From fe42d339cda596bb893c9e97cc1adf34a5ae0ed6 Mon Sep 17 00:00:00 2001 From: Joseph Lee Hunsaker Date: Mon, 16 Feb 2026 01:00:27 -0700 Subject: [PATCH 1/3] Resolve unresolved merge conflict markers in 7 files These files contained <<<<<<< HEAD / ======= / >>>>>>> upstream/main conflict markers that were committed without being resolved. Keeps the upstream/main side in all cases: - 3 annotated-copies files (different auto-generated accordion IDs) - 2 glossary files (self-authenticating.md, streamer.md) - overview-and-context.mdx (auto-generated table data) - overview.json (auto-generated JSON data) Co-Authored-By: Claude Opus 4.6 --- docs/04_glossary/self-authenticating.md | 4 ---- docs/04_glossary/streamer.md | 12 ------------ .../WebOfTrust-ietf-acdc-main-draft-ssmith-acdc.md | 12 ------------ ...-cesr-proof-main-draft-pfeairheller-cesr-proof.md | 12 ------------ .../WebOfTrust-ietf-ipex-main-draft-ssmith-ipex.md | 12 ------------ docs/_02_overview/overview-and-context.mdx | 6 ------ static/json/overview.json | 4 ---- 7 files changed, 62 deletions(-) diff --git a/docs/04_glossary/self-authenticating.md b/docs/04_glossary/self-authenticating.md index 32bd35bdce..b91f300659 100644 --- a/docs/04_glossary/self-authenticating.md +++ b/docs/04_glossary/self-authenticating.md @@ -1,11 +1,7 @@ -<<<<<<< HEAD -<<<<<<< HEAD -======= # self authenticating ======= # self authenticating ======= >>>>>>> upstream/main ->>>>>>> upstream/main ## See [self-certifying](self-certifying-identifier) \ No newline at end of file diff --git a/docs/04_glossary/streamer.md b/docs/04_glossary/streamer.md index 4c3ba519a1..b9e2e4e772 100644 --- a/docs/04_glossary/streamer.md +++ b/docs/04_glossary/streamer.md @@ -1,25 +1,13 @@ -<<<<<<< HEAD -<<<<<<< HEAD -======= # streamer ## Definition A convenience class for supporting stream parsing, including nested (tunneled, encrypted) CESR streams. Streams can be a mixture/combination of different primitives, including other streams. A stream is a concatenation of primitives. ======= ->>>>>>> upstream/main ## Definition A convenience class for supporting stream parsing, including nested (tunneled, encrypted) [CESR](CESR) streams. Streams can be a mixture/combination of different [primitives](primitive), including other streams. A stream is a concatenation of primitives. Source: Kent Bull in chat Zoom meeting KERI Aug 6, 2024. ## More -<<<<<<< HEAD -======= -# streamer -## Definition - A convenience class for supporting stream parsing, including nested (tunneled, encrypted) CESR streams. Streams can be a mixture/combination of different primitives, including other streams. A stream is a concatenation of primitives. - -======= ->>>>>>> upstream/main >>>>>>> upstream/main It is akin to a cryptographic primitive yet is not a cryptographic primitive itself. diff --git a/docs/08_annotated-copies/WebOfTrust-ietf-acdc-main-draft-ssmith-acdc.md b/docs/08_annotated-copies/WebOfTrust-ietf-acdc-main-draft-ssmith-acdc.md index 3c24d1690b..0a34eebe9b 100644 --- a/docs/08_annotated-copies/WebOfTrust-ietf-acdc-main-draft-ssmith-acdc.md +++ b/docs/08_annotated-copies/WebOfTrust-ietf-acdc-main-draft-ssmith-acdc.md @@ -4,19 +4,11 @@
-<<<<<<< HEAD -

- - - @@ -25,11 +17,7 @@

-<<<<<<< HEAD -
-=======
->>>>>>> upstream/main
diff --git a/docs/08_annotated-copies/WebOfTrust-ietf-cesr-proof-main-draft-pfeairheller-cesr-proof.md b/docs/08_annotated-copies/WebOfTrust-ietf-cesr-proof-main-draft-pfeairheller-cesr-proof.md index 3587f71afb..32bd4e0a5f 100644 --- a/docs/08_annotated-copies/WebOfTrust-ietf-cesr-proof-main-draft-pfeairheller-cesr-proof.md +++ b/docs/08_annotated-copies/WebOfTrust-ietf-cesr-proof-main-draft-pfeairheller-cesr-proof.md @@ -4,19 +4,11 @@
-<<<<<<< HEAD -

- - - @@ -25,11 +17,7 @@

-<<<<<<< HEAD -
-=======
->>>>>>> upstream/main
diff --git a/docs/08_annotated-copies/WebOfTrust-ietf-ipex-main-draft-ssmith-ipex.md b/docs/08_annotated-copies/WebOfTrust-ietf-ipex-main-draft-ssmith-ipex.md index f5959b1e02..86b0b3510c 100644 --- a/docs/08_annotated-copies/WebOfTrust-ietf-ipex-main-draft-ssmith-ipex.md +++ b/docs/08_annotated-copies/WebOfTrust-ietf-ipex-main-draft-ssmith-ipex.md @@ -4,19 +4,11 @@
-<<<<<<< HEAD -

- - - @@ -25,11 +17,7 @@

-<<<<<<< HEAD -
-=======
->>>>>>> upstream/main
diff --git a/docs/_02_overview/overview-and-context.mdx b/docs/_02_overview/overview-and-context.mdx index 8c56807226..37622d2013 100644 --- a/docs/_02_overview/overview-and-context.mdx +++ b/docs/_02_overview/overview-and-context.mdx @@ -2,12 +2,6 @@ -<<<<<<< HEAD:docs/_02_overview/overview-and-context.mdx -
KeyTypeFormToIP_FkeyPhilvid_FkeyTermtextlinkPhilvid_startlevelCat_PTELCat_IPEXCat_OOBICat_CESRCat_ACDCCat_KERICat_SAIDCat_GLEIFShortened version@dropdownShortened version static copy
1KnACDCACDCtype of data as issuance concretely defined by the authentic-chained-data-container specificationLinkLink3#REF!1Data type as described by the authentic-chained-data-container specification.Data type defined by Authentic Chained Data Container Spec.
2KnADCADCan authentic data container conveys data that allows the authenticity of its content to be proved.LinkLink3#REF!1An authentic data container proves the authenticity of its content.
3SnAIDAIDan identifier that is self-certifying and self-sovereign.LinkLink3#REF!11A self-certifying and self-sovereign identifier.
4SnANANa namespace that is truly self-sovereign.LinkLink3#REF!1A self-sovereign namespace.
5KrAPCAPCauthentic provenance chain; evidence of data to be verfiably tracked back to its originLinkLink3#REF!Verified provenance chain; evidence of data can be tracked back to its origin.
6KrBADABADAbest available data acceptance, mechanism that provides a degree of replay attack protectionLinkLink31#REF!best data acceptance mechanism with replay attack protection.
7GnBFTBFTByzantine Fault TolleranceLinkLink3#REF!Byzantine Fault Tolerance
8KnCESRCESRcomposable event streaming representationLinkLink3#REF!1Event streaming representation
9GnCTCTcertificate transparency; internet security standard for digital certificatesLinkLink2#REF!Certificate Transparency is an internet security standard for digital certificates.
10GnDAGDAGdirected acyclic graph, mathematical construct, no cycles in itLinkLink2#REF!Directed acyclic graph is a mathematical construct without any cycles.
11KnDELDELduplicitous event logLinkLink3#REF!1Event log
12GnDHTDHTdistributed hash tableLinkLink2#REF!1distributed hash table
13SnDKMIDKMIdecentralized key management infrastructure; ensure no single third-party can compromise the integrity and security of a systemLinkLink2#REF!1decentralized key management system; prevents any single third-party from compromising system integrity and security.
14SnDPKIDPKIdecentralized public key infrastructure; ensure no single third-party can compromise the integrity and security of a systemLinkLink2#REF!Decentralized PKI; guarantee no third-party compromise system integrity and security.
15GnGPGGPGGnu Privacy Guard, a free-software replacement for Symantec's PGP cryptographic software suiteLinkLink2#REF!Gnu Privacy Guard is a free-software alternative to Symantec's PGP suite.
16GnI-OI-OInput / OutputLinkLink1#REF!Input/Output
17GnIANAIANAInternet assigned numbers authority; oversees the allocation of IP addresses to internet service providers (ISPs)LinkLink2#REF!The Internet Assigned Numbers Authority (IANA) oversees IP address allocation to ISPs.
18KrIPEXIPEXissuance and presentation exchange protocol; mechanism for the issuance and presentation of ACDCsLinkLink31#REF!1ACDC issuance and presentation protocol; mechanism for issuing and presenting ACDCs.
19GrJOSEJOSEJavascript object signing and encryption; method to securely transfer claims between partiesLinkLink3#REF!1JavaScript object signing and encryption is a secure method for transferring claims between parties.
20KnKA2CEKA2CEKERI agreement algorithm for control establishmentLinkLink3#REF!1KERI control establishment algorithm
21KnKAACEKAACEKERI agreement algorithm for control establishmentLinkLink3#REF!1KERI control establishment algorithm
22KnKELKELKey Event LogLinkLink3#REF!1Event Log
23KnKERIKERIKey Event Receipt InfrastructureLinkLink3#REF!1Receipt Infrastructure
24KnKERLKERLKey Event Receipt LogLinkLink3#REF!1Event Receipt Log
25KnKIDKIDKERI improvement docLinkLink3#REF!1Keri Improvement Document
26GnLoALoAany time a judgement is not a binary Yes or No, you have levels of assuranceLinkLink2#REF!Whenever a judgement is not simply a "Yes" or "No," there are varying levels of assurance.
27GnLoCLoCLocus of ControlLinkLink2#REF!Locus of Control refers to the extent to which individuals believe they have control over events in their lives.
28GnNFTNFTNon-fungible tokenLinkLink1#REF!Non-fungible token
29KvOOBIOOBIOut of band introductionLinkLink31#REF!Introduction
30GrP2PP2PPeer to peerLinkLink1#REF!Peer-to-peer
31GrPGPPGPPretty Good PrivacyLinkLink1#REF!Pretty Good Privacy (PGP)
32GnPKIPKIPublic Key InfrastructureLinkLink2#REF!111Public Key Infrastructure (PKI)
33KnPTELPTELis a public transaction event log that can be used to securely track state anchored to a KELLinkLink31#REF!is a secure public event log for tracking state anchored to a KEL.
34KnSADSADSelf-Adressing DataLinkLink3#REF!1Self-Addressing Data.
35KnSAIDSAIDSelf-Adressing IdentifierLinkLink3#REF!11Self-Addressing Identifier
36GnSATPSATPsecure asset transfer protocol; IETF protocol (and working group) in the making (as of mid 2022) for moving assets between blockchainsLinkLink3#REF!Secure asset transfer protocol: IETF protocol (and working group) currently being developed (mid-2022) to transfer assets between blockchains.
37SvSCIDSCIDSelf-Certifying Identifier, cryptographically binds an identifier to a public and private key pair.LinkLink3#REF!1A Self-Certifying Identifier cryptographically binds an identifier to a key pair.
38SrSSISSISelf-Sovereign IdentityLinkLink1#REF!111Self-Sovereign Identity (SSI)
39GnTCPTCPtransmission control protocol, one of the main protocols of the Internet protocol suite.LinkLink21#REF!11Transmission Control Protocol (TCP) is a key protocol in the Internet protocol suite.
40KnTELTELprovides a cryptographic proof of registry state by reference to the corresponding controlling KEL.LinkLink31#REF!11provides cryptographic proof of registry state via the corresponding controlling KEL.
41GrUIUIthe space where interactions between humans and machines occur.LinkLink1111#REF!1111The area where humans and machines interact.
42GnURLURLuniform resource locator or 'web address', is a reference to a web resource that specifies its location on a computer networkLinkLink1111#REF!1111A URL, known as a web address, is a reference to a web resource that specifies its location on a computer network.
43KnVC-TELVC-TELvirtual credential transaction event logLinkLink31#REF!Virtual credential transaction log
44GnVCVCvirtual credentialLinkLink1#REF!11Virtual credential
45GnVDSVDSverifiable data structureLinkLink3#REF!Verifiable data structure.
46Gvagencyagencya service that a representative for an identity (agent) offersLinkLink2#REF!111A service offered by an identity representative (agent).
47Kvambient-verifiabilityambient-verifiabilityVerifiable by anyone, anywhere, at anytime.LinkLink3#REF!Verifiable by anyone, anywhere, at any time.
48Gnappend-only-event-logsappend-only-event-logsis a property of computer data storage such that new data can be appended to the storage, but where existing data is immutableLinkLink2#REF!Mutable data storage allows new data to be added, but existing data cannot be changed.
49Knauthentic-chained-data-containerauthentic-chained-data-containerdata structure that proves digital data consistency and authenticity in one goLinkLink3#REF!A data structure that ensures both the consistency and authenticity of digital data.
50Knauthentic-data-containerauthentic-data-containerdata structure that proves digital data consistency and authenticity in one goLinkLink3#REF!A data structure that ensures both the consistency and authenticity of digital data.
51Kvauthentic-provenance-chainauthentic-provenance-chainevidence of data to be tracked back to its origin in an verifiable wayLinkLink3#REF!Evidence of data can be tracked back to its origin in a verifiable manner.
52Gaauthenticityauthenticitythe quality of having an objectively verifiable originLinkLink2#REF!The quality of having an objectively verifiable origin.
53Gnautonomic-computing-systemsautonomic-computing-systemsself-managing computing systems using algorithmic governanceLinkLink2#REF!Self-managing computing systems with algorithmic governance.
54Snautonomic-identity-systemautonomic-identity-systemidentity systems where you can verify (establishment of) the authenticity all the way back to the root-of-trustLinkLink2#REF!Identity systems can verify authenticity all the way back to the root of trust.
55Snautonomic-namespaceautonomic-namespacenamespace that is self-certifying and hence self-administrating, is truly self-sovereignLinkLink2#REF!A self-certifying and self-administrating namespace is truly self-sovereign.
56Knbest-available-data-acceptance-mechanismbest-available-data-acceptance-mechanismBADA, mechanism that provides a degree of replay attack protectionLinkLink3#REF!BADA is a mechanism that offers replay attack protection.
57Svbindingbindingthe association of data or an identifier with another identifier or a subject (a person, organization or machine)LinkLink1#REF!Associating data or an identifier with another identifier or subject (person, organization, or machine).
58Grbyzantine-agreementbyzantine-agreementis Byzantine fault tolerance of distributed computing system coming to consensus despite arbitrary behavior from a fraction of the networkLinkLink2#REF!Byzantine fault tolerance allows distributed computing systems to reach consensus despite arbitrary behavior from some network participants.
59Gnbyzantine-fault-tolerancebyzantine-fault-toleranceis a condition of a (distributed) computer system, where components may fail and there is imperfect information on whether a component has failedLinkLink2#REF!Distributed computer systems can experience failures and uncertainty regarding component statuses.
60Gncertificate-transparencycertificate-transparencyinternet security standard and framework for digital certificatesLinkLink2#REF!Internet security standard and framework for digital certificates.
61Kncesr-proof-signaturescesr-proof-signaturesAn extension to CESR that provides signature attachmentsLinkLink3#REF!NO INPUT
62Gvchain-of-custodychain-of-custodylegal chronological documentation or paper trail that records the sequence of custody of materialsLinkLink2#REF!A legal record that documents the sequence of material custody.
63Gvclaimclaimassertion of the truth of something, typically one which is disputed or in doubtLinkLink1#REF!assertion of disputed or doubtful truth.
64Kncomposable-event-streaming-representationcomposable-event-streaming-representationAlso 'CESR'. An encoding scheme of interchangeable textual and binary streaming applications of attached crypto material.LinkLink3#REF!CESR is an encoding scheme for interchangeable textual and binary streaming applications with attached crypto material.NO INPUT
65Gvconsensus-mechanismconsensus-mechanismHow groups of entitities come to decisions.LinkLink2#REF!NO INPUT
66Gncontent-addressable-hashcontent-addressable-hashFinding content by a hash of this content, generated by a one-way hash function applied to the content.LinkLink2#REF!NO INPUT
67Srcontrol-authoritycontrol-authorityIs 'who controls what?' and that is the primary factor in determining the basis for trust in themLinkLink2#REF!NO INPUT
68Gncontrollercontrollerthe entity that has the ability to make changes to an identity, cryptocurrency or verifiable credential.LinkLink2#REF!The entity capable of modifying an identity, cryptocurrency, or verifiable credential.
69Gvcorrelationcorrelationan identifier used to indicate that external parties have observed how wallet contents are related.LinkLink1#REF!An identifier indicating external parties have observed the relationship between wallet contents.
70Gncredentialcredentialevidence of authority, status, rights, entitlement to privileges, or the like.LinkLink1#REF!Evidence of authority, status, rights, entitlements, or similar privileges.
71Gncrypto-librariescrypto-librariesdeal with cryptography algorithms and have API function calls to each of the supported featuresLinkLink1#REF!This deals with cryptography algorithms and has API functions for each supported feature.
72Gncryptocurrencycryptocurrencya digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a digital ledger.LinkLink1#REF!A digital asset that serves as a medium of exchange, with individual coin ownership records stored in a digital ledger.
73Gncryptographic-commitment-schemecryptographic-commitment-schemeis a cryptographic primitive that allows one to commit to a value while keeping it hidden to others; you can reveal the committed value later.LinkLink2#REF!NO INPUT
74Gncryptographic-strengthcryptographic-strengthused to describe greater resistance to attack of an encryption algorithm in comparison to some other (which is thus cryptographically weaker)LinkLink1#REF!NO INPUT
75Gncryptonymcryptonyma code word or name used to refer to another name, word, project, or personLinkLink2#REF!NO INPUT
76Sndecentralized-identitydecentralized-identityis a technology that uses cryptography to allow individuals to create and control their own digital identifiersLinkLink1#REF!NO INPUT
77Gndecentralized-key-management-infrastructuredecentralized-key-management-infrastructurean infrastructure ensure that no single third-party can compromise the integrity and security of the system as as whole.LinkLink2#REF!NO INPUT
78Sndelegated-identifierdelegated-identifierMatches the act of delagation with the appropriate digital twin.LinkLink3#REF!NO INPUT
79Gndigital-signaturedigital-signaturea mathematical scheme for verifying the authenticity of digital messages or documentsLinkLink1#REF!Mathematical scheme to verify authenticity of digital messages or documents.
80Gndirected-acyclic-graphdirected-acyclic-graphDAG, a mathematical construct, particularly graph theory, the acyclic property stems from a directed graph with no cyclesLinkLink2#REF!1A DAG, a mathematical construct in graph theory, is a directed graph with no cycles, giving it the acyclic property.
81Gndistributed-hash-tabledistributed-hash-tableany participant can retrieve the value associated with a given keyLinkLink2#REF!Any participant can get the value for a specific key.
82Kndual-text-binary-encoding-formatdual-text-binary-encoding-formatAn encoding format that allows for both text and binary encoding format, which is fully interchangeableLinkLink3#REF!1NO INPUT
83Knduplicitous-event-logduplicitous-event-logrecord of inconsistent event messages produced by a given controller or witnessLinkLink3#REF!1log of inconsistent event messages from a controller or witness
84Gnduplicityduplicityexternal inconsistency; which stems from publication of two or more versions of a (by itself consistent) key event logLinkLink3#REF!1External inconsistency occurs when multiple versions of a key event log are published, even though the log itself is consistent.
85Gvelectronic-signatureelectronic-signatureLinkLink1#REF!NO INPUT
86Gaend-verifiableend-verifiableLinkLink3#REF!1NO INPUT
87GventropyentropyLinkLink2#REF!1NO INPUT
88GaephemeralephemeralLinkLink2#REF!1NO INPUT
89Kafirst-seenfirst-seenLinkLink3#REF!1NO INPUT
90Gngnu-privacy-guardgnu-privacy-guardGPG is a free-software replacement for Symantec's PGP cryptographic software suiteLinkLink2#REF!GPG replaces Symantec's PGP software suite for free.
91KnhaberyhaberyLinkLink3#REF!NO INPUT
92Grhierarchical-asynchronous-coroutines-and-input-outputhierarchical-asynchronous-coroutines-and-input-outputLinkLink3#REF!NO INPUT
93GnidentifieridentifierSomething to uniquely identify (public) identities; pointing to something or someone else.LinkLink1#REF!Something to uniquely identify public identities, pointing to someone or something else.
94Gnidentityidentitya unique entity. Typically represented by a unique identifier.LinkLink2#REF!A distinct entity typically represented by a unique identifier.
95Kninception-eventinception-eventthe first event in KERI that establishes an identifier.LinkLink31#REF!1The initial event in KERI that establishes an identifier.
96Gvinceptioninceptionoperation creating an AID by binding it to the initial set of authoritative keypairs and any other associated information.LinkLink2#REF!Create an AID by binding it to the initial set of authoritative keypairs and any relevant information.
97Grinconsistencyinconsistencydifferent parts of a reason, idea or opinion do not agree, or it does not agree with something else.LinkLink1#REF!1When different parts of a reason, idea, or opinion do not agree, or it is in disagreement with something else.
98Knindexed-signatureindexed-signaturean index telling which public key is used when signing anything with a multi-key autonomic identifier.LinkLink3#REF!An index indicating the public key used for signing with a multi-key autonomic identifier.
99Grinternal-inconsistencyinternal-inconsistencyA status that exists within an entity where different parts of a reason, idea or opinion disagree.LinkLink2#REF!1A disagreement within an entity where different parts have conflicting reasons, ideas, or opinions.
100Gninternet-assigned-numbers-authorityinternet-assigned-numbers-authorityAlso IANA; the organization that oversees the allocation of IP addresses to internet service providers (ISPs)LinkLink3#REF!IANA oversees IP address allocation to ISPs.
101Krissuance-and-presentation-exchange-protocolissuance-and-presentation-exchange-protocolprovides a uniform mechanism for the issuance and presentation of ACDCs in a securely attributable mannerLinkLink3#REF!1provides a secure and standardized way to issue and present ACDCs.
102Grjavascript-object-signing-and-encryptionjavascript-object-signing-and-encryptionJavascript object signing and encryption; method to securely transfer claims between partiesLinkLink1#REF!JavaScript object signing and encryption is a secure method for transferring claims between parties.
103KnjudgejudgeLinkLink3#REF!NO INPUT
104Krkeri-agreement-algorithm-for-control-establishmentkeri-agreement-algorithm-for-control-establishmentLinkLink3#REF!1NO INPUT
105Knkeri-command-line-interfacekeri-command-line-interfaceLinkLink3#REF!11NO INPUT
106Knkeri-improvement-dockeri-improvement-docLinkLink3#REF!1NO INPUT
107Knkeridemliakeridemliadistributed database of Witness IP-addressesLinkLink3#REF!Database of Witness IP addresses.
108Gvkey-compromisekey-compromiseLinkLink2#REF!1NO INPUT
109Knkey-event-messagekey-event-messageLinkLink3#REF!1NO INPUT
110Knkey-event-receipt-infrastructurekey-event-receipt-infrastructureapproach to decentralized identifiers and decentralized key management that promises significant benefits for self-sovereign identity and Trust over IP infrastructureLinkLink3#REF!1An approach to decentralized identifiers and key management that offers significant benefits for self-sovereign identity and Trust over IP infrastructure.
111Knkey-event-receipt-logkey-event-receipt-logLinkLink3#REF!1NO INPUT
112Knkey-event-receiptkey-event-receiptLinkLink3#REF!1NO INPUT
113Gnkey-statekey-stateLinkLink2#REF!1NO INPUT
114Gnkey-transparencykey-transparencylookup service for generic records and a public, tamper-proof audit log of all record changesLinkLink3#REF!1lookup service for generic records and a publicly accessible, tamper-proof audit log of all record modifications
115GnkeykeyLinkLink2#REF!1NO INPUT
116Gnlevels-of-assurancelevels-of-assuranceLoA, any time a judgement is not a binary Yes or No, you have levels of assuranceLinkLink3#REF!In LoA, when a judgment isn't a simple Yes or No, there are various levels of assurance.
117GnlivenesslivenessLinkLink3#REF!NO INPUT
118Grloci-of-controlloci-of-controlLinkLink3#REF!NO INPUT
119Knmanagement-transaction-event-logmanagement-transaction-event-logLinkLink3#REF!NO INPUT
120GnmessagemessageLinkLink1#REF!NO INPUT
121GnmulticodecmulticodecLinkLink2#REF!NO INPUT
122GnnamespacenamespaceLinkLink11#REF!NO INPUT
123Knnested-cooperative-delegated-identifiersnested-cooperative-delegated-identifiersLinkLink3#REF!NO INPUT
124Knnon-establishment-eventnon-establishment-eventLinkLink3#REF!NO INPUT
125Gnnon-fungible-tokennon-fungible-tokenLinkLink2#REF!NO INPUT
126Ganon-normativenon-normativethe purpose of non-normative theories is not to give answers, but rather to describe possibilities or predict results of certain actionsLinkLink1#REF!Non-normative theories do not provide answers but describe possibilities or predict outcomes of specific actions.
127Sanon-repudiablenon-repudiablea statement's author cannot successfully dispute its authorship or the validity of an associated contract, signature or commitment.LinkLink2#REF!The author of a statement cannot dispute its authorship or the validity of an associated contract, signature, or commitment.
128Ganon-transferablenon-transferableNo capacity to transfer (the control over) a certain digital asset in an unobstructed or loss-less manner.LinkLink1#REF!No ability to transfer a digital asset without any obstruction or loss.
129Ganormativenormativea theory that tells you what you should do - what action you should takeLinkLink1#REF!A theory that explains the appropriate action to take.
130Grone-way-functionone-way-functiona one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random inputLinkLink2#REF!A one-way function is easy to compute on all inputs but difficult to reverse given the image of a random input.
131Gnpayloadpayloadthe payload of an item in KERI is a specific cryptographic building blockLinkLink1#REF!The payload of an item in KERI is a cryptographic building block.
132Gnpretty-good-privacypretty-good-privacyLinkLink1#REF!NO INPUT
133Knprimary-root-of-trustprimary-root-of-trustLinkLink2#REF!NO INPUT
134GnprimitiveprimitiveLinkLink1#REF!NO INPUT
135Gnproof-of-authorityproof-of-authorityproof that somebody or something has certain rights or permissions on dataLinkLink2#REF!proof of rights or permissions on data
136Knproof-of-authorshipproof-of-authorshipproof that somebody or something has originally created certain contentLinkLink2#REF!Evidence that someone or something has created specific content.
137Gnprovenanceprovenancehistoric documentation of cryptographic verifiable key states , data consistency and cedentialsLinkLink2#REF!Historical documentation of cryptographic key states, data consistency, and credentials.
138Gnpublic-key-infrastructurepublic-key-infrastructureset of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificatesLinkLink2#REF!Set of roles, policies, hardware, software, and procedures required for creating, managing, distributing, utilizing, storing, and revoking digital certificates.
139Knpublic-verifiable-credential-registrypublic-verifiable-credential-registrya Verifiable Data Registry that tracks the issuance/revocation state of credentialsLinkLink31#REF!A Verifiable Data Registry tracks the issuing and revoking of credentials.
140Gnrace-conditionrace-conditionthe condition where a system's substantive behavior is dependent on the sequence or timing of external uncontrollable eventsLinkLink3#REF!The condition where a system's behavior depends on external uncontrollable events' sequence or timing.
141Knreceipt-logreceipt-logordered record of all key event receipts for a given set of witnessesLinkLink3#REF!A record of key event receipts for witnesses.
142Gnreceiptreceiptevent message or reference with one or more witness signaturesLinkLink3#REF!event message with witness signatures
143Knregistrarregistraridentifiers that serve as backers for each transaction event log under its provenanceLinkLink3#REF!Identifiers back each transaction event log to establish its provenance.
144Gnroot-of-trustroot-of-trusttrust in end-verifiable digital signatures from asymmetric key cryptography, replaces human basis-of-trustLinkLink2#REF!End-verifiable digital signatures from asymmetric key cryptography replace human basis-of-trust.
145Kvrotationrotationthe operation of revoking and replacing the set of authoritative key pairs for an AIDLinkLink2#REF!revoking and replacing authoritative key pairs for an AID
146Krsecondary-root-of-trustsecondary-root-of-trusta root-of-trust that, for its secure attribution, depends on another primary root-of-trustLinkLink3#REF!A root-of-trust depends on a primary root-of-trust for secure attribution.
147Srsecure-asset-transfer-protocolsecure-asset-transfer-protocolan IETF protocol for moving assets between blockchainsLinkLink3#REF!An IETF protocol for transferring assets across blockchains.
148Svsecure-attributionsecure-attributionis 'whodunit?!' in cyberspaceLinkLink3#REF!Whodunit in cyberspace!
149Gnseedseeda pseudorandomly generated number, often expressed in representation of a series of wordsLinkLink1#REF!A randomly generated number, usually expressed as a series of words.
150Srself-addressing-dataself-addressing-dataan encryption program that provides cryptographic privacy and authentication for data communicationLinkLink3#REF!An encryption program that ensures data communication's cryptographic privacy and authentication.
151Srself-certifying-identifierself-certifying-identifiercryptographically binds an identifier to a public and private key pairLinkLink3#REF!Cryptographically binds an identifier to a key pair.
152Kaself-framingself-framingA textual encoding that includes type, size, and value is self-framing; and thus parseable without needing any additional delimiting characters.LinkLink3#REF!A self-framing textual encoding includes type, size, and value, making it parseable without any extra delimiting characters.
153Snself-sovereign-identityself-sovereign-identityLinkLink2#REF!NO INPUT
154Gnsigned-digestsigned-digestLinkLink2#REF!NO INPUT
155Gnspanning-layerspanning-layerLinkLink3#REF!NO INPUT
156Krtext-binary-concatenation-composabilitytext-binary-concatenation-composabilityWhen any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.LinkLink3#REF!When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss.
157Kntransaction-event-logtransaction-event-logThe set of transactions that determine registry state form a log called a Transaction Event Log (TEL) and is cryptographically linked to corresponding controlling KEL.LinkLink3#REF!The transactions that determine the registry state form a log called Transaction Event Log (TEL) and are cryptographically linked to the corresponding controlling KEL.
158Grtransmission-control-protocoltransmission-control-protocolTCP is one of the main protocols of the Internet protocol suiteLinkLink1#REF!TCP is a key protocol in the Internet protocol suite.
159Srtrust-domaintrust-domainA trust domain is the ecosystem of interactions that rely on a trust basis. A trust basis binds controllers, identifiers, and key-pairs.LinkLink1#REF!A trust domain is an ecosystem of interactions relying on trust. It binds controllers, identifiers, and key pairs.
160Gvvalidatorvalidatorthe capability to determine whether or not (verified) data is valid to be used for some specific purpose(s).LinkLink21#REF!the ability to verify data's validity for a specific purpose.
161Grveracityveracitythe quest for the truthLinkLink2#REF!The Truth Quest
162Gnverifiable-data-structureverifiable-data-structurea verifiable data structure is a data structure that incorporates cryptographic techniques to ensure the integrity and authenticity of its contentsLinkLink3#REF!A verifiable data structure is a structure that uses cryptographic techniques to guarantee the integrity and authenticity of its contents.
163Gaverifiableverifiableable to cryptographically verify a certain data structure on its consistency and its authenticity.LinkLink2#REF!Capable of cryptographically verifying a specific data structure for consistency and authenticity.
164Gnverifierverifierthe entity that (cryptogrpahically) verifies data received from peers (check structure, signatures, dates)LinkLink2#REF!The entity verifies received data from peers by checking its structure, signatures, and dates using cryptography.
165Gnversionversionis a class of systems responsible for managing changes to computer programs, documents, large web sites, or other collections of informationLinkLink1#REF!Version: -Version control is responsible for managing changes to computer programs, documents, web sites, or other collections of information.
166Knvirtual-credential-transaction-event-logvirtual-credential-transaction-event-logwill track the issued or revoked state of each virtual credential (VC)LinkLink3#REF!NO INPUT
167Grweb-of-trustweb-of-trustIn cryptography, a web of trust is a concept to establish the authenticity of the binding between a public key and its owner.LinkLink2#REF!NO INPUT
168Knwell-known-witnesseswell-known witnessesPredictable witness identifier creation by using known salts to initialize their key stores. For testing purposes only!LinkLink3#REF!NO INPUT
171GnreporeporepoSoftware repositoryLinkLink2#REF!Software Repo
173GncoroutinescoroutinescoroutinesComputer programs that can be suspended and resumed at will.LinkLink1#REF!Suspend and resume computer programs at will.
174Grinput-outputI/Oinput-outputInput / outputLinkLink1#REF!Input/Output
175GnhiohiohioHierarchical asynchronous coroutines and I/O in PythonLinkLink3#REF!Hierarchical async coroutines and I/O in Python.
178GncloneclonecloneA copy of a system that is - and works exactly as the originalLinkLink2#REF!A replica system that is functioning exactly like the original.
179GnbranchbranchbranchA duplicate of an object under version control for further separate modificationLinkLink2#REF!A duplicate object under version control for separate modifications.
180KnkliklikliKERI command line interfaceLinkLink3#REF!Keri CLI
183Snverifiable-credentialverifiable credentialsverifiable-credentialthe digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable wayLinkLink1#REF!The digital version of our daily life credentials, such as passports and driver's licenses, but in a machine-verifiable format.
185nsub-shellsub shellsub-shella child shell started up from - and contained in another parent shellLinkLink1#REF!A child shell started from and contained within a parent shell.
186Snagentagentagenta representative for an identityLinkLink2#REF!identity representative
187Gncloud-agentcloud agentcloud-agentis software installed on the cloud server instances for security, monitoring, and analysisLinkLink2#REF!The software is installed on cloud server instances for security, monitoring, and analysis.
190Gnuser-interfaceU/Iuser-interfaceA user interface (UI) is the space where interactions between humans and machines occur.LinkLink1#REF!A user interface (UI) is where humans and machines interact.
191Grmultisigmulti-sigmultisigA digital signature scheme which allows a group of users to sign a single piece of digital data.LinkLink1#REF!A digital signature scheme enables a group of users to sign a single piece of digital data.
192Gnidentifier-systemidentifieridentifier-systemSomething to uniquely identify (public) identities, pointing to something or someone else.LinkLink2#REF!A unique identifier for public identities, referring to something or someone else.
193GnwalletwalletwalletA wallet is a collection of data stores, made up of a keystore, local and remote key event log database and credential database.LinkLink3#REF!A wallet includes a keystore, local and remote key event log database, and a credential database.
195KnwitnesswitnesseswitnessEntity that may receive, verify, and store key events for an identifierLinkLink3#REF!Entity that receives, verifies, and stores key events for an identifier.
196KnwatcherwatcherswatcherGuarantee that KERI logs are immutableLinkLink3#REF!Ensure KERI logs are immutable.
197Gvkey-managementkey managementkey-managementManagement of cryptographic keys in a crypto-system.LinkLink3#REF!Managing cryptographic keys in a crypto-system.
199Snsingle-signature-identifiersingle sig identifiersingle-signature-identifierAn identifier that is controlled by a one-of-one signing keypairLinkLink2#REF!An identifier controlled by a unique signing keypair.
200Gnkeystorekey storekeystoreA keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs.LinkLink3#REF!A keystore in KERI is an encrypted data store that holds the private keys for a collection of AIDs.
201Srkey-eventkey eventskey-eventEvents happening to controlling keys of an identifier recorded in a Key Event Log (KEL).LinkLink21#REF!Events happening to control keys of an identifier are recorded in a Key Event Log (KEL).
202Srinteraction-eventinteraction eventinteraction-eventAnchors external data to the key-state as established by the most recent prior establishment eventLinkLink3#REF!Anchoring external data to the key-state established by the most recent establishment event.
203Srrotation-eventrotation eventrotation-eventChanges the key-state which includes a change to the set of authoritative keypairs for an AIDLinkLink3#REF!Changes the key-state, including a change to the set of authoritative keypairs for an AID.
204Gnsigning-thresholdsigning thresholdssigning-thresholdMinimum number of valid signatures to satisfy the requirement for successful validationLinkLink3#REF!Minimum number of valid signatures for successful validation requirement.
205Knkey-event-logKELkey-event-logKey Event Log is the native KERI verifiable data structureLinkLink31#REF!Key Event Log is the KERI's native verifiable data structure.
206Gvverify-signatureverify signaturesverify-signatureApplying an algorithm that either accepts or rejects the message's claim to authenticity; when you can succesfully verify a signatureLinkLink2#REF!Applying an algorithm to verify the authenticity of a message by accepting or rejecting its claim when a signature can be successfully verified.
207Grpeer-to-peerpeer-to-peer communicationspeer-to-peerPeers are equally privileged, equipotent participants in a networkLinkLink2#REF!Peers are equally privileged and equipotent participants in a network.
209GnsaltsaltssaltRandom data that is used as an additional input to a cryptographic one-way functionLinkLink3#REF!Random data used as an additional input for a cryptographic one-way function.
210KvdelegationdelegationdelegationDelegation can be defined as “the act of empowering to act for another”LinkLink3#REF!Delegation is the act of empowering someone to act on behalf of another.
211Krmulti-sig-delegationmulti-sig delegationmulti-sig-delegationdelegated identifiers under multi-signature controlLinkLink3#REF!Multi-signature control for delegated identifiers.
213Sntransferable-identifiertransferabletransferable-identifierControl over identifier can be transferred by rotating keysLinkLink3#REF!Keys can transfer control over identifiers by rotating them.
215Gnconfiguration-filesconfiguration fileconfiguration-filesFile used to configure the parameters and initial settings for some computer programsLinkLink1#REF!This file configures parameters and initial settings for computer programs.
219Grtransfer_Protocolpost and puttransfer_ProtocolHTTP request methods to indicate the desired action to be performed on the identified resourceLinkLink2#REF!HTTP request methods indicate the desired action on the identified resource.
221GnpasscodepasscodepasscodeSecret data, typically a string of characters, usually used to confirm a user's identityLinkLink2#REF!Secret data, often a string of characters, commonly utilized for user identity verification.
222Gvkey-stretchingstretched into an encryption keykey-stretchingmake a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resourcesLinkLink3#REF!Enhance the security of a potentially weak key, such as a password or passphrase, against brute-force attacks by increasing available resources.
224Knnon-transferable-identitifernon-transferable identifiernon-transferable-identitiferControlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other controlLinkLink3#REF!Keys cannot be rotated for this identifier, making it non-transferable for control elsewhere.
226Knthreshold-signature-schemewitness thresholdthreshold-signature-schemeThe minimum number of valid witness signatures requiredLinkLink3#REF!Minimum required witness signatures.
227Kvpre-rotationpre-rotationpre-rotationcommitment to next rotated key set in previous rotation or inception eventLinkLink3#REF!commitment to the next key set rotated in the previous rotation or inception event.
228KnprefixprefixesprefixA prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing keyLinkLink3#REF!The prefix is a combination of a Base-64 derivation code and the Base-64 encoding of a public digital signing key.
229Gnbase64base64base64A group of binary-to-text encoding schemes that represent binary dataLinkLink3#REF!Binary-to-text encoding schemes represent binary data.
230Kaqualifiedqualifiedqualifiedwhen qualified, a cryptographic primitive includes a prepended derivation codeLinkLink3#REF!When qualified, a cryptographic primitive includes a derived code prepended.
231Knderivation-codederivation codederivation-codeA special character that encodes the derivation process, pre-pended to the identifierLinkLink3#REF!A special character that encodes the derivation process, added to the identifier.
232Gnblake3Blake3 hashblake3BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2.LinkLink3#REF!BLAKE3 is a new cryptographic hash function, released in 2020, that builds upon Bao and BLAKE2.
233Gndata-anchoranchor data intodata-anchorData anchors are digests of digital data, that uniquely identify this dataLinkLink3#REF!Data anchors are digital data digests that uniquely identify the data.
234Snautonomic-identifierAIDautonomic-identifierAn identifier that is self-certifying and self-sovereignLinkLink3#REF!A self-certifying and self-sovereign identifier.
236GndigestdigestdigestVerifiable cryptographic commitment. It's a collision resistant hash of contentLinkLink21#REF!Verifiable cryptographic commitment is a collision-resistant content hash.
237Krissuance-eventissuance eventissuance-eventThe inception event of a verifiable credentialLinkLink3#REF!The inception event of a verifiable credential.
238Knpublic-transaction-event-logpublic transaction event logpublic-transaction-event-logIs a hash linked data structure of transactions that can be used to track stateLinkLink3#REF!A hash linked data structure is used to track state in transactions.
239GnRustRustprogramming languageLinkLink3#REF!Programming Language
240Krestablishment-eventestablishmentestablishment-eventAn event that establishes control authorityLinkLink3#REF!A control authority event
241Gnmemory-Mapped_Databaselmdb databasesmemory-Mapped_DatabaseLightning Memory-Mapped DatabaseLinkLink3#REF!Lightning Memory-Mapped DB
242Krindexed-signatureindexed signaturesindexed-signatureUsed when signing anything with a multi-key autonomic identifier, a verifier knows which of the multiple public keys was usedLinkLink3#REF!When signing with a multi-key autonomic identifier, a verifier can determine which specific public key was used.
245Knself-addressing-identifierself-addressing identifiersself-addressing-identifierAn identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evidentLinkLink3#REF!An identifier is deterministically generated from and embedded in the content it identifies, making it and its data tamper-evident.
247Knledger-backerledger backerledger-backerA witness in KERI that is ledger-registeredLinkLink3#REF!A registered witness in KERI.
248Knwitnesswitness backerwitnessA native KERI witness whose control authority is established in a KELLinkLink3#REF!A KERI witness, native to KEL, has established control authority.
249Knverifiable-legal-entity-identifiervLEIverifiable-legal-entity-identifierDigital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authenticLinkLink3#REF!Digital verifiable credentials issued by GLEIF delegates to verify the authenticity of information about a legal entity.
250Snssi-systemSSI systemssi-systemSSI Infrastructure consisting of the technological components that are deployed all over the worldLinkLink1#REF!SSI Infrastructure consists of technological components deployed worldwide.
252Kvtransfer-off-ledgertransfer off a ledgertransfer-off-ledgerThe act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KELLinkLink3#REF!Transferring control authority of an identifier from a ledger or blockchain to the KEL data structure in KERI.
255Gnservice-endpointservice endpointsservice-endpointA web service endpoint which is a URL at which clients of specific service can get access to the service.LinkLink2#REF!A web service endpoint is a URL where clients can access a specific service.
256Gnuniform-resource-locatorURLsuniform-resource-locatorA reference to a web resource that specifies its location on a computer network and a mechanism for retrieving itLinkLink1#REF!A web resource reference that specifies its location on a computer network and a retrieval mechanism.
257Gnip-addressip-addressip-addressA numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communicationLinkLink1#REF!A numerical label, like '192.0.2.1', connected to a computer network using the Internet Protocol for communication.
258Gntcp-endpointTCP endpointtcp-endpointThis is a service endpoint of the web transmission control protocolLinkLink2#REF!This is a web transmission control protocol endpoint.
259KninquisitorinquisitorinquisitorSomeone (in a validating role) that launches an inquiry at some KERI witnessLinkLink3#REF!A person (in a validating role) who questions a KERI witness.
260Gvreplay-attackreplay-attackintercept and then fraudulently delays or resend a message to misdirect the receiver into doing what the attacker wantsLinkLink3#REF!Intercepting a message and fraudulently delaying or resending it to misdirect the receiver into complying with the attacker's desires.
