The Jolocom Protocol - Own Your Digital Self¶
The Jolocom identity solution aims to be a universal, lightweight, open source protocol for decentralized digital identity and access right management. The protocol is built on to leading open source standards standards and relies on distributed / decentralized systems such as Ethereum and IPFS for identity registration and resolution.
The protcol architecture revolves around three main concepts:
- Hierarchical Deterministic Key Derivation , which enables pseudonymous, context-specific interactions through the creation of and control over multiple identities.
- Decentralized Identifiers (DIDs) , which are associated with each identity and used during most interaction flows, such as authentication or data exchange.
- Verifiable Credentials , which are digitally-signed attestations issued by an identity. The specification can be used to develop a simple way of associating attribute information with identifiers.
Cryptographic keys and DIDs enable the existence of a self-sovereign identity. Keys and verifiable credentials provide the tools required to create complex data while simultaneously preserving simplicity at the core.
This approach allows us to keep the protocol generic while facilitating an unlimited number of specific use cases with varying levels of complexity.
A further component of the protocol architecture calls for the integration of a public, censorship-resistant, decentralized network for anchoring and resolving user identifiers. For this we currently use IPFS for storage and Ethereum for anchoring and indexing identifiers.
In its most simplistic form, the Jolocom protocol can be used to:
- Create a self-sovereign identity for use by humans, organisations, and smart agents;
- Attach meaningful information to identities in the form of verifiable credentials;
- Easily request and consume verified information about identities in an automated fashoin.
We hope it will serve efforts to decentralize the web and digital identity, and enable people, organisations, and smart agents to own and control the data that defines them.
- 1. Introduction
- 2. Getting Started
- 3. Credentials & Signed Credentials
- 4. Public Profile
- 5. Credential-based Communication Flows
- 6. Single Sign On (SSO) with Jolocom
- 7. Using custom connectors