UKISS Whitepaper ©2022 - Page 7

3.1

Self-Sovereign Identity

Before we further illustrate the use cases , let us show how a typical Verification Credentials process looks ( also known as the trust-triangle ):
Holder Manages credentials
Issuer
Signs attestations , issues credentials
Write
Verifiable Data Registry
Write
Verifier
Requests & verifies proof of credentials
In the VC process , the issuer supplies credentials to the holder , who will then present the certificates to the verifier . The verifier then confirms the authenticity of the credentials using the UKISS Blockchain , which can act as the Verifiable Data Registry .
With the UKISS Hugware ® , holders can simply use it to authenticate their DIDs . Other than DIDs , users can also secure non-fungible tokens with the UKISS Blockchain .
Here ’ s a non-exhaustive list of documents that can be created as DIDs or minted as NFTs :
• Government-issued IDs
• Simple agreement for future tokens ( SAFTs )
• Property deeds
• Education certificates
• Health records
• Business contracts
• Certificate Authority information
• Public keys
• Ownership data
• Commercial documents
Here are three use-case scenarios of DIDs and the Hugware :
David needs to prove he is above 21 years old before entering a casino in the metaverse . Instead of uploading his ID and exposing his details , he creates a DID with a VC , and secures it with the DID wallet and the Hugware . David plugs his Hugware to the computer and verifies his age at the metaverse casino .
Casie wants to prove her identity to confirm her virtual real estate purchase . Instead of uploading her ID online , she creates a DID and secures it with the DID wallet and the Hugware , which she uses to provide a digital signature . She later mints the virtual real estate and also secures it with the Hugware .
Bruce wants to access a social media platform that integrates the UKISS DID wallet as a login feature . Instead of providing his phone number to authenticate himself , Bruce plugs in his Hugware and activates the two-factor authentication using DIDs .
Copyright © UKISS TECHNOLOGY PTE . LTD . 07