How is the data flow in the persistence layer?
Future State Implementation
Persistence layer is used to store Zero-knowledge decentralized identifier information
•Persistence layer enables relying parties to access DID-Document of an applicant
•DID-Documents are Zero-knowledge, they contain no PII, they contain DID & Public key
•With out access to the public key (which is securely held by the user) DID documents cannot be used.
•DIDs are issued by the DID-Issuer and are fully independent of Brunei data bases.
•DIDs are used to prove ownership of a verifiable claim
Persistence layer contains no PII or sensitive data
W3C designed the persistence layer to be
privacy preserving and not present an attack surface

DIDs are signed by a DID controller
DIDs enable a relying party to verify that subject owns a private key.
DID are exposed via the persistence layer.
DIDs are Zero-knowledge (No PII)

Verifiable claims are signed by the credential authority (Brunei Business license authority)
Verifiable claims enable a relying party to prove that a DID owner is the subject of the signed credentials.
Verifiable credentials are controlled by the user in the secure wallet.
Last updated