IIW |
Internet Identity Workshop twice in a year un-conference since 2005 |
https://internetidentityworkshop.com |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m03s |
7 |
KERI |
Key Event Receipt Infrastructure |
https://github.com/WebOfTrust/keri |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m12s |
7 |
repo |
Software repository |
https://github.com/trustoverip/acdc/wiki/repo |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s |
3 |
KERIpy |
Python implementation of KERI |
https://github.com/WebOfTrust/keripy |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s |
7 |
repo |
Software repository |
https://github.com/trustoverip/acdc/wiki/repo |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m33s |
1 |
coroutines |
Computer programs that can be suspended and resumed at will. |
https://github.com/trustoverip/acdc/wiki/coroutines |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s |
1 |
I/O |
Input / output |
https://github.com/trustoverip/acdc/wiki/input-output |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s |
1 |
HIO |
Hierarchical asynchronous coroutines and I/O in Python |
https://github.com/trustoverip/acdc/wiki/hio |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s |
7 |
Sam Smith |
Samuel M. Smith PhD, Inventor and lead developer of KERI |
https://www.linkedin.com/in/samuel-m-smith/ |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s |
7 |
python |
Programming Language |
https://www.python.org |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m49s |
3 |
clone |
A copy of a system that is - and works exactly as the original |
https://github.com/trustoverip/acdc/wiki/clone |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s |
3 |
branch |
A duplicate of an object under version control for further separate modification |
https://github.com/trustoverip/acdc/wiki/branch |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s |
3 |
kli |
KERI command line interface |
https://github.com/trustoverip/acdc/wiki/kli |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s |
7 |
Kubernetes |
Kubernetes is an open source platform for managing software containers |
https://kubernetes.io |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s |
3 |
kubectl |
Kubernetes command line interface |
https://kubernetes.io/docs/reference/kubectl/ |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m18s |
7 |
verifiable credentials |
The digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable way |
https://github.com/trustoverip/acdc/wiki/verifiable-credential |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s |
1 |
Docker containers |
Docker takes away repetitive, mundane configuration tasks and is used for application development |
https://www.docker.com |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m38s |
3 |
sub shell |
a child shell started up from - and contained in another parent shell |
https://github.com/trustoverip/acdc/wiki/sub-shell |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s |
1 |
agent |
A representative for an identity |
https://github.com/trustoverip/acdc/wiki/agent |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s |
3 |
cloud agent |
Cloud agent is software that is installed on the cloud server instances for security, monitoring, and analysis |
https://github.com/trustoverip/acdc/wiki/cloud-agent |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s |
3 |
Py installer |
Python installer bundles a Python application and all its dependencies into a single package |
https://pypi.org/project/pyinstaller/ |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m09s |
3 |
Electron |
A Python interface for Apache Electron command line interface |
https://pypi.org/project/python-electron/ |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s |
3 |
U/I |
A user interface FUI) is the space where interactions between humans and machines occur. |
https://github.com/trustoverip/acdc/wiki/user-interface |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s |
1 |
multi-sig |
A digital signature scheme which allows a group of users to sign a single piece of digital data. |
https://github.com/trustoverip/acdc/wiki/multisig |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s |
1 |
identifier |
Something to uniquely identify (public) identities; pointing to something or someone else. |
https://github.com/trustoverip/acdc/wiki/identifier-system |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s |
3 |
wallet |
A wallet is a collection of data stores; made up of a keystore, local and remote key event log database and credential database. |
https://github.com/trustoverip/acdc/wiki/wallet |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s |
7 |
wallet commands |
The section of kli where verifiable credentials can be listed |
https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s |
7 |
witnesses |
Entity that may receive, verify, and store key events for an identifier |
https://github.com/trustoverip/acdc/wiki/witness |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s |
7 |
watchers |
Guarantee that KERI logs are immutable |
https://github.com/trustoverip/acdc/wiki/watcher |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s |
7 |
key management |
