current position:Home>Blockchain application series - did
Blockchain application series - did
2022-02-03 05:27:29 【Brick moving leader】
Reference resources :
https://mp.weixin.qq.com/s/3pUC0uRwQAJJ-QC_FF-QTg
https://w3c.github.io/did-core
https://www.w3.org/TR/vc-data-model/#example-42-the-relationship-property-in-a-child-s-credential
First time to know
If we want to use blockchain to do DID(Decentralized Identity) Words , Three main points involved :
- De centralization : The complete control of users' personal identity , Only you know the password , Only you have permission to modify 、 Read identity information
- Interworking : Sign up for a digital identity , You can log in to any digital service of other service providers .
- Privacy protection : Users keep their own data , Thus, it can determine which data the service provider can call .
Personally, I think our chain has the ability to provide DID Corresponding basic services :
- De centralization : Registration and authority authentication of accounts on the chain , The private key is kept by the user himself , It can be used for login authentication and authorization
- Interworking : The login authentication node of the chain (API node ) Provide account authority authentication services , Other Internet / Digital service providers access our authentication SDK
- Privacy protection : The certificate to be presented is produced after being certified by an authority proof And signature , The service provider will not get the privacy data itself , They can verify Your proof
A term is used to explain
-
DID Method : This enables implementers to design specific types of DID, With a computing infrastructure they trust ( For example, distributed ledger , Distributed file system , Distributed database , Peer-to-peer networks ) Use it together . Specific types of DID The specification of is called DID Method . Use DID The implementer of an application or system can choose to support the application that best suits its specific use case DID Method .( You don't have to use blockchain )
-
Verifiable data registry : In order to be parsed as DID file ,DID Usually recorded on some underlying system or network . No matter what specific technology is used , Any supporting records DID And return to generate DID Such systems for the data necessary for documents are called verifiable data registries . Examples include distributed ledgers , Distributed file system , Any type of database , The government ID database , Peer to peer networks and other forms of trusted data storage .
-
Decentralized identifier (DID): Globally unique permanent identifier , Because it is generated by password and / Or registered , Therefore, there is no need for a centralized registration authority . DID The general format of is in DID Core As defined in the specification . stay DID Specific methods are defined in the method specification DID programme . many ( But not all )DID Methods using distributed ledger technology (DLT) Or some other form of decentralized network .
-
Distributed ledger (DLT): Decentralized system for recording events . These systems build enough confidence for participants , So that it can rely on the data recorded by others to make operational decisions . They usually use distributed databases , Different nodes use consensus protocol to confirm the order of cryptographically signed transactions . Over time , Links to digitally signed transactions usually make the history of the general ledger effectively immutable .( such as Blockchain )
-
DIDs: Yes, it will DID The theme And DID Associated with the document URI, Allow trusted interactions associated with this topic .
-
DID file : Every DID Documents can represent encrypted materials , Validate method or service endpoint , This provides a set of mechanisms , send DID The controller can prove to be correct DID The control of .
-
DID file : One DID The file may contain DID The theme itself
-
DID The theme : DID The theme is information resources , Such as data model .
-
PII Personally identifiable information that should be kept confidential : If all are publicly available DID and DID The public verifiable data registry of the document is written DID Method specification , be DID It is important that the document does not contain any personal data . All personal data should be in DID Under the control of the topic, it is saved after the service endpoint . It should also revolve around... In the service endpoint URL Additional due diligence on the use of , To prevent service endpoints URL Accidental disclosure of personal data or relevance in . for example , Contains the user name URL May be dangerously contained in DID In the document , Because the user name may have human meaning , In a way that may inadvertently reveal DID The subject disagrees with the shared information . Use this privacy Architecture , Can be used by DID The public key in the document describes the communication channel for identification and protection , In private , Exchange personal data on a peer-to-peer basis . It also makes DID The subject and the requesting party can implement GDPR( General data protection regulations ) right , because No personal data is written into the immutable distributed ledger .
DID character string
One DID Is a simple text string consisting of three parts :
- URI Scheme identifier (did)
- DID Methodical identifier
- DID Method specific identifier .
did:example:123456789abcdefghi
DID Document
{
"@context": "https://www.w3.org/ns/did/v1",
"id": "did:example:123456789abcdefghi",
"authentication": [{
"id": "did:example:123456789abcdefghi#keys-1",
"type": "Ed25519VerificationKey2018",
"controller": "did:example:123456789abcdefghi",
"publicKeyBase58": "H3C2AVvLMv6gmMNam3uVAjZpfkcJCwDwnZn6z3wXmqPV"
}],
"service": [{
"id":"did:example:123456789abcdefghi#vcs",
"type": "VerifiableCredentialService",
"serviceEndpoint": "https://example.com/vc/"
}]
}
Verifiable credential data model
The specification provides a standard approach , It can be encrypted and secure , Respect privacy and machine verifiable ways in Web Express credentials on .
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-MqTVx2oz-1639613215336)(https://www.w3.org/TR/vc-data-model/diagrams/ecosystem.svg)]
[ Failed to transfer the external chain picture , The origin station may have anti-theft chain mechanism , It is suggested to save the pictures and upload them directly (img-9togjJWX-1639613215338)(https://www.w3.org/TR/vc-data-model/diagrams/credential-graph.svg)]
EXAMPLE 40: Usage of the nonTransferable property
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://www.w3.org/2018/credentials/examples/v1"
],
"id": "http://example.edu/credentials/3732",
"type": ["VerifiableCredential", "ProofOfAgeCredential"],
"issuer": "https://example.edu/issuers/14",
"issuanceDate": "2010-01-01T19:23:24Z",
"credentialSubject": {
"id": "did:example:ebfeb1f712ebc6f1c276e12ec21",
"ageOver": 21
},
"nonTransferable": "True",
"proof": {
..
