Skip to content

Trust Framework

The Trust Framework defines how trust is established, maintained, and verified within IOST 3.0's DID ecosystem. It provides the rules, policies, and mechanisms that enable participants to make reliable trust decisions about digital identities and credentials.

Trust Model

IOST 3.0 implements a multi-layered trust model that combines the strengths of decentralized systems with practical governance mechanisms:

Foundational Principles

  1. Decentralized Trust: No single authority controls identity verification

  2. Trust Triangulation: Trust established through multiple independent verification paths

  3. Contextual Trust: Different trust requirements for different use cases

  4. Proportional Trust: Verification strength proportional to risk and value

  5. Transparent Verification: Clear mechanisms for credential verification

Trust Levels

IOST 3.0 defines standardized trust levels that provide a common framework for expressing verification strength:

LevelNameDescriptionTypical Use Cases
0BasicSelf-attested information with minimal verificationSocial profiles, preferences
1EnhancedSingle-source verification with basic checksForum memberships, community access
2VerifiedMulti-source verification with strong evidenceFinancial services, healthcare
3CertifiedHighest level verification including biometric and regulatory complianceGovernment services, high-value transactions

Trust Level Calculation

Trust levels are calculated based on multiple factors:

  1. Identity Proofing Strength: Robustness of the initial verification process

  2. Authentication Factors: Number and strength of authentication methods

  3. Credential Issuer Reputation: Trust score of the credential issuer

  4. Verification Freshness: Recency of verification checks

  5. Compliance Alignment: Adherence to relevant regulatory requirements

Trust Anchors

Trust anchors are entities within the IOST ecosystem that serve as trusted reference points:

Types of Trust Anchors

  1. Institutional Anchors: Established organizations with regulatory credentials

  2. Technical Anchors: Secure systems and infrastructure components

  3. Community Anchors: Entities with high reputation scores in the network

  4. Governance Anchors: IOST foundation and governance members

Trust Anchor Requirements

To qualify as a trust anchor, entities must meet stringent requirements:

  • Maintain secure key management practices

  • Submit to regular security audits

  • Implement transparent verification procedures

  • Maintain compliance with relevant regulations

  • Contribute to the overall security of the ecosystem

Credential Verification

IOST 3.0's trust framework defines how verifiable credentials are evaluated and trusted:

Verification Mechanisms

  1. Cryptographic Verification: Mathematical validation of credential signatures

  2. Status Checking: Verification of credential revocation status

  3. Chain of Trust: Validation of the issuer's authority to issue credentials

  4. Biometric Binding: Linking credentials to biometric verification (when applicable)

  5. Cross-Verification: Corroborating credentials across multiple sources

Selective Disclosure & Zero-Knowledge Proofs

The framework supports privacy-preserving verification through:

  • Minimal Disclosure: Revealing only necessary attributes

  • Derived Credentials: Proving properties without revealing source data

  • Range Proofs: Demonstrating values within acceptable ranges

  • Zero-Knowledge Age Verification: Proving age requirements without revealing birth date

Biometric Trust Enhancement

IOST 3.0 uniquely integrates biometric verification to strengthen the trust framework:

Proof of Heartbeat Protocol

The Proof of Heartbeat protocol provides continuous passive authentication:

  1. Device Binding: Associates wearable devices with DID through secure registration

  2. Biometric Templates: Creates secure, privacy-preserving biometric reference data

  3. Continuous Authentication: Validates user presence through heartbeat patterns

  4. Anti-Spoofing Measures: Detects fraudulent biometric presentations

Privacy Safeguards

To protect biometric data within the trust framework:

  1. Local Processing: Biometric matching occurs on secure hardware

  2. Template Protection: Biometric templates are encrypted and never stored in raw form

  3. Revocable Biometrics: Templates can be revoked and regenerated

  4. Consent Management: Clear user consent mechanisms for biometric processing

Trust Registry

The Trust Registry maintains authoritative information about ecosystem participants:

Registry Components

  1. Issuer Registry: Records about authorized credential issuers

  2. Schema Registry: Standard schemas for different credential types

  3. Revocation Registry: Information about revoked credentials and DIDs

  4. Trust Anchor Directory: Listing of recognized trust anchors

Governance Model

The Trust Registry is governed through:

  1. Distributed Administration: Multiple parties share administrative responsibility

  2. Transparent Policies: Clear rules for inclusion and removal

  3. Audit Trails: Immutable records of registry changes

  4. Community Input: Stakeholder participation in governance decisions

Regulatory Compliance

IOST 3.0's trust framework addresses key regulatory requirements:

Compliance Integration

  1. KYC/AML Alignment: Compatibility with Know Your Customer and Anti-Money Laundering regulations

  2. GDPR Compatibility: Mechanisms for data minimization, right to be forgotten, and data portability

  3. Industry-Specific Standards: Support for financial, healthcare, and other regulated sectors

  4. Cross-Jurisdiction Capabilities: Adaptable trust rules for different regulatory environments

Compliance Verification

The framework enables compliance verification through:

  1. Automated Policy Checking: Programmatic verification of regulatory requirements

  2. Audit Support: Comprehensive logging for compliance audits

  3. Regulatory Reporting: Tools for generating required regulatory reports

  4. Adaptive Compliance: Updating compliance measures as regulations evolve

Dispute Resolution

The trust framework includes mechanisms for resolving identity-related disputes:

Resolution Process

  1. Discovery Phase: Collection and preservation of relevant evidence

  2. Evaluation Phase: Assessment by qualified arbitrators

  3. Resolution Phase: Determination of appropriate remedies

  4. Implementation Phase: Execution of the resolution decision

Remediation Options

Available remedies for trust violations include:

  1. Credential Revocation: Invalidation of compromised credentials

  2. Trust Score Adjustment: Modification of entity trust ratings

  3. Registry Updates: Changes to Trust Registry entries

  4. Compensatory Measures: Restitution for affected parties

Ecosystem Integration

The Trust Framework integrates with the broader IOST 3.0 ecosystem:

Integration Points

  1. RWA Framework: Trust verification for real-world asset tokenization

  2. Payment Infrastructure: Risk-based authentication for financial transactions

  3. Governance Systems: Identity verification for voting and governance participation

  4. Layer 2 Solutions: Scalable trust verification for high-volume applications

Released under the MIT License.