Skip to content

Commit 73281f0

Browse files
author
Grant Noble
authored
Merge pull request #1 from w3c/gh-pages
Merging head fork back into mine
2 parents 99b0dc9 + a318451 commit 73281f0

File tree

1 file changed

+87
-79
lines changed

1 file changed

+87
-79
lines changed

index.html

Lines changed: 87 additions & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -155,7 +155,7 @@ <h2>Introduction</h2>
155155
<p>
156156
It is currently difficult to express banking account information,
157157
education qualifications, healthcare data, and other sorts of machine-readable
158-
personal information that has been verified by a 3rd party on the Web and this
158+
personal information that was verified by a third-party on the Web and this
159159
makes it difficult to receive the same benefits from the Web that physical
160160
credentials provide us in the physical world.
161161
</p>
@@ -166,47 +166,47 @@ <h2>Introduction</h2>
166166
and machine-verifiable.
167167
</p>
168168
<p>
169-
For those that are unfamiliar with the concepts related to verifiable
169+
For those who are unfamiliar with the concepts related to verifiable
170170
credentials, the following sections provide an overview of:
171171
</p>
172-
<ol>
172+
<ul>
173173
<li>
174-
the components that constitute a <a>verifiable credential</a>,
174+
The components that constitute a <a>verifiable credential</a>
175175
</li>
176176
<li>
177-
the components that constitutes a <a>verifiable presentation</a>,
177+
The components that constitute a <a>verifiable presentation</a>
178178
</li>
179179
<li>
180-
an ecosystem where verifiable credentials and verifiable presentations are
181-
expected to be useful, and
180+
An ecosystem where verifiable credentials and verifiable presentations are
181+
expected to be useful
182182
</li>
183183
<li>
184-
the use cases and requirements that informed this specification.
184+
The use cases and requirements that informed this specification.
185185
</li>
186-
</ol>
186+
</ul>
187187
</p>
188188

189189
<section>
190190
<h3>What is a Verifiable Credential?</h3>
191191

192192
<p>
193-
In the physical world, a credential may consist of:
193+
In the physical world, a credential might consist of:
194194
</p>
195195

196196
<ul>
197197
<li>
198-
information related to the subject of the credential (e.g., photo, name, and
199-
identification number),
198+
Information related to the subject of the credential (for example, a photo,
199+
name, and identification number)
200200
</li>
201201
<li>
202-
information related to the issuing authority (e.g., city government,
203-
national agency, or certification body),
202+
Information related to the issuing authority (for example, a city government,
203+
national agency, or certification body)
204204
</li>
205205
<li>
206-
evidence related to how the credential was derived, and
206+
Evidence related to how the credential was derived
207207
</li>
208208
<li>
209-
information related to expiration dates.
209+
Information related to expiration dates.
210210
</li>
211211
</ul>
212212

@@ -220,16 +220,16 @@ <h3>What is a Verifiable Credential?</h3>
220220
presentations can be rapidly transmitted, making them more convenient than
221221
their physical counterparts when establishing trust at a distance.
222222
</p>
223-
<p>
224-
The persistence of digital information, and the ease with which
225-
disparate sources of digital data may be collected and correlated,
226-
comprise a privacy concern that the use of verifiable and easily
227-
machine-readable credentials threatens to exacerbate. A <a href="#privacy-considerations">Privacy Considerations</a>
228-
section addresses these issues. Items of particular concern in
229-
this specification may also be noted in the text. Examples of
230-
how to use this data model using privacy-enhancing technologies
231-
such as zero-knowledge proofs are also provided.
232-
</p>
223+
<p>
224+
The persistence of digital information, and the ease with which disparate
225+
sources of digital data can be collected and correlated, comprise a privacy
226+
concern that the use of verifiable and easily machine-readable credentials
227+
threatens to make worse. A <a href="#privacy-considerations">Privacy Considerations</a>
228+
section addresses these issues. Items of particular concern in this
229+
specification are noted in the text. Examples of how to use this data model
230+
using privacy-enhancing technologies, such as zero-knowledge proofs, are also
231+
provided.
232+
</p>
233233
</section>
234234
<section>
235235
<h3>Ecosystem Overview</h3>
@@ -238,53 +238,58 @@ <h3>Ecosystem Overview</h3>
238238

239239
<p>
240240
This section outlines a basic set of roles and an ecosystem where verifiable
241-
credentials are expected to be useful. In this section, we distinguish the essential
242-
roles of core actors and the relationships between them; how do they interact?
243-
A role is an abstraction that might be implemented in many different ways. The
244-
separation of roles suggests likely interfaces and/or protocols for
245-
standardization. The following roles are introduced in this specification:
241+
credentials are expected to be useful. In this section, we describe the
242+
essential roles of the core actors and the relationships between them; how do
243+
they interact? A role is an abstraction that might be implemented in many
244+
different ways. The separation of roles suggests likely interfaces and
245+
protocols for standardization. The following roles are introduced in this
246+
specification:
246247
</p>
247248

