Page 34 - FIGI: e-KYC use cases in digital financial services
P. 34

public key which could be on the distributed led-  7�5  DID Resolution
                ger.                                           The DID specification requires each DLT to have a DID
                                                               Method specification to describe how DID operations
               DID Authentication enable a DID Holder to prove   are performed. The implication of having many DID
            control over a DID during its interaction with a Ver-  Method specifications is that resolving a text string,
            ifier (sometimes referred to as Relying Party). DID   the DID, to locate the trust root and the associated
            authentication should support web and mobile flows.  DID Document is complex. The DID resolution func-
               The following general steps to be executed by the   tion could become a major impediment to interoper-
            Verifier include:                                  able DIDs. Work has begun on a universal DID resolv-
                                                               er architecture and toolset that can take any valid
            a)  The Verifier retrieves the DID Document associ-  DID as input and resolve it to a DID Document. The
                ated with the DID Holder.                      universal resolvers are specifically designed to work
            b)  The Verifier uses the authentication property of   for decentralized identifiers and support DID resolu-
                the DID Document to determine how to perform   tion over many different types of DLT. The universal
                DID authentication, for example cryptographic   resolver approach solves the problem of heteroge-
                signatures, proving control of a public key or use   neous networks having different method specifica-
                of an authentication service endpoint.         tions for their own DID. Figure 13 depicts the Univer-
            c)  The Verifier executes the authentication mecha-  sal Resolver concept.
                nism provided.


            Figure 13: Universal DID Resolver



























            7�6  Decentralized Identity Wallets                allow the individual to prove control over a DID and
            The individual must have software and/or hardware   thus participate in the decentralized identity system.
            that enables them to interact with the decentralized   The agent and wallet hold verifiable credentials and
            identity system. These components are agents and   proofs belonging to the individual.
            wallets.                                             The wallet can be entirely on the user's device or
               The primary function of an agent is to commu-   a virtual wallet where one part of the wallet is on the
            nicate with other agents and coordinate DID reso-  user mobile device and another part in the cloud. The
            lution and authentication. The agent keeps track   latter configuration enables the creation of agents to
            of DIDs related to other entities in the network. An   act on behalf of the user and perform services with-
            agent contains or is connected to a wallet where   out the need for user direct involvement.
            cryptographic secret keys are kept and protected.
            The wallet contains  the essential private keys  that





           32    e-KYC use cases in digital financial services
   29   30   31   32   33   34   35   36   37   38