Communication Protocols
In Hovi, communication protocols are essential components that enable secure and encrypted exchanges of verifiable credentials between issuers, holders, and verifiers. These protocols ensure that identity data is transferred safely and reliably across different parties, preventing unauthorized access or data tampering during the exchange process.
Why Communication Protocols are Important?
Imagine sending a physical ID via regular mail—anyone could intercept it and misuse your credentials. Similarly, in the digital world, identity data requires a robust system to ensure that only the intended recipient (verifier) can access it and that it remains intact and unaltered. Communication protocols in Hovi act as this secure mailing system, ensuring cryptographically encrypted transmissions of identity information between parties.
How Communication Protocols Work in Hovi
At the heart of Hovi's communication framework are several supported protocols that dictate how credentials are issued and verified securely. Hovi uses various standardized protocols that align with decentralized identity principles, ensuring cross-platform compatibility and interoperability between different identity providers and ecosystems.
In practical terms, Hovi enables the following process through communication protocols:
- The issuer creates a verifiable credential and sends it securely to the holder (who stores it in their wallet).
- The holder shares this credential with a verifier when requested.
- The verifier checks the validity and authenticity of the credential using the same secure protocol, ensuring that the data is accurate and unaltered.
For example, if a university issues a digital diploma to a student (the holder), the student can later present it to an employer (the verifier), who will verify it through a secure communication protocol.
Types of Communication Protocols Supported by Hovi
These protocols facilitate secure, decentralized communication and credential exchange in identity systems. Each platform chooses protocols that align with its specific approach to digital identity management.
This table provides a concise overview of each communication protocol mentioned in the original image, along with a brief explanation of its purpose or key features.
Protocol | Explanation |
---|---|
DIDcomm V1 | A secure, private communication methodology built on Decentralized Identifiers (DIDs). Used by Sovrin, Indicio, and Cheqd. |
Out-of-Band | Allows for information exchange outside the main communication channel, often used for initial connections or sharing DIDs. Used alongside DIDcomm V1 by Sovrin, Indicio, and Cheqd. |
Iden3 | An identity management solution focused on privacy and scalability. Uniquely used by Privado. |
OID4VC | OpenID for Verifiable Credentials. Part of the OpenID protocol suite. |
OID4VP | OpenID for Verifiable Presentations. Part of the OpenID protocol suite. |
SIOPv2 | Self-Issued OpenID Provider v2. Part of the OpenID protocol suite. |
Each protocol has its specific strengths, but the common goal is to encrypt and secure credential exchanges between the involved parties, ensuring data integrity and privacy.