Management of cryptographic keys in a crypto-system. |
https://github.com/trustoverip/acdc/wiki/key-management |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s |
7 |
init |
Initialization, a command in the kli |
https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_12 |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m21s |
3 |
single sig identifier |
An identifier that is controlled by a one-of-one signing keypair |
https://github.com/trustoverip/acdc/wiki/single-signature-identifier |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s |
3 |
key store |
A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs. |
https://github.com/trustoverip/acdc/wiki/keystore |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s |
7 |
key events |
Events happening to controlling keys of an identifier recorded in a Key Event Log (KEL). |
https://github.com/trustoverip/acdc/wiki/key-event |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s |
3 |
interaction event |
Anchors external data to the key-state as established by the most recent prior establishment event |
https://github.com/trustoverip/acdc/wiki/interaction-event |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s |
7 |
rotation event |
Changes the key-state which includes a change to the set of authoritative keypairs for an AID |
https://github.com/trustoverip/acdc/wiki/rotation-event |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s |
7 |
signing thresholds |
Minimum number of valid signatures to satisfy the requirement for successful validation |
https://github.com/trustoverip/acdc/wiki/signing-threshold |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s |
7 |
KEL |
Key Event Log is the native KERI verifiable data structure |
https://github.com/trustoverip/acdc/wiki/key-event-log |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s |
7 |
verify signatures |
Applying an algorithm that either accepts or rejects the message's claim to authenticity |
https://github.com/trustoverip/acdc/wiki/verify-signature |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s |
3 |
peer-to-peer communications |
Peers are equally privileged, equipotent participants in a network |
https://github.com/trustoverip/acdc/wiki/peer-to-peer |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s |
3 |
bootstrap command |
Start an empty agent or to run a single agent against one that's already been started |
https://docs.google.com/presentation/d/1RIMX7J-cdg8OctoG4JqxPOfqKZsVNodqajtpQ0oFIyE/edit#slide=id.gf2168aef68_0_20 |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m31s |
3 |
salts |
Random data that is used as an additional input to a cryptographic one-way function |
https://github.com/trustoverip/acdc/wiki/salt |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s |
7 |
delegation |
Delegation can be defined as “the act of empowering to act for another” |
https://github.com/trustoverip/acdc/wiki/delegation |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s |
7 |
multi-sig delegation |
delegated identifiers under multi-signature control |
https://github.com/trustoverip/acdc/wiki/delegation |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s |
7 |
JSON |
JavaScript Object Notation |
https://en.wikipedia.org/wiki/JSON |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m08s |
3 |
transferable |
Control over identifier can be transferred by rotating keys |
https://github.com/trustoverip/acdc/wiki/transferable-identifier |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s |
7 |
ports |
A number assigned to uniquely identify a connection endpoint and to direct data to a specific service. |
https://en.wikipedia.org/wiki/Port_(computer_networking) |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m04s |
3 |
configuration file |
File used to configure the parameters and initial settings for some computer programs |
https://github.com/trustoverip/acdc/wiki/configuration-files |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s |
1 |
REST |
REpresentational State Transfer (REST) is a software architectural style that developers apply to web APIs |
https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s |
3 |
APIs |
Application Programming Interface |
https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-exactly-is-a-rest-api |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m00s |
3 |
CURL |
Command-line tool (curl) for transferring data using various network protocols. |
https://en.wikipedia.org/wiki/CURL |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s |
3 |
post and put |
HTTP request methods to indicate the desired action to be performed on the identified resource |
https://en.wikipedia.org/wiki/Hypertext_Transfer_Protocol |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s |
3 |
Swagger |
OpenAPI (former Swagger) is important to KERI, CESR and ACDC. It's open sourced and has many ready-usable extensions in JSON available. |
https://github.com/WebOfTrust/keri/blob/main/docs/keri-dev-env.md#what-is-swagger-and-openapi |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m31s |
7 |
passcode |
Secret data, typically a string of characters, usually used to confirm a user's identity |
