Главная
Study mode:
on
1
Cast of Characters
2
The User Agent generates keys
3
Alice creates a Decentralized ID on the blockchain
4
Alice logs on to the bank and starts a loan application
5
The User Agent signs and stores it in Alice's identity hub
6
Decentralized Identity Building Blocks
7
The Trust Model behind Decentralized Identity
8
Decentralized Identifiers (DID)
9
DID Methods
10
BTCR DID Method
11
Proof of control of Decentralized Identifiers
12
Various forms of DID Auth Interactions
13
Authenticating with DIDs via Self-Issued OIDC
14
Verifiable Credentials
15
Sovrin DID method, Foundation, Ledger
16
How can You Apply this knowledge
Description:
Explore the fundamentals of decentralized identity in this 51-minute RSA Conference talk. Delve into the mechanics of public key storage on ledgers as anchors for digital trust and examine evolving architectures leveraging this trust. Learn about key generation, Decentralized ID creation on blockchains, and the process of using these IDs for secure transactions. Understand core concepts such as the Trust Model, Decentralized Identifiers (DIDs), DID Methods, and proof of control. Investigate various DID authentication interactions, including Self-Issued OIDC, and grasp the significance of Verifiable Credentials. Gain insights into specific implementations like the Sovrin DID method, Foundation, and Ledger. Conclude by discovering practical applications for this knowledge in real-world scenarios.

Decentralized Identity - No Promises Edition

RSA Conference
Add to list
0:00 / 0:00