248249
<dl>
249250
<dt><a>holder</a></dt>
250251
<dd>
251-
A role an <a>entity</a> may perform by possessing one or more
252+
A role an <a>entity</a> might perform by possessing one or more
252253
<a>verifiable credentials</a> and generating <a>presentations</a> from them.
253254
Examples of holders include students, employees, and customers.
254255
</dd>
255256
<dt><a>issuer</a></dt>
256257
<dd>
257-
A role an <a>entity</a> may perform by creating a <a>verifiable credential</a>,
258-
associating it with a particular <a>subject</a>, and transmitting it to
259-
a <a>holder</a>. Examples of issuers include corporations, non-profits,
260-
trade associations, governments, and individuals.
258+
A role an <a>entity</a> might perform by creating a
259+
<a>verifiable credential</a>, associating it with a specific <a>subject</a>,
260+
and transmitting it to a <a>holder</a>. Examples of issuers include
261+
corporations, non-profit organizations, trade associations, governments, and
262+
individuals.
261263
</dd>
262264
<dt><a>verifier</a></dt>
263265
<dd>
264-
A role an <a>entity</a> may perform by requesting and receiving a
265-
<a>verifiable presentation</a> that proves the holder possesses the required verifiable credentials with certain characteristics.
266-
Examples of verifiers include employers, security personnel, and websites.
266+
A role an <a>entity</a> might perform by requesting and receiving a
267+
<a>verifiable presentation</a> that proves the holder possesses the required
268+
<a>verifiable credentials</a> with certain characteristics. Examples of
269+
verifiers include employers, security personnel, and websites.
267270
</dd>
268271
<dt><a>identifier registry</a></dt>
269272
<dd>
270-
A role a system may perform by mediating the creation and verification of <a>issuer</a> identifiers,
271-
keys and other relevant data required to use verifiable credentials. Some configurations may require correlatable
272-
identifiers for subjects. Examples of such data repositories include trusted databases,
273-
decentralized databases, government ID databases, and distributed ledgers.
273+
A role a system might perform by mediating the creation and verification of
274+
<a>issuer</a> identifiers, keys, and other relevant data required to use
275+
<a>verifiable credentials</a>. Some configurations might require correlatable
276+
identifiers for <a>subjects</a>. Examples of such data repositories include
277+
trusted databases, decentralized databases, government ID databases, and
278+
distributed ledgers.
274279
</dd>
275280
</dl>
276281

277282
<figure>
278283
<img style="margin: auto; display: block;" width="75%" src="diagrams/ecosystem.svg">
279284
<figcaption style="text-align: center;">
280-
The roles and information flows that form the basis for this specification.
285+
The roles and information flows forming the basis for this specification.
281286
</figcaption>
282287
</figure>
283288

284289
<p class="note">
285-
The ecosystem above is provided as an example to the reader in order to ground
286-
the rest of the concepts in this specification. Other ecosystems exist, such as
287-
protected environments or proprietary systems, where verifiable credentials also
290+
The ecosystem above is provided as an example to ground the rest of the
291+
concepts in this specification. Other ecosystems exist, such as protected
292+
environments or proprietary systems, where <a>verifiable credentials</a> also
288293
provide benefit.
289294
</p>
290295

