End-to-end secure infrastructure to create Verifiable Credentials
Dock has built a secure, future-proof technology stack to create tamper-proof Verifiable Credentials, Decentralized Identifiers, and DApps for Decentralized Identity solutions.
Verifiable Credentials - leveraging the power of the Dock blockchain
Dock’s highly scalable Substrate-based blockchain specializes in issuing decentralized identifiers and cryptographically-signed Verifiable Credentials at a very low cost.
Verifiable Credentials and blockchain, how do they work?
Dock’s groundbreaking blockchain technology is redefining how you trust data. It is an ideal infrastructure for a completely permissionless digital credential ecosystem enabling anyone to issue, store, and verify Verifiable Credentials and create Decentralized Identifiers (DIDs),
The Dock blockchain forms the basis of trust by maintaining a verifiable registry of all DIDs, proof of credentials issued (if the credential is anchored), public cryptographic keys, and revocation registries. Its advanced architecture prevents unauthorized users from accessing or modifying any data in the credentials.
Credentials issued on the Dock blockchain are stored off-chain, typically in a holder's digital wallet app, along with the cryptographic key pairs. To ensure data privacy, the only data registered on the Dock chain are the issuer and holder's DIDs, the Credential Schema (its "template"), and the Revocation Registries. The issuer may also record the hash of a credential on the Dock blockchain; this is called Anchoring.
Docking the Verifiable Credentials
Everyone who owns a Decentralized Identifier (DID) on the Dock blockchain.
Entities who cryptographically sign and issue Verifiable Credentials. The issuers put a cryptographic signature into the credential using their private key.
Entities who verify the received presentations from the holder. They require verification of certain conditions to engage, transact, or provide services to holders.
The sole owner and the receiver of Verifiable Credentials from the issuers. Holders can verify the authenticity of their received credentials and their revocation status anytime.
Defines what fields are required for the Verifiable Credential. They are a useful way of enforcing a specific structure on a verifiable credential.
Constitutes the credentials’ proof of existence that demonstrates that the credentials existed when the block containing the anchor was created in their original form (as reflected in the hash).
A registry of IDs that contains no personal information, but that is checked whenever a Verifier wants to verify if a credential has been revoked.
Certs - the first standards-compliant global application on the Dock blockchain
Certs offer a full-stack global standards-compliant Verifiable Credentials environment that harnesses the trusted storage, security, and cost-effectiveness of the Dock blockchain.
Verifiable Credentials — Taking them a step further
Decentralized Identifiers on the Dock blockchain:
Web3 begins here!
Dock’s Substrate-based, interoperable and versatile blockchain is designed to provide a secure and scalable protocol for businesses and developers to build Decentralized Identity solutions and DApps. Everyone using Web3 will need their own Decentralized Identifiers (DIDs). The Dock blockchain serves as the entry point with a protocol layer for all things Web3.
Proof of Stake - Low Cost, Highly Scalable, and Eco-friendly
Dock’s use of Nominated Proof of Stake makes its blockchain infrastructure scalable, resilient, and environment friendly.
The Dock Blockchain uses Web3 Foundation’s GRANDPA (GHOST-based Recursive Ancestor Deriving Prefix Agreement)
Entities who run a full node on the Dock network and are in charge of producing and finalizing blocks
Earn lucrative APYs by staking $DOCK and selecting validators to process transactions and produce blocks.
Invited to vote on changes to the network including network functionality, actors in the network, reward and slashing rules, and Treasury spending.
A group of individuals who are elected using Dock's open governance to make and implement proposals by controlling which (source code) upgrades are allowed on the network.
TC can fast track on-chain governance proposals made by the Council.