From 94ee832ed9075586527448ec418e42ce7996adb5 Mon Sep 17 00:00:00 2001
From: Manu Sporny Use Cases and Requirements
.
A conforming issuer implementation produces conforming documents, MUST include all required properties in the @@ -628,39 +626,6 @@
-Verifiable credentials and verifiable presentations MUST be -protected using a securing mechanism as described in Section -. Having and verifying proofs, -which might be dependent on the syntax of the proof (for example, using the JSON -Web Signature of a JSON Web Token for proofing a key holder), are an essential -part of processing verifiable credentials and -verifiable presentations. At the time of publication, Working Group -members had implemented such protection using at least three proof mechanisms: -
- --Implementers are advised to note that not all proof mechanisms are standardized -as of the publication date of this specification. The group expects some of -these mechanisms, as well as new ones, to mature independently and become -standardized in time. Given there are multiple valid proof mechanisms, this -specification does not standardize on any single digital signature mechanism. -One of the goals of this specification is to provide a data model that can be -protected by a variety of current and future digital proof mechanisms. -Conformance to this specification does not depend on the details of a particular -proof mechanism; it requires clearly identifying the mechanism used by -each verifiable credential and verifiable presentation. -
-
This document also contains examples that contain characters that are invalid
JSON, such as inline comments (//
) and the use of ellipsis