261GnXBRLXBRLextensible business reporting language, standard for digital business reportingLinkLink1Extensible Business Reporting Language (XBRL), a digital standard for business reporting.
262Gnextensible-business-reporting-languageextensible-business-reporting-languageXBRL, standard for digital business reportingLinkLink1XBRL is the standard for digital business reporting.
263Knlocked-statelocked statelocked-statedefault state of an encrypted KERI data store with a passcodeLinkLink3#REF!The default state of an encrypted KERI data store with a passcode.
265Krout-of-band-introductiondata OOBIsout-of-band-introductiondata out-of-band introductionsLinkLink3#REF!Data out-of-band intros
266Krout-of-band-introductioncredential schema OOBIsout-of-band-introductioncredential schema out-of-band introductionsLinkLink3#REF!Credentials schema introductions outside of the main channel.
267Knkeepkeepkeepis KERI's and ACDC's depreciated crypto wallet, a task orientated application for managing AIDs in ecosystems, e.g. the vLEI EcosystemLinkLink3#REF!This is a deprecated crypto wallet by KERI and ACDC. It is a task-oriented app for managing AIDs in ecosystems such as the vLEI Ecosystem.
268Grzero-trustzero trustzero-trusta Zero Trust approach trusts no oneLinkLink2#REF!In a Zero Trust approach, no one is trusted.
270Krrevocation-eventrevocation eventsrevocation-eventAn event that revokes control authority over an identifierLinkLink2#REF!An event revoking control authority over an identifier.
272Knescrow-stateescrow statesescrow-stateThe current state of all the temporary storage locations (what events are waiting for what other information) that KERI protocol needs to keep track of, due to its fully asynchronous nature.LinkLink3#REF!The current state of all temporary storage locations that the KERI protocol needs to keep track of, due to its fully asynchronous nature (events waiting for other information).
273Krserver-sent-eventserver-sent eventsserver-sent-eventMailbox notifications, a streaming service for the agent U/I, to get notifications from the KERI system itselfLinkLink3#REF!Mailbox notifications is a streaming service for the agent U/I, providing notifications directly from the KERI system.
274Gnsealsealcryptographic proof in a secondary root-of-trust that is anchored in a primary-root-of-trustLinkLink21#REF!cryptographic proof in a secondary root-of-trust anchored in a primary root-of-trust
275Saauthoritativeauthoritative(control over) an identifier is 'authoritative' because it can be considered accurate, renowned, honourable and / or respectedLinkLink31#REF!An identifier has control and is considered authoritative when it is accurate, renowned, honorable, and respected.
276KnQVIQVIqualified vlei issuer, contracting party qualified by GLEIFLinkLink2#REF!1Qualified vlei issuer, contracting party qualified by GLEIF.
277Knqualified-vlei-issuerqualified-vlei-issuerQVI, contracting party qualified by GLEIFLinkLink2#REF!1QVI, a contracting party qualified by GLEIF.
278Knghost-credentialghost-credentiala valid credential within in a 90 days grace periodLinkLink2#REF!1a valid credential within a 90-day grace period
279Knredundant-credentialredundant-credentialmultiple -, independently valid credentials issued by the same issuerLinkLink2#REF!1Multiple independently valid credentials issued by the same issuer.
280Krengagement-context-roleengagement-context-roleA person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.LinkLink2#REF!1A person represents the Legal Entity in a role and is issued an ECR vLEI Credential.
281KrECRECRA person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.LinkLink2#REF!1A person represents the Legal Entity in a role and is issued an ECR vLEI Credential.
282Kngleif-authorized-representativegleif authorized representativeA GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.LinkLink2#REF!1A GLEIF representative authorized to verify and issue the QVI vLEI Credential.
283KnGARGARA GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.LinkLink2#REF!1A GLEIF representative authorized to verify and issue the QVI vLEI Credential.
284GnGLEIFGLEIFGlobal Legal Entity Identifier FoundationLinkLink1#REF!1Global LEI Foundation.
285KnDARDARA representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.LinkLink2#REF!1A representative authorized by a Legal Entity to act on its behalf officially.
286Kndesignated-authorized-representativedesignated-authorized-representativeA representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.LinkLink2#REF!1A representative authorized by a Legal Entity to act on its behalf officially.
287KnAVRAVRauthorized vlei representativeLinkLink2#REF!1Authorized Vlei representative.
288Knauthorized-vlei-representativeauthorized-vlei-representativea representative of a Legal Entity that's authorized to request issuance and revocation of credentialsLinkLink2#REF!1a representative of a legal entity authorized to request issuance and revocation of credentials
289GnLEILEILegal Entity InstituteLinkLink2#REF!1Legal Entity Institute.
290Gnlegal-entitylegal-entityunique parties that are legally or financially responsible for financial transactions or have the legal right to enter into legal contractsLinkLink2#REF!1parties who are legally and financially responsible for transactions or have the right to enter into contractsparties legally or financially responsible for transactions or with the legal right to enter contracts
291KrOOROORofficial organizational role, a person holding a vLEI credential person and representing the Legal EntityLinkLink2#REF!1official organizational role, a person holding a vLEI credential and representing the Legal Entity
292Krofficial-organizational-roleofficial-organizational-roleOOR, a person holding a vLEI credential person and representing the Legal EntityLinkLink2#REF!1OOR, a person holding a vLEI credential and representing the Legal Entity
293Knqvi-authorized-representativeqvi-authorized-representativeQAR, conducts QVI operations with GLEIF and Legal EntitiesLinkLink2#REF!1QAR conducts QVI operations in collaboration with GLEIF and Legal Entities.
294KnQARQARqvi authorized representative, conducts QVI operations with GLEIF and Legal EntitiesLinkLink2#REF!1Authorized representative conducts QVI operations with GLEIF and legal entities.
295Knvlei-ecosystem-governance-frameworkvlei-ecosystem-governance-frameworka document that defines the information security, privacy, availability, confidentiality and processing integrity policies that applyLinkLink2#REF!1This document defines the policies for information security, privacy, availability, confidentiality, and processing integrity.
296Kvsolicited-issuancesolicited-issuanceissuance of Legal Entity vLEI / OOR / ECR Credentials upon receipt by the QARLinkLink2#REF!1issuing vLEI/OOR/ECR Credentials upon QAR's receipt.
297Kvunsolicited-issuanceunsolicited-issuanceissuance of a Legal Entity vLEI Credential upon notice by a QAR to its AVR(s)LinkLink2#REF!1QAR notifies AVR(s) to issue a vLEI Credential to Legal Entity.
298Gngovernance-frameworkgovernance-frameworka set of rules how to apply technologyLinkLink2#REF!1A set of rules on how to apply technology.
299KnGLEISGLEISGlobal Legal Entity Identifier SystemLinkLink2#REF!1Global LEI System
300Knvlei-credentialvlei-credentialverifiable Legal Entity IdentifierLinkLink2#REF!1Verifiable LEI
301Krlegal-entity-engagement-context-role-vlei-credential-governance-frameworklegal-entity-engagement-context-role-vlei-credential-governance-frameworkA document that details the requirements for vLEI Role Credentials issued to representatives of a Legal Entity in functional - or other context of engagement.LinkLink2#REF!1NO INPUT
302Knvlei-role-credentialvlei-role-credentialA vLEI credential that attests a role.LinkLink2#REF!1NO INPUT
303Knlegal-entity-official-organizational-role-vlei-credential-governance-frameworklegal-entity-official-organizational-role-vlei-credential-governance-frameworkA document that details the requirements for vLEI Role Credentials issued to official representatives of a Legal Entity.LinkLink2#REF!1NO INPUT
304Knlegal-entity-vlei-credential-governance-frameworklegal-entity-vlei-credential-governance-frameworkA document that details the requirements for vLEI Credential issued by a Qualified vLEI Issuer to a Legal EntityLinkLink2#REF!1NO INPUT
305Knqualified-vlei-issuer-vlei-credential-governance-frameworkqualified-vlei-issuer-vlei-credential-governance-frameworkA document that details the requirements to enable this Credential to be issued by GLEIF to Qualified vLEI IssuersLinkLink2#REF!1NO INPUT
306SnDIDDIDDecentralized IdentifierLinkLink2#REF!DID
307Sndecentralized-identifierdecentralized-identifierDecentralized identifiers (DIDs) enable verifiable, decentralized digital identity, refering to a person, organization, thing, data model, abstract entity, etc.LinkLink1#REF!NO INPUT
308Kvpartial-pre-rotationpartial-pre-rotationchange of control but partially keep some keys unexposed while exposing others as needed.LinkLink3#REF!1Change control but partially keep certain keys undisclosed while exposing others as required.
309Kvpartial-rotationpartial-rotationchange of control but partially keep some keys unexposed while exposing others as needed.LinkLink3#REF!1Change control but partially keep certain keys undisclosed while exposing others as required.
310Kvcustodial-rotationcustodial-rotationchange of control that is split between two key setsLinkLink3#REF!1Change of control split between two key sets.
311Kvreserve-rotationreserve-rotationpreparatory key pairs being held in reserve and not exposedLinkLink3#REF!1Preparation key pairs reserved and not exposed.
312Kncustodial-agentcustodial-agenta custodian who has been granted signing authority and usually also being the host of the running agent software.LinkLink3#REF!1A custodian typically granted signing authority and also acts as the host for the running agent software.
313Srsigning-authoritysigning-authoritythe authority to sign on behalf of the controller of an identifierLinkLink3#REF!1the authority to sign for the controller of an identifier
314Srrotation-authorityrotation-authoritythe (exclusive) right to change control over an identifierLinkLink3#REF!1The exclusive right to change control of an identifier.
315Gntrans-contextual-valuetrans-contextual-valuevalue that is transferrable between contextsLinkLink1#REF!1Transferable value across contexts.
316Grsource-of-truthsource-of-trutha trusted data source that gives a complete picture of the truth about a data object.LinkLink1#REF!1a reliable data source providing a comprehensive view of the truth about a data object.
317Gvauthorizationauthorizationspecifying access rights or privileges to resourcesLinkLink11#REF!11specifying access rights to resources
318Grapplication-programming-interfaceapplication-programming-interfacea way for two or more computer programs to communicate with each other.LinkLink1#REF!11A method for multiple computer programs to communicate with each other.
319GnAPIAPIan application Programming Interface, a way for two or more computer programs to communicate with each other.LinkLink1#REF!11An API is a way for computer programs to communicate with each other.
320Gnkey-pairkey-paira public key and its corresponding private key.LinkLink11#REF!11a public key and its corresponding private key.
321Gnownerownera role that exercizes its legal, rightful or natural title to control something.LinkLink1#REF!1111A role that exercises its legal, rightful, or natural authority to control something.
322Grownershipownershipa relationship between two, one of these (the owner) is entitled to enjoy, dispose of, and control the other sovereignly.LinkLink1#REF!1111In a relationship between two individuals, one (the owner) has the entitlement to enjoy, dispose of, and control the other entirely.
323Gnself-sovereigntyself-sovereigntythe characteristic of every party that it is autonomous in managing and operating its own knowledgeLinkLink1#REF!111Every party is autonomous in managing and operating its own knowledge.
324Krpresentation-exchangepresentation-exchangean exchange that provides disclosure of one or more ACDCs between a Discloser and a Disclosee.LinkLink31#REF!an exchange that discloses one or more ACDCs between a Discloser and a Disclosee.
325Gndiscloserdiscloseran ACDC in a disclosure is disclosed by the Discloser.LinkLink11#REF!The Discloser discloses an ACDC in a disclosure.
326Gndiscloseediscloseean ACDC in a disclosure is disclosed to the Disclosee.LinkLink11#REF!An ACDC in a disclosure is revealed to the Disclosee.
327Gnissuerissueran ACDC is issued by the Issuer. The Issuer identifier (AID) appears in the top level of the ACDC.LinkLink11#REF!An ACDC is issued by the Issuer and contains the Issuer identifier (AID) in the top level.
328Gnissueeissueean ACDC is optionally issued to the Issuee.LinkLink11#REF!An ACDC can be optionally issued to the recipient.
329Krissuance-exchangeissuance-exchangea special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDCLinkLink31#REF!This is a special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDC.
330Krchain-link-confidentialitychain-link-confidentialitychains together a sequence of Disclosees. Each Disclosee in the sequence in turn is the Discloser to the next Disclosee.LinkLink31#REF!This text chains a sequence of Disclosees, where each Disclosee becomes the Discloser to the next.
331Kvgraduated-disclosuregraduated-disclosuredisclosure performed by a presentation exchange that has cross-variant Issuer commitment verifiability as an essential property.LinkLink31#REF!Disclosure is performed by a presentation exchange with cross-variant Issuer commitment verifiability as an essential property.
332Kntop-level-sectiontop-level-sectionare the fields of an ACDC compact variant.LinkLink21#REF!These fields are part of an ACDC compact variant.
333Krcompact-variantcompact-variantan Issuer commitment via a signature to any variant of ACDCLinkLink31#REF!an Issuer signs a commitment to any variant of ACDC.
334Kvcontractually-protected-disclosurecontractually-protected-disclosurethe most elaborate form of disclosure by an IPEX. Contractually protected disclosure includes both chain-link confidential and contingent disclosure.LinkLink31#REF!The most detailed form of disclosure by an IPEX includes contractually protected disclosure, which encompasses both chain-link confidential and contingent disclosure.
335Gnricardian-contractricardian-contracta method of recording a document as a contract at law, and linking it securely to other systemsLinkLink21#REF!A way to record a document as a secure contract and link it to other systems.
336Kvcontingent-disclosurecontingent-disclosureLinkLink31#REF!NO INPUT
337Gveclipse-attackeclipse-attackan eclipse attack is a P2P network-based attack, an attacker tries to isolate a node from the rest of the networkLinkLink2#REF!1An eclipse attack is a P2P network attack where the attacker attempts to isolate a node from the network.
338Knpromiscuous-modepromiscuous-modethe indiscriminate mode a watcher (network) runs in.LinkLink3#REF!The mode of a watcher in a network.
339Gnprotocolprotocola code of correct conduct, in our case specifically communication protocols, cryptographic protocols, and decentralized network protocolsLinkLink1111#REF!11Our code of conduct includes communication, cryptographic, and decentralized network protocols.
340Gnpseudo-random-numberpseudo-random-numbera value that is statistically random, but it is (repeatedly) derived from a known starting pointLinkLink1A randomly derived value from a known starting point.
341Gvvalidatevalidatea decision to accept an outcomeLinkLink1deciding to accept an outcome
342Svverifyverifythe act, by or on behalf of a party, of determining whether that data is authentic, not expired, and conforms to other specifications.LinkLink2
343Snpersistent-identifierpersistent-identifierControl over this type of long-living identifier can be transferred by rotating keys.LinkLink2Keys can rotate to transfer control of long-living identifiers.
344Krinterleaved-serializationsinterleaved-serializationsSerializations of different types interleaved in an overarching formatLinkLink2Different types of serializations are interleaved in an overarching format.
345Srcollective-signaturecollective-signatureMultisignature scheme for a single resulting pubic keyLinkLink2Multisignature scheme for a single public key.
346Gngraph-fragmentgraph-fragmentan ACDC is a verifiable data structure and part of a graph consisting of a node fragment and edge fragmentsLinkLink2ACDC is a verifiable data structure that forms part of a graph, including a node fragment and edge fragments.
347Grpersistent-datastructurepersistent-datastructurean append only verifiable data structure. Hence, making them immutable means distributable and concurrency-friendly. What we sign may not change.LinkLink2An append-only, verifiable data structure makes them immutable, which enables distribution and concurrency. What we sign cannot be changed.
348Grcollisioncollisiona circumstance where two or more identifiers in a given namespace or a given scope cannot be unambiguously resolvedLinkLink1A situation where two or more identifiers in a namespace or scope cannot be resolved unambiguously.
349Gnschema-namespace-registryschema-namespace-registrya centrally managed schema registry where corporations or individuals reserve schemas within a specific namespace in order to have an interoperable schema that is labeled with a corporation-specific or individual-specific namespaceLinkLink2A centrally managed schema registry allows corporations or individuals to reserve interoperable schemas within a specific namespace. These labeled schemas are assigned a corporation-specific or individual-specific namespace.
350Gnschema-registryschema-registryregistry for credential schemas based on namespacesLinkLink2Registry for schemas based on namespaces.
351Gndomain-namedomain-nameis a string that identifies a realm of administrative autonomy on the internetLinkLink1A string that identifies an internet administrative realm.
352Gndomaindomaingeneral term for (an identifier of) an autonomous spaceLinkLink1General term for an autonomous space identifier.
353Gnregistryregistryan official digital record book, usually refering to one means to a specific instance, within a multi-tenant registry.LinkLink1An official digital record book typically refers to a specific instance within a multi-tenant registry.
354GrcomposabilitycomposabilityWhen any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.LinkLink2When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss.
356GainteroperableinteroperableInteroperability is a characteristic of a product or system to work with other products or systems.LinkLink1Interoperability is the ability of a product or system to work with others.
357GrinteroperabilityinteroperabilityInteroperability is a characteristic of a product or system to work with other products or systems.LinkLink1Interoperability is the ability of a product or system to work with others.
358Gncryptographic-primitivecryptographic-primitiveWell-established, low-level cryptographic algorithm that is frequently used to build cryptographic protocols for computer security systems; e.g. one-way hash functions and encryption functions.LinkLink1A well-known cryptographic algorithm commonly used in computer security systems for creating cryptographic protocols such as one-way hash functions and encryption functions.
359Gvconcatenationconcatenationthe operation of joining character strings end-to-end. E.g. 'snow' and 'ball' becomes 'snowball'LinkLink1The process of combining character strings to create a single string. For example, 'snow' and 'ball' combine to form 'snowball'.
360Gvmultiplexingmultiplexingis a method by which multiple analog or digital signals are combined into one signal over a shared medium. The aim is to share a scarce resource.LinkLink2Signal combining is a method to merge multiple analog or digital signals into a single shared signal. It aims to efficiently distribute limited resources.
361Gvpipeliningpipelininga set of data processing elements connected in series, where the output of one element is the input of the next one.LinkLink2A series of connected data processing elements, where the output of one element becomes the input for the next.
362Kngroup-framing-codegroup-framing-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
363Krhierarchical-compositionhierarchical-compositionencoding protocol that is composable in a hierarchy and enables pipelining of complex streams in either text or compact binaryLinkLink3Composable and hierarchical encoding protocol enables pipelining of complex streams in text or binary formats.
364Knframe-codeframe-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
365Kncount-codecount-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
366Kngroup-codegroup-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
367Satransferabletransferablecapable of loss-less transfer of control over identifiers, private keys, etc.LinkLink1Capable of lossless transfer of control for identifiers, private keys, etc.
368Gvpost-padpost-padthe action and / or result of extending a string with trailing pad characters to align to a certain length in bits or bytes.LinkLink3Extending a string with pad characters to align it to a specific length in bits or bytes is the act or outcome.
369Gvpre-padpre-padthe action and / or result of prepending a string with leading pad characters to align to a certain length in bits or bytes.LinkLink3Prepending a string with leading pad characters is the act of aligning it to a specific length in bits or bytes.
370Kvnaive-conversionnaive-conversiona text to binary conversion or vice versa that doesn't anticipate on either composability and / or on the concatenation capability of the result of such an operation.LinkLink3A text to binary conversion that does not consider composability or concatenation capabilities of the output.
371Gnpadpadis a character used to fill empty spaceLinkLink2Is a character used to fill empty space.
372Gnlead-byteslead-bytespre-conversion added characters in a pre-padded way, used to fill empty spaceLinkLink2Pre-conversion characters were added to fill empty space in a pre-padded manner.
373Gncode-tablecode-tablea code table is the Internet's most comprehensive yet simple resource for browsing and searching for various codes.LinkLink1A code table is the Internet's most comprehensive and user-friendly resource for browsing and searching various codes.
374Kncode-table-selectorcode-table-selectorthe first character in the text code of CESR stream that determines which code table to use.LinkLink3The first character in the text code of CESR stream determines the code table to use.
375Knsallysallya vLEI Audit Reporting Agent that receives presentations of credentials and notices of revocation.LinkLink3A vLEI Audit Reporting Agent that receives credential presentations and revocation notices.
376Knsignifysignifyis a web client (key) event signing - and key pair creation app that minimizes the use of KERI on the client.LinkLink3This is a web client app for event signing and key pair creation. It reduces the need for using KERI on the client.
377Gnescrowescrowa third party temporarily holds money or property until a particular condition has been met. The verb refers to handling out of order events in KERI.LinkLink1A third party temporarily holds funds or assets until a specific condition is met. The verb refers to managing out-of-sequence events in KERI.
378Knkeri-suite-search-enginekeri-suite-search-enginethe Docusaurus self-education site of Web-of-Trust GitHub repo with Typesense search facilitiesLinkLink1The Docusaurus self-education site for the Web-of-Trust GitHub repo now includes Typesense search capabilities.
379Knfield-mapfield-mapa traditional key:value pair renamed to avoid confusing with the cryptographic use of the term 'key'LinkLink3A traditional key:value pair is renamed to avoid confusion with the cryptographic meaning of the term 'key'.
380KrCLCCLCchain-link confidential, a disclosure mechnism of credentialsLinkLink3Chain-link confidential is a mechanism for disclosing credentials.
381Kvcold-start-stream-parsingcold-start-stream-parsingAfter a reboot a stream processor looks for framing information to know how to parse groups of elements in the stream.LinkLink3After a reboot, a stream processor searches for framing information to determine how to parse element groups in the stream.
382Kafully-compactfully-compactthe intermediate variant of a ACDC credential -> signed and its proofs anchored in key event logs.LinkLink3The intermediate ACDC credential variant is signed and its proofs are anchored in key event logs.
383Kamost-compactmost-compactthe most brief least disclosing version of an ACDC based credential.LinkLink3The shortest and least revealing ACDC credential version.
384Kafully-expandedfully-expandedthe most extensive most disclosing and most user-friendly version of an ACDC based credential.LinkLink3the most comprehensive, revealing, and user-friendly ACDC-based credential.
385GvRUNRUNread, update, nullify -> the new peer-to-peer end-verifiable monotonic update policyLinkLink1Read, update, nullify - the new P2P EV monotonic update policy.
386GvCRUDCRUDcreate, read, update, delete -> the traditional client-server database update policyLinkLink1The traditional client-server database update policy includes CRUD (Create, Read, Update, Delete) operations.
387Gnauthentic-webauthentic-weba mental model in which the whole internet is considered as a one giant verifiable data structureLinkLink1The internet is viewed as one giant, verifiable data structure.
388Kvrun-off-the-crudrun-off-the-cruda decentralised controlling peer does not create records in the traditional sense of a serverLinkLink3A decentralized controlling peer does not create traditional server records.
389Gnintegrityintegritythe information is whole, complete, sound, in good order and unimpaired (not necessarily correct)LinkLink1The information is complete, accurate, organized, and intact (not necessarily correct).
390Gnverified-integrityverified-integritya proof of unambiguous assessment whether the information is/continues to be whole, sound and unimpairedLinkLink2A proof of clear assessment of whether the information remains intact, reliable, and undamaged.
391Gvcomplementary-integrity-verificationcomplementary-integrity-verificationa mechanism that can verify integrity independent of needing access to a previous instance or reference version of the information for comparisonLinkLink3a mechanism that can independently verify integrity without needing access to a previous instance or reference version for comparison.
392Knprior-next-thresholdprior-next-thresholdLinkLink3NO INPUT
393Kncurrent-signing-thresholdcurrent-signing-thresholdLinkLink2NO INPUT
394Kndual-indexed-codesdual-indexed-codesa context-specific coding scheme, for the common use case of thresholded multi-signature schemes in CESRLinkLink3A specific coding scheme for thresholded multi-signature schemes in CESR.
395KnkeripykeripyPython implementation of KERILinkLink2Python implementation of KERI
396Knkeri-oxkeri-oxRUST implementation of KERILinkLink2RUST KERI Implementation
397Snpiipiipersonally identifiable informationLinkLink1PII
398Srcontextual-linkabilitycontextual-linkabilitywhen data capture points provide enough context to be able to use statistical correlation to link existing data sets describing a person to that same person's disclosed attributesLinkLink3When data capture points give enough context to use statistical correlation in linking existing data sets describing a person to that person's disclosed attributes.
399Krblinded-revocation-registryblinded-revocation-registrya transaction event log hidden or blinded; the only way a verifier can observe the state is when the AID controller discloses it at presentation timeLinkLink3A hidden or blinded transaction event log; the verifier can only observe the state when the AID controller discloses it during presentation.
400Gvrainbow-table-attackrainbow-table-attacka password cracking method that uses a special table (a “rainbow table”) to crack the password hashes in a databaseLinkLink1The method uses a special table, known as a "rainbow table," to crack password hashes in a database.
401KrSKWASKWASimple KERI for Web AuthLinkLink3Simple KERI for Web Authentication.
402Knsimple-keri-for-web-authsimple-keri-for-web-authA KERI implementation that sacrifices performance or other non-security feature for usability.LinkLink3A KERI implementation sacrificing performance or other non-security features for usability.
403KrKRAMKRAMKERI Request Authentication Method for replay protectionLinkLink3Keri requests an authentication method for replay protection.
404Krkeri-request-authentication-methodkeri-request-authentication-methodKERI Request Authentication Method for replay protectionLinkLink3Keri requests an authentication method for replay protection.
405Knjurorjurorperforms duplicity detection on events and event receiptsLinkLink3performs duplicate detection on events and event receipts
406Knjuryjuryset of entities or components acting as jurorsLinkLink3A group of entities or components that act as jurors.
407Knopcodeopcodeprovide stream processing instructions that are more general and flexibleLinkLink3Provide more general and flexible stream processing instructions.
408Knversion-codeversion-codetells you which set of tables to load and it tells the table state.LinkLink3NO INPUT
409Knstrip-parameterstrip-parametertells us what part of the CESR stream will be parsed by which codeLinkLink3This text shows which code will parse each part of the CESR stream.
410Knparsideparsideparser library for Composable Event Streaming Representation (CESR)LinkLink3CESR parser library
411Knversion-stringversion-stringa workaround to make JSON, CBOR and MGPK self-framing in CESRLinkLink3A workaround to make JSON, CBOR, and MGPK self-framing in CESR.
412Kncesridecesridecryptographic primitives for use with Composable Event Streaming Representation (CESR)LinkLink3Cryptographic primitives for CESR.
413Knsniffersnifferthe sniffer is part of Parside and detects if the CESR stream contains CESR binary, CESR Text, JSON, CBOR, MGPKLinkLink3The sniffer, which is part of Parside, detects CESR binary, CESR Text, JSON, CBOR, and MGPK in the CESR stream.
414GnPRNGPRNGPseudorandom Number GeneratorLinkLink2Pseudorandom Number Generator
415GnCSPRNGCSPRNGCryptographically Secure Pseudorandom Number GeneratorLinkLink2Cryptographically Secure PRNG
416nFFIFFIForeign Function InterfaceLinkLink2Foreign Function Interface (FFI)
417Gnforeign-function-interfaceforeign-function-interfaceIs a mechanism by which a program written in one programming language that can call routines or make use of services written or compiled in another oneLinkLink2It is a way for a program in one programming language to call routines or utilize services from another language.
418GnHDKHDKhierchical deterministic keyLinkLink1Hierarchical deterministic key.
419GnHSMHSMhardware security moduleLinkLink1Hardware security module
420Kvpartial-disclosurepartial-disclosurean ACDC attribute section that can disclosed (a nested branch in a tree), you can either decide to disclose or notLinkLink3ACDC attribute section can be disclosed, like a nested branch in a tree. You have the option to disclose or not.
421Kvselective-disclosureselective-disclosureselective disclosure is a list of field maps, that you can choose to blind and publish, however all are disclosured.LinkLink3Selective disclosure is a list of field maps that you can choose to blind and publish. However, all of them are disclosed.
422Kvfull-disclosurefull-disclosurea disclosure of data in all its detailsLinkLink1data disclosure
423Krthreshold-of-accountable-duplicitythreshold-of-accountable-duplicityController provides itself with any degree of protection by giving a minimum number of confirming witnesses sufficient given a certain accountability.LinkLink3The controller protects itself by having a few confirming witnesses to ensure accountability.
424KnTOADTOADthreshold of accountable duplicity; provided by controller concerning witnessesLinkLink3Accountable duplicity threshold provided by controller for witnesses.
425KnkeridekerideRust library for Key Event Receipt InfrastructureLinkLink3Rust lib for Key Event Receipt
426KnKERIAKERIAKERI agent in the cloudLinkLink3KERI cloud agent
427KrSignifideSignifidesigning at the edgeLinkLink3Signing on the edge.
428KnkiwikiwiUI tooling for working with KERILinkLink3UI tooling for KERI
429Gnhardware-security-modulehardware-security-modulea physical computing device that safeguards and manages secrets (most importantly digital keys)LinkLink1A device that safeguards and manages secrets, specifically digital keys.
430Gnhierchical-deterministic-keyshierchical-deterministic-keysa type of deterministic bitcoin wallet derived from a known seed, that allow for the creation of child keys from the parent keyLinkLink1A deterministic bitcoin wallet can be created from a known seed, allowing for the generation of child keys from the parent key.
431KrSKRAPSKRAPSignify/KERIA Request Authentication ProtocolLinkLink3Signify/KERIA Authentication Protocol Request
432Krsignify-keria-request-authentication-protocolsignify-keria-request-authentication-protocolThe KERIA service will expose 3 separate HTTP endpoints on 3 separate network interfacesLinkLink3The KERIA service will have 3 HTTP endpoints on 3 network interfaces.
433Sndead-attackdead-attackan attack on an establishment event that occurs after the Key-state for that event has become staleLinkLinkNO INPUT
434KvprefixingprefixingprefixingLinkLink3Prefixing
435Kvpathingpathingenables sending portions of a credentialLinkLink3enables sending parts of a credential
436KvparsingparsingparsingLinkLink3Parsing
437Krbespoke-credentialbespoke-credentialIt's a custom issuance of the presentation of other ACDCs, it serves as an on-the-fly contract with the issuee; it's a self-referencing and self-contained contractLinkLink3It is a customized presentation of other ACDCs. It serves as a contract with the issuee on-the-fly. It is a self-referencing and self-contained contract.
438KnKERIMaskKERIMaskA wallet similar to MetaMask that will connect to KERIA servers in order for a person to control AIDs from their browser.LinkLink3A MetaMask-like wallet to connect to KERIA servers, enabling browser-based control of AIDs.
439KnKERISSEKERISSEKERI Suite Search EngineLinkLink1KERI Search Engine
440Knkeri-suitekeri-suiteis the set of inter-related developments (KERI, ACDC, OOBI, CESR, IPEX, etc) under the Web-of -Trust user on GithubLinkLink1This is a collection of interconnected developments (KERI, ACDC, OOBI, CESR, IPEX, etc.) used by the Web-of-Trust user on Github.
441KnndigsndigsDigests of keys, used to prove control over keys or to hide keysLinkLink3Key digests are used to prove control over keys or conceal them.
442Knverferverfera primitive that represents a public keyLinkLink3A public key primitive.
443Kndigerdigera primitive that represents a digestLinkLink3A primitive representing a digest.
444Kncigarcigaran unindexed signatureLinkLink3an unindexed signature.
445Knsigersigeran indexed signature used within KERI when there are multiple current keys to an identifierLinkLink3An indexed signature is used in KERI when there are multiple current keys for an identifier.
446Knsignersignera primitive that represents a private keyLinkLink3A primitive representing a private key.
447Knsaltersaltera primitive that represents a seed that has the ability to generate new SignersLinkLink3A seed that can generate new Signers.
448GnLLMLLMLarge Language ModelLinkLink2Language Model
449Gnlarge-language-modellarge-language-modelIs a language model consisting of a neural network with many parametersLinkLink2The language model is a neural network with numerous parameters.
450KnixnixnField name for Interaction Event; its content contains a hash pointerLinkLink3Interaction Event Field: Contains a hash pointer.
451KnrotrotField name for Rotation Event; its content contains a hash pointerLinkLink3Field name: Rotation Event -Content: Contains a hash pointer
452GnJSONJSONJavaScript Object NotationLinkLink1JavaScript Object Notation
453Kvicpicpincept, inceptionLinkLink3inception
454Kvvcpvcpvdr incept, verifiable data registry inceptionLinkLink3VDR, Verifiable Data Registry, inception
455Kvbisbisbacked vc issue, registry-backed transaction event log credential issuanceLinkLink3VC issuance, registry-backed transaction log for credential issuance.
456Gnconcise-binary-object-representationconcise-binary-object-representationIt is a binary data serialization format loosely based on JSONLinkLink3It's a binary data serialization format loosely based on JSON.
457Kvbrvbrvbacked vc revoke, registry-backed transaction event log credential revocationLinkLink3Revoked VC, registry-backed transaction event log for credential revocation.
458Kvvrtvrtvdr rotate, verifiable data registry rotationLinkLink3VDR Rotate: Verifiable Data Registry Rotation.
459Krsecure-private-authentic-confidentialitysecure-private-authentic-confidentialityLinkLink3NO INPUT
460KrSPACSPACsecure private authentic confidentialityLinkLink3Secured, private, authentic, confidential.
461Krdead-dropdead-dropa presenter controls the disclosure so you can't re-identify the dataLinkLink3The presenter controls the disclosure, preventing data re-identification.
462Knampleampleminimum required number of participants in an event to have a supermajority in the consensus agreement algorithm (KAACE) in KERILinkLink3The minimum number of participants needed for a supermajority in the consensus agreement algorithm (KAACE) in KERI.
463GrsupermajoritysupermajoritySufficient majority immune to certain kinds of attacks or faultsLinkLink3Sufficient majority immune to certain attacks or faults.
464GnCBORCBORconcise binary object representationLinkLink2Concise binary object rep
465Kntholdertholdert-holder object that supports fractionally-weighted thresholdsLinkLink3T-holder object supporting fractional-weighted thresholds
466KnbexterbexterA class (programming code) in CESR that preserves its integrity in a round-trip conversion even though it offers variable length textLinkLink3A class in CESR that maintains its integrity in a round-trip conversion despite variable length text.
467Krmoobimoobito share a bunch of different end-points (oobis) all at onceLinkLink3to share multiple end-points (oobis) simultaneously
468Gnts-nodets-nodenpm package that lets you run typescript from a shellLinkLink3npm package for running TypeScript from a shell.
469Kninterceptorinterceptora keria class that allows to push events happening inside the cloud agent to other backend processesLinkLink3A Keria class enables pushing cloud agent events to other backend processes.
470Knsalty-nonce-blinding-factorsalty-nonce-blinding-factorSelectively share a secret and hide information with this secretLinkLink3NO INPUT
471Knilkilkshort for message typeLinkLink3Short for message type.
472Kvdipdipdelcept, delegated inceptionLinkLink3Delcept, Delegated Inception.
473Kvdrtdrtdeltate, delegated rotationLinkLink3Deltate: delegated rotation.
474KnrctrctreceiptLinkLink3Receipt.
475Knksnksnsate, key state noticeLinkLink3State key notice
476KvqryqryqueryLinkLink3Query.
477KvrpyrpyreplyLinkLink3Reply.
478KvexnexnexchangeLinkLink3Exchange.
479Kvexpexpexpose, sealed data expositionLinkLink3Data exposure.
480Kvississvc issue, verifiable credential issuanceLinkLink3VC issuance: verifiable credential issuance.
481Kvrevrevvc revoke, verifiable credential revocationLinkLink3VC revocation, or verifiable credential revocation.
482Knvdrvdrverifiable data registryLinkLink3Verifiable data registry.
483KrKATEKATEKate = KERI at the EdgeLinkLink3Kate at the Edge = KERI
484KvspurnspurnRejectLinkLink3Reject.
485Gvdnddnddo not delegateLinkLink3Don't delegate.
486GvrevocationrevocationThe act of recall or annulment. It is the cancelling of an act, the recalling of a grant or privilege.LinkLink2Recall or annulment is the act of canceling or recalling an act, grant, or privilege.
487Gnverifiable-data-registryverifiable-data-registrya Verifiable Data Structure that actually holds contentLinkLink3A verifiable data structure that holds content securely.
488GnVDRVDRVerifiable Data Registry, a Verifiable Data Structure that actually holds contentLinkLink3Verifiable Data Registry, a structure that holds content and is verifiable.
489GrE2EE2Eend-to-endLinkLink1End-to-end.
490Grend-to-endend-to-endInter-host communication and data flow transformations, considered in motion and at restLinkLink1Inter-host communication and data flow transformations, both in motion and at rest.
491Kvduplicity-detectionduplicity-detectionA mechanism to detect duplicity in cryptographically secured event logLinkLink2Detecting duplicity in cryptographically secured event log
492Grdouble-spend-proofdouble-spend-proofTotal global ordering of transactions so that you can't spend value twiceLinkLink2Global ordering prevents double spending.
493GvMFAMFAmulti-factor authenticationLinkLink1Multi-factor authentication.
494Gvmulti-factor-authenticationmulti-factor-authenticationAuthentication by combining multiple security factors, e.g. what you know, what you have and what you are.LinkLink1Authentication by combining multiple security factors, such as knowledge, possession, and identity.
495Grthreshold-structure-securitythreshold-structure-securityAllows for weaker key management or execution environment infrastructure individually, but achieves greater overall security by multiplying the number of attack surfacesLinkLink3Allows for weaker management or execution environment, but improves overall security by increasing attack surfaces.
496GnTEETEEtrusted-execution-environment; protected hardware/software/firmware security systemLinkLink2trusted execution environment: secure hardware/software/firmware system
497Gntrusted-execution-environmenttrusted-execution-environmentProtected hardware/software/firmware security systemLinkLink2Protected hardware and software security system
498Grsecurity-overlay-properties-trillemasecurity-overlay-properties-trillemaan identifier system has some degree of any combination of the three properties authenticity, privacy and confidentiality, but not all three completelyLinkLink3An identifier system possesses some combination of the three properties: authenticity, privacy, and confidentiality, but never all three to their fullest extent.
499Srautonomic-trust-basisautonomic-trust-basisto form this we use an AID as the root-of-trustLinkLink3To create this, we utilize an AID as the root of trust.
500Snautonomic-identifierautonomic-identifierself-managing self-certifying identifierLinkLink2self-managing, self-certifying identifier.
501Snlegitimized-human-meaningful-identifierlegitimized-human-meaningful-identifieridentifier authorised through its autonomic identifier coupletLinkLink2Authorized identifier through an autonomous identifier couplet.
502SnLIDLIDLegitimized (or authorised) human meaningful identifierLinkLink2Human meaningful ID
503Snsecuritysecurityin identifier systems it means secure from exploit or compromiseLinkLink1In identifier systems, it refers to being secure against exploits or compromises.
504Sasecuresecurein identifier systems it means secure from exploit or compromiseLinkLink1In identifier systems, it refers to being secure against exploits or compromises.
505Krunivalentunivalenthaving a unique and non-ambiguous identifier for each entity or resourceLinkLink2Each entity or resource should have a unique and unambiguous identifier.
506Krmulti-valentmulti-valentA situation in which a delegator may have multiple delegates thereby enabling elastic horizontal scalability.LinkLink2NO INPUT
507Srsecurity-cost-performance-architecture-trade-offsecurity-cost-performance-architecture-trade-offLinkLink3NO INPUT
508Krcooperative-delegationcooperative-delegationA type of delegation that needs both a delegator and a delegate to be establishedLinkLink3NO INPUT
509GnTPMTPMtrusted platform module; a device that enhances the security and privacy by providing hardware-based cryptographic functionsLinkLink3Trusted Platform Module (TPM) is a device that enhances security and privacy through hardware-based cryptographic functions.
510Gntrusted-platform-moduletrusted-platform-moduleA device that enhances the security and privacy by providing hardware-based cryptographic functionsLinkLink3A device that enhances security and privacy using hardware-based cryptographic functions.
511KrbivalentbivalentTwo independent key management infrastructures with no movement of private keys between the two.LinkLink2NO INPUT
512Snkeri‐event‐streamkeri‐event‐streamA stream of verifiable KERI data, consisting of the key event log and other data such as a transaction event logLinkLink3A verifiable stream of KERI data, including the key event log and other transaction event logs.
513Snstale-keystale-keyA stale key is an outdated or expired encryption key that should no longer be used for securing dataLinkLink2A stale key is an outdated or expired encryption key that shouldn't be used for securing data anymore.
514Snstale-eventstale-eventAn outdated or irrelevant (key) event involving an expired encryption key that may compromise securityLinkLink2An obsolete or irrelevant event related to an expired encryption key that could jeopardize security.
515GrprivacyprivacyPrivacy is the ability of an individual or group to seclude themselves or information about themselvesLinkLink1Privacy is the ability for individuals or groups to hide themselves or their personal information.
516Gnconfidentialityconfidentialitya set of rules or a promise that limits the access or places restrictions on certain types of informationLinkLink1Rules or promises that limit access or place restrictions on certain information.
517KnRIDRIDRoot autonomic identifierLinkLink3Root identifier
518Knroot-autonomic-identifierroot-autonomic-identifierAn entity may provide the root-of-trust for some ecosystem (with delegations) via its root autonomic identier (AID).LinkLink3An entity can offer the root-of-trust for an ecosystem through its root autonomic identifier (AID) and delegations.
519KaprovenancedprovenancedThe act of verifying authenticity or quality of documented history or origin of somethingLinkLink2Verifying the authenticity or origin of something.
520Krnon-interactive-authentication-designnon-interactive-authentication-designNon-interactive Authentication DesignLinkLink3Non-interactive Authentication Design, shortened and with grammar corrected
521Krinteractive-authentication-designinteractive-authentication-designsecure authentication through an interactive mechanism that requires a set of requests and responses or challenge responses with challenge response repliesLinkLink3Secure authentication is achieved through an interactive mechanism that involves requesting and responding with challenge responses.
522SrESSRESSREncrypt Sender, Sign the ReceiverLinkLink2Encrypt sender, sign receiver.
523SnVIDVIDVerifiable IdentifierLinkLink2Verifiable ID
524Srencrypt‐sender‐sign‐receiverencrypt‐sender‐sign‐receiverEncrypt Sender, Sign the ReceiverLinkLink2Encrypt sender, sign receiver.
525Snverifiable-identifierverifiable-identifierCryptographically verifiable authentic identifierLinkLink2Cryptographically verifiable identifier
526Sntrust-spanning-protocoltrust-spanning-protocolProtocol using VIDs that signs every single message on the internet.LinkLink2Protocol using VIDs that signs every internet message.
527SnTSPTSPTrust spanning protocol, using VIDs that signs every single message on the internet.LinkLink2TrustSpan protocol, utilizing VIDs to sign every internet message.
528Svprivacy-washingprivacy-washingDe-identification so that it provides a personal data safe harbour and could be legally acceptable forwardedLinkLink1De-identification provides a safe harbor for personal data and can be legally acceptable when forwarded.
529SnDKRDKRDid:keri resolverLinkLink2Did Keri resolve?
530SnreputationreputationConsistent behaviour over time on the basis of which anyone else makes near-future decisionsLinkLink1Consistent behavior over time on which others base near-future decisions.
531Srdiscoverydiscoverya discovery mechanism helps to locate and verify digital identities without relying on a central authorityLinkLink1A discovery mechanism allows locating and validating digital identities without relying on a central authority.
532Srbroken-object-level-authorizationbroken-object-level-authorizationor BOLA, refers to security flaws where users can access data they shouldn'tLinkLink3BOLA stands for security flaws allowing unauthorized data access.
