@@ -155,7 +155,7 @@ <h2>Introduction</h2>
155
155
< p >
156
156
It is currently difficult to express banking account information,
157
157
education qualifications, healthcare data, and other sorts of machine-readable
158
- personal information that has been verified by a 3rd party on the Web and this
158
+ personal information that was verified by a third- party on the Web and this
159
159
makes it difficult to receive the same benefits from the Web that physical
160
160
credentials provide us in the physical world.
161
161
</ p >
@@ -166,47 +166,47 @@ <h2>Introduction</h2>
166
166
and machine-verifiable.
167
167
</ p >
168
168
< p >
169
- For those that are unfamiliar with the concepts related to verifiable
169
+ For those who are unfamiliar with the concepts related to verifiable
170
170
credentials, the following sections provide an overview of:
171
171
</ p >
172
- < ol >
172
+ < ul >
173
173
< li >
174
- the components that constitute a < a > verifiable credential</ a > ,
174
+ The components that constitute a < a > verifiable credential</ a >
175
175
</ li >
176
176
< li >
177
- the components that constitutes a < a > verifiable presentation</ a > ,
177
+ The components that constitute a < a > verifiable presentation</ a >
178
178
</ li >
179
179
< li >
180
- an ecosystem where verifiable credentials and verifiable presentations are
181
- expected to be useful, and
180
+ An ecosystem where verifiable credentials and verifiable presentations are
181
+ expected to be useful
182
182
</ li >
183
183
< li >
184
- the use cases and requirements that informed this specification.
184
+ The use cases and requirements that informed this specification.
185
185
</ li >
186
- </ ol >
186
+ </ ul >
187
187
</ p >
188
188
189
189
< section >
190
190
< h3 > What is a Verifiable Credential?</ h3 >
191
191
192
192
< p >
193
- In the physical world, a credential may consist of:
193
+ In the physical world, a credential might consist of:
194
194
</ p >
195
195
196
196
< ul >
197
197
< li >
198
- information related to the subject of the credential (e.g., photo, name, and
199
- identification number),
198
+ Information related to the subject of the credential (for example, a photo,
199
+ name, and identification number)
200
200
</ li >
201
201
< li >
202
- information related to the issuing authority (e.g., city government,
203
- national agency, or certification body),
202
+ Information related to the issuing authority (for example, a city government,
203
+ national agency, or certification body)
204
204
</ li >
205
205
< li >
206
- evidence related to how the credential was derived, and
206
+ Evidence related to how the credential was derived
207
207
</ li >
208
208
< li >
209
- information related to expiration dates.
209
+ Information related to expiration dates.
210
210
</ li >
211
211
</ ul >
212
212
@@ -220,16 +220,16 @@ <h3>What is a Verifiable Credential?</h3>
220
220
presentations can be rapidly transmitted, making them more convenient than
221
221
their physical counterparts when establishing trust at a distance.
222
222
</ p >
223
- < p >
224
- The persistence of digital information, and the ease with which
225
- disparate sources of digital data may be collected and correlated,
226
- comprise a privacy concern that the use of verifiable and easily
227
- machine-readable credentials threatens to exacerbate . A < a href ="#privacy-considerations "> Privacy Considerations</ a >
228
- section addresses these issues. Items of particular concern in
229
- this specification may also be noted in the text. Examples of
230
- how to use this data model using privacy-enhancing technologies
231
- such as zero-knowledge proofs are also provided.
232
- </ p >
223
+ < p >
224
+ The persistence of digital information, and the ease with which disparate
225
+ sources of digital data can be collected and correlated, comprise a privacy
226
+ concern that the use of verifiable and easily machine-readable credentials
227
+ threatens to make worse . A < a href ="#privacy-considerations "> Privacy Considerations</ a >
228
+ section addresses these issues. Items of particular concern in this
229
+ specification are noted in the text. Examples of how to use this data model
230
+ using privacy-enhancing technologies, such as zero-knowledge proofs, are also
231
+ provided.
