Appearance
DID Core
IOST 3.0's Decentralized Identity (DID) Core provides the fundamental architecture, specifications, and protocols that power IOST's identity layer. It enables secure, portable digital identities that remain under user control while meeting the demands of enterprise applications and regulatory requirements.
Core Components
The DID Core of IOST 3.0 consists of several essential components:
Protocol Architecture
Foundational specifications for digital identity implementation, including DID document structure, resolution mechanisms, and identifier formats.
Learn more →Trust Framework
The rules, verifiable credentials system, and governance mechanisms that establish trust between different participants in the identity ecosystem.
Learn more →Key Features
IOST 3.0's DID implementation offers several unique advantages:
Self-sovereign Identity
Users maintain complete control over their identities, including the ability to:
Create and manage multiple identities for different contexts
Update identity attributes without relying on central authorities
Revoke access to previously shared credentials
Transfer identities between wallets and devices
Layer 2 Scalability
IOST 3.0's DID infrastructure leverages Layer 2 solutions to achieve:
High-throughput identity operations with minimal gas fees
Instant verification of credentials and authentication
Efficient batch processing of identity updates
Privacy-preserving identity anchoring with minimal on-chain footprint
Hardware-Integrated Authentication
Industry-first biometric authentication through wearable integration:
Proof of Heartbeat for continuous passive authentication
Secure enclaves for biometric data processing
Multi-modal biometric options for varying security levels
Non-replayable biometric verification
Enterprise & Regulatory Compliance
Built-in features for meeting business and regulatory requirements:
KYC/AML-compliant identity verification processes
Customizable trust levels for different business contexts
Comprehensive audit trails for identity operations
Privacy-by-design principles aligned with GDPR and other regulations
Technical Architecture
IOST 3.0's DID framework is structured in multiple layers:
Interaction Flow
The following sequence diagram illustrates how the different layers interact during key DID operations:
The architecture design enables secure, scalable identity management through clearly defined responsibilities at each layer:
Application Layer: User-facing interfaces for identity management
Trust Framework Layer: Rules and mechanisms for establishing trust
DID Method Layer: IOST-specific identity operations and resolution
Protocol Layer: Core standards and formats for DIDs and documents
Infrastructure Layer: Underlying blockchain and hardware security
Cross-Chain Capabilities
IOST 3.0's DID system is designed for cross-chain identity management:
Universal Resolver: Compatible with W3C DID resolution specifications for interoperability
Bridge Protocols: Identity verification across IOST, Ethereum, and other major blockchains
Protocol Adaptors: Flexible adapters for different blockchain identity systems
Common Credentials Format: Standardized credential format for cross-chain recognition
Get Started with IOST DID
Begin implementing decentralized identity solutions with IOST 3.0:
Explore the Protocol Architecture to understand the foundational design
Review the IOST DID Method for IOST-specific implementation details
Study the Trust Framework to implement compliant identity systems
Each section provides detailed documentation, including specifications, code examples, and integration guides to help you build powerful identity solutions on IOST 3.0.