533SnBOLABOLABroken Object Level AuthorizationLinkLink3Broken Object-Level Authorization
534Kvread-update-nullifyread-update-nullifyor "RUN"; Read, update, nullify are actions you can take on data, no create or deleteLinkLink3"RUN": Read, update, and nullify are actions for data manipulation, without the ability to create or delete.
535KvRUNRUNread-update-nullify, actions you can take on data, no create or delete.LinkLink3Read, update, and nullify data - these are the actions you can take. No creating or deleting is allowed.
536Krdirect-modedirect-mode(one-to-one) trust mode in KERI, in which the identity controller establishes control via verified signatures of the controlling key-pair.LinkLink3KREI employs a one-to-one trust mode where the identity controller gains control through verified signatures of the controlling key-pair.
537Krindirect-modeindirect-mode(one-to-many) trust mode in KERI, which extends the direct trust basis with witnessed key event receipt logs (KERL) for validating events.LinkLink3In KERI, there is a trust mode called one-to-many that adds witnessed key event receipt logs (KERL) to validate events.
538Krend-roleend-roleAn end role is an authorization for one AID to serve in a role for another AID.LinkLink3An end role authorizes one AID to serve in another AID's role.
539KnhabhabA Hab is a keystore for one identifier.LinkLink3A Hab is a store for one identifier.
540Sridentity-assuranceidentity-assuranceThe heavy-lifting to be done to establish reputational trust, KERI is for attributional trustLinkLink3Establishing reputational trust requires significant effort, while KERI is aimed at achieving attributional trust.
541Srattributional-trustattributional-trustYou can't have reputation without attributional trust, KERI offers cryptographic root-of-trustLinkLink2
542Srreputational-trustreputational-trustidentity-assurance by a trusted partyLinkLink2
543GnADRADRArchitectural Decision RecordsLinkLink2
544Gnarchitectural-decision-recordarchitectural-decision-recordjustified software design choice that addresses an architectural requirementLinkLink2
545GnMIME-typeMIME-typeAlso 'media type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.LinkLink1
546Gnmedia-typemedia-typeAlso 'MIME type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.LinkLink1
547Knlisted-identifierlisted-identifiera list in an ACDC of authorised did:webs identifier + methodLinkLink3
548Srdesignated-aliasesdesignated-aliasesAn AID controller can designate aliases which are AID controlled identifiers such as a did:keri, did:webs, etcLinkLink2
549KasniffablesniffableA stream is sniffable as soon as it starts with a CESR group code or field mapLinkLink3
550KnreconciliationreconciliationReconciliation is the process in which you decide to accept a fork of the KEL or not.LinkLink2
551Snpartypartyan entity who participates or is concerned in an action, proceeding, plan, etc.LinkLink1
553SnverificationverficationAn action an agent (of a principal) performs to determine the authenticity of a claim or other digital object using a cryptographic key.LinkLink2
554KnkeverkeverKever is a key event verifierLinkLink3
555Snkerifickerifickerific is a front plugin or extension for Chrome and Brave, that matches words in text on the web that offers buttons to various SSI glossaries and definitions.LinkLink1
556Kraccess-controlled-interactionaccess-controlled-interactionAccess controlled actions like submitting a reportLinkLink3
557Krregistration-interactionregistration-interactionSetup/Registration interaction, new AID and authorization to establish access controlLinkLink3
559KnxipxipA message that allows a transaction set to become duplicity evidentLink
560KnKAPIKAPIKERI APILink
-=======
KeyTypeFormAliasToIP_FkeyPhilvid_FkeyTermtextlinkPhilvid_startlevelCat_PTELCat_IPEXCat_OOBICat_CESRCat_ACDCCat_KERICat_SAIDCat_GLEIFShortened version@dropdownShortened version static copy
1KnACDCACDCtype of data as issuance concretely defined by the authentic-chained-data-container specificationLinkLink3#REF!1#NAME?Data type defined by Authentic Chained Data Container Spec.
2KnADCADCan authentic data container conveys data that allows the authenticity of its content to be proved.LinkLink3#REF!1An authentic data container proves the authenticity of its content.
3SnAIDAIDan identifier that is self-certifying and self-sovereign.LinkLink3#REF!11A self-certifying and self-sovereign identifier.
4SnANANa namespace that is truly self-sovereign.LinkLink3#REF!1A self-sovereign namespace.
5KrAPCAPCauthentic provenance chain; evidence of data to be verfiably tracked back to its originLinkLink3#REF!Verified provenance chain; evidence of data can be tracked back to its origin.
6KrBADABADAbest available data acceptance, mechanism that provides a degree of replay attack protectionLinkLink31#REF!best data acceptance mechanism with replay attack protection.
7GnBFTBFTByzantine Fault TolleranceLinkLink3#REF!Byzantine Fault Tolerance
8KnCESRCESRcomposable event streaming representationLinkLink3#REF!1Event streaming representation
9GnCTCTcertificate transparency; internet security standard for digital certificatesLinkLink2#REF!Certificate Transparency is an internet security standard for digital certificates.
10GnDAGDAGdirected acyclic graph, mathematical construct, no cycles in itLinkLink2#REF!Directed acyclic graph is a mathematical construct without any cycles.
11KnDELDELduplicitous event logLinkLink3#REF!1Event log
12GnDHTDHTdistributed hash tableLinkLink2#REF!1distributed hash table
13SnDKMIDKMIdecentralized key management infrastructure; ensure no single third-party can compromise the integrity and security of a systemLinkLink2#REF!1decentralized key management system; prevents any single third-party from compromising system integrity and security.
14SnDPKIDPKIdecentralized public key infrastructure; ensure no single third-party can compromise the integrity and security of a systemLinkLink2#REF!Decentralized PKI; guarantee no third-party compromise system integrity and security.
15GnGPGGPGGnu Privacy Guard, a free-software replacement for Symantec's PGP cryptographic software suiteLinkLink2#REF!Gnu Privacy Guard is a free-software alternative to Symantec's PGP suite.
16GnI-OI-OInput / OutputLinkLink1#REF!Input/Output
17GnIANAIANAInternet assigned numbers authority; oversees the allocation of IP addresses to internet service providers (ISPs)LinkLink2#REF!The Internet Assigned Numbers Authority (IANA) oversees IP address allocation to ISPs.
18KrIPEXIPEXissuance and presentation exchange protocol; mechanism for the issuance and presentation of ACDCsLinkLink31#REF!1ACDC issuance and presentation protocol; mechanism for issuing and presenting ACDCs.
19GrJOSEJOSEJavascript object signing and encryption; method to securely transfer claims between partiesLinkLink3#REF!1JavaScript object signing and encryption is a secure method for transferring claims between parties.
20KnKA2CEKA2CEKERI agreement algorithm for control establishmentLinkLink3#REF!1KERI control establishment algorithm
21KnKAACEKAACEKERI agreement algorithm for control establishmentLinkLink3#REF!1KERI control establishment algorithm
22KnKELKELKey Event LogLinkLink3#REF!1Event Log
23KnKERIKERIKey Event Receipt InfrastructureLinkLink3#REF!1Receipt Infrastructure
24KnKERLKERLKey Event Receipt LogLinkLink3#REF!1Event Receipt Log
25KnKIDKIDKERI improvement docLinkLink3#REF!1Keri Improvement Document
26GnLoALoAany time a judgement is not a binary Yes or No, you have levels of assuranceLinkLink2#REF!Whenever a judgement is not simply a "Yes" or "No," there are varying levels of assurance.
27GnLoCLoCLocus of ControlLinkLink2#REF!Locus of Control refers to the extent to which individuals believe they have control over events in their lives.
28GnNFTNFTNon-fungible tokenLinkLink1#REF!Non-fungible token
29KvOOBIOOBIOut of band introductionLinkLink31#REF!Introduction
30GrP2PP2PPeer to peerLinkLink1#REF!Peer-to-peer
31GrPGPPGPPretty Good PrivacyLinkLink1#REF!Pretty Good Privacy (PGP)
32GnPKIPKIPublic Key InfrastructureLinkLink2#REF!111Public Key Infrastructure (PKI)
33KnPTELPTELis a public transaction event log that can be used to securely track state anchored to a KELLinkLink31#REF!is a secure public event log for tracking state anchored to a KEL.
34KnSADSADSelf-Adressing DataLinkLink3#REF!1Self-Addressing Data.
35KnSAIDSAIDSelf-Adressing IdentifierLinkLink3#REF!11Self-Addressing Identifier
36GnSATPSATPsecure asset transfer protocol; IETF protocol (and working group) in the making (as of mid 2022) for moving assets between blockchainsLinkLink3#REF!Secure asset transfer protocol: IETF protocol (and working group) currently being developed (mid-2022) to transfer assets between blockchains.
37SvSCIDSCIDSelf-Certifying Identifier, cryptographically binds an identifier to a public and private key pair.LinkLink3#REF!1A Self-Certifying Identifier cryptographically binds an identifier to a key pair.
38SrSSISSISelf-Sovereign IdentityLinkLink1#REF!111Self-Sovereign Identity (SSI)
39GnTCPTCPtransmission control protocol, one of the main protocols of the Internet protocol suite.LinkLink21#REF!11Transmission Control Protocol (TCP) is a key protocol in the Internet protocol suite.
40KnTELTELprovides a cryptographic proof of registry state by reference to the corresponding controlling KEL.LinkLink31#REF!11provides cryptographic proof of registry state via the corresponding controlling KEL.
41GrUIUIthe space where interactions between humans and machines occur.LinkLink1111#REF!1111The area where humans and machines interact.
42GnURLURLuniform resource locator or 'web address', is a reference to a web resource that specifies its location on a computer networkLinkLink1111#REF!1111A URL, known as a web address, is a reference to a web resource that specifies its location on a computer network.
43KnVCTELVCTELvirtual credential transaction event logLinkLink31#REF!Virtual credential transaction log
44GnVCVCvirtual credentialLinkLink1#REF!11Virtual credential
45GnVDSVDSverifiable data structureLinkLink3#REF!Verifiable data structure.
46Gvagencyagencya service that a representative for an identity (agent) offersLinkLink2#REF!111A service offered by an identity representative (agent).
47Kvambient-verifiabilityambient-verifiabilityVerifiable by anyone, anywhere, at anytime.LinkLink3#REF!Verifiable by anyone, anywhere, at any time.
48Gnyappend-only-event-logsappend-only event logsis a property of computer data storage such that new data can be appended to the storage, but where existing data is immutableLinkLink2#REF!Mutable data storage allows new data to be added, but existing data cannot be changed.
49Knyauthentic-chained-data-containerauthentic-chained data containerdata structure that proves digital data consistency and authenticity in one goLinkLink3#REF!A data structure that ensures both the consistency and authenticity of digital data.
50Knyauthentic-data-containerauthentic-data containerdata structure that proves digital data consistency and authenticity in one goLinkLink3#REF!A data structure that ensures both the consistency and authenticity of digital data.
51Kvauthentic-provenance-chainauthentic-provenance-chainevidence of data to be tracked back to its origin in an verifiable wayLinkLink3#REF!Evidence of data can be tracked back to its origin in a verifiable manner.
52Gaauthenticityauthenticitythe quality of having an objectively verifiable originLinkLink2#REF!The quality of having an objectively verifiable origin.
53Gnautonomic-computing-systemsautonomic-computing-systemsself-managing computing systems using algorithmic governanceLinkLink2#REF!Self-managing computing systems with algorithmic governance.
54Snautonomic-identity-systemautonomic-identity-systemidentity systems where you can verify (establishment of) the authenticity all the way back to the root-of-trustLinkLink2#REF!Identity systems can verify authenticity all the way back to the root of trust.
55Snautonomic-namespaceautonomic-namespacenamespace that is self-certifying and hence self-administrating, is truly self-sovereignLinkLink2#REF!A self-certifying and self-administrating namespace is truly self-sovereign.
56Knybest-available-data-acceptance-mechanismbest available data-acceptance mechanismBADA, mechanism that provides a degree of replay attack protectionLinkLink3#REF!BADA is a mechanism that offers replay attack protection.
57Svbindingbindingthe association of data or an identifier with another identifier or a subject (a person, organization or machine)LinkLink1#REF!Associating data or an identifier with another identifier or subject (person, organization, or machine).
58Grbyzantine-agreementbyzantine-agreementis Byzantine fault tolerance of distributed computing system coming to consensus despite arbitrary behavior from a fraction of the networkLinkLink2#REF!Byzantine fault tolerance allows distributed computing systems to reach consensus despite arbitrary behavior from some network participants.
59Gnybyzantine-fault-tolerancebyzantine-fault toleranceis a condition of a (distributed) computer system, where components may fail and there is imperfect information on whether a component has failedLinkLink2#REF!Distributed computer systems can experience failures and uncertainty regarding component statuses.
60Gncertificate-transparencycertificate-transparencyinternet security standard and framework for digital certificatesLinkLink2#REF!Internet security standard and framework for digital certificates.
61Kncesr-proof-signaturescesr-proof-signaturesAn extension to CESR that provides signature attachmentsLinkLink3#REF!NO INPUT
62Gvchain-of-custodychain-of-custodylegal chronological documentation or paper trail that records the sequence of custody of materialsLinkLink2#REF!A legal record that documents the sequence of material custody.
63Gvclaimclaimassertion of the truth of something, typically one which is disputed or in doubtLinkLink1#REF!assertion of disputed or doubtful truth.
64Kncomposable-event-streaming-representationcomposable-event-streaming-representationAlso 'CESR'. An encoding scheme of interchangeable textual and binary streaming applications of attached crypto material.LinkLink3#REF!#NAME?NO INPUT
65Gvconsensus-mechanismconsensus-mechanismHow groups of entitities come to decisions.LinkLink2#REF!NO INPUT
66Gnycontent-addressable-hashcontent-addressable hashFinding content by a hash of this content, generated by a one-way hash function applied to the content.LinkLink2#REF!NO INPUT
67Srcontrol-authoritycontrol-authorityIs 'who controls what?' and that is the primary factor in determining the basis for trust in themLinkLink2#REF!NO INPUT
68Gncontrollercontrollerthe entity that has the ability to make changes to an identity, cryptocurrency or verifiable credential.LinkLink2#REF!The entity capable of modifying an identity, cryptocurrency, or verifiable credential.
69Gvcorrelationcorrelationan identifier used to indicate that external parties have observed how wallet contents are related.LinkLink1#REF!An identifier indicating external parties have observed the relationship between wallet contents.
70Gncredentialcredentialevidence of authority, status, rights, entitlement to privileges, or the like.LinkLink1#REF!Evidence of authority, status, rights, entitlements, or similar privileges.
71Gncrypto-librariescrypto-librariesdeal with cryptography algorithms and have API function calls to each of the supported featuresLinkLink1#REF!This deals with cryptography algorithms and has API functions for each supported feature.
72Gncryptocurrencycryptocurrencya digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a digital ledger.LinkLink1#REF!A digital asset that serves as a medium of exchange, with individual coin ownership records stored in a digital ledger.
73Gncryptographic-commitment-schemecryptographic-commitment-schemeis a cryptographic primitive that allows one to commit to a value while keeping it hidden to others; you can reveal the committed value later.LinkLink2#REF!NO INPUT
74Gncryptographic-strengthcryptographic-strengthused to describe greater resistance to attack of an encryption algorithm in comparison to some other (which is thus cryptographically weaker)LinkLink1#REF!NO INPUT
75Gncryptonymcryptonyma code word or name used to refer to another name, word, project, or personLinkLink2#REF!NO INPUT
76Sndecentralized-identitydecentralized-identityis a technology that uses cryptography to allow individuals to create and control their own digital identifiersLinkLink1#REF!NO INPUT
77Gnydecentralized-key-management-infrastructuredecentralized key-management infrastructurean infrastructure ensure that no single third-party can compromise the integrity and security of the system as as whole.LinkLink2#REF!NO INPUT
78Sndelegated-identifierdelegated-identifierMatches the act of delagation with the appropriate digital twin.LinkLink3#REF!NO INPUT
79Gndigital-signaturedigital-signaturea mathematical scheme for verifying the authenticity of digital messages or documentsLinkLink1#REF!Mathematical scheme to verify authenticity of digital messages or documents.
80Gndirected-acyclic-graphdirected-acyclic-graphDAG, a mathematical construct, particularly graph theory, the acyclic property stems from a directed graph with no cyclesLinkLink2#REF!1A DAG, a mathematical construct in graph theory, is a directed graph with no cycles, giving it the acyclic property.
81Gndistributed-hash-tabledistributed-hash-tableany participant can retrieve the value associated with a given keyLinkLink2#REF!Any participant can get the value for a specific key.
82Knydual-text-binary-encoding-formatdual-text binary-encoding formatAn encoding format that allows for both text and binary encoding format, which is fully interchangeableLinkLink3#REF!1NO INPUT
83Knduplicitous-event-logduplicitous-event-logrecord of inconsistent event messages produced by a given controller or witnessLinkLink3#REF!1log of inconsistent event messages from a controller or witness
84Gnduplicityduplicityexternal inconsistency; which stems from publication of two or more versions of a (by itself consistent) key event logLinkLink3#REF!1External inconsistency occurs when multiple versions of a key event log are published, even though the log itself is consistent.
85Gvelectronic-signatureelectronic-signatureLinkLink1#REF!NO INPUT
86Gaend-verifiableend-verifiableLinkLink3#REF!1NO INPUT
87GventropyentropyLinkLink2#REF!1NO INPUT
88GaephemeralephemeralLinkLink2#REF!1NO INPUT
89Kafirst-seenfirst-seenLinkLink3#REF!1NO INPUT
90Gngnu-privacy-guardgnu-privacy-guardGPG is a free-software replacement for Symantec's PGP cryptographic software suiteLinkLink2#REF!GPG replaces Symantec's PGP software suite for free.
91KnhaberyhaberyLinkLink3#REF!NO INPUT
92Grhierarchical-asynchronous-coroutines-and-input-outputhierarchical-asynchronous-coroutines-and-input-outputLinkLink3#REF!NO INPUT
93GnidentifieridentifierSomething to uniquely identify (public) identities; pointing to something or someone else.LinkLink1#REF!Something to uniquely identify public identities, pointing to someone or something else.
94Gnidentityidentitya unique entity. Typically represented by a unique identifier.LinkLink2#REF!A distinct entity typically represented by a unique identifier.
95Kninception-eventinception-eventthe first event in KERI that establishes an identifier.LinkLink31#REF!1The initial event in KERI that establishes an identifier.
96Gvinceptioninceptionoperation creating an AID by binding it to the initial set of authoritative keypairs and any other associated information.LinkLink2#REF!Create an AID by binding it to the initial set of authoritative keypairs and any relevant information.
97Grinconsistencyinconsistencydifferent parts of a reason, idea or opinion do not agree, or it does not agree with something else.LinkLink1#REF!1When different parts of a reason, idea, or opinion do not agree, or it is in disagreement with something else.
98Knindexed-signatureindexed-signaturean index telling which public key is used when signing anything with a multi-key autonomic identifier.LinkLink3#REF!An index indicating the public key used for signing with a multi-key autonomic identifier.
99Grinternal-inconsistencyinternal-inconsistencyA status that exists within an entity where different parts of a reason, idea or opinion disagree.LinkLink2#REF!1A disagreement within an entity where different parts have conflicting reasons, ideas, or opinions.
100Gninternet-assigned-numbers-authorityinternet-assigned-numbers-authorityAlso IANA; the organization that oversees the allocation of IP addresses to internet service providers (ISPs)LinkLink3#REF!IANA oversees IP address allocation to ISPs.
101Krissuance-and-presentation-exchange-protocolissuance-and-presentation-exchange-protocolprovides a uniform mechanism for the issuance and presentation of ACDCs in a securely attributable mannerLinkLink3#REF!1provides a secure and standardized way to issue and present ACDCs.
102Grjavascript-object-signing-and-encryptionjavascript-object-signing-and-encryptionJavascript object signing and encryption; method to securely transfer claims between partiesLinkLink1#REF!JavaScript object signing and encryption is a secure method for transferring claims between parties.
103KnjudgejudgeLinkLink3#REF!NO INPUT
104Krkeri-agreement-algorithm-for-control-establishmentkeri-agreement-algorithm-for-control-establishmentLinkLink3#REF!1NO INPUT
105Knykeri-command-line-interfacekeri command-line interfaceLinkLink3#REF!11NO INPUT
106Knkeri-improvement-dockeri-improvement-docLinkLink3#REF!1NO INPUT
107Knkeridemliakeridemliadistributed database of Witness IP-addressesLinkLink3#REF!Database of Witness IP addresses.
108Gvkey-compromisekey-compromiseLinkLink2#REF!1NO INPUT
109Knkey-event-messagekey-event-messageLinkLink3#REF!1NO INPUT
110Knkey-event-receipt-infrastructurekey-event-receipt-infrastructureapproach to decentralized identifiers and decentralized key management that promises significant benefits for self-sovereign identity and Trust over IP infrastructureLinkLink3#REF!1An approach to decentralized identifiers and key management that offers significant benefits for self-sovereign identity and Trust over IP infrastructure.
111Knkey-event-receipt-logkey-event-receipt-logLinkLink3#REF!1NO INPUT
112Knkey-event-receiptkey-event-receiptLinkLink3#REF!1NO INPUT
113Gnkey-statekey-stateLinkLink2#REF!1NO INPUT
114Gnkey-transparencykey-transparencylookup service for generic records and a public, tamper-proof audit log of all record changesLinkLink3#REF!1lookup service for generic records and a publicly accessible, tamper-proof audit log of all record modifications
115GnkeykeyLinkLink2#REF!1NO INPUT
116Gnlevels-of-assurancelevels-of-assuranceLoA, any time a judgement is not a binary Yes or No, you have levels of assuranceLinkLink3#REF!In LoA, when a judgment isn't a simple Yes or No, there are various levels of assurance.
117GnlivenesslivenessLinkLink3#REF!NO INPUT
118Grloci-of-controlloci-of-controlLinkLink3#REF!NO INPUT
119Knmanagement-transaction-event-logmanagement-transaction-event-logLinkLink3#REF!NO INPUT
120GnmessagemessageLinkLink1#REF!NO INPUT
121GnmulticodecmulticodecLinkLink2#REF!NO INPUT
122GnnamespacenamespaceLinkLink11#REF!NO INPUT
123Knnested-cooperative-delegated-identifiersnested-cooperative-delegated-identifiersLinkLink3#REF!NO INPUT
124Knynon-establishment-eventnon-establishment eventLinkLink3#REF!NO INPUT
125Gnynon-fungible-tokennon-fungible tokenLinkLink2#REF!NO INPUT
126Ganon-normativenon-normativethe purpose of non-normative theories is not to give answers, but rather to describe possibilities or predict results of certain actionsLinkLink1#REF!Non-normative theories do not provide answers but describe possibilities or predict outcomes of specific actions.
127Sanon-repudiablenon-repudiablea statement's author cannot successfully dispute its authorship or the validity of an associated contract, signature or commitment.LinkLink2#REF!The author of a statement cannot dispute its authorship or the validity of an associated contract, signature, or commitment.
128Ganon-transferablenon-transferableNo capacity to transfer (the control over) a certain digital asset in an unobstructed or loss-less manner.LinkLink1#REF!No ability to transfer a digital asset without any obstruction or loss.
129Ganormativenormativea theory that tells you what you should do - what action you should takeLinkLink1#REF!A theory that explains the appropriate action to take.
130Gryone-way-functionone-way functiona one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random inputLinkLink2#REF!A one-way function is easy to compute on all inputs but difficult to reverse given the image of a random input.
131Gnpayloadpayloadthe payload of an item in KERI is a specific cryptographic building blockLinkLink1#REF!The payload of an item in KERI is a cryptographic building block.
132Gnpretty-good-privacypretty-good-privacyLinkLink1#REF!NO INPUT
133Knyprimary-root-of-trustprimary root-of-trustLinkLink2#REF!NO INPUT
134GnprimitiveprimitiveLinkLink1#REF!NO INPUT
135Gnproof-of-authorityproof-of-authorityproof that somebody or something has certain rights or permissions on dataLinkLink2#REF!proof of rights or permissions on data
136Knproof-of-authorshipproof-of-authorshipproof that somebody or something has originally created certain contentLinkLink2#REF!Evidence that someone or something has created specific content.
137Gnprovenanceprovenancehistoric documentation of cryptographic verifiable key states , data consistency and cedentialsLinkLink2#REF!Historical documentation of cryptographic key states, data consistency, and credentials.
138Gnpublic-key-infrastructurepublic-key-infrastructureset of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificatesLinkLink2#REF!Set of roles, policies, hardware, software, and procedures required for creating, managing, distributing, utilizing, storing, and revoking digital certificates.
139Knypublic-verifiable-credential-registrypublic verifiable-credential registrya Verifiable Data Registry that tracks the issuance/revocation state of credentialsLinkLink31#REF!A Verifiable Data Registry tracks the issuing and revoking of credentials.
140Gnrace-conditionrace-conditionthe condition where a system's substantive behavior is dependent on the sequence or timing of external uncontrollable eventsLinkLink3#REF!The condition where a system's behavior depends on external uncontrollable events' sequence or timing.
141Knreceipt-logreceipt-logordered record of all key event receipts for a given set of witnessesLinkLink3#REF!A record of key event receipts for witnesses.
142Gnreceiptreceiptevent message or reference with one or more witness signaturesLinkLink3#REF!event message with witness signatures
143Knregistrarregistraridentifiers that serve as backers for each transaction event log under its provenanceLinkLink3#REF!Identifiers back each transaction event log to establish its provenance.
144Gnroot-of-trustroot-of-trusttrust in end-verifiable digital signatures from asymmetric key cryptography, replaces human basis-of-trustLinkLink2#REF!End-verifiable digital signatures from asymmetric key cryptography replace human basis-of-trust.
145Kvrotationrotationthe operation of revoking and replacing the set of authoritative key pairs for an AIDLinkLink2#REF!revoking and replacing authoritative key pairs for an AID
146Krysecondary-root-of-trustsecondary root-of-trusta root-of-trust that, for its secure attribution, depends on another primary root-of-trustLinkLink3#REF!A root-of-trust depends on a primary root-of-trust for secure attribution.
147Srysecure-asset-transfer-protocolsecure asset-transfer protocolan IETF protocol for moving assets between blockchainsLinkLink3#REF!An IETF protocol for transferring assets across blockchains.
148Svsecure-attributionsecure-attributionis 'whodunit?!' in cyberspaceLinkLink3#REF!Whodunit in cyberspace!
149Gnseedseeda pseudorandomly generated number, often expressed in representation of a series of wordsLinkLink1#REF!A randomly generated number, usually expressed as a series of words.
150Sryself-addressing-dataself-addressing dataan encryption program that provides cryptographic privacy and authentication for data communicationLinkLink3#REF!An encryption program that ensures data communication's cryptographic privacy and authentication.
151Sryself-certifying-identifierself-certifying identifiercryptographically binds an identifier to a public and private key pairLinkLink3#REF!Cryptographically binds an identifier to a key pair.
152Kaself-framingself-framingA textual encoding that includes type, size, and value is self-framing; and thus parseable without needing any additional delimiting characters.LinkLink3#REF!A self-framing textual encoding includes type, size, and value, making it parseable without any extra delimiting characters.
153Snyself-sovereign-identityself-sovereign identityLinkLink2#REF!NO INPUT
154Gnsigned-digestsigned-digestLinkLink2#REF!NO INPUT
155Gnspanning-layerspanning-layerLinkLink3#REF!NO INPUT
156Krytext-binary-concatenation-composabilitytext-binary-concatenation composabilityWhen any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.LinkLink3#REF!When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss.
157Kntransaction-event-logtransaction-event-logThe set of transactions that determine registry state form a log called a Transaction Event Log (TEL) and is cryptographically linked to corresponding controlling KEL.LinkLink3#REF!The transactions that determine the registry state form a log called Transaction Event Log (TEL) and are cryptographically linked to the corresponding controlling KEL.
158Grtransmission-control-protocoltransmission-control-protocolTCP is one of the main protocols of the Internet protocol suiteLinkLink1#REF!TCP is a key protocol in the Internet protocol suite.
159Srtrust-domaintrust-domainA trust domain is the ecosystem of interactions that rely on a trust basis. A trust basis binds controllers, identifiers, and key-pairs.LinkLink1#REF!A trust domain is an ecosystem of interactions relying on trust. It binds controllers, identifiers, and key pairs.
160Gvvalidatorvalidatorthe capability to determine whether or not (verified) data is valid to be used for some specific purpose(s).LinkLink21#REF!the ability to verify data's validity for a specific purpose.
161Grveracityveracitythe quest for the truthLinkLink2#REF!The Truth Quest
162Gnverifiable-data-structureverifiable-data-structurea verifiable data structure is a data structure that incorporates cryptographic techniques to ensure the integrity and authenticity of its contentsLinkLink3#REF!A verifiable data structure is a structure that uses cryptographic techniques to guarantee the integrity and authenticity of its contents.
163Gaverifiableverifiableable to cryptographically verify a certain data structure on its consistency and its authenticity.LinkLink2#REF!Capable of cryptographically verifying a specific data structure for consistency and authenticity.
164Gnverifierverifierthe entity that (cryptogrpahically) verifies data received from peers (check structure, signatures, dates)LinkLink2#REF!The entity verifies received data from peers by checking its structure, signatures, and dates using cryptography.
165Gnversionversionis a class of systems responsible for managing changes to computer programs, documents, large web sites, or other collections of informationLinkLink1#REF!Version: Version control is responsible for managing changes to computer programs, documents, web sites, or other collections of information.
166Knvirtual-credential-transaction-event-logvirtual-credential-transaction-event-logwill track the issued or revoked state of each virtual credential (VC)LinkLink3#REF!NO INPUT
167Grweb-of-trustweb-of-trustIn cryptography, a web of trust is a concept to establish the authenticity of the binding between a public key and its owner.LinkLink2#REF!NO INPUT
168Knywell-known-witnesseswell-known witnessesPredictable witness identifier creation by using known salts to initialize their key stores. For testing purposes only!LinkLink3#REF!NO INPUT
171GnreporeporepoSoftware repositoryLinkLink2#REF!Software Repo
173GncoroutinescoroutinescoroutinesComputer programs that can be suspended and resumed at will.LinkLink1#REF!Suspend and resume computer programs at will.
174Grinput-outputI/Oinput-outputInput / outputLinkLink1#REF!Input/Output
175GnhiohiohioHierarchical asynchronous coroutines and I/O in PythonLinkLink3#REF!Hierarchical async coroutines and I/O in Python.
178GncloneclonecloneA copy of a system that is - and works exactly as the originalLinkLink2#REF!A replica system that is functioning exactly like the original.
179GnbranchbranchbranchA duplicate of an object under version control for further separate modificationLinkLink2#REF!A duplicate object under version control for separate modifications.
180KnkliklikliKERI command line interfaceLinkLink3#REF!Keri CLI
183Snverifiable-credentialverifiable credentialsverifiable-credentialthe digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable wayLinkLink1#REF!The digital version of our daily life credentials, such as passports and driver's licenses, but in a machine-verifiable format.
185Gnsub-shellsub shellsub-shella child shell started up from - and contained in another parent shellLinkLink1#REF!A child shell started from and contained within a parent shell.
186Snagentagentagenta representative for an identityLinkLink2#REF!identity representative
187Gncloud-agentcloud agentcloud-agentis software installed on the cloud server instances for security, monitoring, and analysisLinkLink2#REF!The software is installed on cloud server instances for security, monitoring, and analysis.
190Gnuser-interfaceU/Iuser-interfaceA user interface (UI) is the space where interactions between humans and machines occur.LinkLink1#REF!A user interface (UI) is where humans and machines interact.
191Grmultisigmulti-sigmultisigA digital signature scheme which allows a group of users to sign a single piece of digital data.LinkLink1#REF!A digital signature scheme enables a group of users to sign a single piece of digital data.
192Gnidentifier-systemidentifieridentifier-systemSomething to uniquely identify (public) identities, pointing to something or someone else.LinkLink2#REF!A unique identifier for public identities, referring to something or someone else.
193GnwalletwalletwalletA wallet is a collection of data stores, made up of a keystore, local and remote key event log database and credential database.LinkLink3#REF!A wallet includes a keystore, local and remote key event log database, and a credential database.
195KnwitnesswitnesseswitnessEntity that may receive, verify, and store key events for an identifierLinkLink3#REF!Entity that receives, verifies, and stores key events for an identifier.
196KnwatcherwatcherswatcherGuarantee that KERI logs are immutableLinkLink3#REF!Ensure KERI logs are immutable.
197Gvkey-managementkey managementkey-managementManagement of cryptographic keys in a crypto-system.LinkLink3#REF!Managing cryptographic keys in a crypto-system.
199Snysingle-signature-identifiersingle sig identifiersingle-signature identifierAn identifier that is controlled by a one-of-one signing keypairLinkLink2#REF!An identifier controlled by a unique signing keypair.
200Gnkeystorekey storekeystoreA keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs.LinkLink3#REF!A keystore in KERI is an encrypted data store that holds the private keys for a collection of AIDs.
201Srkey-eventkey eventskey-eventEvents happening to controlling keys of an identifier recorded in a Key Event Log (KEL).LinkLink21#REF!Events happening to control keys of an identifier are recorded in a Key Event Log (KEL).
202Srinteraction-eventinteraction eventinteraction-eventAnchors external data to the key-state as established by the most recent prior establishment eventLinkLink3#REF!Anchoring external data to the key-state established by the most recent establishment event.
203Srrotation-eventrotation eventrotation-eventChanges the key-state which includes a change to the set of authoritative keypairs for an AIDLinkLink3#REF!Changes the key-state, including a change to the set of authoritative keypairs for an AID.
204Gnsigning-thresholdsigning thresholdssigning-thresholdMinimum number of valid signatures to satisfy the requirement for successful validationLinkLink3#REF!Minimum number of valid signatures for successful validation requirement.
205Knkey-event-logKELkey-event-logKey Event Log is the native KERI verifiable data structureLinkLink31#REF!Key Event Log is the KERI's native verifiable data structure.
206Gvverify-signatureverify signaturesverify-signatureApplying an algorithm that either accepts or rejects the message's claim to authenticity; when you can succesfully verify a signatureLinkLink2#REF!Applying an algorithm to verify the authenticity of a message by accepting or rejecting its claim when a signature can be successfully verified.
207Grpeer-to-peerpeer-to-peer communicationspeer-to-peerPeers are equally privileged, equipotent participants in a networkLinkLink2#REF!Peers are equally privileged and equipotent participants in a network.
209GnsaltsaltssaltRandom data that is used as an additional input to a cryptographic one-way functionLinkLink3#REF!Random data used as an additional input for a cryptographic one-way function.
210KvdelegationdelegationdelegationDelegation can be defined as “the act of empowering to act for another”LinkLink3#REF!Delegation is the act of empowering someone to act on behalf of another.
211Krmulti-sig-delegationmulti-sig delegationmulti-sig-delegationdelegated identifiers under multi-signature controlLinkLink3#REF!Multi-signature control for delegated identifiers.
213Sntransferable-identifiertransferabletransferable-identifierControl over identifier can be transferred by rotating keysLinkLink3#REF!Keys can transfer control over identifiers by rotating them.
215Gnconfiguration-filesconfiguration fileconfiguration-filesFile used to configure the parameters and initial settings for some computer programsLinkLink1#REF!This file configures parameters and initial settings for computer programs.
219Grtransfer_Protocolpost and puttransfer_ProtocolHTTP request methods to indicate the desired action to be performed on the identified resourceLinkLink2#REF!HTTP request methods indicate the desired action on the identified resource.
221GnpasscodepasscodepasscodeSecret data, typically a string of characters, usually used to confirm a user's identityLinkLink2#REF!Secret data, often a string of characters, commonly utilized for user identity verification.
222Gvkey-stretchingstretched into an encryption keykey-stretchingmake a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resourcesLinkLink3#REF!Enhance the security of a potentially weak key, such as a password or passphrase, against brute-force attacks by increasing available resources.
224Knynon-transferable-identifiernon-transferable identifiernon-transferable-identifierControlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other controlLinkLink3#REF!Keys cannot be rotated for this identifier, making it non-transferable for control elsewhere.
226Knthreshold-signature-schemewitness thresholdthreshold-signature-schemeThe minimum number of valid witness signatures requiredLinkLink3#REF!Minimum required witness signatures.
227Kvpre-rotationpre-rotationpre-rotationcommitment to next rotated key set in previous rotation or inception eventLinkLink3#REF!commitment to the next key set rotated in the previous rotation or inception event.
228KnprefixprefixesprefixA prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing keyLinkLink3#REF!The prefix is a combination of a Base-64 derivation code and the Base-64 encoding of a public digital signing key.
229Gnbase64base64base64A group of binary-to-text encoding schemes that represent binary dataLinkLink3#REF!Binary-to-text encoding schemes represent binary data.
230Kaqualifiedqualifiedqualifiedwhen qualified, a cryptographic primitive includes a prepended derivation codeLinkLink3#REF!When qualified, a cryptographic primitive includes a derived code prepended.
231Knderivation-codederivation codederivation-codeA special character that encodes the derivation process, pre-pended to the identifierLinkLink3#REF!A special character that encodes the derivation process, added to the identifier.
232Gnblake3Blake3 hashblake3BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2.LinkLink3#REF!BLAKE3 is a new cryptographic hash function, released in 2020, that builds upon Bao and BLAKE2.
233Gndata-anchoranchor data intodata-anchorData anchors are digests of digital data, that uniquely identify this dataLinkLink3#REF!Data anchors are digital data digests that uniquely identify the data.
234Snautonomic-identifierAIDautonomic-identifierAn identifier that is self-certifying and self-sovereignLinkLink3#REF!A self-certifying and self-sovereign identifier.
236GndigestdigestdigestVerifiable cryptographic commitment. It's a collision resistant hash of contentLinkLink21#REF!Verifiable cryptographic commitment is a collision-resistant content hash.
237Krissuance-eventissuance eventissuance-eventThe inception event of a verifiable credentialLinkLink3#REF!The inception event of a verifiable credential.
238Knpublic-transaction-event-logpublic transaction event logpublic-transaction-event-logIs a hash linked data structure of transactions that can be used to track stateLinkLink3#REF!A hash linked data structure is used to track state in transactions.
239GnRustRustprogramming languageLinkLink3#REF!Programming Language
240Krestablishment-eventestablishmentestablishment-eventAn event that establishes control authorityLinkLink3#REF!A control authority event
242Krindexed-signatureindexed signaturesindexed-signatureUsed when signing anything with a multi-key autonomic identifier, a verifier knows which of the multiple public keys was usedLinkLink3#REF!When signing with a multi-key autonomic identifier, a verifier can determine which specific public key was used.
245Knyself-addressing-identifierself-addressing identifiersself-addressing identifierAn identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evidentLinkLink3#REF!An identifier is deterministically generated from and embedded in the content it identifies, making it and its data tamper-evident.
246KnbackerbackerbackerBackers include both regular KERI witnesses and ledger-registered backersLinkLink3#REF!Backers include regular KERI witnesses and ledger-registered supporters.
247Knledger-backerledger backerledger-backerA witness in KERI that is ledger-registeredLinkLink3#REF!A registered witness in KERI.
248Knwitnesswitness backerwitnessA native KERI witness whose control authority is established in a KELLinkLink3#REF!A KERI witness, native to KEL, has established control authority.
249Knverifiable-legal-entity-identifiervLEIverifiable-legal-entity-identifierDigital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authenticLinkLink3#REF!Digital verifiable credentials issued by GLEIF delegates to verify the authenticity of information about a legal entity.
250Snssi-systemSSI systemssi-systemSSI Infrastructure consisting of the technological components that are deployed all over the worldLinkLink1#REF!SSI Infrastructure consists of technological components deployed worldwide.
252Kvtransfer-off-ledgertransfer off a ledgertransfer-off-ledgerThe act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KELLinkLink3#REF!Transferring control authority of an identifier from a ledger or blockchain to the KEL data structure in KERI.
255Gnservice-endpointservice endpointsservice-endpointA web service endpoint which is a URL at which clients of specific service can get access to the service.LinkLink2#REF!A web service endpoint is a URL where clients can access a specific service.
256Gnuniform-resource-locatorURLsuniform-resource-locatorA reference to a web resource that specifies its location on a computer network and a mechanism for retrieving itLinkLink1#REF!A web resource reference that specifies its location on a computer network and a retrieval mechanism.
257Gnip-addressip-addressip-addressA numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communicationLinkLink1#REF!A numerical label, like '192.0.2.1', connected to a computer network using the Internet Protocol for communication.
258Gntcp-endpointTCP endpointtcp-endpointThis is a service endpoint of the web transmission control protocolLinkLink2#REF!This is a web transmission control protocol endpoint.
259KninquisitorinquisitorinquisitorSomeone (in a validating role) that launches an inquiry at some KERI witnessLinkLink3#REF!A person (in a validating role) who questions a KERI witness.
260Gvreplay-attackreplay-attackintercept and then fraudulently delays or resend a message to misdirect the receiver into doing what the attacker wantsLinkLink3#REF!Intercepting a message and fraudulently delaying or resending it to misdirect the receiver into complying with the attacker's desires.
261GnXBRLXBRLextensible business reporting language, standard for digital business reportingLinkLink1Extensible Business Reporting Language (XBRL), a digital standard for business reporting.
262Gnextensible-business-reporting-languageextensible-business-reporting-languageXBRL, standard for digital business reportingLinkLink1XBRL is the standard for digital business reporting.
263Knlocked-statelocked statelocked-statedefault state of an encrypted KERI data store with a passcodeLinkLink3#REF!The default state of an encrypted KERI data store with a passcode.
265Kryout-of-band-introductiondata OOBIsout-of-band introductiondata out-of-band introductionsLinkLink3#REF!Data out-of-band intros
266Kryout-of-band-introductioncredential schema OOBIsout-of-band introductioncredential schema out-of-band introductionsLinkLink3#REF!Credentials schema introductions outside of the main channel.
267Knkeepkeepkeepis KERI's and ACDC's depreciated crypto wallet, a task orientated application for managing AIDs in ecosystems, e.g. the vLEI EcosystemLinkLink3#REF!This is a deprecated crypto wallet by KERI and ACDC. It is a task-oriented app for managing AIDs in ecosystems such as the vLEI Ecosystem.
268Grzero-trustzero trustzero-trusta Zero Trust approach trusts no oneLinkLink2#REF!In a Zero Trust approach, no one is trusted.
270Krrevocation-eventrevocation eventsrevocation-eventAn event that revokes control authority over an identifierLinkLink2#REF!An event revoking control authority over an identifier.
272Knescrow-stateescrow statesescrow-stateThe current state of all the temporary storage locations (what events are waiting for what other information) that KERI protocol needs to keep track of, due to its fully asynchronous nature.LinkLink3#REF!The current state of all temporary storage locations that the KERI protocol needs to keep track of, due to its fully asynchronous nature (events waiting for other information).
273Kryserver-sent-eventserver-sent eventsserver-sent eventMailbox notifications, a streaming service for the agent U/I, to get notifications from the KERI system itselfLinkLink3#REF!Mailbox notifications is a streaming service for the agent U/I, providing notifications directly from the KERI system.
274Gnsealsealcryptographic proof in a secondary root-of-trust that is anchored in a primary-root-of-trustLinkLink21#REF!cryptographic proof in a secondary root-of-trust anchored in a primary root-of-trust
275Saauthoritativeauthoritative(control over) an identifier is 'authoritative' because it can be considered accurate, renowned, honourable and / or respectedLinkLink31#REF!An identifier has control and is considered authoritative when it is accurate, renowned, honorable, and respected.
