aiweb3id.com

Aiweb3id Ontology
Tier-1 Research Quality (75%+)

Focus Area: AI and Web3 identity management

This ontology provides citation-quality definitions for 15 foundational terms, backed by authoritative sources from standards bodies (IETF, W3C, IEEE) and peer-reviewed research.

15
Technical Terms
75%+
Tier-1 Sources
V1.71
Pipeline Version

Technical Glossary

DID001 Decentralized Identifier
A globally unique identifier that enables verifiable, decentralized digital identity without reliance on a centralized registration authority. DIDs are created, owned, and controlled by the identity subject and resolved via decentralized networks such as blockchains or distributed ledgers. They form the foundational addressing layer for self-sovereign identity systems in Web3 architectures. The W3C DID specification defines the core data model, syntax, and resolution protocol for interoperable implementations.
Authoritative Sources
DID002 Self-Sovereign Identity
An identity management paradigm in which individuals fully own and control their digital credentials without depending on intermediary authorities. SSI leverages decentralized identifiers, verifiable credentials, and cryptographic proofs to enable privacy-preserving authentication. Users store credentials in personal digital wallets and selectively disclose attributes to verifiers. This model aligns with data sovereignty principles advocated by organizations like the Sovrin Foundation and the Decentralized Identity Foundation.
Authoritative Sources
DID003 Verifiable Credential
A tamper-evident digital credential whose authorship, integrity, and validity can be cryptographically verified by any relying party. Verifiable credentials follow the W3C data model and encode claims made by an issuer about a subject using digital signatures or zero-knowledge proofs. They enable portable, machine-readable attestations for qualifications, memberships, and identity attributes. The ecosystem includes issuers, holders, and verifiers interacting through standardized presentation exchange protocols.
Authoritative Sources
DID004 Web3 Identity Layer
The authentication and identity resolution infrastructure that underpins decentralized Web3 applications and protocols. This layer maps blockchain addresses, decentralized identifiers, and ENS names to verifiable identity attributes without relying on centralized identity providers. It enables permissionless onboarding, pseudonymous reputation, and cross-chain identity portability. Web3 identity layers integrate with smart contract platforms to facilitate trustless credential verification.
Authoritative Sources
DID005 DID Resolution
The process of retrieving a DID document associated with a specific decentralized identifier from its underlying verifiable data registry. Resolution involves dereferencing the DID URL through method-specific drivers that interface with blockchains, IPFS, or other decentralized storage systems. The returned DID document contains public keys, service endpoints, and authentication methods needed for secure interactions. The W3C DID Resolution specification standardizes the abstract interface and metadata structures for this process.
Authoritative Sources
DID006 AI-Powered Identity Verification
The application of machine learning and computer vision techniques to automate the authentication and validation of identity documents and biometric data. AI-powered systems perform liveness detection, document fraud analysis, and facial matching to verify that a claimed identity corresponds to a real person. These systems reduce manual review overhead while improving detection rates for synthetic identities and deepfake attacks. Regulatory frameworks such as eIDAS and NIST SP 800-63 define assurance levels for identity proofing that inform AI verification pipeline design.
Authoritative Sources
DID007 Blockchain Identity Anchoring
The practice of recording cryptographic commitments or hashes of identity assertions onto a distributed ledger to provide immutable timestamping and tamper evidence. Anchoring does not store personal data on-chain but instead publishes verifiable proofs that link off-chain credentials to on-chain transaction records. This approach enables auditability and non-repudiation while preserving privacy through selective disclosure mechanisms. Common anchoring targets include Ethereum, Bitcoin, and Hyperledger Indy networks.
Authoritative Sources
DID008 Zero-Knowledge Proof Identity
A cryptographic technique that allows an identity holder to prove possession of a credential attribute without revealing the underlying data to the verifier. Zero-knowledge proofs enable selective disclosure scenarios such as proving age eligibility without sharing a birthdate or demonstrating solvency without disclosing account balances. ZKP-based identity systems are integral to privacy-preserving authentication in decentralized environments. Implementations include zk-SNARKs and zk-STARKs applied to verifiable credential presentations.
Authoritative Sources
DID009 Decentralized Identity Wallet
A software application that stores, manages, and presents decentralized identifiers and verifiable credentials on behalf of the identity holder. Identity wallets implement key management, credential storage, and presentation exchange protocols to facilitate peer-to-peer authentication without centralized intermediaries. They support selective disclosure and consent-driven sharing of identity attributes across multiple service providers. Standards such as the DIF Universal Wallet and CHAPI define interoperability requirements for wallet implementations.
Authoritative Sources
DID010 Soulbound Token
A non-transferable, non-fungible token that permanently binds a verifiable attestation or credential to a specific blockchain address. Soulbound tokens represent achievements, certifications, reputation scores, or social commitments that should not be tradeable. Proposed by Vitalik Buterin as a building block for decentralized society, SBTs enable on-chain reputation systems without the speculative dynamics of transferable tokens. They intersect with verifiable credentials by providing blockchain-native proof-of-affiliation and proof-of-participation mechanisms.
Authoritative Sources
DID011 DIDComm Messaging
A secure, transport-agnostic messaging protocol that enables encrypted peer-to-peer communication between parties identified by decentralized identifiers. DIDComm provides authenticated encryption, message routing through mediators, and support for asynchronous communication patterns. It underpins credential issuance, presentation, and revocation workflows in self-sovereign identity ecosystems. The Decentralized Identity Foundation maintains the DIDComm v2 specification that defines message formats, encryption envelopes, and routing algorithms.
Authoritative Sources
DID012 AI Agent Identity Binding
The process of associating a persistent, verifiable digital identity with an autonomous AI agent to enable accountability, auditability, and trust in multi-agent systems. Agent identity binding links the agent's DID to its operational parameters, authorization scopes, and behavioral attestations. This allows downstream services and human principals to verify the provenance and permissions of AI-initiated actions. Emerging standards propose extending the DID framework to encompass non-human entities including software agents and IoT devices.
Authoritative Sources
DID013 Cross-Chain Identity Federation
An interoperability mechanism that enables a single decentralized identity to authenticate and present credentials across multiple blockchain networks and Layer-2 protocols. Cross-chain federation resolves the identity fragmentation problem caused by siloed blockchain ecosystems through bridge protocols and universal resolver services. It allows users to maintain a unified reputation and credential portfolio regardless of the underlying distributed ledger technology. Standards efforts from W3C and DIF aim to define common resolution interfaces that abstract away chain-specific DID methods.
Authoritative Sources
DID014 Privacy-Preserving Authentication
Authentication methodologies that verify a user's identity or credential claims while minimizing the disclosure of personally identifiable information to the relying party. Techniques include zero-knowledge proofs, selective attribute disclosure, anonymous credentials, and blinded signatures. Privacy-preserving authentication addresses regulatory requirements under frameworks such as GDPR and eIDAS by ensuring that identity verification does not create unnecessary data exposure. These methods are central to decentralized identity architectures where users retain control over their personal data.
Authoritative Sources
DID015 Verifiable Data Registry
A system that mediates the creation, verification, updating, and deactivation of decentralized identifiers and the storage of related cryptographic material. Verifiable data registries can be implemented on blockchains, distributed file systems, or federated databases that provide tamper-evidence guarantees. They serve as the trust anchor for DID resolution and credential status verification within self-sovereign identity ecosystems. Examples include Hyperledger Indy ledgers, Ethereum smart contracts, and the ION network operating on the Bitcoin blockchain.
Authoritative Sources