Abstract [eng] |
The protection of personal data, due to the frequent data leaks and its misuse for commercial purposes, is becoming increasingly important to every Internet user. Organizations and institutions are not interested in returning data management to people because they would suffer financially because of that, so W3C and other non-profit organizations seek to create solutions that bring back digital identity control to people. This work analyzes the concept of self sovereign identity as well as analyzed Distributed Ledget Technology (DLT), Decentralized Identifiers (DID), and Verifiable Credentials (VC) technologies, which, when combined provide a system of self-sovereign identity. There are also identified use cases of self sovereign identity usage and the main system for covering the major use cases of exploitation and its architecture. The work led to the conclusion that self-sovereign identity may in the future change not only alternative types of digital identity, but also physical world equivalents, the main reason being the use of cryptographic functions in self sovereign identity systems. |