232
+ </ p >
233
233
</ section >
234
234
< section >
235
235
< h3 > Ecosystem Overview</ h3 >
@@ -238,53 +238,58 @@ <h3>Ecosystem Overview</h3>
238
238
239
239
< p >
240
240
This section outlines a basic set of roles and an ecosystem where verifiable
241
- credentials are expected to be useful. In this section, we distinguish the essential
242
- roles of core actors and the relationships between them; how do they interact?
243
- A role is an abstraction that might be implemented in many different ways. The
244
- separation of roles suggests likely interfaces and/or protocols for
245
- standardization. The following roles are introduced in this specification:
241
+ credentials are expected to be useful. In this section, we describe the
242
+ essential roles of the core actors and the relationships between them; how do
243
+ they interact? A role is an abstraction that might be implemented in many
244
+ different ways. The separation of roles suggests likely interfaces and
245
+ protocols for standardization. The following roles are introduced in this
246
+ specification:
246
247
</ p >
247
248
248
249
< dl >
249
250
< dt > < a > holder</ a > </ dt >
250
251
< dd >
251
- A role an < a > entity</ a > may perform by possessing one or more
252
+ A role an < a > entity</ a > might perform by possessing one or more
252
253
< a > verifiable credentials</ a > and generating < a > presentations</ a > from them.
253
254
Examples of holders include students, employees, and customers.
254
255
</ dd >
255
256
< dt > < a > issuer</ a > </ dt >
256
257
< dd >
257
- A role an < a > entity</ a > may perform by creating a < a > verifiable credential</ a > ,
258
- associating it with a particular < a > subject</ a > , and transmitting it to
259
- a < a > holder</ a > . Examples of issuers include corporations, non-profits,
260
- trade associations, governments, and individuals.
258
+ A role an < a > entity</ a > might perform by creating a
259
+ < a > verifiable credential</ a > , associating it with a specific < a > subject</ a > ,
260
+ and transmitting it to a < a > holder</ a > . Examples of issuers include
261
+ corporations, non-profit organizations, trade associations, governments, and
262
+ individuals.
261
263
</ dd >
262
264
< dt > < a > verifier</ a > </ dt >
263
265
< dd >
264
- A role an < a > entity</ a > may perform by requesting and receiving a
265
- < a > verifiable presentation</ a > that proves the holder possesses the required verifiable credentials with certain characteristics.
266
- Examples of verifiers include employers, security personnel, and websites.
266
+ A role an < a > entity</ a > might perform by requesting and receiving a
267
+ < a > verifiable presentation</ a > that proves the holder possesses the required
268
+ < a > verifiable credentials</ a > with certain characteristics. Examples of
269
+ verifiers include employers, security personnel, and websites.
267
270
</ dd >
268
271
< dt > < a > identifier registry</ a > </ dt >
269
272
< dd >
270
- A role a system may perform by mediating the creation and verification of < a > issuer</ a > identifiers,
271
- keys and other relevant data required to use verifiable credentials. Some configurations may require correlatable
272
- identifiers for subjects. Examples of such data repositories include trusted databases,
273
- decentralized databases, government ID databases, and distributed ledgers.
273
+ A role a system might perform by mediating the creation and verification of
274
+ < a > issuer</ a > identifiers, keys, and other relevant data required to use
275
+ < a > verifiable credentials</ a > . Some configurations might require correlatable
276
+ identifiers for < a > subjects</ a > . Examples of such data repositories include
277
+ trusted databases, decentralized databases, government ID databases, and
278
+ distributed ledgers.
274
279
</ dd >
275
280
</ dl >
276
281
277
282
< figure >
278
283
< img style ="margin: auto; display: block; " width ="75% " src ="diagrams/ecosystem.svg ">
279
284
< figcaption style ="text-align: center; ">
280
- The roles and information flows that form the basis for this specification.
285
+ The roles and information flows forming the basis for this specification.
