👉

Did you like how we did? Rate your experience!

Rated 4.5 out of 5 stars by our customers 561

Award-winning PDF software

review-platform review-platform review-platform review-platform review-platform

Video instructions and help with filling out and completing Dd 1750

Instructions and Help about Dd 1750

True". Hey folks, if you're watching this video, you're probably interested in building an application that uses verifiable credentials. In this session, we're going to go through what verifiable credentials are and why there are advantages over other approaches. We're also going to touch upon the basics of self-sovereign identity (SSI) ecosystem, including the three roles of issuer, holder, and verifier. We'll show you how you can get started building an application in one evening, and we'll demonstrate this as well. So, what are verifiable credentials? In very simple terms, a verifiable credential is a digital document that makes a claim about an entity. The term "credential" can imply any sort of information that some authority claims to be true about you. This can enable you to convince others about the claims inside the credential. Let's take an example. If you're familiar with JSON, a verifiable credential is a JSON LD schema. JSON-LD is essentially JSON with some additional metadata in the form of context and cryptographic signatures. These cryptographic proofs give the verifiability to the credential. In the example, you can see claims about a subject, which could be a person, organization, or anyone else. In this case, a university is making a claim about a student, stating that they are from that university. More fields, such as the student's GPA, can be added to the credential. The issuer, in this case, the university, can sign the credential, and each entity in the ecosystem has a decentralized identifier (DID) to identify them. Now that we know what a verifiable credential is, let's discuss its advantages. A verifiable credential issued in a digital format can be advantageous in multiple contexts. One advantage is that if the verifiable credential is decentralized and stored in your mobile phone or edge device, you...