Identity Review | Global Tech Think Tank
Keep up with the digital identity landscape.
Jolocom builds global infrastructure to support decentralized digital identity management. Smart agents own and control the data that defines the, a prerequisite for self-sovereign identity. Jolocom does by developing an open-source protocol for decentralized identity management designed along the principles of Self-Sovereign Identity.
The Jolocom Protocol facilitates the generation and management of Decentralized Identifiers, Verifiable Credentials, and cryptographic signatures — the core building blocks of Jolocom identities. Jolocom identities are created entirely locally using hierarchical deterministic keys and are designed to enable management of multiple personas by individual users as well as preservation of pairwise anonymity in context-specific interactions. The protocol logic encodes a granular, claim-based model of identity that is highly generalized and unrestrictive in scope in order to accommodate a multiplicity of potential use cases and broad range of subjects of identity (users), including individual persons as well non-person entities like organizations (e.g. companies, governmental bodies), IoT devices (e.g. hardware/software agents), and autonomous agents (e.g. DAOs).
Jolocom’s open-source protocol makes it easy to produce, share, and consume unique identity information. In addition, decentralized identities generated using Jolocom’s protocol are designed to operate in any virtual environment. The company implements open standards developed by the W3C and the DIF for decentralized identifiers (DIDs) and verifiable credentials to ensure that identities remain highly interoperable over time. Finally, the protocol is primed to support any transaction involving unique identity data. It’s flexible enough to support countless distinct commercial and noncommercial use cases, yet sufficiently robust to sustain implementation at scale across different industries and markets.
Learn more about Jolocom identity solutions. This report covers:
Objective of the Report:
This full review is available to Identity Review’s Consortium Members. You can learn more about this review and other benefits of the Consortium membership by getting in touch with us here.