursuing our mission of empowering individuals with their data. We are currently helping individuals and service providers use Personal data to better manage chronic health conditions, access debt advice, improve independent assisted liv...

Updated: 2023-03-30 less than 1 minute read

Tags:
Data A New Direction
DigitalScot
Enterprise
ISO 27001
National Data Strategy
Personal Data
Personal Data Stores
Public Sector

Indicio

Our software and infrastructure allows companies to confirm data authenticity repeatedly and efficiently from its source without the expense or risk of direct integrations. Privacy-by-design architecture simplifies data compliance and deploys continuous Zero-Trust security, boosting bottom-line p...

Updated: 2023-03-22 less than 1 minute read

Tags:
Absolutely Zero Cyber
Anonyome Labs
Aries
Aruba Health App
BizSecure
BlockSpaces
Blockster Labs
Bot Ventures
Bullet ID
Certification
Compliance
Cynjatech
Cysecure
DID:INDY
Enterprise
EntTrustient
Finclusive
GlobaliD
IDRamp
Indicio TestNet
Liquid Avatar Technologies
Lissi Wallet
Lorica Identity
Machine Readable Governance
Mediator Agent
Mobile Agent
Networks Synergy
Privatyze
Proven
Public Benefit Corporation
Selfd.id
SITA
Snapper Future Tech
Snowbridge Inc
Trusted Digital Ecosystems
Uphold
VCI
Verio ID
VERSES Labs
Xertify

Global ID

Our mission is to bring decentralized digital identity to all people — a self-sovereign identity they can use to communicate, transact, and create value within any context. At GlobaliD, we believe that your identity is the key to unlocking your social and economic potential. This applies to the p...

Updated: 2023-03-22 less than 1 minute read

Tags:
Compliance
COVID
Indicio
PRIVATE
Wallets

Mattereum

We help people to sell, organise, and communicate about their property with confidence. Strong product knowledge ensures everyone derives maximum value from objects they buy, sell, and own. Mattereum’s first customer is legendary actor William Shatner’s company Third Millenia. Using Mattereum Ass...

Updated: 2023-03-22 less than 1 minute read

Tags:
DWeb
Enterprise
Ethereum
IOT
Metaverse

ValidatedID

With ViDSigner we offer a SaaS multichannel electronic signature platform that combines the security of cryptographic technology, biometrics and easy use from email certification to website and mobile integrations, smartcard and handwritten in-person signing.With ViDChain we provide a Blockchain ...

Updated: 2023-03-22 less than 1 minute read

Tags:
DIF
Digital Signatures
EBSI
Education
eIDAS Bridge
Enterprise
ESSIFlab
Europe
Interop
SaaS
ValidatedID
ViDChain
VIDSigner
Wallets

IDramp

IdRamp was founded to simplify identity orchestration across disparate systems, accelerate service delivery, and fortify digital trust. We reduce the frustration, cost, and complexity of delivering a unified passwordless zero trust strategy for any organization. IdRamp provides an “identity-first...

Updated: 2023-03-22 less than 1 minute read

Tags:
Evernym
IDRamp
Oracle
Qiqochat
Trust Stamp