LogoLogo
Back to All
  • TNG Identity user documentation
  • 📑INTRODUCTION
    • Introduction to TNG Identity
    • Why choose TNG Identity?
      • DID differentiators
    • How does TNG Identity work?
      • Data flows
      • Use cases and applications
    • Standards and regulations
    • Portal API
      • Overview
      • Getting Started
      • API Documentation
        • App
        • Auth
        • Mail
        • Organisation Profiles
        • User Profiles
        • PSP > Product Manager > Customer User Api Key
        • PSP > Product Manager > User Manager
  • 📄TNG Identity Issuers
    • What is an issuer?
    • How to become an issuer?
    • Operating an issuer
    • What do issuers do?
    • Issuer API
      • Overview
      • Getting Started
      • Examples
        • Issue an email credential
        • Revoke a claimed email credential
      • API Documentation
        • Info
        • Auth
        • Media
        • Credential Offer Claims
        • Credential Offer Collections
        • Credential Offers
        • Credential Templates
        • Claim
        • Agent
  • 📑TNG IDENTITY VERIFIER
    • What is a Verifier?
    • Operating a verifier
    • How to become a verifier?
    • Verifier API
      • Overview
      • Getting Started
      • Examples
        • Verify an email credential
      • API Documentation
        • Info
        • Auth
        • Verifiable Presentation
        • Agent
        • SIOP
        • Templates
  • 📄TNG IDENTITY WALLET
    • What is the wallet for?
    • How to receive a Verifiable Credential?
    • How to share a Verifiable Credential?
  • 📑Privacy and Security
    • Privacy and Security Measures: TNG Identity Services
    • Revocation and data deletion
  • 🗃️SELF-SOVEREIGN IDENTITY KNOWLEDGE
    • Self-Sovereign Identity
    • Actors
    • Decentralized vs Self-Sovereign Identity
    • Key Principles of Self-Sovereign Identity
    • Self-Sovereign Identity – Use Cases
    • Digital Trust
    • Some of the critical components of Self Sovereign Identity
      • Trust over IP
    • Some of the critical components of Decentralise ID
      • A Blockchain Tailored for Decentralized Identity
      • Decentralise Identifiers (DID)
      • Verifiable Credentials
      • Verifiable Presentations
  • 📑GLOSSARY
    • Glossary
  • 📄FAQs / HELP
    • Help & FAQs
      • What is a digital identity?
      • What is TNG Identity, and how does it work?
      • How is blockchain used in TNG Identity?
      • Compatible Blockchains for TNG Identity.
      • How can my business sign up for TNG Identity?
      • How is TNG Identity different to other identity solutions in the market?
      • Can TNG Identity communicate with other identity solutions?
      • What is TNG Identity doing with my data, and does it act as a data processor or controller?
      • What measures does TNG Identity take to protect user data?
      • What support is available for TNG Identity?
      • Can TNG Identity be integrated into our existing systems?
      • How can I get started with TNG Identity?
      • What countries is TNG Identity available in?
Powered by GitBook
On this page
  • Empowering Digital Ownership
  • Unlocking Advantages
  1. 🗃️SELF-SOVEREIGN IDENTITY KNOWLEDGE

Digital Trust

PreviousSelf-Sovereign Identity – Use CasesNextSome of the critical components of Self Sovereign Identity

Last updated 2 days ago

Copyright © nChain Licensing AG 2024

Whether public or private, centralized or decentralized, there is a common denominator for all – a need for digital trust. The popularity of self-sovereign identity (SSI) solutions has surged over recent years, powered by the unforeseen urgencies of the pandemic, increasing decentralisation and transition towards Web 3.0.

Empowering Digital Ownership

At the heart of self-sovereign identity (SSI) lies the fundamental principle of individuals maintaining absolute ownership and control over their data, deciding when and how it's shared. SSI shifts the data management paradigm by decentralizing personally identifiable information (PII) from centralized organizational databases to the secure confines of a consumer's cryptographically protected digital wallet app. Leveraging distributed ledger technology and pairwise connections, this data undergoes verification by esteemed institutions such as universities, ensuring credibility before selectively sharing with employers and other entities. The outcome is reduced credential fraud, heightened security, enhanced user autonomy, and fortified data protection.

Unlocking Advantages

Embracing transformative technologies and cultivating capabilities to uphold the rightful ownership of identity data is at the core of Digitary's vision. We remain steadfast in our commitment to a learner-centric approach, evolving progressively and collaboratively. This approach mirrors the intricacies of dynamic digital ecosystems globally, ensuring adaptability and responsiveness to the ever-changing landscape.