@@ -787,14 +787,15 @@ <h3>Claims</h3>
787
787
< h3 > Credentials</ h3 >
788
788
789
789
< p >
790
- A [=credential=] is a set of one or more [=claims=] made by the same
791
- [=entity=]. [=Credentials=] might also include an identifier and metadata
792
- to describe properties of the [=credential=], such as the
793
- [=issuer=], the validity date and time period, a representative image,
794
- [=verification material=], the revocation
795
- mechanism, and so on. The metadata might be signed by the [=issuer=]. A
796
- [=verifiable credential=] is a set of tamper-evident [=claims=] and
797
- metadata that cryptographically prove who issued it.
790
+ A [=credential=] is a set of one or more [=claims=] made by the same [=entity=].
791
+ [=Credentials=] might also include an identifier and metadata to describe
792
+ properties of the [=credential=], such as the [=issuer=], the validity date and
793
+ time period, a representative image, [=verification material=], status
794
+ information, and so on. The metadata might be signed by the [=issuer=]. A
795
+ [=verifiable credential=] is a set of tamper-evident [=claims=] and metadata
796
+ that cryptographically prove who issued it. Examples of [=verifiable
797
+ credentials=] include digital employee identification cards, digital birth
798
+ certificates, and digital educational certificates.
798
799
</ p >
799
800
800
801
< figure id ="basic-vc ">
@@ -807,19 +808,6 @@ <h3>Credentials</h3>
807
808
</ figcaption >
808
809
</ figure >
809
810
810
- < p >
811
- Examples of [=verifiable credentials=] include digital employee
812
- identification cards, digital birth certificates, and digital educational
813
- certificates.
814
- </ p >
815
-
816
- < p class ="note ">
817
- [=Credential=] identifiers are often used to identify specific instances
818
- of a [=credential=]. These identifiers can also be used for correlation. A
819
- [=holder=] wanting to minimize correlation is advised to use a selective
820
- disclosure scheme that does not reveal the [=credential=] identifier.
821
- </ p >
822
-
823
811
< p >
824
812
< a href ="#basic-vc "> </ a > above shows the basic components of a
825
813
[=verifiable credential=], but abstracts the details about how [=claims=]
@@ -828,14 +816,17 @@ <h3>Credentials</h3>
828
816
</ p >
829
817
< p >
830
818
< a href ="#info-graph-vc "> </ a > below shows a more complete depiction of a
831
- [=verifiable credential=] using an [=embedded proof=] based on [[?VC-DATA-INTEGRITY]].
832
- It is composed of at least two information [=graphs=].
833
- The first of these information [=graphs=], the [=verifiable credential graph=] (which is the [=default graph=]),
834
- expresses the [=verifiable credential=] itself, through [=credential=] metadata and other [=claims=].
835
- The second information [=graph=], referred to by the `proof` property, is the < dfn > proof graph</ dfn >
836
- of the [=verifiable credential=], and is a separate [=named graph=].
837
- The [=proof graph=] expresses the digital proof, which, in this case, is a digital
838
- signature.
819
+ [=verifiable credential=] using an [=embedded proof=] based on
820
+ [[[?VC-DATA-INTEGRITY]]]. It is composed of at least two information [=graphs=].
821
+ The first of these information [=graphs=], the [=verifiable credential graph=]
822
+ (which is the [=default graph=]), expresses the [=verifiable credential=]
823
+ itself, through [=credential=] metadata and other [=claims=]. The second
824
+ information [=graph=], referred to by the `proof` property, is the
825
+ < dfn > proof graph</ dfn > of the [=verifiable credential=], and is a separate
826
+ [=named graph=]. The [=proof graph=] expresses the digital proof, which, in this
827
+ case, is a digital signature. Readers that are interested in the need for
828
+ multiple information graphs can refer to Section
829
+ [[[#verifiable-credential-graphs]]].
839
830
</ p >
840
831
841
832
< figure id ="info-graph-vc ">
@@ -894,6 +885,13 @@ <h3>Credentials</h3>
894
885
</ figcaption >
895
886
</ figure >
896
887
888
+ < p class ="note ">
889
+ [=Credential=] identifiers are often used to identify specific instances
890
+ of a [=credential=]. These identifiers can also be used for correlation. A
891
+ [=holder=] wanting to minimize correlation is advised to use a selective
892
+ disclosure scheme that does not reveal the [=credential=] identifier.
893
+ </ p >
894
+
897
895
< p class ="note ">
898
896
It is possible to have a [=credential=], such as a marriage certificate,
899
897
containing multiple [=claims=] about different [=subjects=] that are not
@@ -1365,7 +1363,7 @@ <h3>Identifiers</h3>
1365
1363
< a href ="#identifier-based-correlation "> </ a > carefully when considering such
1366
1364
scenarios. There are also other types of access and correlation mechanisms documented
1367
1365
in Section < a href ="#privacy-considerations "> </ a > that create privacy concerns.
1368
- Where privacy is a strong consideration, it is permissible to omit the
1366
+ Where privacy is a strong consideration, it is permissible to omit the
1369
1367
`id` [=property=]. Some use cases do not need, or explicitly need to omit,
1370
1368
the `id` [=property=]. Similarly, special attention is to be given to the choice between
1371
1369
publicly resolvable URLs and other forms of identifiers. Publicly resolvable URLs can
@@ -3061,7 +3059,7 @@ <h3>Trust Model</h3>
3061
3059
either of the following:
3062
3060
< ul >
3063
3061
< li >
3064
- An [=issuer=] is expected to secure a [=credential=] with a
3062
+ An [=issuer=] is expected to secure a [=credential=] with a
3065
3063
< a href ="#securing-mechanisms "> securing mechanism</ a > which establishes
3066
3064
that the [=issuer=] generated the [=credential=]. (In other words, an
3067
3065
[=issuer=] is expected to [=issue=] a [=verifiable credential=].)
@@ -5906,7 +5904,7 @@ <h3>Data Theft</h3>
5906
5904
[=verifiable presentations=] are valuable since they contain authentic
5907
5905
statements made by trusted third parties, such as [=issuers=], or
5908
5906
individuals, such as [=holders=] and [=subjects=]. The storage and
5909
- acessibility of this data can inadvertently create honeypots of
5907
+ acessibility of this data can inadvertently create honeypots of
5910
5908
sensitive data for malicious actors. These adversaries often seek to
5911
5909
exploit such resevoirs of sensitive information, aiming to
5912
5910
acquire and exchange that data for financial gain.
@@ -5917,9 +5915,9 @@ <h3>Data Theft</h3>
5917
5915
manage the status and revocation of those credentials. Similarly,
5918
5916
[=issuers=] are advised to avoid the practice of creating publicly
5919
5917
resolvable credentials that include personally identifiable information
5920
- (PII) or other sensitive data. Software implementers are advised
5921
- to safeguarded [=verifiable credentials=] using robust consent
5922
- and access control measures, ensuring that they remain
5918
+ (PII) or other sensitive data. Software implementers are advised
5919
+ to safeguarded [=verifiable credentials=] using robust consent
5920
+ and access control measures, ensuring that they remain
5923
5921
inaccessible to unauthorized entities.
5924
5922
</ p >
5925
5923
< p >
@@ -6451,7 +6449,7 @@ <h3>Code Injection</h3>
6451
6449
Despite the ability to encode information as HTML, implementers are strongly
6452
6450
discouraged from doing so, for the following reasons:
6453
6451
</ p >
6454
-
6452
+
6455
6453
< ul >
6456
6454
< li >
6457
6455
It requires some version of an HTML processor, which increases the burden of
0 commit comments