Focus Area: AI and Web3 identity management
This ontology provides citation-quality definitions for 15 foundational terms, backed by authoritative sources from standards bodies (IETF, W3C, IEEE) and peer-reviewed research.
Technical Glossary
A globally unique identifier that enables verifiable, decentralized digital identity without reliance on a centralized registration authority. DIDs are created, owned, and controlled by the identity subject and resolved via decentralized networks such as blockchains or distributed ledgers. They form the foundational addressing layer for self-sovereign identity systems in Web3 architectures. The W3C DID specification defines the core data model, syntax, and resolution protocol for interoperable implementations.
An identity management paradigm in which individuals fully own and control their digital credentials without depending on intermediary authorities. SSI leverages decentralized identifiers, verifiable credentials, and cryptographic proofs to enable privacy-preserving authentication. Users store credentials in personal digital wallets and selectively disclose attributes to verifiers. This model aligns with data sovereignty principles advocated by organizations like the Sovrin Foundation and the Decentralized Identity Foundation.
A tamper-evident digital credential whose authorship, integrity, and validity can be cryptographically verified by any relying party. Verifiable credentials follow the W3C data model and encode claims made by an issuer about a subject using digital signatures or zero-knowledge proofs. They enable portable, machine-readable attestations for qualifications, memberships, and identity attributes. The ecosystem includes issuers, holders, and verifiers interacting through standardized presentation exchange protocols.
The authentication and identity resolution infrastructure that underpins decentralized Web3 applications and protocols. This layer maps blockchain addresses, decentralized identifiers, and ENS names to verifiable identity attributes without relying on centralized identity providers. It enables permissionless onboarding, pseudonymous reputation, and cross-chain identity portability. Web3 identity layers integrate with smart contract platforms to facilitate trustless credential verification.
The process of retrieving a DID document associated with a specific decentralized identifier from its underlying verifiable data registry. Resolution involves dereferencing the DID URL through method-specific drivers that interface with blockchains, IPFS, or other decentralized storage systems. The returned DID document contains public keys, service endpoints, and authentication methods needed for secure interactions. The W3C DID Resolution specification standardizes the abstract interface and metadata structures for this process.
The application of machine learning and computer vision techniques to automate the authentication and validation of identity documents and biometric data. AI-powered systems perform liveness detection, document fraud analysis, and facial matching to verify that a claimed identity corresponds to a real person. These systems reduce manual review overhead while improving detection rates for synthetic identities and deepfake attacks. Regulatory frameworks such as eIDAS and NIST SP 800-63 define assurance levels for identity proofing that inform AI verification pipeline design.
The practice of recording cryptographic commitments or hashes of identity assertions onto a distributed ledger to provide immutable timestamping and tamper evidence. Anchoring does not store personal data on-chain but instead publishes verifiable proofs that link off-chain credentials to on-chain transaction records. This approach enables auditability and non-repudiation while preserving privacy through selective disclosure mechanisms. Common anchoring targets include Ethereum, Bitcoin, and Hyperledger Indy networks.
A cryptographic technique that allows an identity holder to prove possession of a credential attribute without revealing the underlying data to the verifier. Zero-knowledge proofs enable selective disclosure scenarios such as proving age eligibility without sharing a birthdate or demonstrating solvency without disclosing account balances. ZKP-based identity systems are integral to privacy-preserving authentication in decentralized environments. Implementations include zk-SNARKs and zk-STARKs applied to verifiable credential presentations.
A software application that stores, manages, and presents decentralized identifiers and verifiable credentials on behalf of the identity holder. Identity wallets implement key management, credential storage, and presentation exchange protocols to facilitate peer-to-peer authentication without centralized intermediaries. They support selective disclosure and consent-driven sharing of identity attributes across multiple service providers. Standards such as the DIF Universal Wallet and CHAPI define interoperability requirements for wallet implementations.
A non-transferable, non-fungible token that permanently binds a verifiable attestation or credential to a specific blockchain address. Soulbound tokens represent achievements, certifications, reputation scores, or social commitments that should not be tradeable. Proposed by Vitalik Buterin as a building block for decentralized society, SBTs enable on-chain reputation systems without the speculative dynamics of transferable tokens. They intersect with verifiable credentials by providing blockchain-native proof-of-affiliation and proof-of-participation mechanisms.
A secure, transport-agnostic messaging protocol that enables encrypted peer-to-peer communication between parties identified by decentralized identifiers. DIDComm provides authenticated encryption, message routing through mediators, and support for asynchronous communication patterns. It underpins credential issuance, presentation, and revocation workflows in self-sovereign identity ecosystems. The Decentralized Identity Foundation maintains the DIDComm v2 specification that defines message formats, encryption envelopes, and routing algorithms.
The process of associating a persistent, verifiable digital identity with an autonomous AI agent to enable accountability, auditability, and trust in multi-agent systems. Agent identity binding links the agent's DID to its operational parameters, authorization scopes, and behavioral attestations. This allows downstream services and human principals to verify the provenance and permissions of AI-initiated actions. Emerging standards propose extending the DID framework to encompass non-human entities including software agents and IoT devices.
An interoperability mechanism that enables a single decentralized identity to authenticate and present credentials across multiple blockchain networks and Layer-2 protocols. Cross-chain federation resolves the identity fragmentation problem caused by siloed blockchain ecosystems through bridge protocols and universal resolver services. It allows users to maintain a unified reputation and credential portfolio regardless of the underlying distributed ledger technology. Standards efforts from W3C and DIF aim to define common resolution interfaces that abstract away chain-specific DID methods.
Authentication methodologies that verify a user's identity or credential claims while minimizing the disclosure of personally identifiable information to the relying party. Techniques include zero-knowledge proofs, selective attribute disclosure, anonymous credentials, and blinded signatures. Privacy-preserving authentication addresses regulatory requirements under frameworks such as GDPR and eIDAS by ensuring that identity verification does not create unnecessary data exposure. These methods are central to decentralized identity architectures where users retain control over their personal data.
A system that mediates the creation, verification, updating, and deactivation of decentralized identifiers and the storage of related cryptographic material. Verifiable data registries can be implemented on blockchains, distributed file systems, or federated databases that provide tamper-evidence guarantees. They serve as the trust anchor for DID resolution and credential status verification within self-sovereign identity ecosystems. Examples include Hyperledger Indy ledgers, Ethereum smart contracts, and the ION network operating on the Bitcoin blockchain.