Introduction to Verifiable Credentials

Introduction to Verifiable Credentials

In the last few guides, we have discussed about several topics: from digital identity models, to the emergence of Self  Sovereign Identity (SSI), and one of the first pillars, DIDs. As already addressed, the concept of Self Sovereign Identity is based on three main...
Introduction to Decentralized Identifiers (DID)

Introduction to Decentralized Identifiers (DID)

What are Decentralized Identifiers (DID)? Special features of Decentralized Identifiers (DID) How is a Decentralized Identifier (DID) formed? Introduction to the architecture of Decentralized Identifiers (DID) In this third guide, we will explain how one of the...
Digital Identity Models

Digital Identity Models

How the centralized model for personal data management works How the federated personal data management model works How the SSi model works for personal data management What is a digital identity? This is an increasingly topical question in a world that is becoming...
Introduction to Self-Sovereign Identity

Introduction to Self-Sovereign Identity

The concept of identity and the concept of identity on the web The birth of the Internet and the problem of digital identity Introduction to the founding concepts and technological architecture of Self-Sovereign Identity. Identity is a purely human concept. It is that...
The Role of Blockchain in Self Sovereign Identity

The Role of Blockchain in Self Sovereign Identity

Welcome back! In previous guides we have already introduced several interesting concepts regarding Self Sovereign Identity. We have moved from digital identity models to the concept of SSI, analysing the three fundamental pillars supporting Self Sovereign Identity,...