https://github.com/trustoverip/acdc/wiki/passcode |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s |
3 |
stretched into an encryption key |
make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources |
https://github.com/trustoverip/acdc/wiki/key-stretching |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s |
7 |
flag |
Many command line programs can be set to various mode by using a flag; e.g. -v or –verbose for verbose mode |
https://en.wikipedia.org/wiki/Verbose_mode |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=12m20s |
3 |
non-transferable identifier |
Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control |
https://github.com/trustoverip/acdc/wiki/non-transferable-identitifer |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s |
7 |
toad |
Field in KERI data structure for describing the witness thresshold |
https://github.com/WebOfTrust/keripy/blob/28873f42aabef096d2b6f4bf1af5dbd9e219d13f/src/keri/core/eventing.py |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s |
7 |
witness threshold |
The minimum number of valid witness signatures required |
https://github.com/trustoverip/acdc/wiki/threshold-signature-scheme |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s |
7 |
pre-rotation |
commitment to next rotated key set in previous rotation or inception event |
https://github.com/trustoverip/acdc/wiki/pre-rotation |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s |
7 |
prefixes |
A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key |
https://github.com/trustoverip/acdc/wiki/prefix |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s |
7 |
Base64 |
A group of binary-to-text encoding schemes that represent binary data |
https://github.com/trustoverip/acdc/wiki/base64 |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s |
7 |
qualified |
when qualified, a cryptographic primitive includes a prepended derivation code |
https://github.com/trustoverip/acdc/wiki/qualified |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s |
7 |
derivation code |
A special character that encodes the derivation process, pre-pended to the identifier |
https://github.com/trustoverip/acdc/wiki/derivation-code |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s |
7 |
Blake3 hash |
BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2. |
https://github.com/trustoverip/acdc/wiki/blake3 |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s |
7 |
anchor data into |
Data anchors are digests of digital data, that uniquely identify this data |
https://github.com/trustoverip/acdc/wiki/data-anchor |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s |
7 |
AID |
An identifier that is self-certifying and self-sovereign |
https://github.com/trustoverip/acdc/wiki/autonomic-identifier-(AID) |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s |
7 |
sequence number |
Incremental number in a log |
https://www.storyofmathematics.com/number-sequences/ |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s |
3 |
digest |
Verifiable cryptographic commitment. It's a collision resistant hash of content |
https://github.com/trustoverip/acdc/wiki/digest |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s |
3 |
issuance event |
The inception event of a verifiable credential |
https://github.com/trustoverip/acdc/wiki/issuance-event |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s |
7 |
public transaction event log |
Is a hash linked data structure of transactions that can be used to track state |
https://github.com/trustoverip/acdc/wiki/public-transaction-event-log-(PTEL) |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s |
7 |
verifiable |
When you can succesfully verify a signature |
https://github.com/trustoverip/acdc/wiki/verify-signature |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s |
7 |
establishment |
An event that establishes control authority |
https://github.com/trustoverip/acdc/wiki/establishment-event |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s |
7 |
lmdb databases |
Lightning Memory-Mapped Database |
https://en.wikipedia.org/wiki/Lightning_Memory-Mapped_Database |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=21m42s |
7 |
indexed signatures |
Used when signing anything with a multi-key autonomic identifier; a verifier knows which of the multiple public keys was used |
https://github.com/trustoverip/acdc/wiki/indexed-signature |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s |
7 |
hex |
Hexadecimal notation |
https://en.wikipedia.org/wiki/Hexadecimal |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m59s |
3 |
verbose |
An option available in many computer operating systems and programming languages that provides additional details as to what the computer is doing |
https://en.wikipedia.org/wiki/Verbose_mode |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m01s |
3 |
self-addressing identifiers |
An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident |
https://github.com/trustoverip/acdc/wiki/self-addressing-identifier |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s |
7 |
backer |
Backers include both regular KERI witnesses and ledger-registered backers |
https://github.com/trustoverip/acdc/wiki/backer |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m48s |
