- Identity authentication in web 2.0 is the process by which the authenticated object proves its identity by showing the identity key.
- A DID record contains a ton of data, including DID number, comparing character name, and public key, associating identity key.
- Students who don’t seem to be conversant in DID could also be surprised that the DID number is simply random.
While you are out in the physical world, there is no authentication required for your identity. If someone knows you, they would also know your identity. You won’t have to sit and give proofs regarding who you are.
However, that is not the case in the digital world. While logging into a website, one usually logs in with a username and password. This is for a person’s safety and privacy.
A person can be a citizen, a driver, a user of a video site, a husband, a son, and various other things. With an identity document model, one can easily understand identity authentication in a variety of scenarios, and this can also be carried out in a unified way.
Web 2.0: Identity Authentication
An identity document contains two data stored in a trusted medium. These two data are the identity name and the identity key. Identity authentication in web 2.0 is the process by which the authenticated object proves its identity by showing the identity key.
Traditionally, identity authentication indicates to confirming the binding relationship between physical identity and a social role. But the abstract model is additionally applicable to the case where the thing being authenticated is an individual apart from someone, like an internet site, a device, or a robot.
The identity document-reading model adequately explains the present process of logging in to an official website to implement identity authentication.
The person to be authenticated is the App, and therefore the object to be verified is the user. The explanation of why passwords are difficult to forge isn’t because they’re complicated, but because others don’t know them.
The decentralized autonomous identity authentication process
The premise of DID activity is the DID report, which is put away on the blockchain. The blockchain is a perpetual storage medium trusted by individuals around the globe.
A DID record contains a ton of data, including DID number, comparing character name, and public key, associating identity key.
The basis of DID operation is the DID document, which is stored on the blockchain. The blockchain is an immutable storage medium trusted by people around the world.
A DID file contains a lot of information, including DID number, corresponding identity name, and public key, corresponding identity key.
There are various other characteristics of DID-based authentication. Firstly, the identity key in the DID document is public. Further, during the authentication process, the person being authenticated does not hold the identity key stored in the document. The idea of DID about cryptography-based authentication is not a new creation.
Authentication and authorization are inseparable. Students who don’t seem to be conversant in DID could also be surprised that the DID number is simply random. Since most of the time, identity and power are tied. It also can be stated that identity is defined by power and obligation.
Lastly, combining the assorted discussions, one discovers that regardless of whether it’s digital space or physical space, whether it’s centralized or decentralized, identity is often abstracted into an identity stored on a trusted medium. The documents are the ones that incorporate the identity name and identity key.