Decentralised Identifier (DID) Wallet.

What are Decentralised Identifiers?

Do we still have control over our personal data? Nearly every piece of information about us is tied to a database these days.

To resolve this, the World Wide Web Consortium has proposed a way to help us decouple from central data registries. The method involves the adoption of decentralised identifiers that will keep us verifiable on the internet without relying on centralised parties. Sooner or later, you may find yourself owning a DID wallet to control your personal data.

What are identifiers?

Before we discuss decentralised identifiers, here’s a brief explanation of what identifiers mean.

Identifiers make anything on the internet identifiable and verifiable. We use them to locate online addresses, identification numbers and also products (i.e., through serial numbers). URLs (Uniform Resource Locator) and URIs (Uniform Resource Identifiers) are common forms of identifiers. They respectively represent the web pages you view in a browser and online resources like HTML pages or images. 

However, the problem with identifiers is that the validity depends on the existence of a central registry or authorising body. The same authorities may also have the power to revoke those identifiers. For example, Facebook can use their discretion in choosing the accounts they want to suspend. 

What are decentralised identifiers?

Now that you’ve learned about identifiers, decentralised identifiers, or DIDs, are a new type of globally unique identifiers. They are designed to help us remain verifiable without relying on a central authority or body. With DIDs, the holders themselves get to be the authority of their own data, by providing authentication through cryptographically secure methods like digital signatures. Users can also define the scope of use for their DIDs that is appropriate to various contexts. 

According to the graphic below, a DID consists of a DID controller, a DID subject, and a DID Document. In order for the DID to be resolvable, or provide clearer information about the subject, the DID has to be recorded on a distributed data registry, such as on blockchain. 

DID Document

A DID document contains information associated with the subject, such as the following:

  • Identifiers: This refers to anything that is identifiable and verifiable about the subject (i.e., email addresses).
  • Public Keys: A DID Document may contain multiple cryptographic public keys for others to verify the information of a DID.
  • Auth Methods: As the name suggests, this allows any service you access to authenticate you as the owner of the entity your ID represents.
  • Service Endpoints: This helps you interact with different services and platforms on the internet.
  • Timestamp: This will help anyone understand when the ID was created, when ownership over an entity was established, etc.
  • Signature: This is merely your digital signature, which will help with the verification and authentication process.

DID Controller

A DID controller refers to the entity that has the capability of making changes to the DID. The controller may also be the DID subject. 

DID Subject

This refers to the subject identified by the DID and in the DID document. This could be a person, group, organisation, or physical and digital items. 

Benefits of Decentralised Identifiers

To summarise, decentralised identifiers can help us improve the way we control and manage our personal data. Being in control of our personal data protects us from undesirable situations like invasion of privacy and data leakage as a result of a data breach. What’s also interesting is that DIDs are customisable. We can personalise them according to our data privacy needs and secure them through cryptography. 

UKISS Technology is creating a decentralised security ecosystem that incorporates a self-sovereign identity blockchain, our multipurpose Hugware® hardware wallet, and KISS Tokens. For more details on how we plan to return control of identity and security to digital natives, read our White Paper.

Related posts

Crypto Token Standards Explained

Crypto Token Standards Explained

Token standards vary depending on the different smart contracts they follow. If you’re looking to…
NFT Gaming Explained

NFT Gaming Explained

NFT gaming is a popular way of collecting NFTs while playing games online. It allows…
$2.9M NFT tweet struggles to sell, US blames North Korean group for crypto theft

$2.9M NFT tweet struggles to sell,...

Goooodddd Friday, folks! Twitter is taking over the Web 3 headlines this week, starting with…

Share this post

Share on facebook
Share on twitter
Share on linkedin
Share on pinterest
Share on print
Share on email