Verifiable Credential
Glossary Page
A verifiable credential includes subject identification, issuing authority, credential type, asserted attributes, derivation evidence, and constraints, mirroring physical credentials. Utilizing technologies like digital signatures, verifiable credentials surpass physical ones in security and tamper resistance. Credential holders can generate and share verifiable presentations to demonstrate specific characteristics. Both can be swiftly transmitted, enhancing remote trust establishment. The specification strives to harmonize the simplicity of expressing digital credentials with privacy considerations, tackling issues related to data persistence and correlation. The term "verifiable" pertains to a credential's verifiability by a verifier, without implying the truth of claims, empowering verifiers to assess based on provided evidence.
Latest Webinars
Latest Articles
HM2024: Dataspace first movers’ success
Discover the success stories and cutting-edge advancements showcased at Hannover Messe 2024, where leaders in dataspaces, digital twins, and smart mobility converge to shape the future of Industry 4.0 and global supply chains.
Read more
Chris S. Langdon
Apr 29, 2024
Tractus-X Sandbox
Discover an innovative application development environment powered by Eclipse Tractus-X, offering unparalleled focus and speed from concept to implementation success. With Tractus-X Sandbox, Catena-X Sandbox, and LivingLab Tractus-X, choose the option that fits your needs and start building your data-driven applications effortlessly. Benefit from trusted transactions, ease of use, and T-Systems' expertise in providing reliable data infrastructure solutions.
Read more
Chris S. Langdon
Apr 15, 2024
Enabling trust in dataspaces: Exploring T-Systems and OpenCorporates collaboration
Explore how the collaboration between OpenCorporates and T-Systems is revolutionizing dataspace onboarding by providing robust verification solutions. Leveraging company information from OpenCorporates and verification expertise from T-Systems, participants can seamlessly join dataspace ecosystems with confidence, ensuring authenticity, security, and trust.
Read more
Lena Matsela, Andrea Garcia
Apr 05, 2024