276KnQVIQVIqualified vlei issuer, contracting party qualified by GLEIFLinkLink2#REF!1Qualified vlei issuer, contracting party qualified by GLEIF.
277Knqualified-vlei-issuerqualified-vlei-issuerQVI, contracting party qualified by GLEIFLinkLink2#REF!1QVI, a contracting party qualified by GLEIF.
278Knghost-credentialghost-credentiala valid credential within in a 90 days grace periodLinkLink2#REF!1a valid credential within a 90-day grace period
279Knredundant-credentialredundant-credentialmultiple -, independently valid credentials issued by the same issuerLinkLink2#REF!1Multiple independently valid credentials issued by the same issuer.
280Krengagement-context-roleengagement-context-roleA person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.LinkLink2#REF!1A person represents the Legal Entity in a role and is issued an ECR vLEI Credential.
281KrECRECRA person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.LinkLink2#REF!1A person represents the Legal Entity in a role and is issued an ECR vLEI Credential.
282Kngleif-authorized-representativegleif authorized representativeA GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.LinkLink2#REF!1A GLEIF representative authorized to verify and issue the QVI vLEI Credential.
283KnGARGARA GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.LinkLink2#REF!1A GLEIF representative authorized to verify and issue the QVI vLEI Credential.
284GnGLEIFGLEIFGlobal Legal Entity Identifier FoundationLinkLink1#REF!1Global LEI Foundation.
285KnDARDARA representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.LinkLink2#REF!1A representative authorized by a Legal Entity to act on its behalf officially.
286Kndesignated-authorized-representativedesignated-authorized-representativeA representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.LinkLink2#REF!1A representative authorized by a Legal Entity to act on its behalf officially.
287KnAVRAVRauthorized vlei representativeLinkLink2#REF!1Authorized Vlei representative.
288Knauthorized-vlei-representativeauthorized-vlei-representativea representative of a Legal Entity that's authorized to request issuance and revocation of credentialsLinkLink2#REF!1a representative of a legal entity authorized to request issuance and revocation of credentials
289GnLEILEILegal Entity InstituteLinkLink2#REF!1Legal Entity Institute.
290Gnlegal-entitylegal-entityunique parties that are legally or financially responsible for financial transactions or have the legal right to enter into legal contractsLinkLink2#REF!1#NAME?parties legally or financially responsible for transactions or with the legal right to enter contracts
291KrOOROORofficial organizational role, a person holding a vLEI credential person and representing the Legal EntityLinkLink2#REF!1official organizational role, a person holding a vLEI credential and representing the Legal Entity
292Krofficial-organizational-roleofficial-organizational-roleOOR, a person holding a vLEI credential person and representing the Legal EntityLinkLink2#REF!1OOR, a person holding a vLEI credential and representing the Legal Entity
293Knyqvi-authorized-representativeqvi-authorized representativeQAR, conducts QVI operations with GLEIF and Legal EntitiesLinkLink2#REF!1QAR conducts QVI operations in collaboration with GLEIF and Legal Entities.
294KnQARQARqvi authorized representative, conducts QVI operations with GLEIF and Legal EntitiesLinkLink2#REF!1Authorized representative conducts QVI operations with GLEIF and legal entities.
295Knvlei-ecosystem-governance-frameworkvlei-ecosystem-governance-frameworka document that defines the information security, privacy, availability, confidentiality and processing integrity policies that applyLinkLink2#REF!1This document defines the policies for information security, privacy, availability, confidentiality, and processing integrity.
296Kvsolicited-issuancesolicited-issuanceissuance of Legal Entity vLEI / OOR / ECR Credentials upon receipt by the QARLinkLink2#REF!1issuing vLEI/OOR/ECR Credentials upon QAR's receipt.
297Kvunsolicited-issuanceunsolicited-issuanceissuance of a Legal Entity vLEI Credential upon notice by a QAR to its AVR(s)LinkLink2#REF!1QAR notifies AVR(s) to issue a vLEI Credential to Legal Entity.
298Gngovernance-frameworkgovernance-frameworka set of rules how to apply technologyLinkLink2#REF!1A set of rules on how to apply technology.
299KnGLEISGLEISGlobal Legal Entity Identifier SystemLinkLink2#REF!1Global LEI System
300Knvlei-credentialvlei-credentialverifiable Legal Entity IdentifierLinkLink2#REF!1Verifiable LEI
301Krlegal-entity-engagement-context-role-vlei-credential-governance-frameworklegal-entity-engagement-context-role-vlei-credential-governance-frameworkA document that details the requirements for vLEI Role Credentials issued to representatives of a Legal Entity in functional - or other context of engagement.LinkLink2#REF!1NO INPUT
302Knvlei-role-credentialvlei-role-credentialA vLEI credential that attests a role.LinkLink2#REF!1NO INPUT
303Knlegal-entity-official-organizational-role-vlei-credential-governance-frameworklegal-entity-official-organizational-role-vlei-credential-governance-frameworkA document that details the requirements for vLEI Role Credentials issued to official representatives of a Legal Entity.LinkLink2#REF!1NO INPUT
304Knlegal-entity-vlei-credential-governance-frameworklegal-entity-vlei-credential-governance-frameworkA document that details the requirements for vLEI Credential issued by a Qualified vLEI Issuer to a Legal EntityLinkLink2#REF!1NO INPUT
305Knqualified-vlei-issuer-vlei-credential-governance-frameworkqualified-vlei-issuer-vlei-credential-governance-frameworkA document that details the requirements to enable this Credential to be issued by GLEIF to Qualified vLEI IssuersLinkLink2#REF!1NO INPUT
306SnDIDDIDDecentralized IdentifierLinkLink2#REF!DID
307Sndecentralized-identifierdecentralized-identifierDecentralized identifiers (DIDs) enable verifiable, decentralized digital identity, refering to a person, organization, thing, data model, abstract entity, etc.LinkLink1#REF!NO INPUT
308Kvpartial-pre-rotationpartial-pre-rotationchange of control but partially keep some keys unexposed while exposing others as needed.LinkLink3#REF!1Change control but partially keep certain keys undisclosed while exposing others as required.
309Kvpartial-rotationpartial-rotationchange of control but partially keep some keys unexposed while exposing others as needed.LinkLink3#REF!1Change control but partially keep certain keys undisclosed while exposing others as required.
310Kvcustodial-rotationcustodial-rotationchange of control that is split between two key setsLinkLink3#REF!1Change of control split between two key sets.
311Kvreserve-rotationreserve-rotationpreparatory key pairs being held in reserve and not exposedLinkLink3#REF!1Preparation key pairs reserved and not exposed.
312Kncustodial-agentcustodial-agenta custodian who has been granted signing authority and usually also being the host of the running agent software.LinkLink3#REF!1A custodian typically granted signing authority and also acts as the host for the running agent software.
313Srsigning-authoritysigning-authoritythe authority to sign on behalf of the controller of an identifierLinkLink3#REF!1the authority to sign for the controller of an identifier
314Srrotation-authorityrotation-authoritythe (exclusive) right to change control over an identifierLinkLink3#REF!1The exclusive right to change control of an identifier.
315Gnytrans-contextual-valuetrans-contextual valuevalue that is transferrable between contextsLinkLink1#REF!1Transferable value across contexts.
316Grsource-of-truthsource-of-trutha trusted data source that gives a complete picture of the truth about a data object.LinkLink1#REF!1a reliable data source providing a comprehensive view of the truth about a data object.
317Gvauthorizationauthorizationspecifying access rights or privileges to resourcesLinkLink11#REF!11specifying access rights to resources
318Grapplication-programming-interfaceapplication-programming-interfacea way for two or more computer programs to communicate with each other.LinkLink1#REF!11A method for multiple computer programs to communicate with each other.
319GnAPIAPIan application Programming Interface, a way for two or more computer programs to communicate with each other.LinkLink1#REF!11An API is a way for computer programs to communicate with each other.
320Gnkey-pairkey-paira public key and its corresponding private key.LinkLink11#REF!11a public key and its corresponding private key.
321Gnownerownera role that exercizes its legal, rightful or natural title to control something.LinkLink1#REF!1111A role that exercises its legal, rightful, or natural authority to control something.
322Grownershipownershipa relationship between two, one of these (the owner) is entitled to enjoy, dispose of, and control the other sovereignly.LinkLink1#REF!1111In a relationship between two individuals, one (the owner) has the entitlement to enjoy, dispose of, and control the other entirely.
323Gnself-sovereigntyself-sovereigntythe characteristic of every party that it is autonomous in managing and operating its own knowledgeLinkLink1#REF!111Every party is autonomous in managing and operating its own knowledge.
324Krpresentation-exchangepresentation-exchangean exchange that provides disclosure of one or more ACDCs between a Discloser and a Disclosee.LinkLink31#REF!an exchange that discloses one or more ACDCs between a Discloser and a Disclosee.
325Gndiscloserdiscloseran ACDC in a disclosure is disclosed by the Discloser.LinkLink11#REF!The Discloser discloses an ACDC in a disclosure.
326Gndiscloseediscloseean ACDC in a disclosure is disclosed to the Disclosee.LinkLink11#REF!An ACDC in a disclosure is revealed to the Disclosee.
327Gnissuerissueran ACDC is issued by the Issuer. The Issuer identifier (AID) appears in the top level of the ACDC.LinkLink11#REF!An ACDC is issued by the Issuer and contains the Issuer identifier (AID) in the top level.
328Gnissueeissueean ACDC is optionally issued to the Issuee.LinkLink11#REF!An ACDC can be optionally issued to the recipient.
329Krissuance-exchangeissuance-exchangea special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDCLinkLink31#REF!This is a special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDC.
330Krchain-link-confidentialitychain-link confidentialitychains together a sequence of Disclosees. Each Disclosee in the sequence in turn is the Discloser to the next Disclosee.LinkLink31#REF!This text chains a sequence of Disclosees, where each Disclosee becomes the Discloser to the next.
331Kvgraduated-disclosuregraduated-disclosuredisclosure performed by a presentation exchange that has cross-variant Issuer commitment verifiability as an essential property.LinkLink31#REF!Disclosure is performed by a presentation exchange with cross-variant Issuer commitment verifiability as an essential property.
332Knytop-level-sectiontop-level sectionare the fields of an ACDC compact variant.LinkLink21#REF!These fields are part of an ACDC compact variant.
333Krcompact-variantcompact-variantan Issuer commitment via a signature to any variant of ACDCLinkLink31#REF!an Issuer signs a commitment to any variant of ACDC.
334Kvycontractually-protected-disclosurecontractually-protected disclosurethe most elaborate form of disclosure by an IPEX. Contractually protected disclosure includes both chain-link confidential and contingent disclosure.LinkLink31#REF!The most detailed form of disclosure by an IPEX includes contractually protected disclosure, which encompasses both chain-link confidential and contingent disclosure.
335Gnricardian-contractricardian-contracta method of recording a document as a contract at law, and linking it securely to other systemsLinkLink21#REF!A way to record a document as a secure contract and link it to other systems.
336Kvcontingent-disclosurecontingent-disclosureLinkLink31#REF!NO INPUT
337Gveclipse-attackeclipse-attackan eclipse attack is a P2P network-based attack, an attacker tries to isolate a node from the rest of the networkLinkLink2#REF!1An eclipse attack is a P2P network attack where the attacker attempts to isolate a node from the network.
338Knpromiscuous-modepromiscuous-modethe indiscriminate mode a watcher (network) runs in.LinkLink3#REF!The mode of a watcher in a network.
339Gnprotocolprotocola code of correct conduct, in our case specifically communication protocols, cryptographic protocols, and decentralized network protocolsLinkLink1111#REF!11Our code of conduct includes communication, cryptographic, and decentralized network protocols.
340Gnypseudo-random-numberpseudo-random numbera value that is statistically random, but it is (repeatedly) derived from a known starting pointLinkLink1A randomly derived value from a known starting point.
341Gvvalidatevalidatea decision to accept an outcomeLinkLink1deciding to accept an outcome
342Svverifyverifythe act, by or on behalf of a party, of determining whether that data is authentic, not expired, and conforms to other specifications.LinkLink2
343Snpersistent-identifierpersistent-identifierControl over this type of long-living identifier can be transferred by rotating keys.LinkLink2Keys can rotate to transfer control of long-living identifiers.
344Krinterleaved-serializationinterleaved-serializationSerializations of different types interleaved in an overarching formatLinkLink2Different types of serializations are interleaved in an overarching format.
345Srcollective-signaturecollective-signatureMultisignature scheme for a single resulting pubic keyLinkLink2Multisignature scheme for a single public key.
346Gngraph-fragmentgraph-fragmentan ACDC is a verifiable data structure and part of a graph consisting of a node fragment and edge fragmentsLinkLink2ACDC is a verifiable data structure that forms part of a graph, including a node fragment and edge fragments.
347Grpersistent-data-structurepersistent-data-structurean append only verifiable data structure. Hence, making them immutable means distributable and concurrency-friendly. What we sign may not change.LinkLink2An append-only, verifiable data structure makes them immutable, which enables distribution and concurrency. What we sign cannot be changed.
348Grcollisioncollisiona circumstance where two or more identifiers in a given namespace or a given scope cannot be unambiguously resolvedLinkLink1A situation where two or more identifiers in a namespace or scope cannot be resolved unambiguously.
349Gnschema-namespace-registryschema-namespace-registrya centrally managed schema registry where corporations or individuals reserve schemas within a specific namespace in order to have an interoperable schema that is labeled with a corporation-specific or individual-specific namespaceLinkLink2A centrally managed schema registry allows corporations or individuals to reserve interoperable schemas within a specific namespace. These labeled schemas are assigned a corporation-specific or individual-specific namespace.
350Gnschema-registryschema-registryregistry for credential schemas based on namespacesLinkLink2Registry for schemas based on namespaces.
351Gndomain-namedomain-nameis a string that identifies a realm of administrative autonomy on the internetLinkLink1A string that identifies an internet administrative realm.
352KndomaindomainLinkLink1General term for an autonomous space identifier.
353Gnregistryregistryan official digital record book, usually refering to one means to a specific instance, within a multi-tenant registry.LinkLink1An official digital record book typically refers to a specific instance within a multi-tenant registry.
354GrcomposabilitycomposabilityWhen any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.LinkLink2When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss.
356GainteroperableinteroperableInteroperability is a characteristic of a product or system to work with other products or systems.LinkLink1Interoperability is the ability of a product or system to work with others.
357GrinteroperabilityinteroperabilityInteroperability is a characteristic of a product or system to work with other products or systems.LinkLink1Interoperability is the ability of a product or system to work with others.
358Gncryptographic-primitivecryptographic-primitiveWell-established, low-level cryptographic algorithm that is frequently used to build cryptographic protocols for computer security systems; e.g. one-way hash functions and encryption functions.LinkLink1A well-known cryptographic algorithm commonly used in computer security systems for creating cryptographic protocols such as one-way hash functions and encryption functions.
359Gvconcatenationconcatenationthe operation of joining character strings end-to-end. E.g. 'snow' and 'ball' becomes 'snowball'LinkLink1The process of combining character strings to create a single string. For example, 'snow' and 'ball' combine to form 'snowball'.
360Gvmultiplexingmultiplexingis a method by which multiple analog or digital signals are combined into one signal over a shared medium. The aim is to share a scarce resource.LinkLink2Signal combining is a method to merge multiple analog or digital signals into a single shared signal. It aims to efficiently distribute limited resources.
361Gvpipeliningpipelininga set of data processing elements connected in series, where the output of one element is the input of the next one.LinkLink2A series of connected data processing elements, where the output of one element becomes the input for the next.
362Kngroup-framing-codegroup-framing-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
363Krhierarchical-compositionhierarchical-compositionencoding protocol that is composable in a hierarchy and enables pipelining of complex streams in either text or compact binaryLinkLink3Composable and hierarchical encoding protocol enables pipelining of complex streams in text or binary formats.
364Knframe-codeframe-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
365Kncount-codecount-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
366Kngroup-codegroup-codecodes that can be specified to support groups of primitives. Grouping enables pipelining.LinkLink3Codes can be specified to support primitive groups, enabling pipelining.
367Satransferabletransferablecapable of loss-less transfer of control over identifiers, private keys, etc.LinkLink1Capable of lossless transfer of control for identifiers, private keys, etc.
368Gvpost-padpost-padthe action and / or result of extending a string with trailing pad characters to align to a certain length in bits or bytes.LinkLink3Extending a string with pad characters to align it to a specific length in bits or bytes is the act or outcome.
369Gvpre-padpre-padthe action and / or result of prepending a string with leading pad characters to align to a certain length in bits or bytes.LinkLink3Prepending a string with leading pad characters is the act of aligning it to a specific length in bits or bytes.
370Kvnaive-conversionnaive-conversiona text to binary conversion or vice versa that doesn't anticipate on either composability and / or on the concatenation capability of the result of such an operation.LinkLink3A text to binary conversion that does not consider composability or concatenation capabilities of the output.
371Gnpadpadis a character used to fill empty spaceLinkLink2Is a character used to fill empty space.
372Gnlead-byteslead-bytespre-conversion added characters in a pre-padded way, used to fill empty spaceLinkLink2Pre-conversion characters were added to fill empty space in a pre-padded manner.
373Gncode-tablecode-tablea code table is the Internet's most comprehensive yet simple resource for browsing and searching for various codes.LinkLink1A code table is the Internet's most comprehensive and user-friendly resource for browsing and searching various codes.
374Kncode-table-selectorcode-table-selectorthe first character in the text code of CESR stream that determines which code table to use.LinkLink3The first character in the text code of CESR stream determines the code table to use.
375Knsallysallya vLEI Audit Reporting Agent that receives presentations of credentials and notices of revocation.LinkLink3A vLEI Audit Reporting Agent that receives credential presentations and revocation notices.
376Knsignifysignifyis a web client (key) event signing - and key pair creation app that minimizes the use of KERI on the client.LinkLink3This is a web client app for event signing and key pair creation. It reduces the need for using KERI on the client.
377Gnescrowescrowa third party temporarily holds money or property until a particular condition has been met. The verb refers to handling out of order events in KERI.LinkLink1A third party temporarily holds funds or assets until a specific condition is met. The verb refers to managing out-of-sequence events in KERI.
378Knkeri-suite-search-enginekeri-suite-search-enginethe Docusaurus self-education site of Web-of-Trust GitHub repo with Typesense search facilitiesLinkLink1The Docusaurus self-education site for the Web-of-Trust GitHub repo now includes Typesense search capabilities.
379Knfield-mapfield-mapa traditional key:value pair renamed to avoid confusing with the cryptographic use of the term 'key'LinkLink3A traditional key:value pair is renamed to avoid confusion with the cryptographic meaning of the term 'key'.
380KrCLCCLCchain-link confidential, a disclosure mechnism of credentialsLinkLink3Chain-link confidential is a mechanism for disclosing credentials.
381Kvcold-start-stream-parsingcold-start-stream-parsingAfter a reboot a stream processor looks for framing information to know how to parse groups of elements in the stream.LinkLink3After a reboot, a stream processor searches for framing information to determine how to parse element groups in the stream.
382Kafully-compactfully-compactthe intermediate variant of a ACDC credential -> signed and its proofs anchored in key event logs.LinkLink3The intermediate ACDC credential variant is signed and its proofs are anchored in key event logs.
383Kamost-compactmost-compactthe most brief least disclosing version of an ACDC based credential.LinkLink3The shortest and least revealing ACDC credential version.
384Kafully-expandedfully-expandedthe most extensive most disclosing and most user-friendly version of an ACDC based credential.LinkLink3the most comprehensive, revealing, and user-friendly ACDC-based credential.
385GvRUNRUNread, update, nullify -> the new peer-to-peer end-verifiable monotonic update policyLinkLink1Read, update, nullify - the new P2P EV monotonic update policy.
386GvCRUDCRUDcreate, read, update, delete -> the traditional client-server database update policyLinkLink1The traditional client-server database update policy includes CRUD (Create, Read, Update, Delete) operations.
387Gnauthentic-webauthentic-weba mental model in which the whole internet is considered as a one giant verifiable data structureLinkLink1The internet is viewed as one giant, verifiable data structure.
388Kvrun-off-the-crudrun-off-the-cruda decentralised controlling peer does not create records in the traditional sense of a serverLinkLink3A decentralized controlling peer does not create traditional server records.
389Gnintegrityintegritythe information is whole, complete, sound, in good order and unimpaired (not necessarily correct)LinkLink1The information is complete, accurate, organized, and intact (not necessarily correct).
390Gnverified-integrityverified-integritya proof of unambiguous assessment whether the information is/continues to be whole, sound and unimpairedLinkLink2A proof of clear assessment of whether the information remains intact, reliable, and undamaged.
391Gvcomplementary-integrity-verificationcomplementary-integrity-verificationa mechanism that can verify integrity independent of needing access to a previous instance or reference version of the information for comparisonLinkLink3a mechanism that can independently verify integrity without needing access to a previous instance or reference version for comparison.
392Knprior-next-thresholdprior-next-thresholdLinkLink3NO INPUT
393Kncurrent-signing-thresholdcurrent-signing-thresholdLinkLink2NO INPUT
394Kndual-indexed-codesdual-indexed-codesa context-specific coding scheme, for the common use case of thresholded multi-signature schemes in CESRLinkLink3A specific coding scheme for thresholded multi-signature schemes in CESR.
395KnkeripykeripyPython implementation of KERILinkLink2Python implementation of KERI
396Knkeri-oxkeri-oxRUST implementation of KERILinkLink2RUST KERI Implementation
397Snpiipiipersonally identifiable informationLinkLink1PII
398Srcontextual-linkabilitycontextual-linkabilitywhen data capture points provide enough context to be able to use statistical correlation to link existing data sets describing a person to that same person's disclosed attributesLinkLink3When data capture points give enough context to use statistical correlation in linking existing data sets describing a person to that person's disclosed attributes.
399Krblinded-revocation-registryblinded-revocation-registrya transaction event log hidden or blinded; the only way a verifier can observe the state is when the AID controller discloses it at presentation timeLinkLink3A hidden or blinded transaction event log; the verifier can only observe the state when the AID controller discloses it during presentation.
400Gvrainbow-table-attackrainbow-table-attacka password cracking method that uses a special table (a “rainbow table”) to crack the password hashes in a databaseLinkLink1The method uses a special table, known as a "rainbow table," to crack password hashes in a database.
401KrSKWASKWASimple KERI for Web AuthLinkLink3Simple KERI for Web Authentication.
402Knsimple-keri-for-web-authsimple-keri-for-web-authA KERI implementation that sacrifices performance or other non-security feature for usability.LinkLink3A KERI implementation sacrificing performance or other non-security features for usability.
403KrKRAMKRAMKERI Request Authentication Method for replay protectionLinkLink3Keri requests an authentication method for replay protection.
404Krkeri-request-authentication-methodkeri-request-authentication-methodKERI Request Authentication Method for replay protectionLinkLink3Keri requests an authentication method for replay protection.
405Knjurorjurorperforms duplicity detection on events and event receiptsLinkLink3performs duplicate detection on events and event receipts
406Knjuryjuryset of entities or components acting as jurorsLinkLink3A group of entities or components that act as jurors.
407Knopcodeopcodeprovide stream processing instructions that are more general and flexibleLinkLink3Provide more general and flexible stream processing instructions.
408Knversion-codeversion-codetells you which set of tables to load and it tells the table state.LinkLink3NO INPUT
409Knstrip-parameterstrip-parametertells us what part of the CESR stream will be parsed by which codeLinkLink3This text shows which code will parse each part of the CESR stream.
410Knparsideparsideparser library for Composable Event Streaming Representation (CESR)LinkLink3CESR parser library
411Knversion-stringversion-stringa workaround to make JSON, CBOR and MGPK self-framing in CESRLinkLink3A workaround to make JSON, CBOR, and MGPK self-framing in CESR.
412Kncesridecesridecryptographic primitives for use with Composable Event Streaming Representation (CESR)LinkLink3Cryptographic primitives for CESR.
413Knsniffersnifferthe sniffer is part of Parside and detects if the CESR stream contains CESR binary, CESR Text, JSON, CBOR, MGPKLinkLink3The sniffer, which is part of Parside, detects CESR binary, CESR Text, JSON, CBOR, and MGPK in the CESR stream.
414GnPRNGPRNGPseudorandom Number GeneratorLinkLink2Pseudorandom Number Generator
415GnCSPRNGCSPRNGCryptographically Secure Pseudorandom Number GeneratorLinkLink2Cryptographically Secure PRNG
416GnFFIFFIForeign Function InterfaceLinkLink2Foreign Function Interface (FFI)
417Gnforeign-function-interfaceforeign-function-interfaceIs a mechanism by which a program written in one programming language that can call routines or make use of services written or compiled in another oneLinkLink2It is a way for a program in one programming language to call routines or utilize services from another language.
418GnHDKHDKhierchical deterministic keyLinkLink1Hierarchical deterministic key.
419GnHSMHSMhardware security moduleLinkLink1Hardware security module
420Kvpartial-disclosurepartial-disclosurean ACDC attribute section that can disclosed (a nested branch in a tree), you can either decide to disclose or notLinkLink3ACDC attribute section can be disclosed, like a nested branch in a tree. You have the option to disclose or not.
421Kvselective-disclosureselective-disclosureselective disclosure is a list of field maps, that you can choose to blind and publish, however all are disclosured.LinkLink3Selective disclosure is a list of field maps that you can choose to blind and publish. However, all of them are disclosed.
422Kvfull-disclosurefull-disclosurea disclosure of data in all its detailsLinkLink1data disclosure
423Krthreshold-of-accountable-duplicitythreshold-of-accountable-duplicityController provides itself with any degree of protection by giving a minimum number of confirming witnesses sufficient given a certain accountability.LinkLink3The controller protects itself by having a few confirming witnesses to ensure accountability.
424KnTOADTOADthreshold of accountable duplicity; provided by controller concerning witnessesLinkLink3Accountable duplicity threshold provided by controller for witnesses.
425KnkeridekerideRust library for Key Event Receipt InfrastructureLinkLink3Rust lib for Key Event Receipt
426KnKERIAKERIAKERI agent in the cloudLinkLink3KERI cloud agent
427KrSignifideSignifidesigning at the edgeLinkLink3Signing on the edge.
428KnkiwikiwiUI tooling for working with KERILinkLink3UI tooling for KERI
429Gnhardware-security-modulehardware-security-modulea physical computing device that safeguards and manages secrets (most importantly digital keys)LinkLink1A device that safeguards and manages secrets, specifically digital keys.
430Gnhierchical-deterministic-keyshierchical-deterministic keysa type of deterministic bitcoin wallet derived from a known seed, that allow for the creation of child keys from the parent keyLinkLink1A deterministic bitcoin wallet can be created from a known seed, allowing for the generation of child keys from the parent key.
431KrSKRAPSKRAPSignify/KERIA Request Authentication ProtocolLinkLink3Signify/KERIA Authentication Protocol Request
432Krsignify-keria-request-authentication-protocolsignify-keria-request-authentication-protocolThe KERIA service will expose 3 separate HTTP endpoints on 3 separate network interfacesLinkLink3The KERIA service will have 3 HTTP endpoints on 3 network interfaces.
433Sndead-attackdead-attackan attack on an establishment event that occurs after the Key-state for that event has become staleLinkLinkNO INPUT
434KvprefixingprefixingprefixingLinkLink3Prefixing
435Kvpathingpathingenables sending portions of a credentialLinkLink3enables sending parts of a credential
436KvparsingparsingparsingLinkLink3Parsing
437Krbespoke-credentialbespoke-credentialIt's a custom issuance of the presentation of other ACDCs, it serves as an on-the-fly contract with the issuee; it's a self-referencing and self-contained contractLinkLink3It is a customized presentation of other ACDCs. It serves as a contract with the issuee on-the-fly. It is a self-referencing and self-contained contract.
438KnKERIMaskKERIMaskA wallet similar to MetaMask that will connect to KERIA servers in order for a person to control AIDs from their browser.LinkLink3A MetaMask-like wallet to connect to KERIA servers, enabling browser-based control of AIDs.
439KnKERISSEKERISSEKERI Suite Search EngineLinkLink1KERI Search Engine
440Knkeri-suitekeri-suiteis the set of inter-related developments (KERI, ACDC, OOBI, CESR, IPEX, etc) under the Web-of -Trust user on GithubLinkLink1This is a collection of interconnected developments (KERI, ACDC, OOBI, CESR, IPEX, etc.) used by the Web-of-Trust user on Github.
441KnndigsndigsDigests of keys, used to prove control over keys or to hide keysLinkLink3Key digests are used to prove control over keys or conceal them.
442Knverferverfera primitive that represents a public keyLinkLink3A public key primitive.
443Kndigerdigera primitive that represents a digestLinkLink3A primitive representing a digest.
444Kncigarcigaran unindexed signatureLinkLink3an unindexed signature.
445Knsigersigeran indexed signature used within KERI when there are multiple current keys to an identifierLinkLink3An indexed signature is used in KERI when there are multiple current keys for an identifier.
446Knsignersignera primitive that represents a private keyLinkLink3A primitive representing a private key.
447Knsaltersaltera primitive that represents a seed that has the ability to generate new SignersLinkLink3A seed that can generate new Signers.
448GnLLMLLMLarge Language ModelLinkLink2Language Model
449Gnlarge-language-modellarge-language-modelIs a language model consisting of a neural network with many parametersLinkLink2The language model is a neural network with numerous parameters.
450KnixnixnField name for Interaction Event; its content contains a hash pointerLinkLink3Interaction Event Field: Contains a hash pointer.
451KnrotrotField name for Rotation Event; its content contains a hash pointerLinkLink3Field name: Rotation Event Content: Contains a hash pointer
452GnJSONJSONJavaScript Object NotationLinkLink1JavaScript Object Notation
453Kvicpicpincept, inceptionLinkLink3inception
454Kvvcpvcpvdr incept, verifiable data registry inceptionLinkLink3VDR, Verifiable Data Registry, inception
455Kvbisbisbacked vc issue, registry-backed transaction event log credential issuanceLinkLink3VC issuance, registry-backed transaction log for credential issuance.
456Gnconcise-binary-object-representationconcise-binary-object-representationIt is a binary data serialization format loosely based on JSONLinkLink3It's a binary data serialization format loosely based on JSON.
457Kvbrvbrvbacked vc revoke, registry-backed transaction event log credential revocationLinkLink3Revoked VC, registry-backed transaction event log for credential revocation.
458Kvvrtvrtvdr rotate, verifiable data registry rotationLinkLink3VDR Rotate: Verifiable Data Registry Rotation.
459Krsecure-private-authentic-confidentialitysecure-private-authentic-confidentialityLinkLink3NO INPUT
460KrSPACSPACsecure private authentic confidentialityLinkLink3Secured, private, authentic, confidential.
461Srdead-dropdead-dropa presenter controls the disclosure so you can't re-identify the dataLinkLink3The presenter controls the disclosure, preventing data re-identification.
462Knampleampleminimum required number of participants in an event to have a supermajority in the consensus agreement algorithm (KAACE) in KERILinkLink3The minimum number of participants needed for a supermajority in the consensus agreement algorithm (KAACE) in KERI.
463GrsupermajoritysupermajoritySufficient majority immune to certain kinds of attacks or faultsLinkLink3Sufficient majority immune to certain attacks or faults.
464GnCBORCBORconcise binary object representationLinkLink2Concise binary object rep
465Kntholdertholdert-holder object that supports fractionally-weighted thresholdsLinkLink3T-holder object supporting fractional-weighted thresholds
466KnbexterbexterA class (programming code) in CESR that preserves its integrity in a round-trip conversion even though it offers variable length textLinkLink3A class in CESR that maintains its integrity in a round-trip conversion despite variable length text.
467Krmoobimoobito share a bunch of different end-points (oobis) all at onceLinkLink3to share multiple end-points (oobis) simultaneously
468Gnts-nodets-nodenpm package that lets you run typescript from a shellLinkLink3npm package for running TypeScript from a shell.
469Kninterceptorinterceptora keria class that allows to push events happening inside the cloud agent to other backend processesLinkLink3A Keria class enables pushing cloud agent events to other backend processes.
470Knsalty-nonce-blinding-factorsalty-nonce-blinding-factorSelectively share a secret and hide information with this secretLinkLink3NO INPUT
471Knilkilkshort for message typeLinkLink3Short for message type.
472Kvdipdipdelcept, delegated inceptionLinkLink3Delcept, Delegated Inception.
473Kvdrtdrtdeltate, delegated rotationLinkLink3Deltate: delegated rotation.
474KnrctrctreceiptLinkLink3Receipt.
475Knksnksnsate, key state noticeLinkLink3State key notice
476KvqryqryqueryLinkLink3Query.
477KvrpyrpyreplyLinkLink3Reply.
478KvexnexnexchangeLinkLink3Exchange.
479Kvexpexpexpose, sealed data expositionLinkLink3Data exposure.
480Kvississvc issue, verifiable credential issuanceLinkLink3VC issuance: verifiable credential issuance.
481Kvrevrevvc revoke, verifiable credential revocationLinkLink3VC revocation, or verifiable credential revocation.
482Knvdrvdrverifiable data registryLinkLink3Verifiable data registry.
483KrKATEKATEKate = KERI at the EdgeLinkLink3Kate at the Edge = KERI
484KvspurnspurnRejectLinkLink3Reject.
485Gvdnddnddo not delegateLinkLink3Don't delegate.
486GvrevocationrevocationThe act of recall or annulment. It is the cancelling of an act, the recalling of a grant or privilege.LinkLink2Recall or annulment is the act of canceling or recalling an act, grant, or privilege.
487Gnverifiable-data-registryverifiable-data-registrya Verifiable Data Structure that actually holds contentLinkLink3A verifiable data structure that holds content securely.
488GnVDRVDRVerifiable Data Registry, a Verifiable Data Structure that actually holds contentLinkLink3Verifiable Data Registry, a structure that holds content and is verifiable.
489GrE2EE2Eend-to-endLinkLink1End-to-end.
490Grend-to-endend-to-endInter-host communication and data flow transformations, considered in motion and at restLinkLink1Inter-host communication and data flow transformations, both in motion and at rest.
491Kvduplicity-detectionduplicity-detectionA mechanism to detect duplicity in cryptographically secured event logLinkLink2Detecting duplicity in cryptographically secured event log
492Grydouble-spend-proofdouble-spend proofTotal global ordering of transactions so that you can't spend value twiceLinkLink2Global ordering prevents double spending.
493GvMFAMFAmulti-factor authenticationLinkLink1Multi-factor authentication.
494Gvymulti-factor-authenticationmulti-factor authenticationAuthentication by combining multiple security factors, e.g. what you know, what you have and what you are.LinkLink1Authentication by combining multiple security factors, such as knowledge, possession, and identity.
495Grthreshold-structure-securitythreshold-structure-securityAllows for weaker key management or execution environment infrastructure individually, but achieves greater overall security by multiplying the number of attack surfacesLinkLink3Allows for weaker management or execution environment, but improves overall security by increasing attack surfaces.
496GnTEETEEtrusted-execution-environment; protected hardware/software/firmware security systemLinkLink2trusted execution environment: secure hardware/software/firmware system
497Gntrusted-execution-environmenttrusted-execution-environmentProtected hardware/software/firmware security systemLinkLink2Protected hardware and software security system
498Grsecurity-overlay-properties-trillemasecurity-overlay-properties-trillemaan identifier system has some degree of any combination of the three properties authenticity, privacy and confidentiality, but not all three completelyLinkLink3An identifier system possesses some combination of the three properties: authenticity, privacy, and confidentiality, but never all three to their fullest extent.
499Srautonomic-trust-basisautonomic-trust-basisto form this we use an AID as the root-of-trustLinkLink3To create this, we utilize an AID as the root of trust.
500Snautonomic-identifierautonomic-identifierself-managing self-certifying identifierLinkLink2self-managing, self-certifying identifier.
501Snylegitimized-human-meaningful-identifierlegitimized human-meaningful identifieridentifier authorised through its autonomic identifier coupletLinkLink2Authorized identifier through an autonomous identifier couplet.
502SnLIDLIDLegitimized (or authorised) human meaningful identifierLinkLink2Human meaningful ID
503Snsecuritysecurityin identifier systems it means secure from exploit or compromiseLinkLink1In identifier systems, it refers to being secure against exploits or compromises.
504Sasecuresecurein identifier systems it means secure from exploit or compromiseLinkLink1In identifier systems, it refers to being secure against exploits or compromises.
505Krunivalentunivalenthaving a unique and non-ambiguous identifier for each entity or resourceLinkLink2Each entity or resource should have a unique and unambiguous identifier.
506Krmulti-valentmulti-valentA situation in which a delegator may have multiple delegates thereby enabling elastic horizontal scalability.LinkLink2NO INPUT
507Srsecurity-cost-performance-architecture-trade-offsecurity-cost-performance-architecture-trade-offLinkLink3NO INPUT
508Krcooperative-delegationcooperative-delegationA type of delegation that needs both a delegator and a delegate to be establishedLinkLink3NO INPUT
509GnTPMTPMtrusted platform module; a device that enhances the security and privacy by providing hardware-based cryptographic functionsLinkLink3Trusted Platform Module (TPM) is a device that enhances security and privacy through hardware-based cryptographic functions.
510Gntrusted-platform-moduletrusted-platform-moduleA device that enhances the security and privacy by providing hardware-based cryptographic functionsLinkLink3A device that enhances security and privacy using hardware-based cryptographic functions.
511KrbivalentbivalentTwo independent key management infrastructures with no movement of private keys between the two.LinkLink2NO INPUT
512Snkeri‐event‐streamkeri‐event‐streamA stream of verifiable KERI data, consisting of the key event log and other data such as a transaction event logLinkLink3A verifiable stream of KERI data, including the key event log and other transaction event logs.
513Snstale-keystale-keyA stale key is an outdated or expired encryption key that should no longer be used for securing dataLinkLink2A stale key is an outdated or expired encryption key that shouldn't be used for securing data anymore.
514Snstale-eventstale-eventAn outdated or irrelevant (key) event involving an expired encryption key that may compromise securityLinkLink2An obsolete or irrelevant event related to an expired encryption key that could jeopardize security.
515GrprivacyprivacyPrivacy is the ability of an individual or group to seclude themselves or information about themselvesLinkLink1Privacy is the ability for individuals or groups to hide themselves or their personal information.
516Gnconfidentialityconfidentialitya set of rules or a promise that limits the access or places restrictions on certain types of informationLinkLink1Rules or promises that limit access or place restrictions on certain information.
517KnRIDRIDRoot autonomic identifierLinkLink3Root identifier
518Knroot-autonomic-identifierroot-autonomic-identifierAn entity may provide the root-of-trust for some ecosystem (with delegations) via its root autonomic identier (AID).LinkLink3An entity can offer the root-of-trust for an ecosystem through its root autonomic identifier (AID) and delegations.
519KaprovenancedprovenancedThe act of verifying authenticity or quality of documented history or origin of somethingLinkLink2Verifying the authenticity or origin of something.
520Krynon-interactive-authentication-designnon-interactive authentication designNon-interactive Authentication DesignLinkLink3Non-interactive Authentication Design, shortened and with grammar corrected
521Krinteractive-authentication-designinteractive-authentication-designsecure authentication through an interactive mechanism that requires a set of requests and responses or challenge responses with challenge response repliesLinkLink3Secure authentication is achieved through an interactive mechanism that involves requesting and responding with challenge responses.
522SrESSRESSREncrypt Sender, Sign the ReceiverLinkLink2Encrypt sender, sign receiver.
523SnVIDVIDVerifiable IdentifierLinkLink2Verifiable ID
524Srencrypt‐sender‐sign‐receiverencrypt‐sender‐sign‐receiverEncrypt Sender, Sign the ReceiverLinkLink2Encrypt sender, sign receiver.
525Snverifiable-identifierverifiable-identifierCryptographically verifiable authentic identifierLinkLink2Cryptographically verifiable identifier
526Sntrust-spanning-protocoltrust-spanning-protocolProtocol using VIDs that signs every single message on the internet.LinkLink2Protocol using VIDs that signs every internet message.
527SnTSPTSPTrust spanning protocol, using VIDs that signs every single message on the internet.LinkLink2TrustSpan protocol, utilizing VIDs to sign every internet message.
528Svprivacy-washingprivacy-washingDe-identification so that it provides a personal data safe harbour and could be legally acceptable forwardedLinkLink1De-identification provides a safe harbor for personal data and can be legally acceptable when forwarded.
529SnDKRDKRDid:keri resolverLinkLink2Did Keri resolve?
530SnreputationreputationConsistent behaviour over time on the basis of which anyone else makes near-future decisionsLinkLink1Consistent behavior over time on which others base near-future decisions.
531Srdiscoverydiscoverya discovery mechanism helps to locate and verify digital identities without relying on a central authorityLinkLink1A discovery mechanism allows locating and validating digital identities without relying on a central authority.
532Srbroken-object-level-authorizationbroken-object-level-authorizationor BOLA, refers to security flaws where users can access data they shouldn'tLinkLink3BOLA stands for security flaws allowing unauthorized data access.
533SnBOLABOLABroken Object Level AuthorizationLinkLink3Broken Object-Level Authorization
534Kvread-update-nullifyread-update-nullifyor "RUN"; Read, update, nullify are actions you can take on data, no create or deleteLinkLink3"RUN": Read, update, and nullify are actions for data manipulation, without the ability to create or delete.
535KvRUNRUNread-update-nullify, actions you can take on data, no create or delete.LinkLink3Read, update, and nullify data - these are the actions you can take. No creating or deleting is allowed.
536Krdirect-modedirect-mode(one-to-one) trust mode in KERI, in which the identity controller establishes control via verified signatures of the controlling key-pair.LinkLink3KREI employs a one-to-one trust mode where the identity controller gains control through verified signatures of the controlling key-pair.
537Krindirect-modeindirect-mode(one-to-many) trust mode in KERI, which extends the direct trust basis with witnessed key event receipt logs (KERL) for validating events.LinkLink3In KERI, there is a trust mode called one-to-many that adds witnessed key event receipt logs (KERL) to validate events.
538Krend-roleend-roleAn end role is an authorization for one AID to serve in a role for another AID.LinkLink3An end role authorizes one AID to serve in another AID's role.
539KnhabhabA Hab is a keystore for one identifier.LinkLink3A Hab is a store for one identifier.
540Sridentity-assuranceidentity-assuranceThe heavy-lifting to be done to establish reputational trust, KERI is for attributional trustLinkLink3Establishing reputational trust requires significant effort, while KERI is aimed at achieving attributional trust.