7 |
ledger backer |
A witness in KERI that is ledger-registered |
https://github.com/trustoverip/acdc/wiki/ledger-backer |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s |
7 |
witness backer |
A native KERI witness whose control authority is established in a KEL |
https://github.com/trustoverip/acdc/wiki/witness |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s |
7 |
vLEI |
Digital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentic |
https://github.com/trustoverip/acdc/wiki/verifiable-legal-entity-identifier |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s |
7 |
SSI system |
SSI Infrastructure consisting of the technological components that are deployed all over the world |
https://github.com/trustoverip/acdc/wiki/ssi-system |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s |
1 |
Indy network |
Hyperledger Indy network is an SSI system based on a private blockchain |
https://www.hyperledger.org/use/hyperledger-indy |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s |
7 |
transfer off a ledger |
The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KEL |
https://github.com/trustoverip/acdc/wiki/transfer-off-ledger |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s |
7 |
Ethereum |
Ethereum is the community-run technology powering the cryptocurrency ether (ETH) and thousands of decentralized applications |
https://ethereum.org/en/ |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m02s |
7 |
Aries |
Hyperledger Aries provides an interoperable tool kit for creating, transmitting and storing verifiable digital credentials |
https://www.hyperledger.org/use/aries |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=31m46s |
7 |
service endpoints |
A web service endpoint which is a URL at which clients of specific service can get access to the service. |
https://github.com/trustoverip/acdc/wiki/service-endpoint |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s |
3 |
URLs |
A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it |
https://github.com/trustoverip/acdc/wiki/uniform-resource-locator |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s |
1 |
IP-address |
A numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication |
https://github.com/trustoverip/acdc/wiki/ip-address |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s |
1 |
TCP endpoint |
This is a service endpoint of the web transmission control protocol |
https://github.com/trustoverip/acdc/wiki/tcp-endpoint |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s |
3 |
inquisitor |
|
https://github.com/trustoverip/acdc/wiki/inquisitor |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s |
7 |
dip: tag |
|
|
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s |
7 |
icp: tag |
|
|
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s |
7 |
di: tag |
|
|
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m20s |
7 |
locked state |
default state of an encrypted KERI data store with a passcode |
https://github.com/trustoverip/acdc/wiki/locked-state |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s |
7 |
onepass |
password manager |
https://github.com/doglex/onepass |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m04s |
7 |
data OOBIs |
data out-of-band ntroductions |
https://github.com/trustoverip/acdc/wiki/out-of-band-introduction |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s |
7 |
credential schema OOBIs |
credential schema out-of-band ntroductions |
https://github.com/trustoverip/acdc/wiki/out-of-band-introduction |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s |
7 |
Keep |
Is KERI's and ACDC's crypto wallet: A task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystem |
https://github.com/trustoverip/acdc/wiki/keep |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s |
7 |
zero trust |
a Zero Trust approach trusts no one |
https://github.com/trustoverip/acdc/wiki/zero-trust |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s |
3 |
credential registries |
Is a functional component that has the capability to register and advertise the information about Credential Types that their respective Governing Parties have decided to disclose |
https://essif-lab.github.io/framework/docs/terms/credential-catalogue |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m53s |
3 |
revocation events |
An event that revokes control authority over an identifier |
https://github.com/trustoverip/acdc/wiki/revocation-event |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s |
3 |
two-factor auth |
Is an electronic authentication method in which a user is granted access to a website or application only after successfully presenting two or more pieces of evidence |
https://en.wikipedia.org/wiki/Multi-factor_authentication |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m13s |
1 |
escrow states |
|
https://github.com/trustoverip/acdc/wiki/escrow-state |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s |
7 |
server-sent events |
Mailbox notifications; a streaming service for the agent U/I, to get notifications from the KERI system itself |
https://github.com/trustoverip/acdc/wiki/server-sent-event |
https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s |
7 |
|
|
|
|
|