Skip to content

DID Core

IOST 3.0's Decentralized Identity (DID) Core provides the fundamental architecture, specifications, and protocols that power IOST's identity layer. It enables secure, portable digital identities that remain under user control while meeting the demands of enterprise applications and regulatory requirements.

Core Components

The DID Core of IOST 3.0 consists of several essential components:

📐

Protocol Architecture

Foundational specifications for digital identity implementation, including DID document structure, resolution mechanisms, and identifier formats.

Learn more →
🔗

Trust Framework

The rules, verifiable credentials system, and governance mechanisms that establish trust between different participants in the identity ecosystem.

Learn more →

Key Features

IOST 3.0's DID implementation offers several unique advantages:

Self-sovereign Identity

Users maintain complete control over their identities, including the ability to:

  • Create and manage multiple identities for different contexts

  • Update identity attributes without relying on central authorities

  • Revoke access to previously shared credentials

  • Transfer identities between wallets and devices

Layer 2 Scalability

IOST 3.0's DID infrastructure leverages Layer 2 solutions to achieve:

  • High-throughput identity operations with minimal gas fees

  • Instant verification of credentials and authentication

  • Efficient batch processing of identity updates

  • Privacy-preserving identity anchoring with minimal on-chain footprint

Hardware-Integrated Authentication

Industry-first biometric authentication through wearable integration:

  • Proof of Heartbeat for continuous passive authentication

  • Secure enclaves for biometric data processing

  • Multi-modal biometric options for varying security levels

  • Non-replayable biometric verification

Enterprise & Regulatory Compliance

Built-in features for meeting business and regulatory requirements:

  • KYC/AML-compliant identity verification processes

  • Customizable trust levels for different business contexts

  • Comprehensive audit trails for identity operations

  • Privacy-by-design principles aligned with GDPR and other regulations

Technical Architecture

IOST 3.0's DID framework is structured in multiple layers:

did-arc

Interaction Flow

did-flow

The following sequence diagram illustrates how the different layers interact during key DID operations:

The architecture design enables secure, scalable identity management through clearly defined responsibilities at each layer:

  1. Application Layer: User-facing interfaces for identity management

  2. Trust Framework Layer: Rules and mechanisms for establishing trust

  3. DID Method Layer: IOST-specific identity operations and resolution

  4. Protocol Layer: Core standards and formats for DIDs and documents

  5. Infrastructure Layer: Underlying blockchain and hardware security

Cross-Chain Capabilities

IOST 3.0's DID system is designed for cross-chain identity management:

  • Universal Resolver: Compatible with W3C DID resolution specifications for interoperability

  • Bridge Protocols: Identity verification across IOST, Ethereum, and other major blockchains

  • Protocol Adaptors: Flexible adapters for different blockchain identity systems

  • Common Credentials Format: Standardized credential format for cross-chain recognition

Get Started with IOST DID

Begin implementing decentralized identity solutions with IOST 3.0:

  1. Explore the Protocol Architecture to understand the foundational design

  2. Review the IOST DID Method for IOST-specific implementation details

  3. Study the Trust Framework to implement compliant identity systems

Each section provides detailed documentation, including specifications, code examples, and integration guides to help you build powerful identity solutions on IOST 3.0.

Released under the MIT License.