3 Ways to implement Decentralised Identity Systems

Roles in Digital Identity

Roles in Digital Identity

Holder/Owner

Identity Provider/Issuer

Relying parties/Verifier

Enterprise

Consortium

Self sovereign identity

--

--

--

Love podcasts or audiobooks? Learn on the go with our new app.

Recommended from Medium

A River of Facebook Profiles

{UPDATE} Draw it Hack Free Resources Generator

📣 Upcoming EYWA listing announcement

A journey up the SkyTower

{UPDATE} Bike Rush Hack Free Resources Generator

Choosing a new master password

{UPDATE} Angela Cara Pintura Na China Hack Free Resources Generator

{UPDATE} Circle Hack Free Resources Generator

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Abrar Rauf

Abrar Rauf

More from Medium

5 Solid Recruitment Lessons to Take Away from Thomas Shelby of the Peaky Blinders

Recruitment Lessons to Take Away from THOMAS SHELBY of the Peaky Blinders

SNOMED CT: An Introduction — Part 1

Why does scientific research cost so much?

William III of Orange as a child next to a potted orange tree, painted by Adriaen Hanneman in 1654. William is dressed in girls’ clothing, as was the Dutch custom for male children at the time. (See, The History of Citrus in the Low Countries during the Middle Ages and the Early Modern Age)

Mogul Places Head of Production at Near Space Labs