Difference between revisions of "Trust Architecture"
Line 29: | Line 29: | ||
|- | |- | ||
| [[Data Encryption/Decryption]] | | [[Data Encryption/Decryption]] | ||
− | | | + | | Application component providing encryption and decryption functionality (symmetrical, asymmetrical or a combination thereof). |
| [[Intermediation Pattern|IM]], [[USI]] (<span style="background:#FFFF00">TODO discuss, strange that this is not applicable to VC</span>) | | [[Intermediation Pattern|IM]], [[USI]] (<span style="background:#FFFF00">TODO discuss, strange that this is not applicable to VC</span>) | ||
|- | |- | ||
| [[Mandates/Powers]] | | [[Mandates/Powers]] | ||
− | | | + | | Handles the mandates/powers for legal and natural persons, i.e. persons representing other persons. |
| [[Intermediation Pattern|IM]], [[USI]] | | [[Intermediation Pattern|IM]], [[USI]] | ||
|- | |- | ||
| [[Distributed Ledger]] | | [[Distributed Ledger]] | ||
− | | | + | | Application component that handles connections and operations related to the distributed ledger. |
| [[VC]] | | [[VC]] | ||
|- | |- | ||
| [[Distributed Ledger Access Management]] | | [[Distributed Ledger Access Management]] | ||
− | | | + | | Application component that manages the access management related to Write/Read access into distributed ledger storage. |
| [[VC]] | | [[VC]] | ||
|- | |- | ||
|} | |} |
Revision as of 15:47, 23 March 2021
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Proin suscipit mauris eu dui aliquet, feugiat porttitor eros placerat. Nullam semper arcu dui, sit amet laoreet urna vulputate a. Nullam et ligula non ante faucibus commodo a eget nisi. Pellentesque habitant morbi tristique senectus et netus et malesuada fames ac turpis.
Application Component | Description | Pattern(s) |
---|---|---|
Trust Service Provisioning Component | Implements the functionalities encapsulating the trust services functionalities.
A ‘trust service’ means an electronic service which consists of these functionalities: i) the creation, verification, and validation of electronic signatures, electronic seals or electronic time stamps, electronic registered delivery services and certificates related to those services, or ii) the creation, verification and validation of certificates for website authentication; or iii) the preservation of electronic signatures, seals or certificates related to those services. |
IM, USI, VC |
Identity Management Component | Implements the functionality of user authentication.
‘Electronic identification’ means the process of using person identification data in electronic form uniquely representing either a natural or legal person, or a natural person representing a legal person; ‘Authentication’ means an electronic process that enables the electronic identification of a natural or legal person, or the origin and integrity of |
IM, USI, VC |
Record Matching | Application component that provides identity matching based on attributes. Provided attributes are matched against attributes in some local registry. | IM, USI, VC |
Data Encryption/Decryption | Application component providing encryption and decryption functionality (symmetrical, asymmetrical or a combination thereof). | IM, USI (TODO discuss, strange that this is not applicable to VC) |
Mandates/Powers | Handles the mandates/powers for legal and natural persons, i.e. persons representing other persons. | IM, USI |
Distributed Ledger | Application component that handles connections and operations related to the distributed ledger. | VC |
Distributed Ledger Access Management | Application component that manages the access management related to Write/Read access into distributed ledger storage. | VC |