541Srattributional-trustattributional-trustYou can't have reputation without attributional trust, KERI offers cryptographic root-of-trustLinkLink2
542Srreputational-trustreputational-trustidentity-assurance by a trusted partyLinkLink2
543GnADRADRArchitectural Decision RecordsLinkLink2
544Gnyarchitectural-decision-recordarchitectural-decision recordjustified software design choice that addresses an architectural requirementLinkLink2
545GnMIME-typeMIME-typeAlso 'media type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.LinkLink1
546Gnmedia-typemedia-typeAlso 'MIME type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.LinkLink1
547Knlisted-identifierlisted-identifiera list in an ACDC of authorised did:webs identifier + methodLinkLink3
548Srdesignated-aliasesdesignated-aliasesAn AID controller can designate aliases which are AID controlled identifiers such as a did:keri, did:webs, etcLinkLink2
549KasniffablesniffableA stream is sniffable as soon as it starts with a CESR group code or field mapLinkLink3
550KnreconciliationreconciliationReconciliation is the process in which you decide to accept a fork of the KEL or not.LinkLink2
551Snpartypartyan entity who participates or is concerned in an action, proceeding, plan, etc.LinkLink1
553SnverificationverficationAn action an agent (of a principal) performs to determine the authenticity of a claim or other digital object using a cryptographic key.LinkLink2
554KnkeverkeverKever is a key event verifierLinkLink3
555Snkerifickerifickerific is a front plugin or extension for Chrome and Brave, that matches words in text on the web that offers buttons to various SSI glossaries and definitions.LinkLink1
556Kryaccess-controlled-interactionaccess-controlled interactionAccess controlled actions like submitting a reportLinkLink3
557Krregistration-interactionregistration-interactionSetup/Registration interaction, new AID and authorization to establish access controlLinkLink3
558Krweight-of-weightsweight-of-weightsa 2-layered weighting solution of the multisign in KERILink
559KnxipxipA message that allows a transaction set to become duplicity evidentLinkLink2
560KnKAPIKAPIKERI APILinkLink1
561Saself-authenticatingself-authenticatingself-certifyingLink
562Knconfiguration-traitsconfiguration-traitsA list of specially defined strings representing a configuration of a KELLinkLink3
563Kaabandoned-identifierabandoned-identifierAn AID is abandoned when there is no further possibility to register any next key event in a KELLink
564KnstreamerstreamerA convenience class for supporting stream parsing, including nested CESR streamsLink
565GncanonicalizationcanonicalizationA process for converting data that has more than one possible representation into a "standard" formLink
566Kncurrent-thresholdcurrent-thresholdLink
567Snend-verifiabilityend-verifiabilityLinkLink2
568Gnlive-attacklive-attackLink
569Knkeri’s-algorithm-for-witness-agreementkeri’s-algorithm-for-witness-agreementLink
570Knnext-thresholdnext-thresholdLink
571Knself-addressed-dataself-addressed-dataLink
569KnKAWAKAWALink
573SnattributeattributeLink
574Knychain-link-confidential-disclosurechain-link confidential disclosureLink
575Kncompact-disclosurecompact-disclosureLink
576Knframing-codeframing-codeLink
577GnstreamstreamLink
578Sninformation-theoretic-securityinformation-theoretic-securityLink
579noperatoroperatorLink
580Knpercolated-discoverypercolated-discoveryLink
581SnITPSITPSLink
582KnrulesrulesLink
580Knpercolated-information-discoverypercolated-information-discoveryLink
584GnsemversemverLink
585KnschemaschemaLink
586Kntargeted-acdctargeted-acdcLink
587Krunpermissioned-correlationunpermissioned-correlationLink
588Knuntargeted-acdcuntargeted-acdcLink
589KnweightweightLink
590KnquadletquadletLink
591KnstablestableLink
592GntritettritetLink
593Gnvariable-lengthvariable-lengthLink
594KnKERIA-agentKERIA-agentLink
595Knbase-media-typebase-media-typeLink
596Gnjavascript-object-notationjavascript-object-notationLink
597Snvirtual-credentialvirtual-credentialLink
598KnproemproemLink
599Gryzero-trust-computingzero-trust computingLink
600KnCESR-versionCESR-versionLink
601GnMIME‐typeMIME‐typeLink
602KnPIDPIDLink
603Snauthentic-dataauthentic-dataLink
604GnauthorityauthorityLink
605Knblind-oobiblind-oobiLink
606KnbranbranLink
607KacomposablecomposableLink
608GnedgeedgeLink
609Krencrypt-sender-sign-receiverencrypt-sender-sign-receiverLink
610GnentityentityLink
611Knkeri-event-streamkeri-event-streamLink
612Knmanagement-TELmanagement-TELmanagement transaction event logLink
613GnmessagepackmessagepackLink
614Grperfect-securityperfect-securityLink
615Gnpost-quantumpost-quantumLink
616KnvLEIvLEIverifiable legal entity identifierLink
->>>>>>> upstream/main:docs/02_overview/overview-and-context.mdx diff --git a/static/json/overview.json b/static/json/overview.json index 954c7b8bef..23ae8a2ee7 100644 --- a/static/json/overview.json +++ b/static/json/overview.json @@ -1,5 +1 @@ -<<<<<<< HEAD -{"range":"'Terms-WOT-manage'!A1:AB1119","majorDimension":"ROWS","values":[["Key","Type","Form","ToIP_Fkey","Philvid_Fkey","Term","text","link","Philvid_start","level","Cat_PTEL","Cat_IPEX","Cat_OOBI","Cat_CESR","Cat_ACDC","Cat_KERI","Cat_SAID","Cat_GLEIF","Shortened version","@dropdown","Shortened version static copy"],["1","K","n","ACDC","","ACDC","type of data as issuance concretely defined by the authentic-chained-data-container specification","https://github.com/weboftrust/WOT-terms/wiki/ACDC","","3","","","","#REF!","1","","","","Data type defined by the authentic chained data container specification.","","Data type defined by Authentic Chained Data Container Spec."],["2","K","n","ADC","","ADC","an authentic data container conveys data that allows the authenticity of its content to be proved.","https://github.com/weboftrust/WOT-terms/wiki/ADC","","3","","","","#REF!","1","","","","","","An authentic data container proves the authenticity of its content."],["3","S","n","AID","","AID","an identifier that is self-certifying and self-sovereign.","https://github.com/weboftrust/WOT-terms/wiki/AID","","3","","","","#REF!","1","","1","","","","A self-certifying and self-sovereign identifier."],["4","S","n","AN","","AN","a namespace that is truly self-sovereign.","https://github.com/weboftrust/WOT-terms/wiki/AN","","3","","","","#REF!","","1","","","","","A self-sovereign namespace."],["5","K","r","APC","","APC","authentic provenance chain; evidence of data to be verfiably tracked back to its origin","https://github.com/weboftrust/WOT-terms/wiki/APC","","3","","","","#REF!","","","","","","","Verified provenance chain; evidence of data can be tracked back to its origin."],["6","K","r","BADA","","BADA","best available data acceptance, mechanism that provides a degree of replay attack protection","https://github.com/weboftrust/WOT-terms/wiki/BADA","","3","","","1","#REF!","","","","","","","best data acceptance mechanism with replay attack protection."],["7","G","n","BFT","","BFT","Byzantine Fault Tollerance","https://github.com/weboftrust/WOT-terms/wiki/BFT","","3","","","","#REF!","","","","","","","Byzantine Fault Tolerance"],["8","K","n","CESR","","CESR","composable event streaming representation","https://github.com/weboftrust/WOT-terms/wiki/CESR","","3","","","","#REF!","","1","","","","","Event streaming representation"],["9","G","n","CT","","CT","certificate transparency; internet security standard for digital certificates","https://github.com/weboftrust/WOT-terms/wiki/CT","","2","","","","#REF!","","","","","","","Certificate Transparency is an internet security standard for digital certificates."],["10","G","n","DAG","","DAG","directed acyclic graph, mathematical construct, no cycles in it","https://github.com/weboftrust/WOT-terms/wiki/DAG","","2","","","","#REF!","","","","","","","Directed acyclic graph is a mathematical construct without any cycles."],["11","K","n","DEL","","DEL","duplicitous event log","https://github.com/weboftrust/WOT-terms/wiki/DEL","","3","","","","#REF!","","1","","","","","Event log"],["12","G","n","DHT","","DHT","distributed hash table","https://github.com/weboftrust/WOT-terms/wiki/DHT","","2","","","","#REF!","","1","","","","","distributed hash table"],["13","S","n","DKMI","","DKMI","decentralized key management infrastructure; ensure no single third-party can compromise the integrity and security of a system","https://github.com/weboftrust/WOT-terms/wiki/DKMI","","2","","","","#REF!","","1","","","","","decentralized key management system; prevents any single third-party from compromising system integrity and security."],["14","S","n","DPKI","","DPKI","decentralized public key infrastructure; ensure no single third-party can compromise the integrity and security of a system","https://github.com/weboftrust/WOT-terms/wiki/DPKI","","2","","","","#REF!","","","","","","","Decentralized PKI; guarantee no third-party compromise system integrity and security."],["15","G","n","GPG","","GPG","Gnu Privacy Guard, a free-software replacement for Symantec's PGP cryptographic software suite","https://github.com/weboftrust/WOT-terms/wiki/GPG","","2","","","","#REF!","","","","","","","Gnu Privacy Guard is a free-software alternative to Symantec's PGP suite."],["16","G","n","I-O","","I-O","Input / Output","https://github.com/weboftrust/WOT-terms/wiki/I-O","","1","","","","#REF!","","","","","","","Input/Output"],["17","G","n","IANA","","IANA","Internet assigned numbers authority; oversees the allocation of IP addresses to internet service providers (ISPs)","https://github.com/weboftrust/WOT-terms/wiki/IANA","","2","","","","#REF!","","","","","","","The Internet Assigned Numbers Authority (IANA) oversees IP address allocation to ISPs."],["18","K","r","IPEX","","IPEX","issuance and presentation exchange protocol; mechanism for the issuance and presentation of ACDCs","https://github.com/weboftrust/WOT-terms/wiki/IPEX","","3","","1","","#REF!","","1","","","","","ACDC issuance and presentation protocol; mechanism for issuing and presenting ACDCs."],["19","G","r","JOSE","","JOSE","Javascript object signing and encryption; method to securely transfer claims between parties","https://github.com/weboftrust/WOT-terms/wiki/JOSE","","3","","","","#REF!","","1","","","","","JavaScript object signing and encryption is a secure method for transferring claims between parties."],["20","K","n","KA2CE","","KA2CE","KERI agreement algorithm for control establishment","https://github.com/weboftrust/WOT-terms/wiki/KA2CE","","3","","","","#REF!","","1","","","","","KERI control establishment algorithm"],["21","K","n","KAACE","","KAACE","KERI agreement algorithm for control establishment","https://github.com/weboftrust/WOT-terms/wiki/KAACE","","3","","","","#REF!","","1","","","","","KERI control establishment algorithm"],["22","K","n","KEL","","KEL","Key Event Log","https://github.com/weboftrust/WOT-terms/wiki/KEL","","3","","","","#REF!","","1","","","","","Event Log"],["23","K","n","KERI","","KERI","Key Event Receipt Infrastructure","https://github.com/weboftrust/WOT-terms/wiki/KERI","","3","","","","#REF!","","1","","","","","Receipt Infrastructure"],["24","K","n","KERL","","KERL","Key Event Receipt Log","https://github.com/weboftrust/WOT-terms/wiki/KERL","","3","","","","#REF!","","1","","","","","Event Receipt Log"],["25","K","n","KID","","KID","KERI improvement doc","https://github.com/weboftrust/WOT-terms/wiki/KID","","3","","","","#REF!","","1","","","","","Keri Improvement Document"],["26","G","n","LoA","","LoA","any time a judgement is not a binary Yes or No, you have levels of assurance","https://github.com/weboftrust/WOT-terms/wiki/LoA","","2","","","","#REF!","","","","","","","Whenever a judgement is not simply a \"Yes\" or \"No,\" there are varying levels of assurance."],["27","G","n","LoC","","LoC","Locus of Control","https://github.com/weboftrust/WOT-terms/wiki/LoC","","2","","","","#REF!","","","","","","","Locus of Control refers to the extent to which individuals believe they have control over events in their lives."],["28","G","n","NFT","","NFT","Non-fungible token","https://github.com/weboftrust/WOT-terms/wiki/NFT","","1","","","","#REF!","","","","","","","Non-fungible token"],["29","K","v","OOBI","","OOBI","Out of band introduction","https://github.com/weboftrust/WOT-terms/wiki/OOBI","","3","","","1","#REF!","","","","","","","Introduction"],["30","G","r","P2P","","P2P","Peer to peer","https://github.com/weboftrust/WOT-terms/wiki/P2P","","1","","","","#REF!","","","","","","","Peer-to-peer"],["31","G","r","PGP","","PGP","Pretty Good Privacy","https://github.com/weboftrust/WOT-terms/wiki/PGP","","1","","","","#REF!","","","","","","","Pretty Good Privacy (PGP)"],["32","G","n","PKI","","PKI","Public Key Infrastructure","https://github.com/weboftrust/WOT-terms/wiki/PKI","","2","","","","#REF!","1","1","1","","","","Public Key Infrastructure (PKI)"],["33","K","n","PTEL","","PTEL","is a public transaction event log that can be used to securely track state anchored to a KEL","https://github.com/weboftrust/WOT-terms/wiki/PTEL","","3","1","","","#REF!","","","","","","","is a secure public event log for tracking state anchored to a KEL."],["34","K","n","SAD","","SAD","Self-Adressing Data","https://github.com/weboftrust/WOT-terms/wiki/SAD","","3","","","","#REF!","1","","","","","","Self-Addressing Data."],["35","K","n","SAID","","SAID","Self-Adressing Identifier","https://github.com/weboftrust/WOT-terms/wiki/SAID","","3","","","","#REF!","1","","1","","","","Self-Addressing Identifier"],["36","G","n","SATP","","SATP","secure asset transfer protocol; IETF protocol (and working group) in the making (as of mid 2022) for moving assets between blockchains","https://github.com/weboftrust/WOT-terms/wiki/SATP","","3","","","","#REF!","","","","","","","Secure asset transfer protocol: IETF protocol (and working group) currently being developed (mid-2022) to transfer assets between blockchains."],["37","S","v","SCID","","SCID","Self-Certifying Identifier, cryptographically binds an identifier to a public and private key pair.","https://github.com/weboftrust/WOT-terms/wiki/SCID","","3","","","","#REF!","","1","","","","","A Self-Certifying Identifier cryptographically binds an identifier to a key pair."],["38","S","r","SSI","","SSI","Self-Sovereign Identity","https://github.com/weboftrust/WOT-terms/wiki/SSI","","1","","","","#REF!","1","1","","1","","","Self-Sovereign Identity (SSI)"],["39","G","n","TCP","","TCP","transmission control protocol, one of the main protocols of the Internet protocol suite.","https://github.com/weboftrust/WOT-terms/wiki/TCP","","2","","","1","#REF!","1","1","","","","","Transmission Control Protocol (TCP) is a key protocol in the Internet protocol suite."],["40","K","n","TEL","","TEL","provides a cryptographic proof of registry state by reference to the corresponding controlling KEL.","https://github.com/weboftrust/WOT-terms/wiki/TEL","","3","1","","","#REF!","1","1","","","","","provides cryptographic proof of registry state via the corresponding controlling KEL."],["41","G","r","UI","","UI","the space where interactions between humans and machines occur.","https://github.com/weboftrust/WOT-terms/wiki/UI","","1","1","1","1","#REF!","1","1","1","1","","","The area where humans and machines interact."],["42","G","n","URL","","URL","uniform resource locator or 'web address', is a reference to a web resource that specifies its location on a computer network","https://github.com/weboftrust/WOT-terms/wiki/URL","","1","1","1","1","#REF!","1","1","1","1","","","A URL, known as a web address, is a reference to a web resource that specifies its location on a computer network."],["43","K","n","VC-TEL","","VC-TEL","virtual credential transaction event log","https://github.com/weboftrust/WOT-terms/wiki/VC-TEL","","3","1","","","#REF!","","","","","","","Virtual credential transaction log"],["44","G","n","VC","","VC","virtual credential","https://github.com/weboftrust/WOT-terms/wiki/VC","","1","","","","#REF!","1","","","1","","","Virtual credential"],["45","G","n","VDS","","VDS","verifiable data structure","https://github.com/weboftrust/WOT-terms/wiki/VDS","","3","","","","#REF!","","","","","","","Verifiable data structure."],["46","G","v","agency","","agency","a service that a representative for an identity (agent) offers","https://github.com/weboftrust/WOT-terms/wiki/agency","","2","","","","#REF!","1","","1","1","","","A service offered by an identity representative (agent)."],["47","K","v","ambient-verifiability","","ambient-verifiability","Verifiable by anyone, anywhere, at anytime.","https://github.com/weboftrust/WOT-terms/wiki/ambient-verifiability","","3","","","","#REF!","","","","","","","Verifiable by anyone, anywhere, at any time."],["48","G","n","append-only-event-logs","","append-only-event-logs","is a property of computer data storage such that new data can be appended to the storage, but where existing data is immutable","https://github.com/weboftrust/WOT-terms/wiki/append-only-event-logs","","2","","","","#REF!","","","","","","","Mutable data storage allows new data to be added, but existing data cannot be changed."],["49","K","n","authentic-chained-data-container","","authentic-chained-data-container","data structure that proves digital data consistency and authenticity in one go","https://github.com/weboftrust/WOT-terms/wiki/authentic-chained-data-container","","3","","","","#REF!","","","","","","","A data structure that ensures both the consistency and authenticity of digital data."],["50","K","n","authentic-data-container","","authentic-data-container","data structure that proves digital data consistency and authenticity in one go","https://github.com/weboftrust/WOT-terms/wiki/authentic-data-container","","3","","","","#REF!","","","","","","","A data structure that ensures both the consistency and authenticity of digital data."],["51","K","v","authentic-provenance-chain","","authentic-provenance-chain","evidence of data to be tracked back to its origin in an verifiable way","https://github.com/weboftrust/WOT-terms/wiki/authentic-provenance-chain","","3","","","","#REF!","","","","","","","Evidence of data can be tracked back to its origin in a verifiable manner."],["52","G","a","authenticity","","authenticity","the quality of having an objectively verifiable origin","https://github.com/weboftrust/WOT-terms/wiki/authenticity","","2","","","","#REF!","","","","","","","The quality of having an objectively verifiable origin."],["53","G","n","autonomic-computing-systems","","autonomic-computing-systems","self-managing computing systems using algorithmic governance","https://github.com/weboftrust/WOT-terms/wiki/autonomic-computing-systems","","2","","","","#REF!","","","","","","","Self-managing computing systems with algorithmic governance."],["54","S","n","autonomic-identity-system","","autonomic-identity-system","identity systems where you can verify (establishment of) the authenticity all the way back to the root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/autonomic-identity-system","","2","","","","#REF!","","","","","","","Identity systems can verify authenticity all the way back to the root of trust."],["55","S","n","autonomic-namespace","","autonomic-namespace","namespace that is self-certifying and hence self-administrating, is truly self-sovereign","https://github.com/weboftrust/WOT-terms/wiki/autonomic-namespace","","2","","","","#REF!","","","","","","","A self-certifying and self-administrating namespace is truly self-sovereign."],["56","K","n","best-available-data-acceptance-mechanism","","best-available-data-acceptance-mechanism","BADA, mechanism that provides a degree of replay attack protection","https://github.com/weboftrust/WOT-terms/wiki/best-available-data-acceptance-mechanism","","3","","","","#REF!","","","","","","","BADA is a mechanism that offers replay attack protection."],["57","S","v","binding","","binding","the association of data or an identifier with another identifier or a subject (a person, organization or machine)","https://github.com/weboftrust/WOT-terms/wiki/binding","","1","","","","#REF!","","","","","","","Associating data or an identifier with another identifier or subject (person, organization, or machine)."],["58","G","r","byzantine-agreement","","byzantine-agreement","is Byzantine fault tolerance of distributed computing system coming to consensus despite arbitrary behavior from a fraction of the network","https://github.com/weboftrust/WOT-terms/wiki/byzantine-agreement","","2","","","","#REF!","","","","","","","Byzantine fault tolerance allows distributed computing systems to reach consensus despite arbitrary behavior from some network participants."],["59","G","n","byzantine-fault-tolerance","","byzantine-fault-tolerance","is a condition of a (distributed) computer system, where components may fail and there is imperfect information on whether a component has failed","https://github.com/weboftrust/WOT-terms/wiki/byzantine-fault-tolerance","","2","","","","#REF!","","","","","","","Distributed computer systems can experience failures and uncertainty regarding component statuses."],["60","G","n","certificate-transparency","","certificate-transparency","internet security standard and framework for digital certificates","https://github.com/weboftrust/WOT-terms/wiki/certificate-transparency","","2","","","","#REF!","","","","","","","Internet security standard and framework for digital certificates."],["61","K","n","cesr-proof-signatures","","cesr-proof-signatures","An extension to CESR that provides signature attachments","https://github.com/weboftrust/WOT-terms/wiki/cesr-proof-signatures","","3","","","","#REF!","","","","","","","NO INPUT"],["62","G","v","chain-of-custody","","chain-of-custody","legal chronological documentation or paper trail that records the sequence of custody of materials","https://github.com/weboftrust/WOT-terms/wiki/chain-of-custody","","2","","","","#REF!","","","","","","","A legal record that documents the sequence of material custody."],["63","G","v","claim","","claim","assertion of the truth of something, typically one which is disputed or in doubt","https://github.com/weboftrust/WOT-terms/wiki/claim","","1","","","","#REF!","","","","","","","assertion of disputed or doubtful truth."],["64","K","n","composable-event-streaming-representation","","composable-event-streaming-representation","Also 'CESR'. An encoding scheme of interchangeable textual and binary streaming applications of attached crypto material.","https://github.com/weboftrust/WOT-terms/wiki/composable-event-streaming-representation","","3","","","","#REF!","","","","","CESR is an encoding scheme for interchangeable textual and binary streaming applications with attached crypto material.","","NO INPUT"],["65","G","v","consensus-mechanism","","consensus-mechanism","How groups of entitities come to decisions.","https://github.com/weboftrust/WOT-terms/wiki/consensus-mechanism","","2","","","","#REF!","","","","","","","NO INPUT"],["66","G","n","content-addressable-hash","","content-addressable-hash","Finding content by a hash of this content, generated by a one-way hash function applied to the content.","https://github.com/weboftrust/WOT-terms/wiki/content-addressable-hash","","2","","","","#REF!","","","","","","","NO INPUT"],["67","S","r","control-authority","","control-authority","Is 'who controls what?' and that is the primary factor in determining the basis for trust in them","https://github.com/weboftrust/WOT-terms/wiki/control-authority","","2","","","","#REF!","","","","","","","NO INPUT"],["68","G","n","controller","","controller","the entity that has the ability to make changes to an identity, cryptocurrency or verifiable credential.","https://github.com/weboftrust/WOT-terms/wiki/controller","","2","","","","#REF!","","","","","","","The entity capable of modifying an identity, cryptocurrency, or verifiable credential."],["69","G","v","correlation","","correlation","an identifier used to indicate that external parties have observed how wallet contents are related.","https://github.com/weboftrust/WOT-terms/wiki/correlation","","1","","","","#REF!","","","","","","","An identifier indicating external parties have observed the relationship between wallet contents."],["70","G","n","credential","","credential","evidence of authority, status, rights, entitlement to privileges, or the like.","https://github.com/weboftrust/WOT-terms/wiki/credential","","1","","","","#REF!","","","","","","","Evidence of authority, status, rights, entitlements, or similar privileges."],["71","G","n","crypto-libraries","","crypto-libraries","deal with cryptography algorithms and have API function calls to each of the supported features","https://github.com/weboftrust/WOT-terms/wiki/crypto-libraries","","1","","","","#REF!","","","","","","","This deals with cryptography algorithms and has API functions for each supported feature."],["72","G","n","cryptocurrency","","cryptocurrency","a digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a digital ledger.","https://github.com/weboftrust/WOT-terms/wiki/cryptocurrency","","1","","","","#REF!","","","","","","","A digital asset that serves as a medium of exchange, with individual coin ownership records stored in a digital ledger."],["73","G","n","cryptographic-commitment-scheme","","cryptographic-commitment-scheme","is a cryptographic primitive that allows one to commit to a value while keeping it hidden to others; you can reveal the committed value later.","https://github.com/weboftrust/WOT-terms/wiki/cryptographic-commitment-scheme","","2","","","","#REF!","","","","","","","NO INPUT"],["74","G","n","cryptographic-strength","","cryptographic-strength","used to describe greater resistance to attack of an encryption algorithm in comparison to some other (which is thus cryptographically weaker)","https://github.com/weboftrust/WOT-terms/wiki/cryptographic-strength","","1","","","","#REF!","","","","","","","NO INPUT"],["75","G","n","cryptonym","","cryptonym","a code word or name used to refer to another name, word, project, or person","https://github.com/weboftrust/WOT-terms/wiki/cryptonym","","2","","","","#REF!","","","","","","","NO INPUT"],["76","S","n","decentralized-identity","","decentralized-identity","is a technology that uses cryptography to allow individuals to create and control their own digital identifiers","https://github.com/weboftrust/WOT-terms/wiki/decentralized-identity","","1","","","","#REF!","","","","","","","NO INPUT"],["77","G","n","decentralized-key-management-infrastructure","","decentralized-key-management-infrastructure","an infrastructure ensure that no single third-party can compromise the integrity and security of the system as as whole.","https://github.com/weboftrust/WOT-terms/wiki/decentralized-key-management-infrastructure","","2","","","","#REF!","","","","","","","NO INPUT"],["78","S","n","delegated-identifier","","delegated-identifier","Matches the act of delagation with the appropriate digital twin.","https://github.com/weboftrust/WOT-terms/wiki/delegated-identifier","","3","","","","#REF!","","","","","","","NO INPUT"],["79","G","n","digital-signature","","digital-signature","a mathematical scheme for verifying the authenticity of digital messages or documents","https://github.com/weboftrust/WOT-terms/wiki/digital-signature","","1","","","","#REF!","","","","","","","Mathematical scheme to verify authenticity of digital messages or documents."],["80","G","n","directed-acyclic-graph","","directed-acyclic-graph","DAG, a mathematical construct, particularly graph theory, the acyclic property stems from a directed graph with no cycles","https://github.com/weboftrust/WOT-terms/wiki/directed-acyclic-graph","","2","","","","#REF!","","1","","","","","A DAG, a mathematical construct in graph theory, is a directed graph with no cycles, giving it the acyclic property."],["81","G","n","distributed-hash-table","","distributed-hash-table","any participant can retrieve the value associated with a given key","https://github.com/weboftrust/WOT-terms/wiki/distributed-hash-table","","2","","","","#REF!","","","","","","","Any participant can get the value for a specific key."],["82","K","n","dual-text-binary-encoding-format","","dual-text-binary-encoding-format","An encoding format that allows for both text and binary encoding format, which is fully interchangeable","https://github.com/weboftrust/WOT-terms/wiki/dual-text-binary-encoding-format","","3","","","","#REF!","","1","","","","","NO INPUT"],["83","K","n","duplicitous-event-log","","duplicitous-event-log","record of inconsistent event messages produced by a given controller or witness","https://github.com/weboftrust/WOT-terms/wiki/duplicitous-event-log","","3","","","","#REF!","","1","","","","","log of inconsistent event messages from a controller or witness"],["84","G","n","duplicity","","duplicity","external inconsistency; which stems from publication of two or more versions of a (by itself consistent) key event log","https://github.com/weboftrust/WOT-terms/wiki/duplicity","","3","","","","#REF!","","1","","","","","External inconsistency occurs when multiple versions of a key event log are published, even though the log itself is consistent."],["85","G","v","electronic-signature","","electronic-signature","","https://github.com/weboftrust/WOT-terms/wiki/electronic-signature","","1","","","","#REF!","","","","","","","NO INPUT"],["86","G","a","end-verifiable","","end-verifiable","","https://github.com/weboftrust/WOT-terms/wiki/end-verifiable","","3","","","","#REF!","","1","","","","","NO INPUT"],["87","G","v","entropy","","entropy","","https://github.com/weboftrust/WOT-terms/wiki/entropy","","2","","","","#REF!","","1","","","","","NO INPUT"],["88","G","a","ephemeral","","ephemeral","","https://github.com/weboftrust/WOT-terms/wiki/ephemeral","","2","","","","#REF!","","1","","","","","NO INPUT"],["89","K","a","first-seen","","first-seen","","https://github.com/weboftrust/WOT-terms/wiki/first-seen","","3","","","","#REF!","","1","","","","","NO INPUT"],["90","G","n","gnu-privacy-guard","","gnu-privacy-guard","GPG is a free-software replacement for Symantec's PGP cryptographic software suite","https://github.com/weboftrust/WOT-terms/wiki/gnu-privacy-guard","","2","","","","#REF!","","","","","","","GPG replaces Symantec's PGP software suite for free."],["91","K","n","habery","","habery","","https://github.com/weboftrust/WOT-terms/wiki/habery","","3","","","","#REF!","","","","","","","NO INPUT"],["92","G","r","hierarchical-asynchronous-coroutines-and-input-output","","hierarchical-asynchronous-coroutines-and-input-output","","https://github.com/weboftrust/WOT-terms/wiki/hierarchical-asynchronous-coroutines-and-input-output","","3","","","","#REF!","","","","","","","NO INPUT"],["93","G","n","identifier","","identifier","Something to uniquely identify (public) identities; pointing to something or someone else.","https://github.com/weboftrust/WOT-terms/wiki/identifier","","1","","","","#REF!","","","","","","","Something to uniquely identify public identities, pointing to someone or something else."],["94","G","n","identity","","identity","a unique entity. Typically represented by a unique identifier.","https://github.com/weboftrust/WOT-terms/wiki/identity","","2","","","","#REF!","","","","","","","A distinct entity typically represented by a unique identifier."],["95","K","n","inception-event","","inception-event","the first event in KERI that establishes an identifier.","https://github.com/weboftrust/WOT-terms/wiki/inception-event","","3","1","","","#REF!","","1","","","","","The initial event in KERI that establishes an identifier."],["96","G","v","inception","","inception","operation creating an AID by binding it to the initial set of authoritative keypairs and any other associated information.","https://github.com/weboftrust/WOT-terms/wiki/inception","","2","","","","#REF!","","","","","","","Create an AID by binding it to the initial set of authoritative keypairs and any relevant information."],["97","G","r","inconsistency","","inconsistency","different parts of a reason, idea or opinion do not agree, or it does not agree with something else.","https://github.com/weboftrust/WOT-terms/wiki/inconsistency","","1","","","","#REF!","","1","","","","","When different parts of a reason, idea, or opinion do not agree, or it is in disagreement with something else."],["98","K","n","indexed-signature","","indexed-signature","an index telling which public key is used when signing anything with a multi-key autonomic identifier.","https://github.com/weboftrust/WOT-terms/wiki/indexed-signature","","3","","","","#REF!","","","","","","","An index indicating the public key used for signing with a multi-key autonomic identifier."],["99","G","r","internal-inconsistency","","internal-inconsistency","A status that exists within an entity where different parts of a reason, idea or opinion disagree.","https://github.com/weboftrust/WOT-terms/wiki/internal-inconsistency","","2","","","","#REF!","","1","","","","","A disagreement within an entity where different parts have conflicting reasons, ideas, or opinions."],["100","G","n","internet-assigned-numbers-authority","","internet-assigned-numbers-authority","Also IANA; the organization that oversees the allocation of IP addresses to internet service providers (ISPs)","https://github.com/weboftrust/WOT-terms/wiki/internet-assigned-numbers-authority","","3","","","","#REF!","","","","","","","IANA oversees IP address allocation to ISPs."],["101","K","r","issuance-and-presentation-exchange-protocol","","issuance-and-presentation-exchange-protocol","provides a uniform mechanism for the issuance and presentation of ACDCs in a securely attributable manner","https://github.com/weboftrust/WOT-terms/wiki/issuance-and-presentation-exchange-protocol","","3","","","","#REF!","1","","","","","","provides a secure and standardized way to issue and present ACDCs."],["102","G","r","javascript-object-signing-and-encryption","","javascript-object-signing-and-encryption","Javascript object signing and encryption; method to securely transfer claims between parties","https://github.com/weboftrust/WOT-terms/wiki/javascript-object-signing-and-encryption","","1","","","","#REF!","","","","","","","JavaScript object signing and encryption is a secure method for transferring claims between parties."],["103","K","n","judge","","judge","","https://github.com/weboftrust/WOT-terms/wiki/judge","","3","","","","#REF!","","","","","","","NO INPUT"],["104","K","r","keri-agreement-algorithm-for-control-establishment","","keri-agreement-algorithm-for-control-establishment","","https://github.com/weboftrust/WOT-terms/wiki/keri-agreement-algorithm-for-control-establishment","","3","","","","#REF!","","1","","","","","NO INPUT"],["105","K","n","keri-command-line-interface","","keri-command-line-interface","","https://github.com/weboftrust/WOT-terms/wiki/keri-command-line-interface","","3","","","","#REF!","1","1","","","","","NO INPUT"],["106","K","n","keri-improvement-doc","","keri-improvement-doc","","https://github.com/weboftrust/WOT-terms/wiki/keri-improvement-doc","","3","","","","#REF!","","1","","","","","NO INPUT"],["107","K","n","keridemlia","","keridemlia","distributed database of Witness IP-addresses","https://github.com/weboftrust/WOT-terms/wiki/keridemlia","","3","","","","#REF!","","","","","","","Database of Witness IP addresses."],["108","G","v","key-compromise","","key-compromise","","https://github.com/weboftrust/WOT-terms/wiki/key-compromise","","2","","","","#REF!","","1","","","","","NO INPUT"],["109","K","n","key-event-message","","key-event-message","","https://github.com/weboftrust/WOT-terms/wiki/key-event-message","","3","","","","#REF!","","1","","","","","NO INPUT"],["110","K","n","key-event-receipt-infrastructure","","key-event-receipt-infrastructure","approach to decentralized identifiers and decentralized key management that promises significant benefits for self-sovereign identity and Trust over IP infrastructure","https://github.com/weboftrust/WOT-terms/wiki/key-event-receipt-infrastructure","","3","","","","#REF!","","1","","","","","An approach to decentralized identifiers and key management that offers significant benefits for self-sovereign identity and Trust over IP infrastructure."],["111","K","n","key-event-receipt-log","","key-event-receipt-log","","https://github.com/weboftrust/WOT-terms/wiki/key-event-receipt-log","","3","","","","#REF!","","1","","","","","NO INPUT"],["112","K","n","key-event-receipt","","key-event-receipt","","https://github.com/weboftrust/WOT-terms/wiki/key-event-receipt","","3","","","","#REF!","","1","","","","","NO INPUT"],["113","G","n","key-state","","key-state","","https://github.com/weboftrust/WOT-terms/wiki/key-state","","2","","","","#REF!","","1","","","","","NO INPUT"],["114","G","n","key-transparency","","key-transparency","lookup service for generic records and a public, tamper-proof audit log of all record changes","https://github.com/weboftrust/WOT-terms/wiki/key-transparency","","3","","","","#REF!","","1","","","","","lookup service for generic records and a publicly accessible, tamper-proof audit log of all record modifications"],["115","G","n","key","","key","","https://github.com/weboftrust/WOT-terms/wiki/key","","2","","","","#REF!","","1","","","","","NO INPUT"],["116","G","n","levels-of-assurance","","levels-of-assurance","LoA, any time a judgement is not a binary Yes or No, you have levels of assurance","https://github.com/weboftrust/WOT-terms/wiki/levels-of-assurance","","3","","","","#REF!","","","","","","","In LoA, when a judgment isn't a simple Yes or No, there are various levels of assurance."],["117","G","n","liveness","","liveness","","https://github.com/weboftrust/WOT-terms/wiki/liveness","","3","","","","#REF!","","","","","","","NO INPUT"],["118","G","r","loci-of-control","","loci-of-control","","https://github.com/weboftrust/WOT-terms/wiki/loci-of-control","","3","","","","#REF!","","","","","","","NO INPUT"],["119","K","n","management-transaction-event-log","","management-transaction-event-log","","https://github.com/weboftrust/WOT-terms/wiki/management-transaction-event-log","","3","","","","#REF!","","","","","","","NO INPUT"],["120","G","n","message","","message","","https://github.com/weboftrust/WOT-terms/wiki/message","","1","","","","#REF!","","","","","","","NO INPUT"],["121","G","n","multicodec","","multicodec","","https://github.com/weboftrust/WOT-terms/wiki/multicodec","","2","","","","#REF!","","","","","","","NO INPUT"],["122","G","n","namespace","","namespace","","https://github.com/weboftrust/WOT-terms/wiki/namespace","","1","1","","","#REF!","","","","","","","NO INPUT"],["123","K","n","nested-cooperative-delegated-identifiers","","nested-cooperative-delegated-identifiers","","https://github.com/weboftrust/WOT-terms/wiki/nested-cooperative-delegated-identifiers","","3","","","","#REF!","","","","","","","NO INPUT"],["124","K","n","non-establishment-event","","non-establishment-event","","https://github.com/weboftrust/WOT-terms/wiki/non-establishment-event","","3","","","","#REF!","","","","","","","NO INPUT"],["125","G","n","non-fungible-token","","non-fungible-token","","https://github.com/weboftrust/WOT-terms/wiki/non-fungible-token","","2","","","","#REF!","","","","","","","NO INPUT"],["126","G","a","non-normative","","non-normative","the purpose of non-normative theories is not to give answers, but rather to describe possibilities or predict results of certain actions","https://github.com/weboftrust/WOT-terms/wiki/non-normative","","1","","","","#REF!","","","","","","","Non-normative theories do not provide answers but describe possibilities or predict outcomes of specific actions."],["127","S","a","non-repudiable","","non-repudiable","a statement's author cannot successfully dispute its authorship or the validity of an associated contract, signature or commitment.","https://github.com/weboftrust/WOT-terms/wiki/non-repudiable","","2","","","","#REF!","","","","","","","The author of a statement cannot dispute its authorship or the validity of an associated contract, signature, or commitment."],["128","G","a","non-transferable","","non-transferable","No capacity to transfer (the control over) a certain digital asset in an unobstructed or loss-less manner.","https://github.com/weboftrust/WOT-terms/wiki/non-transferable","","1","","","","#REF!","","","","","","","No ability to transfer a digital asset without any obstruction or loss."],["129","G","a","normative","","normative","a theory that tells you what you should do - what action you should take","https://github.com/weboftrust/WOT-terms/wiki/normative","","1","","","","#REF!","","","","","","","A theory that explains the appropriate action to take."],["130","G","r","one-way-function","","one-way-function","a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input","https://github.com/weboftrust/WOT-terms/wiki/one-way-function","","2","","","","#REF!","","","","","","","A one-way function is easy to compute on all inputs but difficult to reverse given the image of a random input."],["131","G","n","payload","","payload","the payload of an item in KERI is a specific cryptographic building block","https://github.com/weboftrust/WOT-terms/wiki/payload","","1","","","","#REF!","","","","","","","The payload of an item in KERI is a cryptographic building block."],["132","G","n","pretty-good-privacy","","pretty-good-privacy","","https://github.com/weboftrust/WOT-terms/wiki/pretty-good-privacy","","1","","","","#REF!","","","","","","","NO INPUT"],["133","K","n","primary-root-of-trust","","primary-root-of-trust","","https://github.com/weboftrust/WOT-terms/wiki/primary-root-of-trust","","2","","","","#REF!","","","","","","","NO INPUT"],["134","G","n","primitive","","primitive","","https://github.com/weboftrust/WOT-terms/wiki/primitive","","1","","","","#REF!","","","","","","","NO INPUT"],["135","G","n","proof-of-authority","","proof-of-authority","proof that somebody or something has certain rights or permissions on data","https://github.com/weboftrust/WOT-terms/wiki/proof-of-authority","","2","","","","#REF!","","","","","","","proof of rights or permissions on data"],["136","K","n","proof-of-authorship","","proof-of-authorship","proof that somebody or something has originally created certain content","https://github.com/weboftrust/WOT-terms/wiki/proof-of-authorship","","2","","","","#REF!","","","","","","","Evidence that someone or something has created specific content."],["137","G","n","provenance","","provenance","historic documentation of cryptographic verifiable key states , data consistency and cedentials","https://github.com/weboftrust/WOT-terms/wiki/provenance","","2","","","","#REF!","","","","","","","Historical documentation of cryptographic key states, data consistency, and credentials."],["138","G","n","public-key-infrastructure","","public-key-infrastructure","set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates","https://github.com/weboftrust/WOT-terms/wiki/public-key-infrastructure","","2","","","","#REF!","","","","","","","Set of roles, policies, hardware, software, and procedures required for creating, managing, distributing, utilizing, storing, and revoking digital certificates."],["139","K","n","public-verifiable-credential-registry","","public-verifiable-credential-registry","a Verifiable Data Registry that tracks the issuance/revocation state of credentials","https://github.com/weboftrust/WOT-terms/wiki/public-verifiable-credential-registry","","3","1","","","#REF!","","","","","","","A Verifiable Data Registry tracks the issuing and revoking of credentials."],["140","G","n","race-condition","","race-condition","the condition where a system's substantive behavior is dependent on the sequence or timing of external uncontrollable events","https://github.com/weboftrust/WOT-terms/wiki/race-condition","","3","","","","#REF!","","","","","","","The condition where a system's behavior depends on external uncontrollable events' sequence or timing."],["141","K","n","receipt-log","","receipt-log","ordered record of all key event receipts for a given set of witnesses","https://github.com/weboftrust/WOT-terms/wiki/receipt-log","","3","","","","#REF!","","","","","","","A record of key event receipts for witnesses."],["142","G","n","receipt","","receipt","event message or reference with one or more witness signatures","https://github.com/weboftrust/WOT-terms/wiki/receipt","","3","","","","#REF!","","","","","","","event message with witness signatures"],["143","K","n","registrar","","registrar","identifiers that serve as backers for each transaction event log under its provenance","https://github.com/weboftrust/WOT-terms/wiki/registrar","","3","","","","#REF!","","","","","","","Identifiers back each transaction event log to establish its provenance."],["144","G","n","root-of-trust","","root-of-trust","trust in end-verifiable digital signatures from asymmetric key cryptography, replaces human basis-of-trust","https://github.com/weboftrust/WOT-terms/wiki/root-of-trust","","2","","","","#REF!","","","","","","","End-verifiable digital signatures from asymmetric key cryptography replace human basis-of-trust."],["145","K","v","rotation","","rotation","the operation of revoking and replacing the set of authoritative key pairs for an AID","https://github.com/weboftrust/WOT-terms/wiki/rotation","","2","","","","#REF!","","","","","","","revoking and replacing authoritative key pairs for an AID"],["146","K","r","secondary-root-of-trust","","secondary-root-of-trust","a root-of-trust that, for its secure attribution, depends on another primary root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/secondary-root-of-trust","","3","","","","#REF!","","","","","","","A root-of-trust depends on a primary root-of-trust for secure attribution."],["147","S","r","secure-asset-transfer-protocol","","secure-asset-transfer-protocol","an IETF protocol for moving assets between blockchains","https://github.com/weboftrust/WOT-terms/wiki/secure-asset-transfer-protocol","","3","","","","#REF!","","","","","","","An IETF protocol for transferring assets across blockchains."],["148","S","v","secure-attribution","","secure-attribution","is 'whodunit?!' in cyberspace","https://github.com/weboftrust/WOT-terms/wiki/secure-attribution","","3","","","","#REF!","","","","","","","Whodunit in cyberspace!"],["149","G","n","seed","","seed","a pseudorandomly generated number, often expressed in representation of a series of words","https://github.com/weboftrust/WOT-terms/wiki/seed","","1","","","","#REF!","","","","","","","A randomly generated number, usually expressed as a series of words."],["150","S","r","self-addressing-data","","self-addressing-data","an encryption program that provides cryptographic privacy and authentication for data communication","https://github.com/weboftrust/WOT-terms/wiki/self-addressing-data","","3","","","","#REF!","","","","","","","An encryption program that ensures data communication's cryptographic privacy and authentication."],["151","S","r","self-certifying-identifier","","self-certifying-identifier","cryptographically binds an identifier to a public and private key pair","https://github.com/weboftrust/WOT-terms/wiki/self-certifying-identifier","","3","","","","#REF!","","","","","","","Cryptographically binds an identifier to a key pair."],["152","K","a","self-framing","","self-framing","A textual encoding that includes type, size, and value is self-framing; and thus parseable without needing any additional delimiting characters.","https://github.com/weboftrust/WOT-terms/wiki/self-framing","","3","","","","#REF!","","","","","","","A self-framing textual encoding includes type, size, and value, making it parseable without any extra delimiting characters."],["153","S","n","self-sovereign-identity","","self-sovereign-identity","","https://github.com/weboftrust/WOT-terms/wiki/self-sovereign-identity","","2","","","","#REF!","","","","","","","NO INPUT"],["154","G","n","signed-digest","","signed-digest","","https://github.com/weboftrust/WOT-terms/wiki/signed-digest","","2","","","","#REF!","","","","","","","NO INPUT"],["155","G","n","spanning-layer","","spanning-layer","","https://github.com/weboftrust/WOT-terms/wiki/spanning-layer","","3","","","","#REF!","","","","","","","NO INPUT"],["156","K","r","text-binary-concatenation-composability","","text-binary-concatenation-composability","When any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.","https://github.com/weboftrust/WOT-terms/wiki/text-binary-concatenation-composability","","3","","","","#REF!","","","","","","","When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss."],["157","K","n","transaction-event-log","","transaction-event-log","The set of transactions that determine registry state form a log called a Transaction Event Log (TEL) and is cryptographically linked to corresponding controlling KEL.","https://github.com/weboftrust/WOT-terms/wiki/transaction-event-log","","3","","","","#REF!","","","","","","","The transactions that determine the registry state form a log called Transaction Event Log (TEL) and are cryptographically linked to the corresponding controlling