From b3cff2266c998a4e7c188c37f4cc0b872c975bff Mon Sep 17 00:00:00 2001
From: Ted Thibodeau Jr
Pat then attempts to redeem the alumni discount. The verifier, a ticket
-sales system, states that any alumni of "Example University" receives a discount
+sales system, states that alumni of "Example University" receive a discount
on season tickets to sporting events. Using a mobile device, Pat starts the
process of purchasing a season ticket. A step in this process requests an alumni
verifiable credential, and this request is routed to Pat's digital wallet.
@@ -990,19 +990,19 @@ What is a Verifiable Credential?
refers to the characteristic of a credential or presentation
as being able to be verified by a verifier,
as defined in this document. Verifiability of a credential does not imply
-that truth of claims encoded therein. Rather, once the authenticity and
+the truth of claims encoded therein. Rather, once the authenticity and
currency of a verifiable credential or verifiable presentation are
established, a verifier validates the included claims using their own
business rules before relying on them. Such reliance only occurs after
@@ -979,7 +979,7 @@ Concrete Lifecycle Example
Concrete Lifecycle Example
the verifier and verified.
-Once verified as authentic and current, the seller of the season ticket then -validates that the issuer of the verifiable credential is recognized for -the claim of alumni status—it is, as it is issued by Example -University—and that today's date lies within the validity period defined -by the values of the validFrom and validUntil properties. Since the holder is -expected to be the subject of the verifiable credential, the -verifier also confirms that the id for the alumni claim matches the id of +Once verified as authentic and current, the seller of the season ticket then +validates that the issuer of the verifiable credential is recognized for +the claim of alumni status — it is, as it was issued by Example +University — and that today's date lies within the validity period defined +by the values of the `validFrom` and `validUntil` properties. Since the holder is +expected to be the subject of the verifiable credential, the +verifier also confirms that the `id` for the alumni claim matches the `id` of the creator of the verifiable presentation.
- Having verified the credential and the presentation, and validated the - relevant claims, the ticket seller safely enables the alumni discount for Pat, - confident that Pat is legitimately entitled to it. +Having verified the credential and the presentation, and validated the +relevant claims, the ticket seller safely enables the alumni discount for Pat, +confident that Pat is legitimately entitled to it.
{ @@ -1034,10 +1034,10 @@Concrete Lifecycle Example
The examples above are unsecured. Implementers that are interested in -understanding more about securing Verifiable Credentials can see the -specifications Securing Verifiable Credentials using JOSE and COSE -[[VC-JOSE-COSE]] and Verifiable Credential Data Integrity [[VC-DATA-INTEGRITY]] -and the "Proofs" section of the Verifiable Credential Specifications Directory +understanding more about securing verifiable credentials can see the +specifications [[[VC-JOSE-COSE]]] +[[VC-JOSE-COSE]] and [[[VC-DATA-INTEGRITY]]] [[VC-DATA-INTEGRITY]] +and the "Proofs" section of the [[[VC-SPECS]]] [[VC-SPECS]].
@@ -1090,8 +1090,8 @@Getting Started
so that other developers can use the same vocabulary and context to achieve interoperability. This process is covered in Section . Alternatively, developers can reuse existing vocabulary -and context files that happen to fit their use case. They can explore the Verifiable -Credential Specifications Directory [[VC-SPECS]] for reusable resources. +and context files that happen to fit their use case. They can explore the +[[[VC-SPECS]]] [[VC-SPECS]] for reusable resources. @@ -1122,7 +1122,7 @@Contexts
specification, but might be useful in the future or to related work. For more information, see Section 3.1: The Context -of the [[JSON-LD]] specification. +of the [[[JSON-LD]]] [[JSON-LD]] specification.Verifiable credentials and verifiable presentations MUST include a @@ -2473,7 +2473,7 @@
Data Schemas
The value of the
credentialSchema
property MUST be one or more data schemas that provide verifiers with enough information to -determine if the provided data conforms to the provided schema(s). Each +determine whether the provided data conforms to the provided schema(s). EachcredentialSchema
MUST specify itstype
(for example,JsonSchema
), and anid
property that MUST be a URL identifying the schema file. The precise contents of @@ -2533,7 +2533,7 @@Data Schemas
In the example above, the issuer is specifying a
@@ -2578,7 +2578,7 @@credentialSchema
, which points to a [[?VC-JSON-SCHEMA]] file that -can be used by a verifier to determine if the +can be used by a verifier to determine whether the verifiable credential is well-formed.Data Schemas
In the example above, the issuer is specifying a
@@ -2644,7 +2644,7 @@credentialSchema
pointing to a means of transforming the input -data into a format which can then be used by a verifier to determine if +data into a format which can then be used by a verifier to determine whether the proof provided with the verifiable credential is well-formed.Lifecycle Details
In particular, Sections and @@ -3041,7 +3041,7 @@
-The Working Group is currently attempting to determine if cryptographic hash +The Working Group is currently attempting to determine whether cryptographic hash expression formats can be unified across all of the VCWG core specifications. Candidates for this mechanism include `digestSRI` and `digestMultibase`. There are arguments for and against unification that the WG is currently debating. @@ -3717,7 +3717,7 @@
The working group is discussing if additional extension points
will be reserved in https://www.w3.org/ns/credentials/v2.
-
+
The working group currently plans to only reserve extension points that
have at least a draft specification that is being incubated in a community group.
ageOver
verifiable credentials instead of
date of birth verifiable credentials when a verifier wants to
-determine if an entity is over the age of 18.
+determine whether an entity is over the age of 18.
@@ -4864,10 +4864,10 @@
The process of performing these checks might result in information leakage that leads to a privacy violation of the holder. For example, a simple -operation such as checking an improperly configured revocation list can +operation, such as checking an improperly configured revocation list, can notify the issuer that a specific business is likely interacting with the holder. This could -enable issuers to collude and correlate individuals without their +enable issuers to collude to correlate individuals without their knowledge.
@@ -5558,9 +5558,9 @@While valid cryptographic signatures and successful status checks -signify the reliability of credentials, they do not signify that all credentials -are interchangeable for all contexts. It is crucial for verifiers to -also validate any claims which might be relevant, considering the source and +signify the reliability of credentials, they do not signify that all credentials +are interchangeable for all contexts. It is crucial that verifiers +also validate any claims which might be relevant, considering the source and nature of the claim as well as privilege or service for which the credential is presented.
@@ -5569,7 +5569,7 @@created
property establishes a date and time
before which the credential should not be considered verified,
-separate from the validity period of the credential. This property describes the
-validity of the proof, not of the credential.verificationMethod
property specifies, for example, the
+distinct from the validity period of the credential. This property describes the
+validity of the proof, not of the credential.
+verificationMethod
property specifies, for example, the
public key that can be used to verify the digital signature. Dereferencing a
public key URL reveals information about the controller of the key, which can
be checked against the issuer of the credential. The
@@ -5996,8 +5997,8 @@
-The validFrom
and validUntil
properties are expected
-to be within an expected range for the verifier. For example, a
+The verifier expects that the validFrom
and
+validUntil
properties will be within a certain range. For example, a
verifier can check that the end of the validity period of a verifiable
credential is not in the past. Because some credentials can be useful for
secondary purposes even if their original validity period has expired, validity