BLOCKCHAIN AND DIGITAL IDENTITY: PRIVACY, SECURITY, AND TRUST IN THE DIGITAL AGE
Author: Dr. Pramod Kumar
Publisher: Xoffencerpublication
Published: 2023-06-06
Total Pages: 221
ISBN-13: 9394707972
DOWNLOAD EBOOKAn identity of a person or organization can be represented by a set of qualities associated with the entity, such as the person's or organization's name, address, and other relevant information. Maintaining the data required for identifying a person and controlling their access is a component of identity management. The three most important actors in the identity management system are called a Holder, an Issuer, and a Verifier. Personal credentials can be issued to an identity holder (a legal individual or business) by the identity issuer, which is a third party that can be trusted and is often a local government. The identity issuer verifies the accuracy of the user's personal information included in the credential before releasing the user's data to that user. For instance, the surname, as well as the month and year of birth. These credentials can be saved by the holder of the identity in his or her personality identification wallet, and the holder of the identity can use them at a later time to verify assertions about his or her identity to a third party who is the validator of the identity data. A credential is a collection of several different identity attributes, such as a person's name, age, and date of birth. An identity attribute is a piece of information that describes an identity. The holder of a credential can make a verifiable claim, which must include certain facts about the holder that must be testified to by the issuer and digitally signed by the issuer. Credentials are given out by independent organizations that attest for the truthfulness of the information that is contained inside the credential. The validity and dependability of a certificate are directly proportional to the credibility and reputation of the organization that issued it. The fact in a credential could be the holder's identification data (like their date of birth, for example) or it might be another form of factual data (like their grade point average, for example). After developing a trustworthy connection with the issuer, anybody, such as an employer, has the potential to act in the capacity of claim verifier. The verifier makes a request for a particular credential (such as a person's birth certificate, for instance), and then uses the issuer's signature to validate the legitimacy of the credential. Identity management can be difficult if the holders do not have complete control over their own identity data. This is because identity data are typically stored at the websites of third-party issuers, such as government institutes, banks, and credit agencies