Decentralized Identity Verification
Organizations can quickly verify users' digital credentials in seconds using Dock Certs and the Dock Wallet on a phone or computer. The verification process is powered by blockchain technology, making it fast and reliable. Because Dock's tools detect fraudulent credentials, verifiers can be assured that the information presented is accurate. Organizations can verify documents with the web or wallet-to-wallet (online or in person).
Benefits of Instant Credential Verification for Organizations
- Quickly authenticate a Verifiable Credential in seconds instead of the conventional verification methods that can be time-consuming and take several weeks to months.
- Stop document fraud.
- Streamline the verification process to save time and reduce expenses by avoiding manual, time-intensive, and unproductive methods.
- Comply with data protection regulations.
- Boost operational effectiveness.
- Minimize the possibility of liabilities, fines, legal actions and catastrophic incidents by guaranteeing that only suitable candidates are hired.
Benefits of Instant Credential Verification for Individuals
With the Dock Wallet, individuals:
- Have greater control and protection over their personal data as they have the ability to selectively share parts of their credentials with a verifier. For example, they can opt to share only their degree name and keep sensitive information such as their date of birth private.
- Effortlessly share their credentials directly from their phone.
- Reduce the risk of unauthorized data access by sharing only the required information with a verifier while keeping complete control over who has access to their information.
Complete Verification Guide for Dock Certs and the Dock Wallet
Click here for the complete guide on how to verify credentials.
Difference Between Public Key and Private Key Cryptography With an Example
Every newly created DID comes with one or many private key and public keys.
Each DID comes with one or many private and public keys:
- Private key: Made up of a long string of letters and numbers that allows people to prove ownership, give consent to share selected data, and sign documents. It is used to both encrypt and decrypt the data. As an analogy, a private key is like a master key that can access all of your information and the owner should never share their private key with anyone.
- Public key: Made up of a long string of letters and numbers that can safely be shared with anyone you choose to give specific information to.
You can have multiple private-public key pairs, and it’s good practice to generate new public keys when sharing information with a different party. This can be compared to using the same password for 10 different websites. It’s not safe to do this for security reasons. It’s better to have different and long complex passwords for all sites. Similarly, it’s better to generate a new public key for each party you share information with.
Example of how private and public keys would be used
Let’s say there’s a health and safety training organization that provides certification for construction safety and this course is a requirement for workers to get a job with a construction company. Here is how decentralized identity helps prevent fraud and enables organizations to save a lot of time and resources issuing and verifying credentials:
- Carl finishes the program and the training organization requests to connect with his digital identity wallet
- When Carl authorizes the training organization to connect, the wallet shares his public DID in order for them to issue the credential.
- The training organization signs the digital certificate of completion with their private key and issues the credential. Their public key is stored on the blockchain. The organization can easily and efficiently issue many credentials at the same time with a decentralized identity platform like Dock.
- Carl would hold his credential on a digital wallet on his phone that he can bring everywhere.
- Carl gives the construction company authorization to see his credentials without showing any unnecessary information about himself like his address and date of birth.
- The company instantly verifies the authenticity of his credentials by scanning a QR code and not having to contact the issuer at all because the training organization’s public key is on the blockchain.
Traditional certification verification processes would normally take a few weeks before he can start working because the construction company would have to manually contact the issuer. The previous verification process would be time-consuming and expensive.
去中心化的身份验证
组织可以使用 Dock Certs 和 Dock Wallet,在手机或计算机上在几秒钟内快速验证用户的数字证书。验证过程由区块链技术驱动,因此快速可靠。由于Dock的工具可以检测到欺诈性证书,因此验证者可以确信所呈现的信息是准确的。组织可以使用web或钱包对钱包进行文档验证(在线或面对面)。
组织获得即时凭证验证的好处
- 可以在几秒钟内快速验证可验证证书,而不是传统的验证方法,这可能耗时数周到数月。
- 防止文档欺诈。
- 简化验证过程,节省时间并减少费用,避免手动、耗时和无效的方法。
- 遵守数据保护法规。
- 增强操作效率。
- 通过保证只雇用合适的候选人,最小化可能的责任、罚款、法律诉讼和灾难性事件。
个人获得即时凭证验证的好处
使用Dock钱包的个人:
- 拥有对个人数据的更大控制和保护,因为他们可以选择性地与验证者共享他们的凭证部分。例如,他们可以选择仅共享他们的学位名称,并保持诸如出生日期之类的敏感信息私密。
- 无需费力地从手机直接共享他们的凭证。
- 通过仅与验证者共享所需信息并始终完全控制谁能访问他们的信息,减少未经授权的数据访问的风险。
Dock Certs和Dock Wallet的完整验证指南
点击此处 获取有关如何验证凭证的完整指南。
公钥和私钥加密的区别以及示例
每个新创建的DID都有一个或多个私钥和公钥。
每个DID都有一个或多个私钥和公钥:
- 私钥:由一长串字母和数字组成,允许人们证明所有权,同意分享选定的数据并签署文件。它用于加密和解密数据。类比地说,私钥就像一个可以访问所有信息的主钥匙,所有者不应与任何人分享他们的私钥。
- 公钥:由一长串字母和数字组成,可以安全地与您选择共享特定信息的任何人共享。
您可以有多个私钥-公钥对,并且当与不同方共享信息时生成新的公钥是很好的做法。这可以与为10个不同网站使用相同密码进行比较。出于安全原因,这样做是不安全的。最好为所有站点使用不同且复杂的密码。同样,与与您共享信息的每个方一起生成新的公钥更好。
私钥和公钥用法示例
假设有一个提供建筑安全认证证书的健康和安全培训组织,这门课程是工人在建筑公司获得工作所需的要求。以下是去中心化身份如何帮助防止欺诈并使组织节省大量时间和资源来发行和验证凭证的方式:
- Carl完成该程序,培训组织请求连接到他的数字身份钱包
- 当Carl授权培训组织连接时,钱包共享他的公共DID以便他们发放凭证。
- 培训组织使用他们的 私钥 签署完成数字证书,并发放凭证。他们的 公钥 存储在区块链上。借助像Dock这样的去中心化身份平台,组织可以轻松高效地同时发放许多凭证。
- Carl将在手机上的数字钱包上持有他的凭证,可以随时带到任何地方。
- Carl授权建筑公司查看他的凭证,而不显示与他无关的任何信息,例如他的地址和出生日期。
- 公司通过扫描二维码即可立即验证其凭证的真实性,而无需与发行方联系,因为培训组织的 公钥 存储在区块链上。
传统的证书验证流程通常需要几周才能开始工作,因为建筑公司必须手动联系发行方。过去的验证过程耗时且昂贵。