From cc5cd920acbbc88481993323dacfdaa699686896 Mon Sep 17 00:00:00 2001
From: Orie Steele Data Schemas
integrity protection mechanism. The credentialSchema
property also makes it possible to perform syntactic checking on the
credential and to use verification mechanisms such as JSON Schema
-[[?VC-JSON-SCHEMA-2023]] validation.
+[[?VC-JSON-SCHEMA]] validation.
Data SchemasIn the example above, the issuer is specifying a -
credentialSchema
, which points to a [[?VC-JSON-SCHEMA-2023]] file that +credentialSchema
, which points to a [[?VC-JSON-SCHEMA]] file that can be used by a verifier to determine if the verifiable credential is well formed.-For information about linkages to JSON Schema [[?VC-JSON-SCHEMA-2023]] or other +For information about linkages to JSON Schema [[?VC-JSON-SCHEMA]] or other optional verification mechanisms, see the Verifiable Credentials Implementation Guidelines [[VC-IMP-GUIDE]] document.
@@ -3301,7 +3301,7 @@Terms of Use
@@ -5762,7 +5758,7 @@ Evidence
-+
This feature is at risk and will be removed from the specification if at least two independent, interoperable implementations are not demonstrated for a single extension type by the end of the Candidate Recommendation Phase. If @@ -5047,11 +5047,7 @@
Content Integrity Protection
While this specification does not recommend any specific content integrity protection, document authors who want to ensure links to content are integrity -protected are advised to use URL schemes that enforce content integrity. Two -such schemes are the [[HASHLINK]] specification and the [[IPFS]]. The example -below transforms the previous example and adds content integrity protection to -the JSON-LD Contexts using the [[HASHLINK]] specification, and content integrity -protection to the image by using an [[IPFS]] link. +protected are advised to use URL schemes that enforce content integrity.
@@ -5064,7 +5060,7 @@Content Integrity Protection
"type": ["VerifiableCredential", "ExampleAlumniCredential"], "credentialSubject": { "id": "did:example:ebfeb1f712ebc6f1c276e12ec21", - "image": "ipfs:/ipfs/QmXfrS3pHerg44zzK6QKQj6JDk8H6cMtQS7pdXbohwNQfK/image", + "image": "https://example.com/image", "alumniOf": { "id": "did:example:c276e12ec21ebfeb1f712ebc6f1", "name": "Example University" @@ -5719,7 +5715,7 @@Schema
according to thecredentialSchema
type definition for the verifiable credential and the verifier's own schema evaluation criteria. For example, if thecredentialSchema
'stype
value is -[[?VC-JSON-SCHEMA-2023]], then a verifier can ensure a credential's +[[?VC-JSON-SCHEMA]], then a verifier can ensure a credential's data is valid against the given JSON Schema.Base Context
JSON-LD Context to be either stabilized, or removed, before the publication of this specification as a Proposed Recommendation. While that means that this specification could be delayed if dependencies such as [[?VC-DATA-INTEGRITY]], -[[?VC-JOSE-COSE]], SD-JWT, [[?VC-JSON-SCHEMA-2023]], or status list +[[?VC-JOSE-COSE]], SD-JWT, [[?VC-JSON-SCHEMA]], or status list do not enter the Proposed Recommendation phase around the same time frame, the Working Group is prepared to remove the dependencies if an undue burden is placed on transitioning to the Recommendation phase. This is a calculated @@ -6105,7 +6101,7 @@Differences between Contexts, Types, and CredentialSchemas
The verifiable credential and verifiable presentation data models leverage a variety of underlying technologies including [[JSON-LD]] and -[[?VC-JSON-SCHEMA-2023]]. This section will provide a comparison of the +[[?VC-JSON-SCHEMA]]. This section will provide a comparison of the
@context
,type
, andcredentialSchema
properties, and cover some of the more specific use cases where it is possible to use these features of the data model.