Decentralized Identifiers

Trusted unique IDs that power data authenticity, provenance, and messaging security.

DIDs provide a secure way of ensuring verifiers, issuers, and end users are who they say they are without exposing sensitive data. DIDs offer a second layer of authentication that ensures both data security in transit and underlying identities of the user and relying party,


DIDs authenticate verifiers, issuers, and users without exposing sensitive data, adding an extra layer of security for data in transit and underlying identities.

A better identifier

DIDs do the heavy lifting of binding end-users to their secure credentials. This means that data can only be controlled by the end user and that attempted use of sensitive data without DID-based verification is unauthorized.

Standards-based

DIDs have been a W3C recommendation since 2022. Today we use DID:KEY and DID:WEB, with support for other DID methods on the horizon

A deterministic trust anchor

 DIDs provide cryptographic proof about their subjects. When combined with Verifiable Credentials, DIDs help prove that the data belongs to the subject and only the subject. This is one way we’re fighting the misuse of stolen data. 


Pseudonymous & privacy-preserving

DIDs themselves do not reveal any sensitive information for KYC and AML contexts. However, a DID provides the groundwork for trusted interactions

How it works

1

Methods - Portabl uses multiple DID methods, including DID:ION, a Layer 2 network based on the Sidetree protocol. DID:KEY is also used, with plans to support DID:DHT.

2

Anchor - Anchoring a DID generates a unique proof of existence, acting as a unique identifier like DNS for entities. It can be done with or without blockchain.

3

Hash - Anchoring converts data into cryptographic hashes to prove existence while keeping data private. This can be done through simple or on-chain hashing.

Pink Tick Icon

Transact - The DID enables secure recordkeeping and change tracking. When hashes are recorded on a blockchain, changes are immutably time-stamped without leaking sensitive information.

We simplify and abstract the cryptography

Portabl simplifies DID management for businesses and consumers. No cryptography background is needed, allowing users to use Portabl like any other social login without technical knowledge.

DIDComm — secure messaging and 2-way authentication

DIDs power a second form of authentication that provides a secure channel for information sharing that is ATO- and MITM-proof

Tamper-resistant record keeping

The sequence of data changes over time is tied to the DID. This provides a powerful way to evaluate attribute reputation, provenance, and change history over time.