How is the data flow in the persistence layer?

Future State Implementation

Persistence layer is used to store Zero-knowledge decentralized identifier information

•Persistence layer enables relying parties to access DID-Document of an applicant

•DID-Documents are Zero-knowledge, they contain no PII, they contain DID & Public key

•With out access to the public key (which is securely held by the user) DID documents cannot be used.

•DIDs are issued by the DID-Issuer and are fully independent of Brunei data bases.

•DIDs are used to prove ownership of a verifiable claim

Persistence layer contains no PII or sensitive data

W3C designed the persistence layer to be

privacy preserving and not present an attack surface

DIDs are signed by a DID controller

DIDs enable a relying party to verify that subject owns a private key.

DID are exposed via the persistence layer.

DIDs are Zero-knowledge (No PII)

Verifiable claims are signed by the credential authority (Brunei Business license authority)

Verifiable claims enable a relying party to prove that a DID owner is the subject of the signed credentials.

Verifiable credentials are controlled by the user in the secure wallet.

Last updated