281
286
</ figcaption >
282
287
</ figure >
283
288
284
289
< p class ="note ">
285
- The ecosystem above is provided as an example to the reader in order to ground
286
- the rest of the concepts in this specification. Other ecosystems exist, such as
287
- protected environments or proprietary systems, where verifiable credentials also
290
+ The ecosystem above is provided as an example to ground the rest of the
291
+ concepts in this specification. Other ecosystems exist, such as protected
292
+ environments or proprietary systems, where < a > verifiable credentials</ a > also
288
293
provide benefit.
289
294
</ p >
290
295
@@ -324,41 +329,41 @@ <h3>Use Cases and Requirements</h3>
324
329
325
330
< p >
326
331
The Verifiable Credentials Use Cases [[VC-USECASES]] document outlines a number of
327
- key topics that readers may find useful, including:
332
+ key topics that readers might find useful, including:
328
333
</ p >
329
334
< ul >
330
335
< li >
331
- a more thorough explanation of the
336
+ A more thorough explanation of the
332
337
< a href ="https://www.w3.org/TR/verifiable-claims-use-cases/#user-roles "> roles</ a >
333
- introduced above,
338
+ introduced above
334
339
</ li >
335
340
< li >
336
- the
341
+ The
337
342
< a href ="https://www.w3.org/TR/verifiable-claims-use-cases/#user-needs "> needs</ a >
338
- identified in market verticals like education, finance, healthcare, retail,
339
- professional licensing, and government,
343
+ identified in market verticals, such as education, finance, healthcare, retail,
344
+ professional licensing, and government
340
345
</ li >
341
346
< li >
342
- common
347
+ Common
343
348
< a href ="https://www.w3.org/TR/verifiable-claims-use-cases/#user-tasks "> tasks</ a >
344
349
performed by the roles in the ecosystem, as well as their associated
345
- requirements, and
350
+ requirements
346
351
</ li >
347
352
< li >
348
- common
353
+ Common
349
354
< a href ="https://www.w3.org/TR/verifiable-claims-use-cases/#user-sequences "> sequences and flows</ a >
350
355
identified by the Working Group.
351
356
</ li >
352
357
</ ul >
353
358
< p >
354
359
As a result of documenting and analyzing the use cases document, a number of
355
- desirable ecosystem characteristics have been identified for this
356
- specification, namely :
360
+ desirable ecosystem characteristics were identified for this specification,
361
+ specifically :
357
362
</ p >
358
363
< ul >
359
364
< li >
360
365
< a > Holders</ a > receive and store < a > verifiable credentials</ a > from
361
- < a > issuers</ a > . < a > Holders</ a > may interact with an issuer through an
366
+ < a > issuers</ a > . < a > Holders</ a > might interact with an issuer through an
362
367
agent that the issuer needn't trust.
363
368
</ li >
364
369
< li >
@@ -367,44 +372,47 @@ <h3>Use Cases and Requirements</h3>
367
372
to < a > verifiers</ a > .
368
373
</ li >
369
374
< li >
370
- < a > Holders</ a > may interact with < a > verifiers</ a > through an agent that
371
- verifiers needn't trust; verifiers only need to trust
372
- < a > issuers</ a > .
375
+ < a > Holders</ a > might interact with < a > verifiers</ a > through an agent that
376
+ verifiers need not trust; verifiers only need to trust < a > issuers</ a > .
373
377
</ li >
374
378
< li >
375
379
< a > Verifiable credentials</ a > are associated with < a > subjects</ a > , not
376
- particular services; < a > holders</ a > decide how to aggregate and manage
380
+ specific services; < a > holders</ a > decide how to aggregate and manage
377
381
< a > verifiable credentials</ a > and the < a > verifiable presentations</ a >
378
382
associated with them.
379
383
</ li >
380
384
< li >
381
- < a > Holders</ a > are able to easily control and own their own identifiers.
385
+ < a > Holders</ a > can easily control and own their own identifiers.
