HOME



picture info

Decentralized Identifiers
A decentralized identifier (DID) is a type of globally unique identifier that enables an entity to be identified in a manner that is Verifiable credentials, verifiable, persistent (as long as the DID controller desires), and does not require the use of a centralized Domain name registry, registry. DIDs enable a new model of decentralized digital identity that is often referred to as a self-sovereign identity. They are an important component of decentralized web applications. DID documents A decentralized identifier resolves (points) to a DID document, a set of data describing the DID subject, including mechanisms, such as cryptographic public keys, that the DID subject or a DID delegate can use to authenticate itself and prove its association with the DID. DID methods Just as there are many different types of URI, URIs, all of which conform to the URI standard, there are many different types of DID methods, all of which must conform to the DID standard. Each DID method spec ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Data Model
A data model is an abstract model that organizes elements of data and standardizes how they relate to one another and to the properties of real-world entities. For instance, a data model may specify that the data element representing a car be composed of a number of other elements which, in turn, represent the color and size of the car and define its owner. The corresponding professional activity is called generally ''data modeling'' or, more specifically, '' database design''. Data models are typically specified by a data expert, data specialist, data scientist, data librarian, or a data scholar. A data modeling language and notation are often represented in graphical form as diagrams. Michael R. McCaleb (1999)"A Conceptual Data Model of Datum Systems". National Institute of Standards and Technology. August 1999. A data model can sometimes be referred to as a data structure, especially in the context of programming languages. Data models are often complemented by function ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Federated Identity
A federated identity in information technology is the means of linking a person's electronic identity and attributes, stored across multiple distinct identity management systems. Federated identity is related to single sign-on (SSO), in which a user's single authentication ticket, or token, is trusted across multiple IT systems or even organizations. SSO is a subset of federated identity management, as it relates only to authentication and is understood on the level of technical interoperability, and it would not be possible without some sort of federation. Retrieved 2017-07-03. Management In information technology (IT), federated identity management (FIdM) amounts to having a common set of policies, practices and protocols in place to manage the identity and trust into IT users and devices across organizations. Single sign-on (SSO) systems allow a single user authentication process across multiple IT systems or even organizations. SSO is a subset of federated identity manage ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Digital Technology
Digital technology may refer to: * Application of digital electronics * Any significant piece of knowledge from information technology Information technology (IT) is a set of related fields within information and communications technology (ICT), that encompass computer systems, software, programming languages, data processing, data and information processing, and storage. Inf ...
{{disambiguation ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Identity Management
Identity and access management (IAM or IdAM) or Identity management (IdM), is a framework of policies and technologies to ensure that the right users (that are part of the ecosystem connected to or within an enterprise) have the appropriate access to technology resources. IAM systems fall under the overarching umbrellas of IT security and data management. Identity and access management systems not only identify, authenticate, and control access for individuals who will be utilizing IT resources but also the hardware and applications employees need to access. The terms "identity management" (IdM) and "identity and access management" are used interchangeably in the area of identity access management. Identity-management systems, products, applications and platforms manage identifying and ancillary data about entities that include individuals, computer-related hardware, and software applications. IdM covers issues such as how users gain an identity, the roles, and sometimes the ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Authentication Methods
Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicating a person or thing's identity, authentication is the process of verifying that identity. Authentication is relevant to multiple fields. In art, antiques, and anthropology, a common problem is verifying that a given artifact was produced by a certain person, or in a certain place (i.e. to assert that it is not counterfeit), or in a given period of history (e.g. by determining the age via carbon dating). In computer science, verifying a user's identity is often required to allow access to confidential data or systems. It might involve validating personal identity documents. In art, antiques and anthropology Authentication can be considered to be of three types: The ''first'' type of authentication is accepting proof of identity given by ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Authentication Protocols
An authentication protocol is a type of computer communications protocol or cryptographic protocol specifically designed for transfer of authentication data between two entities. It allows the receiving entity to authenticate the connecting entity (e.g. Client connecting to a Server) as well as authenticate itself to the connecting entity (Server to a client) by declaring the type of information needed for authentication as well as syntax. It is the most important layer of protection needed for secure communication within computer networks. Purpose With the increasing amount of trustworthy information being accessible over the network, the need for keeping unauthorized persons from access to this data emerged. Stealing someone's identity is easy in the computing world - special verification methods had to be invented to find out whether the person/computer requesting data is really who he says he is. The task of the authentication protocol is to specify the exact series of steps n ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