KEL."],["158","G","r","transmission-control-protocol","","transmission-control-protocol","TCP is one of the main protocols of the Internet protocol suite","https://github.com/weboftrust/WOT-terms/wiki/transmission-control-protocol","","1","","","","#REF!","","","","","","","TCP is a key protocol in the Internet protocol suite."],["159","S","r","trust-domain","","trust-domain","A trust domain is the ecosystem of interactions that rely on a trust basis. A trust basis binds controllers, identifiers, and key-pairs.","https://github.com/weboftrust/WOT-terms/wiki/trust-domain","","1","","","","#REF!","","","","","","","A trust domain is an ecosystem of interactions relying on trust. It binds controllers, identifiers, and key pairs."],["160","G","v","validator","","validator","the capability to determine whether or not (verified) data is valid to be used for some specific purpose(s).","https://github.com/weboftrust/WOT-terms/wiki/validator","","2","1","","","#REF!","","","","","","","the ability to verify data's validity for a specific purpose."],["161","G","r","veracity","","veracity","the quest for the truth","https://github.com/weboftrust/WOT-terms/wiki/veracity","","2","","","","#REF!","","","","","","","The Truth Quest"],["162","G","n","verifiable-data-structure","","verifiable-data-structure","a verifiable data structure is a data structure that incorporates cryptographic techniques to ensure the integrity and authenticity of its contents","https://github.com/weboftrust/WOT-terms/wiki/verifiable-data-structure","","3","","","","#REF!","","","","","","","A verifiable data structure is a structure that uses cryptographic techniques to guarantee the integrity and authenticity of its contents."],["163","G","a","verifiable","","verifiable","able to cryptographically verify a certain data structure on its consistency and its authenticity.","https://github.com/weboftrust/WOT-terms/wiki/verifiable","","2","","","","#REF!","","","","","","","Capable of cryptographically verifying a specific data structure for consistency and authenticity."],["164","G","n","verifier","","verifier","the entity that (cryptogrpahically) verifies data received from peers (check structure, signatures, dates)","https://github.com/weboftrust/WOT-terms/wiki/verifier","","2","","","","#REF!","","","","","","","The entity verifies received data from peers by checking its structure, signatures, and dates using cryptography."],["165","G","n","version","","version","is a class of systems responsible for managing changes to computer programs, documents, large web sites, or other collections of information","https://github.com/weboftrust/WOT-terms/wiki/version","","1","","","","#REF!","","","","","","","Version:\nVersion control is responsible for managing changes to computer programs, documents, web sites, or other collections of information."],["166","K","n","virtual-credential-transaction-event-log","","virtual-credential-transaction-event-log","will track the issued or revoked state of each virtual credential (VC)","https://github.com/weboftrust/WOT-terms/wiki/virtual-credential-transaction-event-log","","3","","","","#REF!","","","","","","","NO INPUT"],["167","G","r","web-of-trust","","web-of-trust","In cryptography, a web of trust is a concept to establish the authenticity of the binding between a public key and its owner.","https://github.com/weboftrust/WOT-terms/wiki/web-of-trust","","2","","","","#REF!","","","","","","","NO INPUT"],["168","K","n","well-known-witnesses","","well-known witnesses","Predictable witness identifier creation by using known salts to initialize their key stores. For testing purposes only!","https://github.com/weboftrust/WOT-terms/wiki/well-known-witnesses","","3","","","","#REF!","","","","","","","NO INPUT"],["171","G","n","repo","repo","repo","Software repository","https://github.com/weboftrust/WOT-terms/wiki/repo","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s","2","","","","#REF!","","","","","","","Software Repo"],["173","G","n","coroutines","coroutines","coroutines","Computer programs that can be suspended and resumed at will.","https://github.com/weboftrust/WOT-terms/wiki/coroutines","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s","1","","","","#REF!","","","","","","","Suspend and resume computer programs at will."],["174","G","r","input-output","I/O","input-output","Input / output","https://github.com/weboftrust/WOT-terms/wiki/input-output","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s","1","","","","#REF!","","","","","","","Input/Output"],["175","G","n","hio","hio","hio","Hierarchical asynchronous coroutines and I/O in Python","https://github.com/weboftrust/WOT-terms/wiki/hio","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s","3","","","","#REF!","","","","","","","Hierarchical async coroutines and I/O in Python."],["178","G","n","clone","clone","clone","A copy of a system that is - and works exactly as the original","https://github.com/weboftrust/WOT-terms/wiki/clone","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s","2","","","","#REF!","","","","","","","A replica system that is functioning exactly like the original."],["179","G","n","branch","branch","branch","A duplicate of an object under version control for further separate modification","https://github.com/weboftrust/WOT-terms/wiki/branch","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s","2","","","","#REF!","","","","","","","A duplicate object under version control for separate modifications."],["180","K","n","kli","kli","kli","KERI command line interface","https://github.com/weboftrust/WOT-terms/wiki/kli","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s","3","","","","#REF!","","","","","","","Keri CLI"],["183","S","n","verifiable-credential","verifiable credentials","verifiable-credential","the digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable way","https://github.com/weboftrust/WOT-terms/wiki/verifiable-credential","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s","1","","","","#REF!","","","","","","","The digital version of our daily life credentials, such as passports and driver's licenses, but in a machine-verifiable format."],["185","G","n","sub-shell","sub shell","sub-shell","a child shell started up from - and contained in another parent shell","https://github.com/weboftrust/WOT-terms/wiki/sub-shell","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s","1","","","","#REF!","","","","","","","A child shell started from and contained within a parent shell."],["186","S","n","agent","agent","agent","a representative for an identity","https://github.com/weboftrust/WOT-terms/wiki/agent","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s","2","","","","#REF!","","","","","","","identity representative"],["187","G","n","cloud-agent","cloud agent","cloud-agent","is software installed on the cloud server instances for security, monitoring, and analysis","https://github.com/weboftrust/WOT-terms/wiki/cloud-agent","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s","2","","","","#REF!","","","","","","","The software is installed on cloud server instances for security, monitoring, and analysis."],["190","G","n","user-interface","U/I","user-interface","A user interface (UI) is the space where interactions between humans and machines occur.","https://github.com/weboftrust/WOT-terms/wiki/user-interface","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s","1","","","","#REF!","","","","","","","A user interface (UI) is where humans and machines interact."],["191","G","r","multisig","multi-sig","multisig","A digital signature scheme which allows a group of users to sign a single piece of digital data.","https://github.com/weboftrust/WOT-terms/wiki/multisig","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s","1","","","","#REF!","","","","","","","A digital signature scheme enables a group of users to sign a single piece of digital data."],["192","G","n","identifier-system","identifier","identifier-system","Something to uniquely identify (public) identities, pointing to something or someone else.","https://github.com/weboftrust/WOT-terms/wiki/identifier-system","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s","2","","","","#REF!","","","","","","","A unique identifier for public identities, referring to something or someone else."],["193","G","n","wallet","wallet","wallet","A wallet is a collection of data stores, made up of a keystore, local and remote key event log database and credential database.","https://github.com/weboftrust/WOT-terms/wiki/wallet","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s","3","","","","#REF!","","","","","","","A wallet includes a keystore, local and remote key event log database, and a credential database."],["195","K","n","witness","witnesses","witness","Entity that may receive, verify, and store key events for an identifier","https://github.com/weboftrust/WOT-terms/wiki/witness","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s","3","","","","#REF!","","","","","","","Entity that receives, verifies, and stores key events for an identifier."],["196","K","n","watcher","watchers","watcher","Guarantee that KERI logs are immutable","https://github.com/weboftrust/WOT-terms/wiki/watcher","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s","3","","","","#REF!","","","","","","","Ensure KERI logs are immutable."],["197","G","v","key-management","key management","key-management","Management of cryptographic keys in a crypto-system.","https://github.com/weboftrust/WOT-terms/wiki/key-management","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s","3","","","","#REF!","","","","","","","Managing cryptographic keys in a crypto-system."],["199","S","n","single-signature-identifier","single sig identifier","single-signature-identifier","An identifier that is controlled by a one-of-one signing keypair","https://github.com/weboftrust/WOT-terms/wiki/single-signature-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s","2","","","","#REF!","","","","","","","An identifier controlled by a unique signing keypair."],["200","G","n","keystore","key store","keystore","A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs.","https://github.com/weboftrust/WOT-terms/wiki/keystore","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s","3","","","","#REF!","","","","","","","A keystore in KERI is an encrypted data store that holds the private keys for a collection of AIDs."],["201","S","r","key-event","key events","key-event","Events happening to controlling keys of an identifier recorded in a Key Event Log (KEL).","https://github.com/weboftrust/WOT-terms/wiki/key-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s","2","1","","","#REF!","","","","","","","Events happening to control keys of an identifier are recorded in a Key Event Log (KEL)."],["202","S","r","interaction-event","interaction event","interaction-event","Anchors external data to the key-state as established by the most recent prior establishment event","https://github.com/weboftrust/WOT-terms/wiki/interaction-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s","3","","","","#REF!","","","","","","","Anchoring external data to the key-state established by the most recent establishment event."],["203","S","r","rotation-event","rotation event","rotation-event","Changes the key-state which includes a change to the set of authoritative keypairs for an AID","https://github.com/weboftrust/WOT-terms/wiki/rotation-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s","3","","","","#REF!","","","","","","","Changes the key-state, including a change to the set of authoritative keypairs for an AID."],["204","G","n","signing-threshold","signing thresholds","signing-threshold","Minimum number of valid signatures to satisfy the requirement for successful validation","https://github.com/weboftrust/WOT-terms/wiki/signing-threshold","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s","3","","","","#REF!","","","","","","","Minimum number of valid signatures for successful validation requirement."],["205","K","n","key-event-log","KEL","key-event-log","Key Event Log is the native KERI verifiable data structure","https://github.com/weboftrust/WOT-terms/wiki/key-event-log","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s","3","1","","","#REF!","","","","","","","Key Event Log is the KERI's native verifiable data structure."],["206","G","v","verify-signature","verify signatures","verify-signature","Applying an algorithm that either accepts or rejects the message's claim to authenticity; when you can succesfully verify a signature","https://github.com/weboftrust/WOT-terms/wiki/verify-signature","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s","2","","","","#REF!","","","","","","","Applying an algorithm to verify the authenticity of a message by accepting or rejecting its claim when a signature can be successfully verified."],["207","G","r","peer-to-peer","peer-to-peer communications","peer-to-peer","Peers are equally privileged, equipotent participants in a network","https://github.com/weboftrust/WOT-terms/wiki/peer-to-peer","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s","2","","","","#REF!","","","","","","","Peers are equally privileged and equipotent participants in a network."],["209","G","n","salt","salts","salt","Random data that is used as an additional input to a cryptographic one-way function","https://github.com/weboftrust/WOT-terms/wiki/salt","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s","3","","","","#REF!","","","","","","","Random data used as an additional input for a cryptographic one-way function."],["210","K","v","delegation","delegation","delegation","Delegation can be defined as “the act of empowering to act for another”","https://github.com/weboftrust/WOT-terms/wiki/delegation","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s","3","","","","#REF!","","","","","","","Delegation is the act of empowering someone to act on behalf of another."],["211","K","r","multi-sig-delegation","multi-sig delegation","multi-sig-delegation","delegated identifiers under multi-signature control","https://github.com/weboftrust/WOT-terms/wiki/multi-sig-delegation","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s","3","","","","#REF!","","","","","","","Multi-signature control for delegated identifiers."],["213","S","n","transferable-identifier","transferable","transferable-identifier","Control over identifier can be transferred by rotating keys","https://github.com/weboftrust/WOT-terms/wiki/transferable-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s","3","","","","#REF!","","","","","","","Keys can transfer control over identifiers by rotating them."],["215","G","n","configuration-files","configuration file","configuration-files","File used to configure the parameters and initial settings for some computer programs","https://github.com/weboftrust/WOT-terms/wiki/configuration-files","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s","1","","","","#REF!","","","","","","","This file configures parameters and initial settings for computer programs."],["219","G","r","transfer_Protocol","post and put","transfer_Protocol","HTTP request methods to indicate the desired action to be performed on the identified resource","https://github.com/weboftrust/WOT-terms/wiki/transfer_Protocol","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s","2","","","","#REF!","","","","","","","HTTP request methods indicate the desired action on the identified resource."],["221","G","n","passcode","passcode","passcode","Secret data, typically a string of characters, usually used to confirm a user's identity","https://github.com/weboftrust/WOT-terms/wiki/passcode","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s","2","","","","#REF!","","","","","","","Secret data, often a string of characters, commonly utilized for user identity verification."],["222","G","v","key-stretching","stretched into an encryption key","key-stretching","make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources","https://github.com/weboftrust/WOT-terms/wiki/key-stretching","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s","3","","","","#REF!","","","","","","","Enhance the security of a potentially weak key, such as a password or passphrase, against brute-force attacks by increasing available resources."],["224","K","n","non-transferable-identitifer","non-transferable identifier","non-transferable-identitifer","Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control","https://github.com/weboftrust/WOT-terms/wiki/non-transferable-identitifer","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s","3","","","","#REF!","","","","","","","Keys cannot be rotated for this identifier, making it non-transferable for control elsewhere."],["226","K","n","threshold-signature-scheme","witness threshold","threshold-signature-scheme","The minimum number of valid witness signatures required","https://github.com/weboftrust/WOT-terms/wiki/threshold-signature-scheme","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s","3","","","","#REF!","","","","","","","Minimum required witness signatures."],["227","K","v","pre-rotation","pre-rotation","pre-rotation","commitment to next rotated key set in previous rotation or inception event","https://github.com/weboftrust/WOT-terms/wiki/pre-rotation","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s","3","","","","#REF!","","","","","","","commitment to the next key set rotated in the previous rotation or inception event."],["228","K","n","prefix","prefixes","prefix","A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key","https://github.com/weboftrust/WOT-terms/wiki/prefix","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s","3","","","","#REF!","","","","","","","The prefix is a combination of a Base-64 derivation code and the Base-64 encoding of a public digital signing key."],["229","G","n","base64","base64","base64","A group of binary-to-text encoding schemes that represent binary data","https://github.com/weboftrust/WOT-terms/wiki/base64","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s","3","","","","#REF!","","","","","","","Binary-to-text encoding schemes represent binary data."],["230","K","a","qualified","qualified","qualified","when qualified, a cryptographic primitive includes a prepended derivation code","https://github.com/weboftrust/WOT-terms/wiki/qualified","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s","3","","","","#REF!","","","","","","","When qualified, a cryptographic primitive includes a derived code prepended."],["231","K","n","derivation-code","derivation code","derivation-code","A special character that encodes the derivation process, pre-pended to the identifier","https://github.com/weboftrust/WOT-terms/wiki/derivation-code","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s","3","","","","#REF!","","","","","","","A special character that encodes the derivation process, added to the identifier."],["232","G","n","blake3","Blake3 hash","blake3","BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2.","https://github.com/weboftrust/WOT-terms/wiki/blake3","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s","3","","","","#REF!","","","","","","","BLAKE3 is a new cryptographic hash function, released in 2020, that builds upon Bao and BLAKE2."],["233","G","n","data-anchor","anchor data into","data-anchor","Data anchors are digests of digital data, that uniquely identify this data","https://github.com/weboftrust/WOT-terms/wiki/data-anchor","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s","3","","","","#REF!","","","","","","","Data anchors are digital data digests that uniquely identify the data."],["234","S","n","autonomic-identifier","AID","autonomic-identifier","An identifier that is self-certifying and self-sovereign","https://github.com/weboftrust/WOT-terms/wiki/autonomic-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s","3","","","","#REF!","","","","","","","A self-certifying and self-sovereign identifier."],["236","G","n","digest","digest","digest","Verifiable cryptographic commitment. It's a collision resistant hash of content","https://github.com/weboftrust/WOT-terms/wiki/digest","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s","2","1","","","#REF!","","","","","","","Verifiable cryptographic commitment is a collision-resistant content hash."],["237","K","r","issuance-event","issuance event","issuance-event","The inception event of a verifiable credential","https://github.com/weboftrust/WOT-terms/wiki/issuance-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s","3","","","","#REF!","","","","","","","The inception event of a verifiable credential."],["238","K","n","public-transaction-event-log","public transaction event log","public-transaction-event-log","Is a hash linked data structure of transactions that can be used to track state","https://github.com/weboftrust/WOT-terms/wiki/public-transaction-event-log","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s","3","","","","#REF!","","","","","","","A hash linked data structure is used to track state in transactions."],["239","G","n","Rust","","Rust","programming language","https://github.com/weboftrust/WOT-terms/wiki/Rust","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s","3","","","","#REF!","","","","","","","Programming Language"],["240","K","r","establishment-event","establishment","establishment-event","An event that establishes control authority","https://github.com/weboftrust/WOT-terms/wiki/establishment-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s","3","","","","#REF!","","","","","","","A control authority event"],["241","G","n","memory-Mapped_Database","lmdb databases","memory-Mapped_Database","Lightning Memory-Mapped Database","https://github.com/weboftrust/WOT-terms/wiki/memory-Mapped_Database","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=21m42s","3","","","","#REF!","","","","","","","Lightning Memory-Mapped DB"],["242","K","r","indexed-signature","indexed signatures","indexed-signature","Used when signing anything with a multi-key autonomic identifier, a verifier knows which of the multiple public keys was used","https://github.com/weboftrust/WOT-terms/wiki/indexed-signature","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s","3","","","","#REF!","","","","","","","When signing with a multi-key autonomic identifier, a verifier can determine which specific public key was used."],["245","K","n","self-addressing-identifier","self-addressing identifiers","self-addressing-identifier","An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident","https://github.com/weboftrust/WOT-terms/wiki/self-addressing-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s","3","","","","#REF!","","","","","","","An identifier is deterministically generated from and embedded in the content it identifies, making it and its data tamper-evident."],["247","K","n","ledger-backer","ledger backer","ledger-backer","A witness in KERI that is ledger-registered","https://github.com/weboftrust/WOT-terms/wiki/ledger-backer","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s","3","","","","#REF!","","","","","","","A registered witness in KERI."],["248","K","n","witness","witness backer","witness","A native KERI witness whose control authority is established in a KEL","https://github.com/weboftrust/WOT-terms/wiki/witness","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s","3","","","","#REF!","","","","","","","A KERI witness, native to KEL, has established control authority."],["249","K","n","verifiable-legal-entity-identifier","vLEI","verifiable-legal-entity-identifier","Digital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentic","https://github.com/weboftrust/WOT-terms/wiki/verifiable-legal-entity-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s","3","","","","#REF!","","","","","","","Digital verifiable credentials issued by GLEIF delegates to verify the authenticity of information about a legal entity."],["250","S","n","ssi-system","SSI system","ssi-system","SSI Infrastructure consisting of the technological components that are deployed all over the world","https://github.com/weboftrust/WOT-terms/wiki/ssi-system","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s","1","","","","#REF!","","","","","","","SSI Infrastructure consists of technological components deployed worldwide."],["252","K","v","transfer-off-ledger","transfer off a ledger","transfer-off-ledger","The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KEL","https://github.com/weboftrust/WOT-terms/wiki/transfer-off-ledger","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s","3","","","","#REF!","","","","","","","Transferring control authority of an identifier from a ledger or blockchain to the KEL data structure in KERI."],["255","G","n","service-endpoint","service endpoints","service-endpoint","A web service endpoint which is a URL at which clients of specific service can get access to the service.","https://github.com/weboftrust/WOT-terms/wiki/service-endpoint","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s","2","","","","#REF!","","","","","","","A web service endpoint is a URL where clients can access a specific service."],["256","G","n","uniform-resource-locator","URLs","uniform-resource-locator","A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it","https://github.com/weboftrust/WOT-terms/wiki/uniform-resource-locator","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s","1","","","","#REF!","","","","","","","A web resource reference that specifies its location on a computer network and a retrieval mechanism."],["257","G","n","ip-address","ip-address","ip-address","A numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication","https://github.com/weboftrust/WOT-terms/wiki/ip-address","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s","1","","","","#REF!","","","","","","","A numerical label, like '192.0.2.1', connected to a computer network using the Internet Protocol for communication."],["258","G","n","tcp-endpoint","TCP endpoint","tcp-endpoint","This is a service endpoint of the web transmission control protocol","https://github.com/weboftrust/WOT-terms/wiki/tcp-endpoint","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s","2","","","","#REF!","","","","","","","This is a web transmission control protocol endpoint."],["259","K","n","inquisitor","inquisitor","inquisitor","Someone (in a validating role) that launches an inquiry at some KERI witness","https://github.com/weboftrust/WOT-terms/wiki/inquisitor","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s","3","","","","#REF!","","","","","","","A person (in a validating role) who questions a KERI witness."],["260","G","v","replay-attack","","replay-attack","intercept and then fraudulently delays or resend a message to misdirect the receiver into doing what the attacker wants","https://github.com/weboftrust/WOT-terms/wiki/replay-attack","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s","3","","","","#REF!","","","","","","","Intercepting a message and fraudulently delaying or resending it to misdirect the receiver into complying with the attacker's desires."],["261","G","n","XBRL","","XBRL","extensible business reporting language, standard for digital business reporting","https://github.com/weboftrust/WOT-terms/wiki/XBRL","","1","","","","","","","","","","","Extensible Business Reporting Language (XBRL), a digital standard for business reporting."],["262","G","n","extensible-business-reporting-language","","extensible-business-reporting-language","XBRL, standard for digital business reporting","https://github.com/weboftrust/WOT-terms/wiki/extensible-business-reporting-language","","1","","","","","","","","","","","XBRL is the standard for digital business reporting."],["263","K","n","locked-state","locked state","locked-state","default state of an encrypted KERI data store with a passcode","https://github.com/weboftrust/WOT-terms/wiki/locked-state","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s","3","","","","#REF!","","","","","","","The default state of an encrypted KERI data store with a passcode."],["265","K","r","out-of-band-introduction","data OOBIs","out-of-band-introduction","data out-of-band introductions","https://github.com/weboftrust/WOT-terms/wiki/out-of-band-introduction","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s","3","","","","#REF!","","","","","","","Data out-of-band intros"],["266","K","r","out-of-band-introduction","credential schema OOBIs","out-of-band-introduction","credential schema out-of-band introductions","https://github.com/weboftrust/WOT-terms/wiki/out-of-band-introduction","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s","3","","","","#REF!","","","","","","","Credentials schema introductions outside of the main channel."],["267","K","n","keep","keep","keep","is KERI's and ACDC's depreciated crypto wallet, a task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystem","https://github.com/weboftrust/WOT-terms/wiki/keep","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s","3","","","","#REF!","","","","","","","This is a deprecated crypto wallet by KERI and ACDC. It is a task-oriented app for managing AIDs in ecosystems such as the vLEI Ecosystem."],["268","G","r","zero-trust","zero trust","zero-trust","a Zero Trust approach trusts no one","https://github.com/weboftrust/WOT-terms/wiki/zero-trust","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s","2","","","","#REF!","","","","","","","In a Zero Trust approach, no one is trusted."],["270","K","r","revocation-event","revocation events","revocation-event","An event that revokes control authority over an identifier","https://github.com/weboftrust/WOT-terms/wiki/revocation-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s","2","","","","#REF!","","","","","","","An event revoking control authority over an identifier."],["272","K","n","escrow-state","escrow states","escrow-state","The current state of all the temporary storage locations (what events are waiting for what other information) that KERI protocol needs to keep track of, due to its fully asynchronous nature.","https://github.com/weboftrust/WOT-terms/wiki/escrow-state","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s","3","","","","#REF!","","","","","","","The current state of all temporary storage locations that the KERI protocol needs to keep track of, due to its fully asynchronous nature (events waiting for other information)."],["273","K","r","server-sent-event","server-sent events","server-sent-event","Mailbox notifications, a streaming service for the agent U/I, to get notifications from the KERI system itself","https://github.com/weboftrust/WOT-terms/wiki/server-sent-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s","3","","","","#REF!","","","","","","","Mailbox notifications is a streaming service for the agent U/I, providing notifications directly from the KERI system."],["274","G","n","seal","","seal","cryptographic proof in a secondary root-of-trust that is anchored in a primary-root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/seal","","2","1","","","#REF!","","","","","","","cryptographic proof in a secondary root-of-trust anchored in a primary root-of-trust"],["275","S","a","authoritative","","authoritative","(control over) an identifier is 'authoritative' because it can be considered accurate, renowned, honourable and / or respected","https://github.com/weboftrust/WOT-terms/wiki/authoritative","","3","1","","","#REF!","","","","","","","An identifier has control and is considered authoritative when it is accurate, renowned, honorable, and respected."],["276","K","n","QVI","","QVI","qualified vlei issuer, contracting party qualified by GLEIF","https://github.com/weboftrust/WOT-terms/wiki/QVI","","2","","","","#REF!","","","","1","","","Qualified vlei issuer, contracting party qualified by GLEIF."],["277","K","n","qualified-vlei-issuer","","qualified-vlei-issuer","QVI, contracting party qualified by GLEIF","https://github.com/weboftrust/WOT-terms/wiki/qualified-vlei-issuer","","2","","","","#REF!","","","","1","","","QVI, a contracting party qualified by GLEIF."],["278","K","n","ghost-credential","","ghost-credential","a valid credential within in a 90 days grace period","https://github.com/weboftrust/WOT-terms/wiki/ghost-credential","","2","","","","#REF!","","","","1","","","a valid credential within a 90-day grace period"],["279","K","n","redundant-credential","","redundant-credential","multiple -, independently valid credentials issued by the same issuer","https://github.com/weboftrust/WOT-terms/wiki/redundant-credential","","2","","","","#REF!","","","","1","","","Multiple independently valid credentials issued by the same issuer."],["280","K","r","engagement-context-role","","engagement-context-role","A person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/engagement-context-role","","2","","","","#REF!","","","","1","","","A person represents the Legal Entity in a role and is issued an ECR vLEI Credential."],["281","K","r","ECR","","ECR","A person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/ECR","","2","","","","#REF!","","","","1","","","A person represents the Legal Entity in a role and is issued an ECR vLEI Credential."],["282","K","n","gleif-authorized-representative","","gleif authorized representative","A GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/gleif-authorized-representative","","2","","","","#REF!","","","","1","","","A GLEIF representative authorized to verify and issue the QVI vLEI Credential."],["283","K","n","GAR","","GAR","A GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/GAR","","2","","","","#REF!","","","","1","","","A GLEIF representative authorized to verify and issue the QVI vLEI Credential."],["284","G","n","GLEIF","","GLEIF","Global Legal Entity Identifier Foundation","https://github.com/weboftrust/WOT-terms/wiki/GLEIF","","1","","","","#REF!","","","","1","","","Global LEI Foundation."],["285","K","n","DAR","","DAR","A representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.","https://github.com/weboftrust/WOT-terms/wiki/DAR","","2","","","","#REF!","","","","1","","","A representative authorized by a Legal Entity to act on its behalf officially."],["286","K","n","designated-authorized-representative","","designated-authorized-representative","A representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.","https://github.com/weboftrust/WOT-terms/wiki/designated-authorized-representative","","2","","","","#REF!","","","","1","","","A representative authorized by a Legal Entity to act on its behalf officially."],["287","K","n","AVR","","AVR","authorized vlei representative","https://github.com/weboftrust/WOT-terms/wiki/AVR","","2","","","","#REF!","","","","1","","","Authorized Vlei representative."],["288","K","n","authorized-vlei-representative","","authorized-vlei-representative","a representative of a Legal Entity that's authorized to request issuance and revocation of credentials","https://github.com/weboftrust/WOT-terms/wiki/authorized-vlei-representative","","2","","","","#REF!","","","","1","","","a representative of a legal entity authorized to request issuance and revocation of credentials"],["289","G","n","LEI","","LEI","Legal Entity Institute","https://github.com/weboftrust/WOT-terms/wiki/LEI","","2","","","","#REF!","","","","1","","","Legal Entity Institute."],["290","G","n","legal-entity","","legal-entity","unique parties that are legally or financially responsible for financial transactions or have the legal right to enter into legal contracts","https://github.com/weboftrust/WOT-terms/wiki/legal-entity","","2","","","","#REF!","","","","1","parties responsible for financial transactions or legally entitled to enter contracts","","parties legally or financially responsible for transactions or with the legal right to enter contracts"],["291","K","r","OOR","","OOR","official organizational role, a person holding a vLEI credential person and representing the Legal Entity","https://github.com/weboftrust/WOT-terms/wiki/OOR","","2","","","","#REF!","","","","1","","","official organizational role, a person holding a vLEI credential and representing the Legal Entity"],["292","K","r","official-organizational-role","","official-organizational-role","OOR, a person holding a vLEI credential person and representing the Legal Entity","https://github.com/weboftrust/WOT-terms/wiki/official-organizational-role","","2","","","","#REF!","","","","1","","","OOR, a person holding a vLEI credential and representing the Legal Entity"],["293","K","n","qvi-authorized-representative","","qvi-authorized-representative","QAR, conducts QVI operations with GLEIF and Legal Entities","https://github.com/weboftrust/WOT-terms/wiki/qvi-authorized-representative","","2","","","","#REF!","","","","1","","","QAR conducts QVI operations in collaboration with GLEIF and Legal Entities."],["294","K","n","QAR","","QAR","qvi authorized representative, conducts QVI operations with GLEIF and Legal Entities","https://github.com/weboftrust/WOT-terms/wiki/QAR","","2","","","","#REF!","","","","1","","","Authorized representative conducts QVI operations with GLEIF and legal entities."],["295","K","n","vlei-ecosystem-governance-framework","","vlei-ecosystem-governance-framework","a document that defines the information security, privacy, availability, confidentiality and processing integrity policies that apply","https://github.com/weboftrust/WOT-terms/wiki/vlei-ecosystem-governance-framework","","2","","","","#REF!","","","","1","","","This document defines the policies for information security, privacy, availability, confidentiality, and processing integrity."],["296","K","v","solicited-issuance","","solicited-issuance","issuance of Legal Entity vLEI / OOR / ECR Credentials upon receipt by the QAR","https://github.com/weboftrust/WOT-terms/wiki/solicited-issuance","","2","","","","#REF!","","","","1","","","issuing vLEI/OOR/ECR Credentials upon QAR's receipt."],["297","K","v","unsolicited-issuance","","unsolicited-issuance","issuance of a Legal Entity vLEI Credential upon notice by a QAR to its AVR(s)","https://github.com/weboftrust/WOT-terms/wiki/unsolicited-issuance","","2","","","","#REF!","","","","1","","","QAR notifies AVR(s) to issue a vLEI Credential to Legal Entity."],["298","G","n","governance-framework","","governance-framework","a set of rules how to apply technology","https://github.com/weboftrust/WOT-terms/wiki/governance-framework","","2","","","","#REF!","","","","1","","","A set of rules on how to apply technology."],["299","K","n","GLEIS","","GLEIS","Global Legal Entity Identifier System","https://github.com/weboftrust/WOT-terms/wiki/GLEIS","","2","","","","#REF!","","","","1","","","Global LEI System"],["300","K","n","vlei-credential","","vlei-credential","verifiable Legal Entity Identifier","https://github.com/weboftrust/WOT-terms/wiki/vlei-credential","","2","","","","#REF!","","","","1","","","Verifiable LEI"],["301","K","r","legal-entity-engagement-context-role-vlei-credential-governance-framework","","legal-entity-engagement-context-role-vlei-credential-governance-framework","A document that details the requirements for vLEI Role Credentials issued to representatives of a Legal Entity in functional - or other context of engagement.","https://github.com/weboftrust/WOT-terms/wiki/legal-entity-engagement-context-role-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["302","K","n","vlei-role-credential","","vlei-role-credential","A vLEI credential that attests a role.","https://github.com/weboftrust/WOT-terms/wiki/vlei-role-credential","","2","","","","#REF!","","","","1","","","NO INPUT"],["303","K","n","legal-entity-official-organizational-role-vlei-credential-governance-framework","","legal-entity-official-organizational-role-vlei-credential-governance-framework","A document that details the requirements for vLEI Role Credentials issued to official representatives of a Legal Entity.","https://github.com/weboftrust/WOT-terms/wiki/legal-entity-official-organizational-role-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["304","K","n","legal-entity-vlei-credential-governance-framework","","legal-entity-vlei-credential-governance-framework","A document that details the requirements for vLEI Credential issued by a Qualified vLEI Issuer to a Legal Entity","https://github.com/weboftrust/WOT-terms/wiki/legal-entity-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["305","K","n","qualified-vlei-issuer-vlei-credential-governance-framework","","qualified-vlei-issuer-vlei-credential-governance-framework","A document that details the requirements to enable this Credential to be issued by GLEIF to Qualified vLEI Issuers","https://github.com/weboftrust/WOT-terms/wiki/qualified-vlei-issuer-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["306","S","n","DID","","DID","Decentralized Identifier","https://github.com/weboftrust/WOT-terms/wiki/DID","","2","","","","#REF!","","","","","","","DID"],["307","S","n","decentralized-identifier","","decentralized-identifier","Decentralized identifiers (DIDs) enable verifiable, decentralized digital identity, refering to a person, organization, thing, data model, abstract entity, etc.","https://github.com/weboftrust/WOT-terms/wiki/decentralized-identifier","","1","","","","#REF!","","","","","","","NO INPUT"],["308","K","v","partial-pre-rotation","","partial-pre-rotation","change of control but partially keep some keys unexposed while exposing others as needed.","https://github.com/weboftrust/WOT-terms/wiki/partial-pre-rotation","","3","","","","#REF!","","1","","","","","Change control but partially keep certain keys undisclosed while exposing others as required."],["309","K","v","partial-rotation","","partial-rotation","change of control but partially keep some keys unexposed while exposing others as needed.","https://github.com/weboftrust/WOT-terms/wiki/partial-rotation","","3","","","","#REF!","","1","","","","","Change control but partially keep certain keys undisclosed while exposing others as required."],["310","K","v","custodial-rotation","","custodial-rotation","change of control that is split between two key sets","https://github.com/weboftrust/WOT-terms/wiki/custodial-rotation","","3","","","","#REF!","","1","","","","","Change of control split between two key sets."],["311","K","v","reserve-rotation","","reserve-rotation","preparatory key pairs being held in reserve and not exposed","https://github.com/weboftrust/WOT-terms/wiki/reserve-rotation","","3","","","","#REF!","","1","","","","","Preparation key pairs reserved and not exposed."],["312","K","n","custodial-agent","","custodial-agent","a custodian who has been granted signing authority and usually also being the host of the running agent software.","https://github.com/weboftrust/WOT-terms/wiki/custodial-agent","","3","","","","#REF!","","1","","","","","A custodian typically granted signing authority and also acts as the host for the running agent software."],["313","S","r","signing-authority","","signing-authority","the authority to sign on behalf of the controller of an identifier","https://github.com/weboftrust/WOT-terms/wiki/signing-authority","","3","","","","#REF!","","1","","","","","the authority to sign for the controller of an identifier"],["314","S","r","rotation-authority","","rotation-authority","the (exclusive) right to change control over an identifier","https://github.com/weboftrust/WOT-terms/wiki/rotation-authority","","3","","","","#REF!","","1","","","","","The exclusive right to change control of an identifier."],["315","G","n","trans-contextual-value","","trans-contextual-value","value that is transferrable between contexts","https://github.com/weboftrust/WOT-terms/wiki/trans-contextual-value","","1","","","","#REF!","","1","","","","","Transferable value across contexts."],["316","G","r","source-of-truth","","source-of-truth","a trusted data source that gives a complete picture of the truth about a data object.","https://github.com/weboftrust/WOT-terms/wiki/source-of-truth","","1","","","","#REF!","","1","","","","","a reliable data source providing a comprehensive view of the truth about a data object."],["317","G","v","authorization","","authorization","specifying access rights or privileges to resources","https://github.com/weboftrust/WOT-terms/wiki/authorization","","1","","","1","#REF!","1","1","","","","","specifying access rights to resources"],["318","G","r","application-programming-interface","","application-programming-interface","a way for two or more computer programs to communicate with each other.","https://github.com/weboftrust/WOT-terms/wiki/application-programming-interface","","1","","","","#REF!","1","1","","","","","A method for multiple computer programs to communicate with each other."],["319","G","n","API","","API","an application Programming Interface, a way for two or more computer programs to communicate with each other.","https://github.com/weboftrust/WOT-terms/wiki/API","","1","","","","#REF!","1","1","","","","","An API is a way for computer programs to communicate with each other."],["320","G","n","key-pair","","key-pair","a public key and its corresponding private key.","https://github.com/weboftrust/WOT-terms/wiki/key-pair","","1","","","1","#REF!","1","1","","","","","a public key and its corresponding private key."],["321","G","n","owner","","owner","a role that exercizes its legal, rightful or natural title to control something.","https://github.com/weboftrust/WOT-terms/wiki/owner","","1","","","","#REF!","1","1","1","1","","","A role that exercises its legal, rightful, or natural authority to control something."],["322","G","r","ownership","","ownership","a relationship between two, one of these (the owner) is entitled to enjoy, dispose of, and control the other sovereignly.","https://github.com/weboftrust/WOT-terms/wiki/ownership","","1","","","","#REF!","1","1","1","1","","","In a relationship between two individuals, one (the owner) has the entitlement to enjoy, dispose of, and control the other entirely."],["323","G","n","self-sovereignty","","self-sovereignty","the characteristic of every party that it is autonomous in managing and operating its own knowledge","https://github.com/weboftrust/WOT-terms/wiki/self-sovereignty","","1","","","","#REF!","1","1","","1","","","Every party is autonomous in managing and operating its own knowledge."],["324","K","r","presentation-exchange","","presentation-exchange","an exchange that provides disclosure of one or more ACDCs between a Discloser and a Disclosee.","https://github.com/weboftrust/WOT-terms/wiki/presentation-exchange","","3","","1","","#REF!","","","","","","","an exchange that discloses one or more ACDCs between a Discloser and a Disclosee."],["325","G","n","discloser","","discloser","an ACDC in a disclosure is disclosed by the Discloser.","https://github.com/trustoverip/acdc/wiki/discloser","","1","","1","","#REF!","","","","","","","The Discloser discloses an ACDC in a disclosure."],["326","G","n","disclosee","","disclosee","an ACDC in a disclosure is disclosed to the Disclosee.","https://github.com/trustoverip/acdc/wiki/disclosee","","1","","1","","#REF!","","","","","","","An ACDC in a disclosure is revealed to the Disclosee."],["327","G","n","issuer","","issuer","an ACDC is issued by the Issuer. The Issuer identifier (AID) appears in the top level of the ACDC.","https://github.com/trustoverip/acdc/wiki/issuer","","1","","1","","#REF!","","","","","","","An ACDC is issued by the Issuer and contains the Issuer identifier (AID) in the top level."],["328","G","n","issuee","","issuee","an ACDC is optionally issued to the Issuee.","https://github.com/trustoverip/acdc/wiki/issuee","","1","","1","","#REF!","","","","","","","An ACDC can be optionally issued to the recipient."],["329","K","r","issuance-exchange","","issuance-exchange","a special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDC","https://github.com/trustoverip/acdc/wiki/issuance-exchange","","3","","1","","#REF!","","","","","","","This is a special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDC."],["330","K","r","chain-link-confidentiality","","chain-link-confidentiality","chains together a sequence of Disclosees. Each Disclosee in the sequence in turn is the Discloser to the next Disclosee.","https://github.com/trustoverip/acdc/wiki/chain-link-confidentiality","","3","","1","","#REF!","","","","","","","This text chains a sequence of Disclosees, where each Disclosee becomes the Discloser to the next."],["331","K","v","graduated-disclosure","","graduated-disclosure","disclosure performed by a presentation exchange that has cross-variant Issuer commitment verifiability as an essential property.","https://github.com/trustoverip/acdc/wiki/graduated-disclosure","","3","","1","","#REF!","","","","","","","Disclosure is performed by a presentation exchange with cross-variant Issuer commitment verifiability as an essential property."],["332","K","n","top-level-section","","top-level-section","are the fields of an ACDC compact variant.","https://github.com/trustoverip/acdc/wiki/top-level-section","","2","","1","","#REF!","","","","","","","These fields are part of an ACDC