"verificationMethod": "did:example:ebfeb1f712ebc6f1c276e12ec21",
... }
}
EXAMPLE 42: The relationship property in a child's credential
{
"@context": [
"https://www.w3.org/2018/credentials/v1",
"https://www.w3.org/2018/credentials/examples/v1"
],
"id": "http://example.edu/credentials/3732",
"type": ["VerifiableCredential", "AgeCredential", "RelationshipCredential"],
"issuer": "https://example.edu/issuers/14",
"issuanceDate": "2010-01-01T19:23:24Z",
"credentialSubject": {
"id": "did:example:ebfeb1f712ebc6f1c276e12ec21",
"ageUnder": 16,
"parent": {
"id": "did:example:ebfeb1c276e12ec211f712ebc6f",
"type": "Mother"
}
},
"proof": {
... }
}
Be careful
Avoid using the same verification method for multiple purposes
copyright notice
author[Brick moving leader],Please bring the original link to reprint, thank you.
https://en.netfreeman.com/2022/02/202202030527246117.html
The sidebar is recommended
- A blockchain instance analysis based on POS consensus algorithm (upgraded version)
- three. JS imitates the blockchain to realize the interconnection of multiple small balls
- Look at what blockchain is. Don't be cheated again
- Basic meaning of blockchain
- A brief introduction to the basic concepts, principles, characteristics and application scenarios of blockchain
- Blockchain note 1: what is the significance of bitcoin?
- Entering the meta universe, where is the so-called opportunity?
- Blockchain game development and deployment
- Blockchain farm game development source code
- Intensive reading of MESARI cryptocurrency annual report (Part I)
guess what you like
-
Accessing blockchain data from scrypt smart contract (2)
-
A malicious kmspico installer can steal your cryptocurrency wallet
-
How should blockchain be applied in the logistics industry?
-
What does blockchain change mean
-
Cattle herding blockchain, blockchain technology changes production relations
-
5g private network + blockchain: building the "cornerstone of security and trust" of smart government
-
[blockchain Apocalypse: Nakamoto collection] II: working principle of bitcoin (Part 2)
-
[blockchain Apocalypse: Nakamoto collection] I: preface | working principle of bitcoin (Part I)
-
Circle and endaoment will create a usdc based disaster relief fund for communities affected by deadly tornadoes
-
HSBC Group and IBM successfully created multi ledger CBDC demonstration
Random recommended
- Bloomberg 2022 encryption Outlook: the United States may accept cryptocurrency next year
- Curtis sword (CSC), the first 3D chain game of the concept of meta universe, will be launched soon
- Defi Criticism: in addition to more speculation, it is also an amplifier of greed and fear
- 5g private network + blockchain: building the "cornerstone of security and trust" of smart government
- US media: another huge theft of cryptocurrency was exposed, and hackers stole nearly $200 million
- The chief economist of the International Monetary Fund stressed the "global policy demand" of crypto regulation
- Is NFT music an untapped opportunity?
- The 2nd edition of 1 inch price limit order agreement was officially released
- Decentralized Oracle adameral blockchain data interaction Middleware
- Coinbase releases the vision of metauniverse, or will become Facebook of the early Internet
- Aofex exchange was investigated by the police, and the cryptocurrency exchange retreated into the countdown
- Blockchain talent shortage, world chain job effectively improves the matching rate of people and posts
- DAPP Industry Report in 2021: daily living addresses exceeded 2.7 million, and NFT trading volume exceeded US $23 billion
- Happy bitcoin bear market day: three years have passed since BTC bottomed at $3100
- Teach you how to use Nansen to play NFT
- Win10 uses geth client to build Ethereum private chain
- "Balcony, blockchain and robot" modern automobile thinks about the future with art
- Mars weekly | NBA star Durant became the spokesperson of coinbase brand; Solana launched $150 million chain game fund
- First class position: in depth interpretation of decentralized trading platform Bancor
- The current situation of Dao: investigating Dao ecology from community construction, governance and world integration under the chain
- Technology weekly · why is Web3 related to blockchain
- Blockchain mainstream consensus mechanism
- Technical magic of blockchain
- Decentralized Oracle adameral blockchain data interaction Middleware
- Is it difficult to settle claims in hospital? Blockchain technology realizes "report upon hospitalization and compensation upon discharge"
- Implement the national standardization development outline and put the blockchain on a standardized path
- Understand pledge as service: opportunities and risks, current situation and future
- Talk about Web3 Decentralized work: will the Internet create human prosperity?
- Vitalik: how to improve the transaction anti censorship of the block proposer's scheme
- [Hackathon] BSV programming marathon champion plan to build a dynamic bitcoin network
- Research Report on Solana: practical applications, advantages and challenges
- A hundred flowers bloom in application, presenting the five pole pattern of North Zhejiang, Jiangsu, Shanghai and Guangdong - industrial application of China's blockchain industry development report in 2021
- Popular science article | can Ethereum and Boca use the same address? Moonbeam "unified account" helps you achieve
- Bloomberg 2022 encryption Outlook: the "fate" of bitcoin, Ethereum and encrypted dollar
- Sailian blockchain education provides block chain technology training for Weichai Power
- Sailian blockchain Education: does the school district blockchain have a future?
- Is the development of school district block chain promising?
- Sailian blockchain education was invited to give a training lecture on blockchain technology in Shandong science and engineering district
- School district block chain technology, what do you learn? Blockchain training institutions or self-study?
- What exactly does blockchain learning learn? Do you need to go to blockchain training institutions?