Skip to content

Commit 6938250

Browse files
committed
Speak to graph quoting in credential section.
1 parent 9d2560e commit 6938250

File tree

1 file changed

+34
-36
lines changed

1 file changed

+34
-36
lines changed

index.html

Lines changed: 34 additions & 36 deletions
Original file line numberDiff line numberDiff line change
@@ -787,14 +787,15 @@ <h3>Claims</h3>
787787
<h3>Credentials</h3>
788788

789789
<p>
790-
A [=credential=] is a set of one or more [=claims=] made by the same
791-
[=entity=]. [=Credentials=] might also include an identifier and metadata
792-
to describe properties of the [=credential=], such as the
793-
[=issuer=], the validity date and time period, a representative image,
794-
[=verification material=], the revocation
795-
mechanism, and so on. The metadata might be signed by the [=issuer=]. A
796-
[=verifiable credential=] is a set of tamper-evident [=claims=] and
797-
metadata that cryptographically prove who issued it.
790+
A [=credential=] is a set of one or more [=claims=] made by the same [=entity=].
791+
[=Credentials=] might also include an identifier and metadata to describe
792+
properties of the [=credential=], such as the [=issuer=], the validity date and
793+
time period, a representative image, [=verification material=], status
794+
information, and so on. The metadata might be signed by the [=issuer=]. A
795+
[=verifiable credential=] is a set of tamper-evident [=claims=] and metadata
796+
that cryptographically prove who issued it. Examples of [=verifiable
797+
credentials=] include digital employee identification cards, digital birth
798+
certificates, and digital educational certificates.
798799
</p>
799800

800801
<figure id="basic-vc">
@@ -807,19 +808,6 @@ <h3>Credentials</h3>
807808
</figcaption>
808809
</figure>
809810

810-
<p>
811-
Examples of [=verifiable credentials=] include digital employee
812-
identification cards, digital birth certificates, and digital educational
813-
certificates.
814-
</p>
815-
816-
<p class="note">
817-
[=Credential=] identifiers are often used to identify specific instances
818-
of a [=credential=]. These identifiers can also be used for correlation. A
819-
[=holder=] wanting to minimize correlation is advised to use a selective
820-
disclosure scheme that does not reveal the [=credential=] identifier.
821-
</p>
822-
823811
<p>
824812
<a href="#basic-vc"></a> above shows the basic components of a
825813
[=verifiable credential=], but abstracts the details about how [=claims=]
@@ -828,14 +816,17 @@ <h3>Credentials</h3>
828816
</p>
829817
<p>
830818
<a href="#info-graph-vc"></a> below shows a more complete depiction of a
831-
[=verifiable credential=] using an [=embedded proof=] based on [[?VC-DATA-INTEGRITY]].
832-
It is composed of at least two information [=graphs=].
833-
The first of these information [=graphs=], the [=verifiable credential graph=] (which is the [=default graph=]),
834-
expresses the [=verifiable credential=] itself, through [=credential=] metadata and other [=claims=].
835-
The second information [=graph=], referred to by the `proof` property, is the <dfn>proof graph</dfn>
836-
of the [=verifiable credential=], and is a separate [=named graph=].
837-
The [=proof graph=] expresses the digital proof, which, in this case, is a digital
838-
signature.
819+
[=verifiable credential=] using an [=embedded proof=] based on
820+
[[[?VC-DATA-INTEGRITY]]]. It is composed of at least two information [=graphs=].
821+
The first of these information [=graphs=], the [=verifiable credential graph=]
822+
(which is the [=default graph=]), expresses the [=verifiable credential=]
823+
itself, through [=credential=] metadata and other [=claims=]. The second
824+
information [=graph=], referred to by the `proof` property, is the
825+
<dfn>proof graph</dfn> of the [=verifiable credential=], and is a separate
826+
[=named graph=]. The [=proof graph=] expresses the digital proof, which, in this
827+
case, is a digital signature. Readers that are interested in the need for
828+
multiple information graphs can refer to Section
829+
[[[#verifiable-credential-graphs]]].
839830
</p>
840831

841832
<figure id="info-graph-vc">
@@ -894,6 +885,13 @@ <h3>Credentials</h3>
894885
</figcaption>
895886
</figure>
896887

888+
<p class="note">
889+
[=Credential=] identifiers are often used to identify specific instances
890+
of a [=credential=]. These identifiers can also be used for correlation. A
891+
[=holder=] wanting to minimize correlation is advised to use a selective
892+
disclosure scheme that does not reveal the [=credential=] identifier.
893+
</p>
894+
897895
<p class="note">
898896
It is possible to have a [=credential=], such as a marriage certificate,
899897
containing multiple [=claims=] about different [=subjects=] that are not
@@ -1365,7 +1363,7 @@ <h3>Identifiers</h3>
13651363
<a href="#identifier-based-correlation"></a> carefully when considering such
13661364
scenarios. There are also other types of access and correlation mechanisms documented
13671365
in Section <a href="#privacy-considerations"></a> that create privacy concerns.
1368-
Where privacy is a strong consideration, it is permissible to omit the
1366+
Where privacy is a strong consideration, it is permissible to omit the
13691367
`id` [=property=]. Some use cases do not need, or explicitly need to omit,
13701368
the `id` [=property=]. Similarly, special attention is to be given to the choice between
13711369
publicly resolvable URLs and other forms of identifiers. Publicly resolvable URLs can
@@ -3061,7 +3059,7 @@ <h3>Trust Model</h3>
30613059
either of the following:
30623060
<ul>
30633061
<li>
3064-
An [=issuer=] is expected to secure a [=credential=] with a
3062+
An [=issuer=] is expected to secure a [=credential=] with a
30653063
<a href="#securing-mechanisms">securing mechanism</a> which establishes
30663064
that the [=issuer=] generated the [=credential=]. (In other words, an
30673065
[=issuer=] is expected to [=issue=] a [=verifiable credential=].)
@@ -5906,7 +5904,7 @@ <h3>Data Theft</h3>
59065904
[=verifiable presentations=] are valuable since they contain authentic
59075905
statements made by trusted third parties, such as [=issuers=], or
59085906
individuals, such as [=holders=] and [=subjects=]. The storage and
5909-
acessibility of this data can inadvertently create honeypots of
5907+
acessibility of this data can inadvertently create honeypots of
59105908
sensitive data for malicious actors. These adversaries often seek to
59115909
exploit such resevoirs of sensitive information, aiming to
59125910
acquire and exchange that data for financial gain.
@@ -5917,9 +5915,9 @@ <h3>Data Theft</h3>
59175915
manage the status and revocation of those credentials. Similarly,
59185916
[=issuers=] are advised to avoid the practice of creating publicly
59195917
resolvable credentials that include personally identifiable information
5920-
(PII) or other sensitive data. Software implementers are advised
5921-
to safeguarded [=verifiable credentials=] using robust consent
5922-
and access control measures, ensuring that they remain
5918+
(PII) or other sensitive data. Software implementers are advised
5919+
to safeguarded [=verifiable credentials=] using robust consent
5920+
and access control measures, ensuring that they remain
59235921
inaccessible to unauthorized entities.
59245922
</p>
59255923
<p>
@@ -6451,7 +6449,7 @@ <h3>Code Injection</h3>
64516449
Despite the ability to encode information as HTML, implementers are strongly
64526450
discouraged from doing so, for the following reasons:
64536451
</p>
6454-
6452+
64556453
<ul>
64566454
<li>
64576455
It requires some version of an HTML processor, which increases the burden of

0 commit comments

Comments
 (0)