Self-sovereign Identity
Self-sovereign identity (SSI) is an approach to digital identity that gives individuals control over the information they use to prove who they are to websites, services, and applications across the web. Without SSI, individuals with persistent accounts (identities) across the internet must rely on a number of large identity providers, such as Facebook (Facebook Connect) and Google (Google Sign-In), that have control of the information associated with their identity. If a user chooses not to use a large identity provider, then they have to create new accounts with each service provider, which fragments their web experiences. Self-sovereign identity offers a way to avoid these two undesirable alternatives. In a self-sovereign identity system, the user accesses services in a streamlined and secure manner, while maintaining control over the information associated with their identity. Background The TCP/IP protocol provides identifiers for machines, but not for the people and org ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

LinkedIn
LinkedIn () is an American business and employment-oriented Social networking service, social network. It was launched on May 5, 2003 by Reid Hoffman and Eric Ly. Since December 2016, LinkedIn has been a wholly owned subsidiary of Microsoft. The platform is primarily used for professional networking and career development, and allows jobseekers to post their Curriculum vitae, CVs and employers to post jobs. From 2015, most of the company's revenue came from Information broker, selling access to information about its members to recruiters and sales professionals and has also introduced their own ad portal named LinkedIn Ads to let companies advertise in their platform. LinkedIn has more than 1 billion registered members from over 200 countries and territories. LinkedIn allows members (both employees and employers) to create profiles and connect with each other in an online social network which may represent real-world professional relationships. Members can invite anyone (whet ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

Bluesky
Bluesky is a microblogging social media social networking service, service. Users can share short posts containing text, images, and videos. It is owned by Bluesky Social PBC, a benefit corporation based in the United States. Bluesky was developed as a reference implementation of the AT Protocol, an Open standard, open communication protocol for distributed social networks. Bluesky Social promotes a Composability, composable user experience and Algorithmic curation, algorithmic choice as core features of Bluesky. The platform offers a "marketplace of algorithms" where users can choose or create algorithmic feeds, user-managed moderation and labelling services, and user-made "starter packs" that allow users to quickly follow a large number of related accounts within a community or subculture. The AT Protocol offers a domain name, domain-name–based handle system within Bluesky, allowing users to self-verify an account's legitimacy and identity by proving ownership of a domain ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  


picture info

AT Protocol
The AT Protocol (Authenticated Transfer Protocol, pronounced " @ protocol" and commonly shortened to ATProto) is a protocol and open standard for distributed social networking services. It is under development by Bluesky Social PBC, a public benefit corporation originally created as an independent research group within Twitter, Inc. to investigate the possibility of decentralizing the service. The AT Protocol aims to address perceived issues with other decentralized protocols, such as user experience, platform interoperability, discoverability, network scalability, and portability of user data and social graphs. It employs a modular microservice architecture and a federated, server- agnostic user identity to enable movement between protocol services, with the goal of providing an integrated online experience. Platforms can access and serve any user content within the network by fetching content formatted as predefined data schemas from federated network-wide dat ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]  




China RealDID
China Real-Name Decentralized Identifier System (China RealDID, zh, 实名DID) is China's national-level decentralized identifier system. China RealDID was officially launched on December 12, 2023, by the First Research Institute of China's Ministry of Public Security and the Blockchain-based Service Network (BSN) China. China RealDID was developed as a real-name identity verification system based on blockchain technology, including real name verification, data encryption for personal data protection, secure private logins, business identity checks, and personal identification certificate services. It allows Chinese residents to access online services using DID addresses and private keys, maintaining anonymity with business platform operators while upholding real-name compliance in accordance with Chinese legislation that requires real-name registration for online accounts. In November 2024, China RealDID underwent trials in Hong Kong, allowing Mainland Chinese citizens tr ...
[...More Info...]      
[...Related Items...]     OR:     [Wikipedia]   [Google]   [Baidu]