zkPass
zkPass User's Guide
zkPass User's Guide
  • Getting Started
    • ๐Ÿ”ŠIntroduction
      • What is zkPass?
      • How does it work?
      • How zkPass can help you
      • What's Ahead
    • ๐ŸŒค๏ธService-based Proof System
      • Main Features
      • zkPass Workflows
      • Deployment Options
        • Public-Cloud Hosting
        • Private-Cloud Hosting
        • On-Premise Hosting
    • ๐Ÿ—๏ธKey Concepts
      • User Data
      • DVR
      • zkPass Proof
  • Core Components
    • ๐Ÿ›๏ธService Architecture
      • RESTful API Web Service
      • zkPass Query Host
    • ๐Ÿ‘ฅzkPass Client Roles
    • ๐ŸคTrust Models
      • Data Privacy Trust Model
      • Data Integrity Trust Model
      • Computation Integrity Trust Model
    • ๐Ÿ‘ฉโ€๐Ÿ’ปzkPass Module
  • Use Cases
    • ๐ŸฉธEmployee Onboarding
      • โ€œBlood Test Resultโ€ User Data
      • "Employee Onboarding" DVR
      • zkPass Integration
      • Call Sequence
    • ๐Ÿš˜Loan Application Screening
      • โ€œBCA Customer Profileโ€ User Data
      • Loan Screening DVR
      • zkPass Integration
      • Call Sequence
    • ๐Ÿ›’Sharing OIDC Users Securely
      • "ShopSphere ID Token" User Data
      • "ShopSphere Account Holder" DVR
      • zkPass Integration
        • Integration Guidelines for ShopSphere OIDC Provider
        • Integration Guidelines for Krisna Service
        • Integration Guideline for ShopSphere App
      • Call Sequence
  • FAQ
    • How is verifiable computing implemented by ZKP?
  • Glossary
    • Client-based Proof System
    • DVR
    • User Data
    • zkPass Proof
Powered by GitBook
On this page
  • Secure and Versatile Folder
  • Authenticity and Trust
  • Schema-Agnostic Design and JSON Format
  • Confidential Verification and Sharing
Export as PDF
  1. Getting Started
  2. Key Concepts

User Data

User data encapsulates a spectrum of sensitive and confidential attributes, credentials, or claims, ranging from driver's licenses and passports to financial credentials such as bank account details.

PreviousKey ConceptsNextDVR

Last updated 1 year ago

Secure and Versatile Folder

The User Data can be envisioned as a digital personal folder, where you securely store confidential information like driver's licenses, birth certificates, diplomas, and others. This system represents a flexible and secure way to manage a variety of data, inspired by W3C's but extending beyond to accommodate diverse document types, irrespective of their format. Unlike the complex W3C format, we are using the ubiquitous and versatile as the folder. Thus the User Data is essentially formatted as a JSON Web Token.

Authenticity and Trust

The items stored within your User Data, akin to the confidential information in your personal folder in this analogy, generally originate from external entities referred to as Data Issuers. These are typically authorities or institutions issuing official documents. To ensure the authenticity of the document added to your folder, the Data Issuer stamps it, similar to placing an official seal on the physical folder. This digital stamping on the folder is effectively implemented using (JWS), serving as a digital seal that verifies the genuineness and trustworthiness of your data.

Schema-Agnostic Design and JSON Format

zkPass's 'schema-agnostic' design enables the storage of various types of data without the need to follow a specific layout or format. Whether it's an official certificate or an informal note, as long as itโ€™s in the universally understandable JSON format, it can be included in your folder. This approach ensures that your personal folder is not only flexible but also coherent and user-friendly.

Confidential Verification and Sharing

When sharing or verifying your personal document contained in the User Data, confidentiality and security are paramount. The zkPass Query Host facilitates the verification of your document without compromising their integrity, similar to a secure viewing room where confidentiality is maintained at all times. This setup offers you a digital personal folder that is organized, accessible, and fortified with robust security, ensuring peace of mind in managing sensitive data.

For a more detailed explanation of the User Data, please refer to the .

๐Ÿ—๏ธ
Verifiable Credentials
JSON Web Token
JSON Web Signature
Developer's Guide