TrustGrid Wiki
CtrlK
  • TrustGrid Overview
    • Platform Overview
    • Potential Applications
  • SSI Personae
    • Holder
    • Issuer
    • Verifier
  • Technical Architecture
    • HyperLedger Indy
      • Indy Nodes
    • Aries Framework
    • TrustGrid Architecture
  • Decentralized Identities (DIDs)
    • What is a DID?
    • DID Issuance
    • DID Document
  • Verifiable Credentials
    • Verifiable Business License issuance process
    • VC Structure
    • Issuing VCs
    • Verifying VCs
  • Product Features & Security
    • Biometrics
      • Liveliness Test
      • 3D Vector Check
    • HROT - Hardware Root Of Trust
      • HRoT and Zero-Knowledge Proofs (ZKPs) for Enhanced Security
      • Old Contents
    • Decentralized Storage
    • Secure Access to Portal with Keycloak
    • Key Management
  • Security Standards & Encryption
    • Encryption Algorithms
    • Hashing Algorithms
    • Security & Privacy Standards
  • User Guide
    • 1. Consortium Creation
    • 2. Consortium
    • 3. Adding Issuer Organization
    • 4. Adding Verifier Organization
    • 5. TrustGrid Issuer Portal - Account Setup
    • 6. Add details to Issuer Profile
    • 7. Add New Service - Issuer Portal
    • 8. Add User in the Issuer Portal
    • 9. View Issued Credentials
    • 10. TrustGrid Verifier Portal - Account Setup
    • 11. Add details to Verifier Profile
    • 12. Add User in the Verifier portal
    • 13. Verifiable Claims Creation
    • 14. Verifiable Claim QR display
    • 15. View Requested proofs
    • 16. Holder Sign up on TrustGrid Mobile App
    • 17. Join the Consortium as a Holder
    • 18. Subscribe to a Service within the consortium as a Holder
    • 19. View Active Credentials
    • 20. Presenting proof to Verifier
  • About Us
  • Our Patents
  • ISO Certifications
  • Our Solutions
  • FAQ
    • How is the data flow in the persistence layer?
    • How does the architecture represent the decentralized model?
Powered by GitBook
On this page

Product Features & Security

BiometricsHROT - Hardware Root Of TrustDecentralized StorageSecure Access to Portal with KeycloakKey Management
PreviousVerifying VCsNextBiometrics

Last updated 1 year ago