382
386
</ li >
383
387
< li >
384
388
< a > Holders</ a > control which < a > verifiable credentials</ a > to use and when.
385
389
</ li >
386
390
< li >
387
- < a > Holders</ a > are able to freely choose and change the agents they employ
388
- to help them manage their < a > verifiable credentials</ a > and generate and share < a > verifiable presentations</ a > .
391
+ < a > Holders</ a > can freely choose and change the agents they employ to help
392
+ them manage their < a > verifiable credentials</ a > and generate and share
393
+ < a > verifiable presentations</ a > .
389
394
</ li >
390
395
< li >
391
- < a > Holders</ a > can share < a > verifiable presentations</ a > that can be verified without revealing
392
- the identity of the < a > verifier</ a > to the < a > issuer</ a > .
396
+ < a > Holders</ a > can share < a > verifiable presentations</ a > that can be verified
397
+ without revealing the identity of the < a > verifier</ a > to the < a > issuer</ a > .
393
398
</ li >
394
399
< li >
395
- < a > Holders</ a > in < a > presentations</ a > can either disclose the attributes or satisfy < a > predicates</ a >
396
- requested by the < a > verifier</ a > . < a > Predicates</ a > are boolean conditions like greater/less than or
397
- equal to, is in set, etc.
400
+ < a > Holders</ a > in < a > presentations</ a > can either disclose the attributes or
401
+ satisfy < a > predicates</ a > requested by the < a > verifier</ a > . < a > Predicates</ a >
402
+ are boolean conditions like greater/less than or equal to, is in set, and so
403
+ on.
398
404
</ li >
399
405
< li >
400
- < a > Verifiable credentials</ a > and < a > verifiable presentations</ a > are expressed in one or more standard,
401
- machine-readable data formats which can also be extended with minimal coordination.
406
+ < a > Verifiable credentials</ a > and < a > verifiable presentations</ a > are
407
+ expressed in one or more standard, machine-readable data formats, which can
408
+ also be extended with minimal coordination.
402
409
</ li >
403
410
< li >
404
- Issuers issue < a > verifiable credentials</ a > , and holders store them.
405
- Holders offer < a > verifiable presentations</ a > , and verifiers verify them.
406
- Issuance of credentials, storage of credentials, the generation and sharing
407
- of presentations, and the verification of them are each independent processes.
411
+ < a > Issuers</ a > issue < a > verifiable credentials</ a > , and < a > holders</ a > store
412
+ them. < a > Holders</ a > offer < a > verifiable presentations</ a > , and
413
+ < a > verifiers</ a > verify them. Issuing of credentials, storage of credentials,
414
+ generation and sharing of presentations, and verification of presentations are
415
+ each independent processes.
408
416
</ li >
409
417
< li >
410
418
< a > Verifiable Credentials</ a > can be revoked by the < a > issuer</ a > .
@@ -1573,7 +1581,7 @@ <h2>Terms of Use</h2>
1573
1581
],
1574
1582
"id": "did:example:ebfeb1f712ebc6f1c276e12ec21",
1575
1583
"type": "VerifiablePresentation",
1576
- "credential ": [{
1584
+ "verifiableCredential ": [{
1577
1585
"id": "http://dmv.example.gov/credentials/3732",
1578
1586
"type": ["VerifiableCredential", "ProofOfAgeCredential"],
1579
1587
"issuer": "https://dmv.example.gov/issuers/14",
@@ -1875,7 +1883,7 @@ <h3> Passing on a Verifiable Credential </h3>
1875
1883
{
1876
1884
"id": "did:example:76e12ec21ebhyu1f712ebc6f1z2",
1877
1885
"type": ["VerifiablePresentation"],
1878
- "credential ": [{
1886
+ "verifiableCredential ": [{
1879
1887
"id": "http://example.gov/credentials/3732",
1880
1888
"type": ["VerifiableCredential", "PrescriptionCredential"],
1881
1889
"issuer": "https://dmv.example.gov",
0 commit comments