@@ -324,41 +329,41 @@ <h3>Use Cases and Requirements</h3>
324329

325330
<p>
326331
The Verifiable Credentials Use Cases [[VC-USECASES]] document outlines a number of
327-
key topics that readers may find useful, including:
332+
key topics that readers might find useful, including:
328333
</p>
329334
<ul>
330335
<li>
331-
a more thorough explanation of the
336+
A more thorough explanation of the
332337
<a href="https://www.w3.org/TR/verifiable-claims-use-cases/#user-roles">roles</a>
333-
introduced above,
338+
introduced above
334339
</li>
335340
<li>
336-
the
341+
The
337342
<a href="https://www.w3.org/TR/verifiable-claims-use-cases/#user-needs">needs</a>
338-
identified in market verticals like education, finance, healthcare, retail,
339-
professional licensing, and government,
343+
identified in market verticals, such as education, finance, healthcare, retail,
344+
professional licensing, and government
340345
</li>
341346
<li>
342-
common
347+
Common
343348
<a href="https://www.w3.org/TR/verifiable-claims-use-cases/#user-tasks">tasks</a>
344349
performed by the roles in the ecosystem, as well as their associated
345-
requirements, and
350+
requirements
346351
</li>
347352
<li>
348-
common
353+
Common
349354
<a href="https://www.w3.org/TR/verifiable-claims-use-cases/#user-sequences">sequences and flows</a>
350355
identified by the Working Group.
351356
</li>
352357
</ul>
353358
<p>
354359
As a result of documenting and analyzing the use cases document, a number of
355-
desirable ecosystem characteristics have been identified for this
356-
specification, namely:
360+
desirable ecosystem characteristics were identified for this specification,
361+
specifically:
357362
</p>
358363
<ul>
359364
<li>
360365
<a>Holders</a> receive and store <a>verifiable credentials</a> from
361-
<a>issuers</a>. <a>Holders</a> may interact with an issuer through an
366+
<a>issuers</a>. <a>Holders</a> might interact with an issuer through an
362367
agent that the issuer needn't trust.
363368
</li>
364369
<li>
@@ -367,44 +372,47 @@ <h3>Use Cases and Requirements</h3>
367372
to <a>verifiers</a>.
368373
</li>
369374
<li>
370-
<a>Holders</a> may interact with <a>verifiers</a> through an agent that
371-
verifiers needn't trust; verifiers only need to trust
372-
<a>issuers</a>.
375+
<a>Holders</a> might interact with <a>verifiers</a> through an agent that
376+
verifiers need not trust; verifiers only need to trust <a>issuers</a>.
373377
</li>
374378
<li>
375379
<a>Verifiable credentials</a> are associated with <a>subjects</a>, not
376-
particular services; <a>holders</a> decide how to aggregate and manage
380+
specific services; <a>holders</a> decide how to aggregate and manage
377381
<a>verifiable credentials</a> and the <a>verifiable presentations</a>
378382
associated with them.
379383
</li>
380384
<li>
381-
<a>Holders</a> are able to easily control and own their own identifiers.
385+
<a>Holders</a> can easily control and own their own identifiers.
382386
</li>
383387
<li>
384388
<a>Holders</a> control which <a>verifiable credentials</a> to use and when.
385389
</li>
386390
<li>
387-
<a>Holders</a> are able to freely choose and change the agents they employ
388-
to help them manage their <a>verifiable credentials</a> and generate and share <a>verifiable presentations</a>.
391+
<a>Holders</a> can freely choose and change the agents they employ to help
392+
them manage their <a>verifiable credentials</a> and generate and share
393+
<a>verifiable presentations</a>.
389394
</li>
390395
<li>
391-
<a>Holders</a> can share <a>verifiable presentations</a> that can be verified without revealing
392-
the identity of the <a>verifier</a> to the <a>issuer</a>.
396+
<a>Holders</a> can share <a>verifiable presentations</a> that can be verified
397+
without revealing the identity of the <a>verifier</a> to the <a>issuer</a>.
393398
</li>
394399
<li>
395-
<a>Holders</a> in <a>presentations</a> can either disclose the attributes or satisfy <a>predicates</a>
396-
requested by the <a>verifier</a>. <a>Predicates</a> are boolean conditions like greater/less than or
397-
equal to, is in set, etc.
400+
<a>Holders</a> in <a>presentations</a> can either disclose the attributes or
401+
satisfy <a>predicates</a> requested by the <a>verifier</a>. <a>Predicates</a>
402+
are boolean conditions like greater/less than or equal to, is in set, and so
403+
on.
398404
</li>
399405
<li>
400-
<a>Verifiable credentials</a> and <a>verifiable presentations</a> are expressed in one or more standard,
401-
machine-readable data formats which can also be extended with minimal coordination.
406+
<a>Verifiable credentials</a> and <a>verifiable presentations</a> are
407+
expressed in one or more standard, machine-readable data formats, which can
408+
also be extended with minimal coordination.
402409
</li>
403410
<li>
404-
Issuers issue <a>verifiable credentials</a>, and holders store them.
405-
Holders offer <a>verifiable presentations</a>, and verifiers verify them.
406-
Issuance of credentials, storage of credentials, the generation and sharing
407-
of presentations, and the verification of them are each independent processes.
411+
<a>Issuers</a> issue <a>verifiable credentials</a>, and <a>holders</a> store
412+
them. <a>Holders</a> offer <a>verifiable presentations</a>, and
413+
<a>verifiers</a> verify them. Issuing of credentials, storage of credentials,
414+
generation and sharing of presentations, and verification of presentations are
415+
each independent processes.
408416
</li>
409417
<li>
410418
<a>Verifiable Credentials</a> can be revoked by the <a>issuer</a>.
@@ -1573,7 +1581,7 @@ <h2>Terms of Use</h2>
15731581
],
15741582
"id": "did:example:ebfeb1f712ebc6f1c276e12ec21",
15751583
"type": "VerifiablePresentation",
1576-
"credential": [{
1584+
"verifiableCredential": [{
15771585
"id": "http://dmv.example.gov/credentials/3732",
15781586
"type": ["VerifiableCredential", "ProofOfAgeCredential"],
15791587
"issuer": "https://dmv.example.gov/issuers/14",
@@ -1875,7 +1883,7 @@ <h3> Passing on a Verifiable Credential </h3>
18751883
{
18761884
"id": "did:example:76e12ec21ebhyu1f712ebc6f1z2",
18771885
"type": ["VerifiablePresentation"],
1878-
"credential": [{
1886+
"verifiableCredential": [{
18791887
"id": "http://example.gov/credentials/3732",
18801888
"type": ["VerifiableCredential", "PrescriptionCredential"],
18811889
"issuer": "https://dmv.example.gov",

0 commit comments

Comments
 (0)