compact variant."],["333","K","r","compact-variant","","compact-variant","an Issuer commitment via a signature to any variant of ACDC","https://github.com/trustoverip/acdc/wiki/compact-variant","","3","","1","","#REF!","","","","","","","an Issuer signs a commitment to any variant of ACDC."],["334","K","v","contractually-protected-disclosure","","contractually-protected-disclosure","the most elaborate form of disclosure by an IPEX. Contractually protected disclosure includes both chain-link confidential and contingent disclosure.","https://github.com/trustoverip/acdc/wiki/contractually-protected-disclosure","","3","","1","","#REF!","","","","","","","The most detailed form of disclosure by an IPEX includes contractually protected disclosure, which encompasses both chain-link confidential and contingent disclosure."],["335","G","n","ricardian-contract","","ricardian-contract","a method of recording a document as a contract at law, and linking it securely to other systems","https://github.com/trustoverip/acdc/wiki/ricardian-contract","","2","","1","","#REF!","","","","","","","A way to record a document as a secure contract and link it to other systems."],["336","K","v","contingent-disclosure","","contingent-disclosure","","https://github.com/trustoverip/acdc/wiki/contingent-disclosure","","3","","1","","#REF!","","","","","","","NO INPUT"],["337","G","v","eclipse-attack","","eclipse-attack","an eclipse attack is a P2P network-based attack, an attacker tries to isolate a node from the rest of the network","https://github.com/weboftrust/WOT-terms/wiki/eclipse-attack","","2","","","","#REF!","","1","","","","","An eclipse attack is a P2P network attack where the attacker attempts to isolate a node from the network."],["338","K","n","promiscuous-mode","","promiscuous-mode","the indiscriminate mode a watcher (network) runs in.","https://github.com/weboftrust/WOT-terms/wiki/promiscuous-mode","","3","","","","#REF!","","","","","","","The mode of a watcher in a network."],["339","G","n","protocol","","protocol","a code of correct conduct, in our case specifically communication protocols, cryptographic protocols, and decentralized network protocols","https://github.com/weboftrust/WOT-terms/wiki/protocol","","1","1","1","1","#REF!","1","1","","","","","Our code of conduct includes communication, cryptographic, and decentralized network protocols."],["340","G","n","pseudo-random-number","","pseudo-random-number","a value that is statistically random, but it is (repeatedly) derived from a known starting point","https://github.com/weboftrust/WOT-terms/wiki/pseudo-random-number","","1","","","","","","","","","","","A randomly derived value from a known starting point."],["341","G","v","validate","","validate","a decision to accept an outcome","https://github.com/weboftrust/WOT-terms/wiki/validate","","1","","","","","","","","","","","deciding to accept an outcome"],["342","S","v","verify","","verify","the act, by or on behalf of a party, of determining whether that data is authentic, not expired, and conforms to other specifications.","https://github.com/weboftrust/WOT-terms/wiki/verify","","2"],["343","S","n","persistent-identifier","","persistent-identifier","Control over this type of long-living identifier can be transferred by rotating keys.","https://github.com/weboftrust/WOT-terms/wiki/persistent-identifier","","2","","","","","","","","","","","Keys can rotate to transfer control of long-living identifiers."],["344","K","r","interleaved-serializations","","interleaved-serializations","Serializations of different types interleaved in an overarching format","https://github.com/weboftrust/WOT-terms/wiki/interleaved-serializations","","2","","","","","","","","","","","Different types of serializations are interleaved in an overarching format."],["345","S","r","collective-signature","","collective-signature","Multisignature scheme for a single resulting pubic key","https://github.com/weboftrust/WOT-terms/wiki/collective-signature","","2","","","","","","","","","","","Multisignature scheme for a single public key."],["346","G","n","graph-fragment","","graph-fragment","an ACDC is a verifiable data structure and part of a graph consisting of a node fragment and edge fragments","https://github.com/weboftrust/WOT-terms/wiki/graph-fragment","","2","","","","","","","","","","","ACDC is a verifiable data structure that forms part of a graph, including a node fragment and edge fragments."],["347","G","r","persistent-datastructure","","persistent-datastructure","an append only verifiable data structure. Hence, making them immutable means distributable and concurrency-friendly. What we sign may not change.","https://github.com/weboftrust/WOT-terms/wiki/persistent-data-structure","","2","","","","","","","","","","","An append-only, verifiable data structure makes them immutable, which enables distribution and concurrency. What we sign cannot be changed."],["348","G","r","collision","","collision","a circumstance where two or more identifiers in a given namespace or a given scope cannot be unambiguously resolved","https://github.com/weboftrust/WOT-terms/wiki/collision","","1","","","","","","","","","","","A situation where two or more identifiers in a namespace or scope cannot be resolved unambiguously."],["349","G","n","schema-namespace-registry","","schema-namespace-registry","a centrally managed schema registry where corporations or individuals reserve schemas within a specific namespace in order to have an interoperable schema that is labeled with a corporation-specific or individual-specific namespace","https://github.com/weboftrust/WOT-terms/wiki/schema-namespace-registry","","2","","","","","","","","","","","A centrally managed schema registry allows corporations or individuals to reserve interoperable schemas within a specific namespace. These labeled schemas are assigned a corporation-specific or individual-specific namespace."],["350","G","n","schema-registry","","schema-registry","registry for credential schemas based on namespaces","https://github.com/weboftrust/WOT-terms/wiki/schema-registry","","2","","","","","","","","","","","Registry for schemas based on namespaces."],["351","G","n","domain-name","","domain-name","is a string that identifies a realm of administrative autonomy on the internet","https://github.com/weboftrust/WOT-terms/wiki/domain-name","","1","","","","","","","","","","","A string that identifies an internet administrative realm."],["352","G","n","domain","","domain","general term for (an identifier of) an autonomous space","https://github.com/weboftrust/WOT-terms/wiki/domain","","1","","","","","","","","","","","General term for an autonomous space identifier."],["353","G","n","registry","","registry","an official digital record book, usually refering to one means to a specific instance, within a multi-tenant registry.","https://github.com/weboftrust/WOT-terms/wiki/registry","","1","","","","","","","","","","","An official digital record book typically refers to a specific instance within a multi-tenant registry."],["354","G","r","composability","","composability","When any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.","https://github.com/weboftrust/WOT-terms/wiki/composability","","2","","","","","","","","","","","When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss."],["356","G","a","interoperable","","interoperable","Interoperability is a characteristic of a product or system to work with other products or systems.","https://github.com/weboftrust/WOT-terms/wiki/interoperable","","1","","","","","","","","","","","Interoperability is the ability of a product or system to work with others."],["357","G","r","interoperability","","interoperability","Interoperability is a characteristic of a product or system to work with other products or systems.","https://github.com/weboftrust/WOT-terms/wiki/interoperability","","1","","","","","","","","","","","Interoperability is the ability of a product or system to work with others."],["358","G","n","cryptographic-primitive","","cryptographic-primitive","Well-established, low-level cryptographic algorithm that is frequently used to build cryptographic protocols for computer security systems; e.g. one-way hash functions and encryption functions.","https://github.com/weboftrust/WOT-terms/wiki/cryptographic-primitive","","1","","","","","","","","","","","A well-known cryptographic algorithm commonly used in computer security systems for creating cryptographic protocols such as one-way hash functions and encryption functions."],["359","G","v","concatenation","","concatenation","the operation of joining character strings end-to-end. E.g. 'snow' and 'ball' becomes 'snowball'","https://github.com/weboftrust/WOT-terms/wiki/concatenation","","1","","","","","","","","","","","The process of combining character strings to create a single string. For example, 'snow' and 'ball' combine to form 'snowball'."],["360","G","v","multiplexing","","multiplexing","is a method by which multiple analog or digital signals are combined into one signal over a shared medium. The aim is to share a scarce resource.","https://github.com/weboftrust/WOT-terms/wiki/multiplexing","","2","","","","","","","","","","","Signal combining is a method to merge multiple analog or digital signals into a single shared signal. It aims to efficiently distribute limited resources."],["361","G","v","pipelining","","pipelining","a set of data processing elements connected in series, where the output of one element is the input of the next one.","https://github.com/weboftrust/WOT-terms/wiki/pipelining","","2","","","","","","","","","","","A series of connected data processing elements, where the output of one element becomes the input for the next."],["362","K","n","group-framing-code","","group-framing-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/group-framing-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["363","K","r","hierarchical-composition","","hierarchical-composition","encoding protocol that is composable in a hierarchy and enables pipelining of complex streams in either text or compact binary","https://github.com/weboftrust/WOT-terms/wiki/hierarchical-composition","","3","","","","","","","","","","","Composable and hierarchical encoding protocol enables pipelining of complex streams in text or binary formats."],["364","K","n","frame-code","","frame-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/frame-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["365","K","n","count-code","","count-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/count-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["366","K","n","group-code","","group-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/group-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["367","S","a","transferable","","transferable","capable of loss-less transfer of control over identifiers, private keys, etc.","https://github.com/weboftrust/WOT-terms/wiki/transferable","","1","","","","","","","","","","","Capable of lossless transfer of control for identifiers, private keys, etc."],["368","G","v","post-pad","","post-pad","the action and / or result of extending a string with trailing pad characters to align to a certain length in bits or bytes.","https://github.com/weboftrust/WOT-terms/wiki/post-pad","","3","","","","","","","","","","","Extending a string with pad characters to align it to a specific length in bits or bytes is the act or outcome."],["369","G","v","pre-pad","","pre-pad","the action and / or result of prepending a string with leading pad characters to align to a certain length in bits or bytes.","https://github.com/weboftrust/WOT-terms/wiki/pre-pad","","3","","","","","","","","","","","Prepending a string with leading pad characters is the act of aligning it to a specific length in bits or bytes."],["370","K","v","naive-conversion","","naive-conversion","a text to binary conversion or vice versa that doesn't anticipate on either composability and / or on the concatenation capability of the result of such an operation.","https://github.com/weboftrust/WOT-terms/wiki/naive-conversion","","3","","","","","","","","","","","A text to binary conversion that does not consider composability or concatenation capabilities of the output."],["371","G","n","pad","","pad","is a character used to fill empty space","https://github.com/weboftrust/WOT-terms/wiki/pad","","2","","","","","","","","","","","Is a character used to fill empty space."],["372","G","n","lead-bytes","","lead-bytes","pre-conversion added characters in a pre-padded way, used to fill empty space","https://github.com/weboftrust/WOT-terms/wiki/lead-bytes","","2","","","","","","","","","","","Pre-conversion characters were added to fill empty space in a pre-padded manner."],["373","G","n","code-table","","code-table","a code table is the Internet's most comprehensive yet simple resource for browsing and searching for various codes.","https://github.com/weboftrust/WOT-terms/wiki/code-table","","1","","","","","","","","","","","A code table is the Internet's most comprehensive and user-friendly resource for browsing and searching various codes."],["374","K","n","code-table-selector","","code-table-selector","the first character in the text code of CESR stream that determines which code table to use.","https://github.com/weboftrust/WOT-terms/wiki/code-table-selector","","3","","","","","","","","","","","The first character in the text code of CESR stream determines the code table to use."],["375","K","n","sally","","sally","a vLEI Audit Reporting Agent that receives presentations of credentials and notices of revocation.","https://github.com/weboftrust/WOT-terms/wiki/sally","","3","","","","","","","","","","","A vLEI Audit Reporting Agent that receives credential presentations and revocation notices."],["376","K","n","signify","","signify","is a web client (key) event signing - and key pair creation app that minimizes the use of KERI on the client.","https://github.com/weboftrust/WOT-terms/wiki/signify","","3","","","","","","","","","","","This is a web client app for event signing and key pair creation. It reduces the need for using KERI on the client."],["377","G","n","escrow","","escrow","a third party temporarily holds money or property until a particular condition has been met. The verb refers to handling out of order events in KERI.","https://github.com/weboftrust/WOT-terms/wiki/escrow","","1","","","","","","","","","","","A third party temporarily holds funds or assets until a specific condition is met. The verb refers to managing out-of-sequence events in KERI."],["378","K","n","keri-suite-search-engine","","keri-suite-search-engine","the Docusaurus self-education site of Web-of-Trust GitHub repo with Typesense search facilities","https://github.com/trustoverip/acdc/wiki/keri-suite-search-engine","","1","","","","","","","","","","","The Docusaurus self-education site for the Web-of-Trust GitHub repo now includes Typesense search capabilities."],["379","K","n","field-map","","field-map","a traditional key:value pair renamed to avoid confusing with the cryptographic use of the term 'key'","https://github.com/weboftrust/WOT-terms/wiki/field-map","","3","","","","","","","","","","","A traditional key:value pair is renamed to avoid confusion with the cryptographic meaning of the term 'key'."],["380","K","r","CLC","","CLC","chain-link confidential, a disclosure mechnism of credentials","https://github.com/weboftrust/WOT-terms/wiki/CLC","","3","","","","","","","","","","","Chain-link confidential is a mechanism for disclosing credentials."],["381","K","v","cold-start-stream-parsing","","cold-start-stream-parsing","After a reboot a stream processor looks for framing information to know how to parse groups of elements in the stream.","https://github.com/weboftrust/WOT-terms/wiki/cold-start-stream-parsing","","3","","","","","","","","","","","After a reboot, a stream processor searches for framing information to determine how to parse element groups in the stream."],["382","K","a","fully-compact","","fully-compact","the intermediate variant of a ACDC credential -> signed and its proofs anchored in key event logs.","https://github.com/weboftrust/WOT-terms/wiki/fully-compact","","3","","","","","","","","","","","The intermediate ACDC credential variant is signed and its proofs are anchored in key event logs."],["383","K","a","most-compact","","most-compact","the most brief least disclosing version of an ACDC based credential.","https://github.com/weboftrust/WOT-terms/wiki/most-compact","","3","","","","","","","","","","","The shortest and least revealing ACDC credential version."],["384","K","a","fully-expanded","","fully-expanded","the most extensive most disclosing and most user-friendly version of an ACDC based credential.","https://github.com/weboftrust/WOT-terms/wiki/fully-expanded","","3","","","","","","","","","","","the most comprehensive, revealing, and user-friendly ACDC-based credential."],["385","G","v","RUN","","RUN","read, update, nullify -> the new peer-to-peer end-verifiable monotonic update policy","https://github.com/weboftrust/WOT-terms/wiki/RUN","","1","","","","","","","","","","","Read, update, nullify - the new P2P EV monotonic update policy."],["386","G","v","CRUD","","CRUD","create, read, update, delete -> the traditional client-server database update policy","https://github.com/weboftrust/WOT-terms/wiki/CRUD","","1","","","","","","","","","","","The traditional client-server database update policy includes CRUD (Create, Read, Update, Delete) operations."],["387","G","n","authentic-web","","authentic-web","a mental model in which the whole internet is considered as a one giant verifiable data structure","https://github.com/weboftrust/WOT-terms/wiki/authentic-web","","1","","","","","","","","","","","The internet is viewed as one giant, verifiable data structure."],["388","K","v","run-off-the-crud","","run-off-the-crud","a decentralised controlling peer does not create records in the traditional sense of a server","https://github.com/weboftrust/WOT-terms/wiki/run-off-the-crud","","3","","","","","","","","","","","A decentralized controlling peer does not create traditional server records."],["389","G","n","integrity","","integrity","the information is whole, complete, sound, in good order and unimpaired (not necessarily correct)","https://github.com/weboftrust/WOT-terms/wiki/integrity","","1","","","","","","","","","","","The information is complete, accurate, organized, and intact (not necessarily correct)."],["390","G","n","verified-integrity","","verified-integrity","a proof of unambiguous assessment whether the information is/continues to be whole, sound and unimpaired","https://github.com/weboftrust/WOT-terms/wiki/verified-integrity","","2","","","","","","","","","","","A proof of clear assessment of whether the information remains intact, reliable, and undamaged."],["391","G","v","complementary-integrity-verification","","complementary-integrity-verification","a mechanism that can verify integrity independent of needing access to a previous instance or reference version of the information for comparison","https://github.com/weboftrust/WOT-terms/wiki/complementary-integrity-verification","","3","","","","","","","","","","","a mechanism that can independently verify integrity without needing access to a previous instance or reference version for comparison."],["392","K","n","prior-next-threshold","","prior-next-threshold","","https://github.com/weboftrust/WOT-terms/wiki/prior-next-threshold","","3","","","","","","","","","","","NO INPUT"],["393","K","n","current-signing-threshold","","current-signing-threshold","","https://github.com/weboftrust/WOT-terms/wiki/current-signing-threshold","","2","","","","","","","","","","","NO INPUT"],["394","K","n","dual-indexed-codes","","dual-indexed-codes","a context-specific coding scheme, for the common use case of thresholded multi-signature schemes in CESR","https://github.com/weboftrust/WOT-terms/wiki/dual-indexed-codes","","3","","","","","","","","","","","A specific coding scheme for thresholded multi-signature schemes in CESR."],["395","K","n","keripy","","keripy","Python implementation of KERI","https://github.com/weboftrust/WOT-terms/wiki/keripy","","2","","","","","","","","","","","Python implementation of KERI"],["396","K","n","keri-ox","","keri-ox","RUST implementation of KERI","https://github.com/weboftrust/WOT-terms/wiki/keri-ox","","2","","","","","","","","","","","RUST KERI Implementation"],["397","S","n","pii","","pii","personally identifiable information","https://github.com/weboftrust/WOT-terms/wiki/pii","","1","","","","","","","","","","","PII"],["398","S","r","contextual-linkability","","contextual-linkability","when data capture points provide enough context to be able to use statistical correlation to link existing data sets describing a person to that same person's disclosed attributes","https://github.com/trustoverip/acdc/wiki/contextual-linkability","","3","","","","","","","","","","","When data capture points give enough context to use statistical correlation in linking existing data sets describing a person to that person's disclosed attributes."],["399","K","r","blinded-revocation-registry","","blinded-revocation-registry","a transaction event log hidden or blinded; the only way a verifier can observe the state is when the AID controller discloses it at presentation time","https://github.com/weboftrust/WOT-terms/wiki/blinded-revocation-registry","","3","","","","","","","","","","","A hidden or blinded transaction event log; the verifier can only observe the state when the AID controller discloses it during presentation."],["400","G","v","rainbow-table-attack","","rainbow-table-attack","a password cracking method that uses a special table (a “rainbow table”) to crack the password hashes in a database","https://github.com/weboftrust/WOT-terms/wiki/rainbow-table-attack","","1","","","","","","","","","","","The method uses a special table, known as a \"rainbow table,\" to crack password hashes in a database."],["401","K","r","SKWA","","SKWA","Simple KERI for Web Auth","https://github.com/weboftrust/WOT-terms/wiki/skwa","","3","","","","","","","","","","","Simple KERI for Web Authentication."],["402","K","n","simple-keri-for-web-auth","","simple-keri-for-web-auth","A KERI implementation that sacrifices performance or other non-security feature for usability.","https://github.com/weboftrust/WOT-terms/wiki/simple-keri-for-web-auth","","3","","","","","","","","","","","A KERI implementation sacrificing performance or other non-security features for usability."],["403","K","r","KRAM","","KRAM","KERI Request Authentication Method for replay protection","https://github.com/weboftrust/WOT-terms/wiki/KRAM","","3","","","","","","","","","","","Keri requests an authentication method for replay protection."],["404","K","r","keri-request-authentication-method","","keri-request-authentication-method","KERI Request Authentication Method for replay protection","https://github.com/weboftrust/WOT-terms/wiki/keri-request-authentication-method","","3","","","","","","","","","","","Keri requests an authentication method for replay protection."],["405","K","n","juror","","juror","performs duplicity detection on events and event receipts","https://github.com/weboftrust/WOT-terms/wiki/juror","","3","","","","","","","","","","","performs duplicate detection on events and event receipts"],["406","K","n","jury","","jury","set of entities or components acting as jurors","https://github.com/weboftrust/WOT-terms/wiki/jury","","3","","","","","","","","","","","A group of entities or components that act as jurors."],["407","K","n","opcode","","opcode","provide stream processing instructions that are more general and flexible","https://github.com/trustoverip/acdc/wiki/opcode","","3","","","","","","","","","","","Provide more general and flexible stream processing instructions."],["408","K","n","version-code","","version-code","tells you which set of tables to load and it tells the table state.","https://github.com/weboftrust/WOT-terms/wiki/version-code","","3","","","","","","","","","","","NO INPUT"],["409","K","n","strip-parameter","","strip-parameter","tells us what part of the CESR stream will be parsed by which code","https://github.com/weboftrust/WOT-terms/wiki/strip-parameter","","3","","","","","","","","","","","This text shows which code will parse each part of the CESR stream."],["410","K","n","parside","","parside","parser library for Composable Event Streaming Representation (CESR)","https://github.com/weboftrust/WOT-terms/wiki/parside","","3","","","","","","","","","","","CESR parser library"],["411","K","n","version-string","","version-string","a workaround to make JSON, CBOR and MGPK self-framing in CESR","https://github.com/weboftrust/WOT-terms/wiki/version-string","","3","","","","","","","","","","","A workaround to make JSON, CBOR, and MGPK self-framing in CESR."],["412","K","n","cesride","","cesride","cryptographic primitives for use with Composable Event Streaming Representation (CESR)","https://github.com/weboftrust/WOT-terms/wiki/cesride","","3","","","","","","","","","","","Cryptographic primitives for CESR."],["413","K","n","sniffer","","sniffer","the sniffer is part of Parside and detects if the CESR stream contains CESR binary, CESR Text, JSON, CBOR, MGPK","https://github.com/weboftrust/WOT-terms/wiki/sniffer","","3","","","","","","","","","","","The sniffer, which is part of Parside, detects CESR binary, CESR Text, JSON, CBOR, and MGPK in the CESR stream."],["414","G","n","PRNG","","PRNG","Pseudorandom Number Generator","https://github.com/trustoverip/acdc/wiki/PRNG","","2","","","","","","","","","","","Pseudorandom Number Generator"],["415","G","n","CSPRNG","","CSPRNG","Cryptographically Secure Pseudorandom Number Generator","https://github.com/trustoverip/acdc/wiki/CSPRNG","","2","","","","","","","","","","","Cryptographically Secure PRNG"],["416","G","n","FFI","","FFI","Foreign Function Interface","https://github.com/weboftrust/WOT-terms/wiki/FFI","","2","","","","","","","","","","","Foreign Function Interface (FFI)"],["417","G","n","foreign-function-interface","","foreign-function-interface","Is a mechanism by which a program written in one programming language that can call routines or make use of services written or compiled in another one","https://github.com/weboftrust/WOT-terms/wiki/foreign-function-interface","","2","","","","","","","","","","","It is a way for a program in one programming language to call routines or utilize services from another language."],["418","G","n","HDK","","HDK","hierchical deterministic key","https://github.com/trustoverip/acdc/wiki/HDK","","1","","","","","","","","","","","Hierarchical deterministic key."],["419","G","n","HSM","","HSM","hardware security module","https://github.com/trustoverip/acdc/wiki/HSM","","1","","","","","","","","","","","Hardware security module"],["420","K","v","partial-disclosure","","partial-disclosure","an ACDC attribute section that can disclosed (a nested branch in a tree), you can either decide to disclose or not","https://github.com/trustoverip/acdc/wiki/partial-disclosure","","3","","","","","","","","","","","ACDC attribute section can be disclosed, like a nested branch in a tree. You have the option to disclose or not."],["421","K","v","selective-disclosure","","selective-disclosure","selective disclosure is a list of field maps, that you can choose to blind and publish, however all are disclosured.","https://github.com/trustoverip/acdc/wiki/selective-disclosure","","3","","","","","","","","","","","Selective disclosure is a list of field maps that you can choose to blind and publish. However, all of them are disclosed."],["422","K","v","full-disclosure","","full-disclosure","a disclosure of data in all its details","https://github.com/trustoverip/acdc/wiki/full-disclosure","","1","","","","","","","","","","","data disclosure"],["423","K","r","threshold-of-accountable-duplicity","","threshold-of-accountable-duplicity","Controller provides itself with any degree of protection by giving a minimum number of confirming witnesses sufficient given a certain accountability.","https://github.com/weboftrust/WOT-terms/wiki/threshold-of-accountable-duplicity","","3","","","","","","","","","","","The controller protects itself by having a few confirming witnesses to ensure accountability."],["424","K","n","TOAD","","TOAD","threshold of accountable duplicity; provided by controller concerning witnesses","https://github.com/weboftrust/WOT-terms/wiki/KERIA","","3","","","","","","","","","","","Accountable duplicity threshold provided by controller for witnesses."],["425","K","n","keride","","keride","Rust library for Key Event Receipt Infrastructure","https://github.com/weboftrust/WOT-terms/wiki/keride","","3","","","","","","","","","","","Rust lib for Key Event Receipt"],["426","K","n","KERIA","","KERIA","KERI agent in the cloud","","","3","","","","","","","","","","","KERI cloud agent"],["427","K","r","Signifide","","Signifide","signing at the edge","https://github.com/weboftrust/WOT-terms/wiki/Signifide","","3","","","","","","","","","","","Signing on the edge."],["428","K","n","kiwi","","kiwi","UI tooling for working with KERI","https://github.com/weboftrust/WOT-terms/wiki/kiwi","","3","","","","","","","","","","","UI tooling for KERI"],["429","G","n","hardware-security-module","","hardware-security-module","a physical computing device that safeguards and manages secrets (most importantly digital keys)","https://github.com/weboftrust/WOT-terms/wiki/hardware-security-module","","1","","","","","","","","","","","A device that safeguards and manages secrets, specifically digital keys."],["430","G","n","hierchical-deterministic-keys","","hierchical-deterministic-keys","a type of deterministic bitcoin wallet derived from a known seed, that allow for the creation of child keys from the parent key","https://github.com/weboftrust/WOT-terms/wiki/hierchical-deterministic-keys","","1","","","","","","","","","","","A deterministic bitcoin wallet can be created from a known seed, allowing for the generation of child keys from the parent key."],["431","K","r","SKRAP","","SKRAP","Signify/KERIA Request Authentication Protocol","https://github.com/weboftrust/WOT-terms/wiki/SKRAP","","3","","","","","","","","","","","Signify/KERIA Authentication Protocol Request"],["432","K","r","signify-keria-request-authentication-protocol","","signify-keria-request-authentication-protocol","The KERIA service will expose 3 separate HTTP endpoints on 3 separate network interfaces","https://github.com/weboftrust/WOT-terms/wiki/signify-keria-request-authentication-protocol","","3","","","","","","","","","","","The KERIA service will have 3 HTTP endpoints on 3 network interfaces."],["433","S","n","dead-attack","","dead-attack","an attack on an establishment event that occurs after the Key-state for that event has become stale","https://github.com/weboftrust/WOT-terms/wiki/dead-attack","","","","","","","","","","","","","NO INPUT"],["434","K","v","prefixing","","prefixing","prefixing","https://github.com/weboftrust/WOT-terms/wiki/prefixing","","3","","","","","","","","","","","Prefixing"],["435","K","v","pathing","","pathing","enables sending portions of a credential","https://github.com/weboftrust/WOT-terms/wiki/pathing","","3","","","","","","","","","","","enables sending parts of a credential"],["436","K","v","parsing","","parsing","parsing","https://github.com/weboftrust/WOT-terms/wiki/parsing","","3","","","","","","","","","","","Parsing"],["437","K","r","bespoke-credential","","bespoke-credential","It's a custom issuance of the presentation of other ACDCs, it serves as an on-the-fly contract with the issuee; it's a self-referencing and self-contained contract","https://github.com/trustoverip/acdc/wiki/bespoke-credential","","3","","","","","","","","","","","It is a customized presentation of other ACDCs. It serves as a contract with the issuee on-the-fly. It is a self-referencing and self-contained contract."],["438","K","n","KERIMask","","KERIMask","A wallet similar to MetaMask that will connect to KERIA servers in order for a person to control AIDs from their browser.","https://github.com/weboftrust/WOT-terms/wiki/KERIMask","","3","","","","","","","","","","","A MetaMask-like wallet to connect to KERIA servers, enabling browser-based control of AIDs."],["439","K","n","KERISSE","","KERISSE","KERI Suite Search Engine","https://github.com/weboftrust/WOT-terms/wiki/KERISSE","","1","","","","","","","","","","","KERI Search Engine"],["440","K","n","keri-suite","","keri-suite","is the set of inter-related developments (KERI, ACDC, OOBI, CESR, IPEX, etc) under the Web-of -Trust user on Github","https://github.com/weboftrust/WOT-terms/wiki/keri-suite","","1","","","","","","","","","","","This is a collection of interconnected developments (KERI, ACDC, OOBI, CESR, IPEX, etc.) used by the Web-of-Trust user on Github."],["441","K","n","ndigs","","ndigs","Digests of keys, used to prove control over keys or to hide keys","https://github.com/weboftrust/WOT-terms/wiki/ndigs","","3","","","","","","","","","","","Key digests are used to prove control over keys or conceal them."],["442","K","n","verfer","","verfer","a primitive that represents a public key","https://github.com/weboftrust/WOT-terms/wiki/verfer","","3","","","","","","","","","","","A public key primitive."],["443","K","n","diger","","diger","a primitive that represents a digest","https://github.com/weboftrust/WOT-terms/wiki/diger","","3","","","","","","","","","","","A primitive representing a digest."],["444","K","n","cigar","","cigar","an unindexed signature","https://github.com/weboftrust/WOT-terms/wiki/cigar","","3","","","","","","","","","","","an unindexed signature."],["445","K","n","siger","","siger","an indexed signature used within KERI when there are multiple current keys to an identifier","https://github.com/weboftrust/WOT-terms/wiki/siger","","3","","","","","","","","","","","An indexed signature is used in KERI when there are multiple current keys for an identifier."],["446","K","n","signer","","signer","a primitive that represents a private key","https://github.com/weboftrust/WOT-terms/wiki/signer","","3","","","","","","","","","","","A primitive representing a private key."],["447","K","n","salter","","salter","a primitive that represents a seed that has the ability to generate new Signers","https://github.com/weboftrust/WOT-terms/wiki/salter","","3","","","","","","","","","","","A seed that can generate new Signers."],["448","G","n","LLM","","LLM","Large Language Model","https://github.com/weboftrust/WOT-terms/wiki/LLM","","2","","","","","","","","","","","Language Model"],["449","G","n","large-language-model","","large-language-model","Is a language model consisting of a neural network with many parameters","https://github.com/weboftrust/WOT-terms/wiki/large-language-model","","2","","","","","","","","","","","The language model is a neural network with numerous parameters."],["450","K","n","ixn","","ixn","Field name for Interaction Event; its content contains a hash pointer","https://github.com/weboftrust/WOT-terms/wiki/ixn","","3","","","","","","","","","","","Interaction Event Field: Contains a hash pointer."],["451","K","n","rot","","rot","Field name for Rotation Event; its content contains a hash pointer","https://github.com/weboftrust/WOT-terms/wiki/rot","","3","","","","","","","","","","","Field name: Rotation Event\nContent: Contains a hash pointer"],["452","G","n","JSON","","JSON","JavaScript Object Notation","https://github.com/weboftrust/WOT-terms/wiki/JSON","","1","","","","","","","","","","","JavaScript Object Notation"],["453","K","v","icp","","icp","incept, inception","https://github.com/weboftrust/WOT-terms/wiki/icp","","3","","","","","","","","","","","inception"],["454","K","v","vcp","","vcp","vdr incept, verifiable data registry inception","https://github.com/weboftrust/WOT-terms/wiki/vcp","","3","","","","","","","","","","","VDR, Verifiable Data Registry, inception"],["455","K","v","bis","","bis","backed vc issue, registry-backed transaction event log credential issuance","https://github.com/weboftrust/WOT-terms/wiki/bis","","3","","","","","","","","","","","VC issuance, registry-backed transaction log for credential issuance."],["456","G","n","concise-binary-object-representation","","concise-binary-object-representation","It is a binary data serialization format loosely based on JSON","https://github.com/weboftrust/WOT-terms/wiki/concise-binary-object-representation","","3","","","","","","","","","","","It's a binary data serialization format loosely based on JSON."],["457","K","v","brv","","brv","backed vc revoke, registry-backed transaction event log credential revocation","https://github.com/weboftrust/WOT-terms/wiki/brv","","3","","","","","","","","","","","Revoked VC, registry-backed transaction event log for credential revocation."],["458","K","v","vrt","","vrt","vdr rotate, verifiable data registry rotation","https://github.com/weboftrust/WOT-terms/wiki/vrt","","3","","","","","","","","","","","VDR Rotate: Verifiable Data Registry Rotation."],["459","K","r","secure-private-authentic-confidentiality","","secure-private-authentic-confidentiality","","https://github.com/weboftrust/WOT-terms/wiki/secure-private-authentic-confidentiality","","3","","","","","","","","","","","NO INPUT"],["460","K","r","SPAC","","SPAC","secure private authentic confidentiality","https://github.com/weboftrust/WOT-terms/wiki/SPAC","","3","","","","","","","","","","","Secured, private, authentic, confidential."],["461","K","r","dead-drop","","dead-drop","a presenter controls the disclosure so you can't re-identify the data","https://github.com/weboftrust/WOT-terms/wiki/dead-drop","","3","","","","","","","","","","","The presenter controls the disclosure, preventing data re-identification."],["462","K","n","ample","","ample","minimum required number of participants in an event to have a supermajority in the consensus agreement algorithm (KAACE) in KERI","https://github.com/weboftrust/WOT-terms/wiki/ample","","3","","","","","","","","","","","The minimum number of participants needed for a supermajority in the consensus agreement algorithm (KAACE) in KERI."],["463","G","r","supermajority","","supermajority","Sufficient majority immune to certain kinds of attacks or faults","https://github.com/weboftrust/WOT-terms/wiki/supemajority","","3","","","","","","","","","","","Sufficient majority immune to certain attacks or faults."],["464","G","n","CBOR","","CBOR","concise binary object representation","https://github.com/weboftrust/WOT-terms/wiki/CBOR","","2","","","","","","","","","","","Concise binary object rep"],["465","K","n","tholder","","tholder","t-holder object that supports fractionally-weighted thresholds","https://github.com/weboftrust/WOT-terms/wiki/tholder","","3","","","","","","","","","","","T-holder object supporting fractional-weighted thresholds"],["466","K","n","bexter","","bexter","A class (programming code) in CESR that preserves its integrity in a round-trip conversion even though it offers variable length text","https://github.com/weboftrust/WOT-terms/wiki/bexter","","3","","","","","","","","","","","A class in CESR that maintains its integrity in a round-trip conversion despite variable length text."],["467","K","r","moobi","","moobi","to share a bunch of different end-points (oobis) all at once","https://github.com/weboftrust/WOT-terms/wiki/moobi","","3","","","","","","","","","","","to share multiple end-points (oobis) simultaneously"],["468","G","n","ts-node","","ts-node","npm package that lets you run typescript from a shell","https://github.com/weboftrust/WOT-terms/wiki/ts-node","","3","","","","","","","","","","","npm package for running TypeScript from a shell."],["469","K","n","interceptor","","interceptor","a keria class that allows to push events happening inside the cloud agent to other backend processes","https://github.com/weboftrust/WOT-terms/wiki/interceptor","","3","","","","","","","","","","","A Keria class enables pushing cloud agent events to other backend processes."],["470","K","n","salty-nonce-blinding-factor","","salty-nonce-blinding-factor","Selectively share a secret and hide information with this secret","https://github.com/weboftrust/WOT-terms/wiki/salty-nonce-blinding-factor","","3","","","","","","","","","","","NO INPUT"],["471","K","n","ilk","","ilk","short for message type","https://github.com/weboftrust/WOT-terms/wiki/ilk","","3","","","","","","","","","","","Short for message type."],["472","K","v","dip","","dip","delcept, delegated inception","https://github.com/weboftrust/WOT-terms/wiki/dip","","3","","","","","","","","","","","Delcept, Delegated Inception."],["473","K","v","drt","","drt","deltate, delegated rotation","https://github.com/weboftrust/WOT-terms/wiki/drt","","3","","","","","","","","","","","Deltate: delegated rotation."],["474","K","n","rct","","rct","receipt","https://github.com/weboftrust/WOT-terms/wiki/rct","","3","","","","","","","","","","","Receipt."],["475","K","n","ksn","","ksn","sate, key state notice","https://github.com/weboftrust/WOT-terms/wiki/ksn","","3","","","","","","","","","","","State key notice"],["476","K","v","qry","","qry","query","https://github.com/weboftrust/WOT-terms/wiki/qry","","3","","","","","","","","","","","Query."],["477","K","v","rpy","","rpy","reply","https://github.com/weboftrust/WOT-terms/wiki/rpy","","3","","","","","","","","","","","Reply."],["478","K","v","exn","","exn","exchange","https://github.com/weboftrust/WOT-terms/wiki/exn","","3","","","","","","","","","","","Exchange."],["479","K","v","exp","","exp","expose, sealed data exposition","https://github.com/weboftrust/WOT-terms/wiki/exp","","3","","","","","","","","","","","Data exposure."],["480","K","v","iss","","iss","vc issue, verifiable credential issuance","https://github.com/weboftrust/WOT-terms/wiki/iss","","3","","","","","","","","","","","VC issuance: verifiable credential issuance."],["481","K","v","rev","","rev","vc revoke, verifiable credential revocation","https://github.com/weboftrust/WOT-terms/wiki/rev","","3","","","","","","","","","","","VC revocation, or verifiable credential revocation."],["482","K","n","vdr","","vdr","verifiable data registry","https://github.com/weboftrust/WOT-terms/wiki/vdr","","3","","","","","","","","","","","Verifiable data registry."],["483","K","r","KATE","","KATE","Kate = KERI at the Edge","https://github.com/weboftrust/WOT-terms/wiki/KATE","","3","","","","","","","","","","","Kate at the Edge = KERI"],["484","K","v","spurn","","spurn","Reject","https://github.com/weboftrust/WOT-terms/wiki/spurn","","3","","","","","","","","","","","Reject."],["485","G","v","dnd","","dnd","do not delegate","https://github.com/WebOfTrust/WOT-terms/wiki/dnd","","3","","","","","","","","","","","Don't delegate."],["486","G","v","revocation","","revocation","The act of recall or annulment. It is the cancelling of an act, the recalling of a grant or privilege.","https://github.com/weboftrust/WOT-terms/wiki/revocation","","2","","","","","","","","","","","Recall or annulment is the act of canceling or recalling an act, grant, or privilege."],["487","G","n","verifiable-data-registry","","verifiable-data-registry","a Verifiable Data Structure that actually holds content","https://github.com/weboftrust/WOT-terms/wiki/verifiable-data-registry","","3","","","","","","","","","","","A verifiable data structure that holds content securely."],["488","G","n","VDR","","VDR","Verifiable Data Registry, a Verifiable Data Structure that actually holds content","https://github.com/weboftrust/WOT-terms/wiki/VDR","","3","","","","","","","","","","","Verifiable Data Registry, a structure that holds content and is verifiable."],["489","G","r","E2E","","E2E","end-to-end","https://github.com/weboftrust/WOT-terms/wiki/E2E","","1","","","","","","","","","","","End-to-end."],["490","G","r","end-to-end","","end-to-end","Inter-host communication and data flow transformations, considered in motion and at rest","https://github.com/weboftrust/WOT-terms/wiki/end-to-end","","1","","","","","","","","","","","Inter-host communication and data flow transformations, both in motion and at rest."],["491","K","v","duplicity-detection","","duplicity-detection","A mechanism to detect duplicity in cryptographically secured event log","https://github.com/weboftrust/WOT-terms/wiki/duplicity-detection","","2","","","","","","","","","","","Detecting duplicity in cryptographically secured event log"],["492","G","r","double-spend-proof","","double-spend-proof","Total global ordering of transactions so that you can't spend value twice","https://github.com/weboftrust/WOT-terms/wiki/double-spend-proof","","2","","","","","","","","","","","Global ordering prevents double spending."],["493","G","v","MFA","","MFA","multi-factor authentication","https://github.com/weboftrust/WOT-terms/wiki/MFA","","1","","","","","","","","","","","Multi-factor authentication."],["494","G","v","multi-factor-authentication","","multi-factor-authentication","Authentication by combining multiple security factors, e.g. what you know, what you have and what you are.","https://github.com/weboftrust/WOT-terms/wiki/multi-factor-authentication","","1","","","","","","","","","","","Authentication by combining multiple security factors, such as knowledge, possession, and identity."],["495","G","r","threshold-structure-security","","threshold-structure-security","Allows for weaker key management or execution environment infrastructure individually, but achieves greater overall security by multiplying the number of attack surfaces","https://github.com/weboftrust/WOT-terms/wiki/threshold-structure-security","","3","","","","","","","","","","","Allows for weaker management or execution environment, but improves overall security by increasing attack surfaces."],["496","G","n","TEE","","TEE","trusted-execution-environment; protected hardware/software/firmware security system","https://github.com/weboftrust/WOT-terms/wiki/TEE","","2","","","","","","","","","","","trusted execution environment: secure hardware/software/firmware system"],["497","G","n","trusted-execution-environment","","trusted-execution-environment","Protected hardware/software/firmware security system","https://github.com/weboftrust/WOT-terms/wiki/trusted-execution-environment","","2","","","","","","","","","","","Protected hardware and software security system"],["498","G","r","security-overlay-properties-trillema","","security-overlay-properties-trillema","an identifier system has some degree of any combination of the three properties authenticity, privacy and confidentiality, but not all three completely","https://github.com/weboftrust/WOT-terms/wiki/security-overlay-properties-trillema","","3","","","","","","","","","","","An identifier system possesses some combination of the three properties: authenticity, privacy, and confidentiality, but never all three to their fullest extent."],["499","S","r","autonomic-trust-basis","","autonomic-trust-basis","to form this we use an AID as the root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/autonomic-trust-basis","","3","","","","","","","","","","","To create this, we utilize an AID as the root of trust."],["500","S","n","autonomic-identifier","","autonomic-identifier","self-managing self-certifying identifier","https://github.com/weboftrust/WOT-terms/wiki/autonomic-identifier","","2","","","","","","","","","","","self-managing, self-certifying identifier."],["501","S","n","legitimized-human-meaningful-identifier","","legitimized-human-meaningful-identifier","identifier authorised through its autonomic identifier couplet","https://github.com/weboftrust/WOT-terms/wiki/legitimized-human-meaningful-identifier","","2","","","","","","","","","","","Authorized identifier through an autonomous identifier couplet."],["502","S","n","LID","","LID","Legitimized (or authorised) human meaningful identifier","https://github.com/weboftrust/WOT-terms/wiki/LID","","2","","","","","","","","","","","Human meaningful ID"],["503","S","n","security","","security","in identifier systems it means secure from exploit or compromise","https://github.com/weboftrust/WOT-terms/wiki/security","","1","","","","","","","","","","","In identifier systems, it refers to being secure against exploits or compromises."],["504","S","a","secure","","secure","in identifier systems it means secure from exploit or compromise","https://github.com/weboftrust/WOT-terms/wiki/secure","","1","","","","","","","","","","","In identifier systems, it refers to being secure against exploits or compromises."],["505","K","r","univalent","","univalent","having a unique and non-ambiguous identifier for each entity or resource","https://github.com/weboftrust/WOT-terms/wiki/univalent","","2","","","","","","","","","","","Each entity or resource should have a unique and unambiguous identifier."],["506","K","r","multi-valent","","multi-valent","A situation in which a delegator may have multiple delegates thereby enabling elastic horizontal scalability.","https://github.com/weboftrust/WOT-terms/wiki/multi-valent","","2","","","","","","","","","","","NO INPUT"],["507","S","r","security-cost-performance-architecture-trade-off","","security-cost-performance-architecture-trade-off","","https://github.com/weboftrust/WOT-terms/wiki/security-cost-performance-architecture-trade-off","","3","","","","","","","","","","","NO INPUT"],["508","K","r","cooperative-delegation","","cooperative-delegation","A type of delegation that needs both a delegator and a delegate to be established","https://github.com/weboftrust/WOT-terms/wiki/cooperative-delegation","","3","","","","","","","","","","","NO INPUT"],["509","G","n","TPM","","TPM","trusted platform module; a device that enhances the security and privacy by providing hardware-based cryptographic functions","https://github.com/weboftrust/WOT-terms/wiki/TPM","","3","","","","","","","","","","","Trusted Platform Module (TPM) is a device that enhances security and privacy through hardware-based cryptographic functions."],["510","G","n","trusted-platform-module","","trusted-platform-module","A device that enhances the security and privacy by providing hardware-based cryptographic functions","https://github.com/weboftrust/WOT-terms/wiki/trusted-platform-module","","3","","","","","","","","","","","A device that enhances security and privacy using hardware-based cryptographic functions."],["511","K","r","bivalent","","bivalent","Two independent key management infrastructures with no movement of private keys between the two.","https://github.com/weboftrust/WOT-terms/wiki/bivalent","","2","","","","","","","","","","","NO INPUT"],["512","S","n","keri‐event‐stream","","keri‐event‐stream","A stream of verifiable KERI data, consisting of the key event log and other data such as a transaction event log","https://github.com/weboftrust/WOT-terms/wiki/keri‐event‐stream","","3","","","","","","","","","","","A verifiable stream of KERI data, including the key event log and other transaction event logs."],["513","S","n","stale-key","","stale-key","A stale key is an outdated or expired encryption key that should no longer be used for securing data","https://github.com/weboftrust/WOT-terms/wiki/stale-key","","2","","","","","","","","","","","A stale key is an outdated or expired encryption key that shouldn't be used for securing data anymore."],["514","S","n","stale-event","","stale-event","An outdated or irrelevant (key) event involving an expired encryption key that may compromise security","https://github.com/weboftrust/WOT-terms/wiki/stale-event","","2","","","","","","","","","","","An obsolete or irrelevant event related to an expired encryption key that could jeopardize security."],["515","G","r","privacy","","privacy","Privacy is the ability of an individual or group to seclude themselves or information about themselves","https://github.com/weboftrust/WOT-terms/wiki/privacy","","1","","","","","","","","","","","Privacy is the ability for individuals or groups to hide themselves or their personal information."],["516","G","n","confidentiality","","confidentiality","a set of rules or a promise that limits the access or places restrictions on certain types of information","https://github.com/weboftrust/WOT-terms/wiki/confidentiality","","1","","","","","","","","","","","Rules or promises that limit access or place restrictions on certain information."],["517","K","n","RID","","RID","Root autonomic identifier","https://github.com/weboftrust/WOT-terms/wiki/RID","","3","","","","","","","","","","","Root identifier"],["518","K","n","root-autonomic-identifier","","root-autonomic-identifier","An entity may provide the root-of-trust for some ecosystem (with delegations) via its root autonomic identier (AID).","https://github.com/weboftrust/WOT-terms/wiki/root-autonomic-identifier","","3","","","","","","","","","","","An entity can offer the root-of-trust for an ecosystem through its root autonomic identifier (AID) and delegations."],["519","K","a","provenanced","","provenanced","The act of verifying authenticity or quality of documented history or origin of something","https://github.com/weboftrust/WOT-terms/wiki/provenanced","","2","","","","","","","","","","","Verifying the authenticity or origin of something."],["520","K","r","non-interactive-authentication-design","","non-interactive-authentication-design","Non-interactive Authentication Design","https://github.com/weboftrust/WOT-terms/wiki/non-interactive-authentication-design","","3","","","","","","","","","","","Non-interactive Authentication Design, shortened and with grammar corrected"],["521","K","r","interactive-authentication-design","","interactive-authentication-design","secure authentication through an interactive mechanism that requires a set of requests and responses or challenge responses with challenge response replies","https://github.com/weboftrust/WOT-terms/wiki/interactive-authentication-design","","3","","","","","","","","","","","Secure authentication is achieved through an interactive mechanism that involves requesting and responding with challenge responses."],["522","S","r","ESSR","","ESSR","Encrypt Sender, Sign the Receiver","https://github.com/weboftrust/WOT-terms/wiki/ESSR","","2","","","","","","","","","","","Encrypt sender, sign receiver."],["523","S","n","VID","","VID","Verifiable Identifier","https://github.com/weboftrust/WOT-terms/wiki/VID","","2","","","","","","","","","","","Verifiable ID"],["524","S","r","encrypt‐sender‐sign‐receiver","","encrypt‐sender‐sign‐receiver","Encrypt Sender, Sign the Receiver","https://github.com/weboftrust/WOT-terms/wiki/encrypt‐sender‐sign‐receiver","","2","","","","","","","","","","","Encrypt sender, sign receiver."],["525","S","n","verifiable-identifier","","verifiable-identifier","Cryptographically verifiable authentic identifier","https://github.com/weboftrust/WOT-terms/wiki/verifiable-identifier","","2","","","","","","","","","","","Cryptographically verifiable identifier"],["526","S","n","trust-spanning-protocol","","trust-spanning-protocol","Protocol using VIDs that signs every single message on the internet.","https://github.com/weboftrust/WOT-terms/wiki/trust-spanning-protocol","","2","","","","","","","","","","","Protocol using VIDs that signs every internet message."],["527","S","n","TSP","","TSP","Trust spanning protocol, using VIDs that signs every single message on the internet.","https://github.com/weboftrust/WOT-terms/wiki/TSP","","2","","","","","","","","","","","TrustSpan protocol, utilizing VIDs to sign every internet message."],["528","S","v","privacy-washing","","privacy-washing","De-identification so that it provides a personal data safe harbour and could be legally acceptable forwarded","https://github.com/weboftrust/WOT-terms/wiki/privacy-washing","","1","","","","","","","","","","","De-identification provides a safe harbor for personal data and can be legally acceptable when forwarded."],["529","S","n","DKR","","DKR","Did:keri resolver","https://github.com/weboftrust/WOT-terms/wiki/DKR","","2","","","","","","","","","","","Did Keri resolve?"],["530","S","n","reputation","","reputation","Consistent behaviour over time on the basis of which anyone else makes near-future decisions","https://github.com/weboftrust/WOT-terms/wiki/reputation","","1","","","","","","","","","","","Consistent behavior over time on which others base near-future decisions."],["531","S","r","discovery","","discovery","a discovery mechanism helps to locate and verify digital identities without relying on a central authority","https://github.com/weboftrust/WOT-terms/wiki/discovery","","1","","","","","","","","","","","A discovery mechanism allows locating and validating digital identities without relying on a central authority."],["532","S","r","broken-object-level-authorization","","broken-object-level-authorization","or BOLA, refers to security flaws where users can access data they shouldn't","https://github.com/weboftrust/WOT-terms/wiki/broken-object-level-authorization","","3","","","","","","","","","","","BOLA stands for security flaws allowing unauthorized data access."],["533","S","n","BOLA","","BOLA","Broken Object Level Authorization","https://github.com/weboftrust/WOT-terms/wiki/BOLA","","3","","","","","","","","","","","Broken Object-Level Authorization"],["534","K","v","read-update-nullify","","read-update-nullify","or \"RUN\"; Read, update, nullify are actions you can take on data, no create or delete","https://github.com/weboftrust/WOT-terms/wiki/read-update-nullify","","3","","","","","","","","","","","\"RUN\": Read, update, and nullify are actions for data manipulation, without the ability to create or delete."],["535","K","v","RUN","","RUN","read-update-nullify, actions you can take on data, no create or delete.","https://github.com/weboftrust/WOT-terms/wiki/RUN","","3","","","","","","","","","","","Read, update, and nullify data - these are the actions you can take. No creating or deleting is allowed."],["536","K","r","direct-mode","","direct-mode","(one-to-one) trust mode in KERI, in which the identity controller establishes control via verified signatures of the controlling key-pair.","https://github.com/weboftrust/WOT-terms/wiki/direct-mode","","3","","","","","","","","","","","KREI employs a one-to-one trust mode where the identity controller gains control through verified signatures of the controlling key-pair."],["537","K","r","indirect-mode","","indirect-mode","(one-to-many) trust mode in KERI, which extends the direct trust basis with witnessed key event receipt logs (KERL) for validating events.","https://github.com/weboftrust/WOT-terms/wiki/indirect-mode","","3","","","","","","","","","","","In KERI, there is a trust mode called one-to-many that adds witnessed key event receipt logs (KERL) to validate events."],["538","K","r","end-role","","end-role","An end role is an authorization for one AID to serve in a role for another AID.","https://github.com/weboftrust/WOT-terms/wiki/end-role","","3","","","","","","","","","","","An end role authorizes one AID to serve in another AID's role."],["539","K","n","hab","","hab","A Hab is a keystore for one identifier.","https://github.com/weboftrust/WOT-terms/wiki/hab","","3","","","","","","","","","","","A Hab is a store for one identifier."],["540","S","r","identity-assurance","","identity-assurance","The heavy-lifting to be done to establish reputational trust, KERI is for attributional trust","https://github.com/weboftrust/WOT-terms/wiki/identity-assurance","","3","","","","","","","","","","","Establishing reputational trust requires significant effort, while KERI is aimed at achieving attributional trust."],["541","S","r","attributional-trust","","attributional-trust","You can't have reputation without attributional trust, KERI offers cryptographic root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/attributional-trust","","2"],["542","S","r","reputational-trust","","reputational-trust","identity-assurance by a trusted party","https://github.com/weboftrust/WOT-terms/wiki/reputational-trust","","2"],["543","G","n","ADR","","ADR","Architectural Decision Records","https://github.com/weboftrust/WOT-terms/wiki/ADR","","2"],["544","G","n","architectural-decision-record","","architectural-decision-record","justified software design choice that addresses an architectural requirement","https://github.com/weboftrust/WOT-terms/wiki/architectural-decision-record","","2"],["545","G","n","MIME-type","","MIME-type","Also 'media type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.","https://github.com/weboftrust/WOT-terms/wiki/MIME-type","","1"],["546","G","n","media-type","","media-type","Also 'MIME type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.","https://github.com/weboftrust/WOT-terms/wiki/media-type","","1"],["547","K","n","listed-identifier","","listed-identifier","a list in an ACDC of authorised did:webs identifier + method","https://github.com/weboftrust/WOT-terms/wiki/listed-identifier","","3"],["548","S","r","designated-aliases","","designated-aliases","An AID controller can designate aliases which are AID controlled identifiers such as a did:keri, did:webs, etc","https://github.com/weboftrust/WOT-terms/wiki/designated-aliases","","2"],["549","K","a","sniffable","","sniffable","A stream is sniffable as soon as it starts with a CESR group code or field map","https://github.com/weboftrust/WOT-terms/wiki/sniffable","","3"],["550","K","n","reconciliation","","reconciliation","Reconciliation is the process in which you decide to accept a fork of the KEL or not.","https://github.com/weboftrust/WOT-terms/wiki/reconciliation","","2"],["551","S","n","party","","party","an entity who participates or is concerned in an action, proceeding, plan, etc.","https://github.com/weboftrust/WOT-terms/wiki/party","","1"],["553","S","n","verification","","verfication","An action an agent (of a principal) performs to determine the authenticity of a claim or other digital object using a cryptographic key.","https://github.com/weboftrust/WOT-terms/wiki/verification","","2"],["554","K","n","kever","","kever","Kever is a key event verifier","https://github.com/weboftrust/WOT-terms/wiki/kever","","3"],["555","S","n","kerific","","kerific","kerific is a front plugin or extension for Chrome and Brave, that matches words in text on the web that offers buttons to various SSI glossaries and definitions.","https://github.com/weboftrust/WOT-terms/wiki/kerific","","1"],["556","K","r","access-controlled-interaction","","access-controlled-interaction","Access controlled actions like submitting a report","https://github.com/weboftrust/WOT-terms/wiki/access-controlled-interaction","","3"],["557","K","r","registration-interaction","","registration-interaction","Setup/Registration interaction, new AID and authorization to establish access control","https://github.com/weboftrust/WOT-terms/wiki/registration-interaction","","3"],["559","K","n","xip","","xip","A message that allows a transaction set to become duplicity evident","https://github.com/weboftrust/WOT-terms/wiki/xip","","2"],["560","K","n","KAPI","","KAPI","KERI API","https://github.com/weboftrust/WOT-terms/wiki/KAPI","","1"],["561","S","a","self-authenticating","","self-authenticating","self-certifying","https://github.com/weboftrust/WOT-terms/wiki/self-authenticating"],["562","K","n","configuration-traits","","configuration-traits","A list of specially defined strings representing a configuration of a KEL","https://github.com/weboftrust/WOT-terms/wiki/configuration-traits","","3"],["563","K","a","abandoned-identifier","","abandoned-identifier","An AID is abandoned when there is no further possibility to register any next key event in a KEL","https://github.com/WebOfTrust/WOT-terms/wiki/abandoned-identifier"],["564","K","n","streamer","","streamer","A convenience class for supporting stream parsing, including nested CESR streams","https://github.com/WebOfTrust/WOT-terms/wiki/streamer"],["565","G","n","canonicalization","","canonicalization","A process for converting data that has more than one possible representation into a \"standard\" form","https://github.com/WebOfTrust/WOT-terms/wiki/canonicalization"]]} -======= {"range":"'Terms-WOT-manage'!A1:AC1119","majorDimension":"ROWS","values":[["Key","Type","Form","Alias","ToIP_Fkey","Philvid_Fkey","Term","text","link","Philvid_start","level","Cat_PTEL","Cat_IPEX","Cat_OOBI","Cat_CESR","Cat_ACDC","Cat_KERI","Cat_SAID","Cat_GLEIF","Shortened version","@dropdown","Shortened version static copy"],["1","K","n","","ACDC","","ACDC","type of data as issuance concretely defined by the authentic-chained-data-container specification","https://github.com/weboftrust/WOT-terms/wiki/ACDC","","3","","","","#REF!","1","","","","#NAME?","","Data type defined by Authentic Chained Data Container Spec."],["2","K","n","","ADC","","ADC","an authentic data container conveys data that allows the authenticity of its content to be proved.","https://github.com/weboftrust/WOT-terms/wiki/ADC","","3","","","","#REF!","1","","","","","","An authentic data container proves the authenticity of its content."],["3","S","n","","AID","","AID","an identifier that is self-certifying and self-sovereign.","https://github.com/weboftrust/WOT-terms/wiki/AID","","3","","","","#REF!","1","","1","","","","A self-certifying and self-sovereign identifier."],["4","S","n","","AN","","AN","a namespace that is truly self-sovereign.","https://github.com/weboftrust/WOT-terms/wiki/AN","","3","","","","#REF!","","1","","","","","A self-sovereign namespace."],["5","K","r","","APC","","APC","authentic provenance chain; evidence of data to be verfiably tracked back to its origin","https://github.com/weboftrust/WOT-terms/wiki/APC","","3","","","","#REF!","","","","","","","Verified provenance chain; evidence of data can be tracked back to its origin."],["6","K","r","","BADA","","BADA","best available data acceptance, mechanism that provides a degree of replay attack protection","https://github.com/weboftrust/WOT-terms/wiki/BADA","","3","","","1","#REF!","","","","","","","best data acceptance mechanism with replay attack protection."],["7","G","n","","BFT","","BFT","Byzantine Fault Tollerance","https://github.com/weboftrust/WOT-terms/wiki/BFT","","3","","","","#REF!","","","","","","","Byzantine Fault Tolerance"],["8","K","n","","CESR","","CESR","composable event streaming representation","https://github.com/weboftrust/WOT-terms/wiki/CESR","","3","","","","#REF!","","1","","","","","Event streaming representation"],["9","G","n","","CT","","CT","certificate transparency; internet security standard for digital certificates","https://github.com/weboftrust/WOT-terms/wiki/CT","","2","","","","#REF!","","","","","","","Certificate Transparency is an internet security standard for digital certificates."],["10","G","n","","DAG","","DAG","directed acyclic graph, mathematical construct, no cycles in it","https://github.com/weboftrust/WOT-terms/wiki/DAG","","2","","","","#REF!","","","","","","","Directed acyclic graph is a mathematical construct without any cycles."],["11","K","n","","DEL","","DEL","duplicitous event log","https://github.com/weboftrust/WOT-terms/wiki/DEL","","3","","","","#REF!","","1","","","","","Event log"],["12","G","n","","DHT","","DHT","distributed hash table","https://github.com/weboftrust/WOT-terms/wiki/DHT","","2","","","","#REF!","","1","","","","","distributed hash table"],["13","S","n","","DKMI","","DKMI","decentralized key management infrastructure; ensure no single third-party can compromise the integrity and security of a system","https://github.com/weboftrust/WOT-terms/wiki/DKMI","","2","","","","#REF!","","1","","","","","decentralized key management system; prevents any single third-party from compromising system integrity and security."],["14","S","n","","DPKI","","DPKI","decentralized public key infrastructure; ensure no single third-party can compromise the integrity and security of a system","https://github.com/weboftrust/WOT-terms/wiki/DPKI","","2","","","","#REF!","","","","","","","Decentralized PKI; guarantee no third-party compromise system integrity and security."],["15","G","n","","GPG","","GPG","Gnu Privacy Guard, a free-software replacement for Symantec's PGP cryptographic software suite","https://github.com/weboftrust/WOT-terms/wiki/GPG","","2","","","","#REF!","","","","","","","Gnu Privacy Guard is a free-software alternative to Symantec's PGP suite."],["16","G","n","","I-O","","I-O","Input / Output","https://github.com/weboftrust/WOT-terms/wiki/I-O","","1","","","","#REF!","","","","","","","Input/Output"],["17","G","n","","IANA","","IANA","Internet assigned numbers authority; oversees the allocation of IP addresses to internet service providers (ISPs)","https://github.com/weboftrust/WOT-terms/wiki/IANA","","2","","","","#REF!","","","","","","","The Internet Assigned Numbers Authority (IANA) oversees IP address allocation to ISPs."],["18","K","r","","IPEX","","IPEX","issuance and presentation exchange protocol; mechanism for the issuance and presentation of ACDCs","https://github.com/weboftrust/WOT-terms/wiki/IPEX","","3","","1","","#REF!","","1","","","","","ACDC issuance and presentation protocol; mechanism for issuing and presenting ACDCs."],["19","G","r","","JOSE","","JOSE","Javascript object signing and encryption; method to securely transfer claims between parties","https://github.com/weboftrust/WOT-terms/wiki/JOSE","","3","","","","#REF!","","1","","","","","JavaScript object signing and encryption is a secure method for transferring claims between parties."],["20","K","n","","KA2CE","","KA2CE","KERI agreement algorithm for control establishment","https://github.com/weboftrust/WOT-terms/wiki/KA2CE","","3","","","","#REF!","","1","","","","","KERI control establishment algorithm"],["21","K","n","","KAACE","","KAACE","KERI agreement algorithm for control establishment","https://github.com/weboftrust/WOT-terms/wiki/KAACE","","3","","","","#REF!","","1","","","","","KERI control establishment algorithm"],["22","K","n","","KEL","","KEL","Key Event Log","https://github.com/weboftrust/WOT-terms/wiki/KEL","","3","","","","#REF!","","1","","","","","Event Log"],["23","K","n","","KERI","","KERI","Key Event Receipt Infrastructure","https://github.com/weboftrust/WOT-terms/wiki/KERI","","3","","","","#REF!","","1","","","","","Receipt Infrastructure"],["24","K","n","","KERL","","KERL","Key Event Receipt Log","https://github.com/weboftrust/WOT-terms/wiki/KERL","","3","","","","#REF!","","1","","","","","Event Receipt Log"],["25","K","n","","KID","","KID","KERI improvement doc","https://github.com/weboftrust/WOT-terms/wiki/KID","","3","","","","#REF!","","1","","","","","Keri Improvement Document"],["26","G","n","","LoA","","LoA","any time a judgement is not a binary Yes or No, you have levels of assurance","https://github.com/weboftrust/WOT-terms/wiki/LoA","","2","","","","#REF!","","","","","","","Whenever a judgement is not simply a \"Yes\" or \"No,\" there are varying levels of assurance."],["27","G","n","","LoC","","LoC","Locus of Control","https://github.com/weboftrust/WOT-terms/wiki/LoC","","2","","","","#REF!","","","","","","","Locus of Control refers to the extent to which individuals believe they have control over events in their lives."],["28","G","n","","NFT","","NFT","Non-fungible token","https://github.com/weboftrust/WOT-terms/wiki/NFT","","1","","","","#REF!","","","","","","","Non-fungible token"],["29","K","v","","OOBI","","OOBI","Out of band introduction","https://github.com/weboftrust/WOT-terms/wiki/OOBI","","3","","","1","#REF!","","","","","","","Introduction"],["30","G","r","","P2P","","P2P","Peer to peer","https://github.com/weboftrust/WOT-terms/wiki/P2P","","1","","","","#REF!","","","","","","","Peer-to-peer"],["31","G","r","","PGP","","PGP","Pretty Good Privacy","https://github.com/weboftrust/WOT-terms/wiki/PGP","","1","","","","#REF!","","","","","","","Pretty Good Privacy (PGP)"],["32","G","n","","PKI","","PKI","Public Key Infrastructure","https://github.com/weboftrust/WOT-terms/wiki/PKI","","2","","","","#REF!","1","1","1","","","","Public Key Infrastructure (PKI)"],["33","K","n","","PTEL","","PTEL","is a public transaction event log that can be used to securely track state anchored to a KEL","https://github.com/weboftrust/WOT-terms/wiki/PTEL","","3","1","","","#REF!","","","","","","","is a secure public event log for tracking state anchored to a KEL."],["34","K","n","","SAD","","SAD","Self-Adressing Data","https://github.com/weboftrust/WOT-terms/wiki/SAD","","3","","","","#REF!","1","","","","","","Self-Addressing Data."],["35","K","n","","SAID","","SAID","Self-Adressing Identifier","https://github.com/weboftrust/WOT-terms/wiki/SAID","","3","","","","#REF!","1","","1","","","","Self-Addressing Identifier"],["36","G","n","","SATP","","SATP","secure asset transfer protocol; IETF protocol (and working group) in the making (as of mid 2022) for moving assets between blockchains","https://github.com/weboftrust/WOT-terms/wiki/SATP","","3","","","","#REF!","","","","","","","Secure asset transfer protocol: IETF protocol (and working group) currently being developed (mid-2022) to transfer assets between blockchains."],["37","S","v","","SCID","","SCID","Self-Certifying Identifier, cryptographically binds an identifier to a public and private key pair.","https://github.com/weboftrust/WOT-terms/wiki/SCID","","3","","","","#REF!","","1","","","","","A Self-Certifying Identifier cryptographically binds an identifier to a key pair."],["38","S","r","","SSI","","SSI","Self-Sovereign Identity","https://github.com/weboftrust/WOT-terms/wiki/SSI","","1","","","","#REF!","1","1","","1","","","Self-Sovereign Identity (SSI)"],["39","G","n","","TCP","","TCP","transmission control protocol, one of the main protocols of the Internet protocol suite.","https://github.com/weboftrust/WOT-terms/wiki/TCP","","2","","","1","#REF!","1","1","","","","","Transmission Control Protocol (TCP) is a key protocol in the Internet protocol suite."],["40","K","n","","TEL","","TEL","provides a cryptographic proof of registry state by reference to the corresponding controlling KEL.","https://github.com/weboftrust/WOT-terms/wiki/TEL","","3","1","","","#REF!","1","1","","","","","provides cryptographic proof of registry state via the corresponding controlling KEL."],["41","G","r","","UI","","UI","the space where interactions between humans and machines occur.","https://github.com/weboftrust/WOT-terms/wiki/UI","","1","1","1","1","#REF!","1","1","1","1","","","The area where humans and machines interact."],["42","G","n","","URL","","URL","uniform resource locator or 'web address', is a reference to a web resource that specifies its location on a computer network","https://github.com/weboftrust/WOT-terms/wiki/URL","","1","1","1","1","#REF!","1","1","1","1","","","A URL, known as a web address, is a reference to a web resource that specifies its location on a computer network."],["43","K","n","","VCTEL","","VCTEL","virtual credential transaction event log","https://github.com/weboftrust/WOT-terms/wiki/VCTEL","","3","1","","","#REF!","","","","","","","Virtual credential transaction log"],["44","G","n","","VC","","VC","virtual credential","https://github.com/weboftrust/WOT-terms/wiki/VC","","1","","","","#REF!","1","","","1","","","Virtual credential"],["45","G","n","","VDS","","VDS","verifiable data structure","https://github.com/weboftrust/WOT-terms/wiki/VDS","","3","","","","#REF!","","","","","","","Verifiable data structure."],["46","G","v","","agency","","agency","a service that a representative for an identity (agent) offers","https://github.com/weboftrust/WOT-terms/wiki/agency","","2","","","","#REF!","1","","1","1","","","A service offered by an identity representative (agent)."],["47","K","v","","ambient-verifiability","","ambient-verifiability","Verifiable by anyone, anywhere, at anytime.","https://github.com/weboftrust/WOT-terms/wiki/ambient-verifiability","","3","","","","#REF!","","","","","","","Verifiable by anyone, anywhere, at any time."],["48","G","n","y","append-only-event-logs","","append-only event logs","is a property of computer data storage such that new data can be appended to the storage, but where existing data is immutable","https://github.com/weboftrust/WOT-terms/wiki/append-only-event-logs","","2","","","","#REF!","","","","","","","Mutable data storage allows new data to be added, but existing data cannot be changed."],["49","K","n","y","authentic-chained-data-container","","authentic-chained data container","data structure that proves digital data consistency and authenticity in one go","https://github.com/weboftrust/WOT-terms/wiki/authentic-chained-data-container","","3","","","","#REF!","","","","","","","A data structure that ensures both the consistency and authenticity of digital data."],["50","K","n","y","authentic-data-container","","authentic-data container","data structure that proves digital data consistency and authenticity in one go","https://github.com/weboftrust/WOT-terms/wiki/authentic-data-container","","3","","","","#REF!","","","","","","","A data structure that ensures both the consistency and authenticity of digital data."],["51","K","v","","authentic-provenance-chain","","authentic-provenance-chain","evidence of data to be tracked back to its origin in an verifiable way","https://github.com/weboftrust/WOT-terms/wiki/authentic-provenance-chain","","3","","","","#REF!","","","","","","","Evidence of data can be tracked back to its origin in a verifiable manner."],["52","G","a","","authenticity","","authenticity","the quality of having an objectively verifiable origin","https://github.com/weboftrust/WOT-terms/wiki/authenticity","","2","","","","#REF!","","","","","","","The quality of having an objectively verifiable origin."],["53","G","n","","autonomic-computing-systems","","autonomic-computing-systems","self-managing computing systems using algorithmic governance","https://github.com/weboftrust/WOT-terms/wiki/autonomic-computing-systems","","2","","","","#REF!","","","","","","","Self-managing computing systems with algorithmic governance."],["54","S","n","","autonomic-identity-system","","autonomic-identity-system","identity systems where you can verify (establishment of) the authenticity all the way back to the root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/autonomic-identity-system","","2","","","","#REF!","","","","","","","Identity systems can verify authenticity all the way back to the root of trust."],["55","S","n","","autonomic-namespace","","autonomic-namespace","namespace that is self-certifying and hence self-administrating, is truly self-sovereign","https://github.com/weboftrust/WOT-terms/wiki/autonomic-namespace","","2","","","","#REF!","","","","","","","A self-certifying and self-administrating namespace is truly self-sovereign."],["56","K","n","y","best-available-data-acceptance-mechanism","","best available data-acceptance mechanism","BADA, mechanism that provides a degree of replay attack protection","https://github.com/weboftrust/WOT-terms/wiki/best-available-data-acceptance-mechanism","","3","","","","#REF!","","","","","","","BADA is a mechanism that offers replay attack protection."],["57","S","v","","binding","","binding","the association of data or an identifier with another identifier or a subject (a person, organization or machine)","https://github.com/weboftrust/WOT-terms/wiki/binding","","1","","","","#REF!","","","","","","","Associating data or an identifier with another identifier or subject (person, organization, or machine)."],["58","G","r","","byzantine-agreement","","byzantine-agreement","is Byzantine fault tolerance of distributed computing system coming to consensus despite arbitrary behavior from a fraction of the network","https://github.com/weboftrust/WOT-terms/wiki/byzantine-agreement","","2","","","","#REF!","","","","","","","Byzantine fault tolerance allows distributed computing systems to reach consensus despite arbitrary behavior from some network participants."],["59","G","n","y","byzantine-fault-tolerance","","byzantine-fault tolerance","is a condition of a (distributed) computer system, where components may fail and there is imperfect information on whether a component has failed","https://github.com/weboftrust/WOT-terms/wiki/byzantine-fault-tolerance","","2","","","","#REF!","","","","","","","Distributed computer systems can experience failures and uncertainty regarding component statuses."],["60","G","n","","certificate-transparency","","certificate-transparency","internet security standard and framework for digital certificates","https://github.com/weboftrust/WOT-terms/wiki/certificate-transparency","","2","","","","#REF!","","","","","","","Internet security standard and framework for digital certificates."],["61","K","n","","cesr-proof-signatures","","cesr-proof-signatures","An extension to CESR that provides signature attachments","https://github.com/weboftrust/WOT-terms/wiki/cesr-proof-signatures","","3","","","","#REF!","","","","","","","NO INPUT"],["62","G","v","","chain-of-custody","","chain-of-custody","legal chronological documentation or paper trail that records the sequence of custody of materials","https://github.com/weboftrust/WOT-terms/wiki/chain-of-custody","","2","","","","#REF!","","","","","","","A legal record that documents the sequence of material custody."],["63","G","v","","claim","","claim","assertion of the truth of something, typically one which is disputed or in doubt","https://github.com/weboftrust/WOT-terms/wiki/claim","","1","","","","#REF!","","","","","","","assertion of disputed or doubtful truth."],["64","K","n","","composable-event-streaming-representation","","composable-event-streaming-representation","Also 'CESR'. An encoding scheme of interchangeable textual and binary streaming applications of attached crypto material.","https://github.com/weboftrust/WOT-terms/wiki/composable-event-streaming-representation","","3","","","","#REF!","","","","","#NAME?","","NO INPUT"],["65","G","v","","consensus-mechanism","","consensus-mechanism","How groups of entitities come to decisions.","https://github.com/weboftrust/WOT-terms/wiki/consensus-mechanism","","2","","","","#REF!","","","","","","","NO INPUT"],["66","G","n","y","content-addressable-hash","","content-addressable hash","Finding content by a hash of this content, generated by a one-way hash function applied to the content.","https://github.com/weboftrust/WOT-terms/wiki/content-addressable-hash","","2","","","","#REF!","","","","","","","NO INPUT"],["67","S","r","","control-authority","","control-authority","Is 'who controls what?' and that is the primary factor in determining the basis for trust in them","https://github.com/weboftrust/WOT-terms/wiki/control-authority","","2","","","","#REF!","","","","","","","NO INPUT"],["68","G","n","","controller","","controller","the entity that has the ability to make changes to an identity, cryptocurrency or verifiable credential.","https://github.com/weboftrust/WOT-terms/wiki/controller","","2","","","","#REF!","","","","","","","The entity capable of modifying an identity, cryptocurrency, or verifiable credential."],["69","G","v","","correlation","","correlation","an identifier used to indicate that external parties have observed how wallet contents are related.","https://github.com/weboftrust/WOT-terms/wiki/correlation","","1","","","","#REF!","","","","","","","An identifier indicating external parties have observed the relationship between wallet contents."],["70","G","n","","credential","","credential","evidence of authority, status, rights, entitlement to privileges, or the like.","https://github.com/weboftrust/WOT-terms/wiki/credential","","1","","","","#REF!","","","","","","","Evidence of authority, status, rights, entitlements, or similar privileges."],["71","G","n","","crypto-libraries","","crypto-libraries","deal with cryptography algorithms and have API function calls to each of the supported features","https://github.com/weboftrust/WOT-terms/wiki/crypto-libraries","","1","","","","#REF!","","","","","","","This deals with cryptography algorithms and has API functions for each supported feature."],["72","G","n","","cryptocurrency","","cryptocurrency","a digital asset designed to work as a medium of exchange wherein individual coin ownership records are stored in a digital ledger.","https://github.com/weboftrust/WOT-terms/wiki/cryptocurrency","","1","","","","#REF!","","","","","","","A digital asset that serves as a medium of exchange, with individual coin ownership records stored in a digital ledger."],["73","G","n","","cryptographic-commitment-scheme","","cryptographic-commitment-scheme","is a cryptographic primitive that allows one to commit to a value while keeping it hidden to others; you can reveal the committed value later.","https://github.com/weboftrust/WOT-terms/wiki/cryptographic-commitment-scheme","","2","","","","#REF!","","","","","","","NO INPUT"],["74","G","n","","cryptographic-strength","","cryptographic-strength","used to describe greater resistance to attack of an encryption algorithm in comparison to some other (which is thus cryptographically weaker)","https://github.com/weboftrust/WOT-terms/wiki/cryptographic-strength","","1","","","","#REF!","","","","","","","NO INPUT"],["75","G","n","","cryptonym","","cryptonym","a code word or name used to refer to another name, word, project, or person","https://github.com/weboftrust/WOT-terms/wiki/cryptonym","","2","","","","#REF!","","","","","","","NO INPUT"],["76","S","n","","decentralized-identity","","decentralized-identity","is a technology that uses cryptography to allow individuals to create and control their own digital identifiers","https://github.com/weboftrust/WOT-terms/wiki/decentralized-identity","","1","","","","#REF!","","","","","","","NO INPUT"],["77","G","n","y","decentralized-key-management-infrastructure","","decentralized key-management infrastructure","an infrastructure ensure that no single third-party can compromise the integrity and security of the system as as whole.","https://github.com/weboftrust/WOT-terms/wiki/decentralized-key-management-infrastructure","","2","","","","#REF!","","","","","","","NO INPUT"],["78","S","n","","delegated-identifier","","delegated-identifier","Matches the act of delagation with the appropriate digital twin.","https://github.com/weboftrust/WOT-terms/wiki/delegated-identifier","","3","","","","#REF!","","","","","","","NO INPUT"],["79","G","n","","digital-signature","","digital-signature","a mathematical scheme for verifying the authenticity of digital messages or documents","https://github.com/weboftrust/WOT-terms/wiki/digital-signature","","1","","","","#REF!","","","","","","","Mathematical scheme to verify authenticity of digital messages or documents."],["80","G","n","","directed-acyclic-graph","","directed-acyclic-graph","DAG, a mathematical construct, particularly graph theory, the acyclic property stems from a directed graph with no cycles","https://github.com/weboftrust/WOT-terms/wiki/directed-acyclic-graph","","2","","","","#REF!","","1","","","","","A DAG, a mathematical construct in graph theory, is a directed graph with no cycles, giving it the acyclic property."],["81","G","n","","distributed-hash-table","","distributed-hash-table","any participant can retrieve the value associated with a given key","https://github.com/weboftrust/WOT-terms/wiki/distributed-hash-table","","2","","","","#REF!","","","","","","","Any participant can get the value for a specific key."],["82","K","n","y","dual-text-binary-encoding-format","","dual-text binary-encoding format","An encoding format that allows for both text and binary encoding format, which is fully interchangeable","https://github.com/weboftrust/WOT-terms/wiki/dual-text-binary-encoding-format","","3","","","","#REF!","","1","","","","","NO INPUT"],["83","K","n","","duplicitous-event-log","","duplicitous-event-log","record of inconsistent event messages produced by a given controller or witness","https://github.com/weboftrust/WOT-terms/wiki/duplicitous-event-log","","3","","","","#REF!","","1","","","","","log of inconsistent event messages from a controller or witness"],["84","G","n","","duplicity","","duplicity","external inconsistency; which stems from publication of two or more versions of a (by itself consistent) key event log","https://github.com/weboftrust/WOT-terms/wiki/duplicity","","3","","","","#REF!","","1","","","","","External inconsistency occurs when multiple versions of a key event log are published, even though the log itself is consistent."],["85","G","v","","electronic-signature","","electronic-signature","","https://github.com/weboftrust/WOT-terms/wiki/electronic-signature","","1","","","","#REF!","","","","","","","NO INPUT"],["86","G","a","","end-verifiable","","end-verifiable","","https://github.com/weboftrust/WOT-terms/wiki/end-verifiable","","3","","","","#REF!","","1","","","","","NO INPUT"],["87","G","v","","entropy","","entropy","","https://github.com/weboftrust/WOT-terms/wiki/entropy","","2","","","","#REF!","","1","","","","","NO INPUT"],["88","G","a","","ephemeral","","ephemeral","","https://github.com/weboftrust/WOT-terms/wiki/ephemeral","","2","","","","#REF!","","1","","","","","NO INPUT"],["89","K","a","","first-seen","","first-seen","","https://github.com/weboftrust/WOT-terms/wiki/first-seen","","3","","","","#REF!","","1","","","","","NO INPUT"],["90","G","n","","gnu-privacy-guard","","gnu-privacy-guard","GPG is a free-software replacement for Symantec's PGP cryptographic software suite","https://github.com/weboftrust/WOT-terms/wiki/gnu-privacy-guard","","2","","","","#REF!","","","","","","","GPG replaces Symantec's PGP software suite for free."],["91","K","n","","habery","","habery","","https://github.com/weboftrust/WOT-terms/wiki/habery","","3","","","","#REF!","","","","","","","NO INPUT"],["92","G","r","","hierarchical-asynchronous-coroutines-and-input-output","","hierarchical-asynchronous-coroutines-and-input-output","","https://github.com/weboftrust/WOT-terms/wiki/hierarchical-asynchronous-coroutines-and-input-output","","3","","","","#REF!","","","","","","","NO INPUT"],["93","G","n","","identifier","","identifier","Something to uniquely identify (public) identities; pointing to something or someone else.","https://github.com/weboftrust/WOT-terms/wiki/identifier","","1","","","","#REF!","","","","","","","Something to uniquely identify public identities, pointing to someone or something else."],["94","G","n","","identity","","identity","a unique entity. Typically represented by a unique identifier.","https://github.com/weboftrust/WOT-terms/wiki/identity","","2","","","","#REF!","","","","","","","A distinct entity typically represented by a unique identifier."],["95","K","n","","inception-event","","inception-event","the first event in KERI that establishes an identifier.","https://github.com/weboftrust/WOT-terms/wiki/inception-event","","3","1","","","#REF!","","1","","","","","The initial event in KERI that establishes an identifier."],["96","G","v","","inception","","inception","operation creating an AID by binding it to the initial set of authoritative keypairs and any other associated information.","https://github.com/weboftrust/WOT-terms/wiki/inception","","2","","","","#REF!","","","","","","","Create an AID by binding it to the initial set of authoritative keypairs and any relevant information."],["97","G","r","","inconsistency","","inconsistency","different parts of a reason, idea or opinion do not agree, or it does not agree with something else.","https://github.com/weboftrust/WOT-terms/wiki/inconsistency","","1","","","","#REF!","","1","","","","","When different parts of a reason, idea, or opinion do not agree, or it is in disagreement with something else."],["98","K","n","","indexed-signature","","indexed-signature","an index telling which public key is used when signing anything with a multi-key autonomic identifier.","https://github.com/weboftrust/WOT-terms/wiki/indexed-signature","","3","","","","#REF!","","","","","","","An index indicating the public key used for signing with a multi-key autonomic identifier."],["99","G","r","","internal-inconsistency","","internal-inconsistency","A status that exists within an entity where different parts of a reason, idea or opinion disagree.","https://github.com/weboftrust/WOT-terms/wiki/internal-inconsistency","","2","","","","#REF!","","1","","","","","A disagreement within an entity where different parts have conflicting reasons, ideas, or opinions."],["100","G","n","","internet-assigned-numbers-authority","","internet-assigned-numbers-authority","Also IANA; the organization that oversees the allocation of IP addresses to internet service providers (ISPs)","https://github.com/weboftrust/WOT-terms/wiki/internet-assigned-numbers-authority","","3","","","","#REF!","","","","","","","IANA oversees IP address allocation to ISPs."],["101","K","r","","issuance-and-presentation-exchange-protocol","","issuance-and-presentation-exchange-protocol","provides a uniform mechanism for the issuance and presentation of ACDCs in a securely attributable manner","https://github.com/weboftrust/WOT-terms/wiki/issuance-and-presentation-exchange-protocol","","3","","","","#REF!","1","","","","","","provides a secure and standardized way to issue and present ACDCs."],["102","G","r","","javascript-object-signing-and-encryption","","javascript-object-signing-and-encryption","Javascript object signing and encryption; method to securely transfer claims between parties","https://github.com/weboftrust/WOT-terms/wiki/javascript-object-signing-and-encryption","","1","","","","#REF!","","","","","","","JavaScript object signing and encryption is a secure method for transferring claims between parties."],["103","K","n","","judge","","judge","","https://github.com/weboftrust/WOT-terms/wiki/judge","","3","","","","#REF!","","","","","","","NO INPUT"],["104","K","r","","keri-agreement-algorithm-for-control-establishment","","keri-agreement-algorithm-for-control-establishment","","https://github.com/weboftrust/WOT-terms/wiki/keri-agreement-algorithm-for-control-establishment","","3","","","","#REF!","","1","","","","","NO INPUT"],["105","K","n","y","keri-command-line-interface","","keri command-line interface","","https://github.com/weboftrust/WOT-terms/wiki/keri-command-line-interface","","3","","","","#REF!","1","1","","","","","NO INPUT"],["106","K","n","","keri-improvement-doc","","keri-improvement-doc","","https://github.com/weboftrust/WOT-terms/wiki/keri-improvement-doc","","3","","","","#REF!","","1","","","","","NO INPUT"],["107","K","n","","keridemlia","","keridemlia","distributed database of Witness IP-addresses","https://github.com/weboftrust/WOT-terms/wiki/keridemlia","","3","","","","#REF!","","","","","","","Database of Witness IP addresses."],["108","G","v","","key-compromise","","key-compromise","","https://github.com/weboftrust/WOT-terms/wiki/key-compromise","","2","","","","#REF!","","1","","","","","NO INPUT"],["109","K","n","","key-event-message","","key-event-message","","https://github.com/weboftrust/WOT-terms/wiki/key-event-message","","3","","","","#REF!","","1","","","","","NO INPUT"],["110","K","n","","key-event-receipt-infrastructure","","key-event-receipt-infrastructure","approach to decentralized identifiers and decentralized key management that promises significant benefits for self-sovereign identity and Trust over IP infrastructure","https://github.com/weboftrust/WOT-terms/wiki/key-event-receipt-infrastructure","","3","","","","#REF!","","1","","","","","An approach to decentralized identifiers and key management that offers significant benefits for self-sovereign identity and Trust over IP infrastructure."],["111","K","n","","key-event-receipt-log","","key-event-receipt-log","","https://github.com/weboftrust/WOT-terms/wiki/key-event-receipt-log","","3","","","","#REF!","","1","","","","","NO INPUT"],["112","K","n","","key-event-receipt","","key-event-receipt","","https://github.com/weboftrust/WOT-terms/wiki/key-event-receipt","","3","","","","#REF!","","1","","","","","NO INPUT"],["113","G","n","","key-state","","key-state","","https://github.com/weboftrust/WOT-terms/wiki/key-state","","2","","","","#REF!","","1","","","","","NO INPUT"],["114","G","n","","key-transparency","","key-transparency","lookup service for generic records and a public, tamper-proof audit log of all record changes","https://github.com/weboftrust/WOT-terms/wiki/key-transparency","","3","","","","#REF!","","1","","","","","lookup service for generic records and a publicly accessible, tamper-proof audit log of all record modifications"],["115","G","n","","key","","key","","https://github.com/weboftrust/WOT-terms/wiki/key","","2","","","","#REF!","","1","","","","","NO INPUT"],["116","G","n","","levels-of-assurance","","levels-of-assurance","LoA, any time a judgement is not a binary Yes or No, you have levels of assurance","https://github.com/weboftrust/WOT-terms/wiki/levels-of-assurance","","3","","","","#REF!","","","","","","","In LoA, when a judgment isn't a simple Yes or No, there are various levels of assurance."],["117","G","n","","liveness","","liveness","","https://github.com/weboftrust/WOT-terms/wiki/liveness","","3","","","","#REF!","","","","","","","NO INPUT"],["118","G","r","","loci-of-control","","loci-of-control","","https://github.com/weboftrust/WOT-terms/wiki/loci-of-control","","3","","","","#REF!","","","","","","","NO INPUT"],["119","K","n","","management-transaction-event-log","","management-transaction-event-log","","https://github.com/weboftrust/WOT-terms/wiki/management-transaction-event-log","","3","","","","#REF!","","","","","","","NO INPUT"],["120","G","n","","message","","message","","https://github.com/weboftrust/WOT-terms/wiki/message","","1","","","","#REF!","","","","","","","NO INPUT"],["121","G","n","","multicodec","","multicodec","","https://github.com/weboftrust/WOT-terms/wiki/multicodec","","2","","","","#REF!","","","","","","","NO INPUT"],["122","G","n","","namespace","","namespace","","https://github.com/weboftrust/WOT-terms/wiki/namespace","","1","1","","","#REF!","","","","","","","NO INPUT"],["123","K","n","","nested-cooperative-delegated-identifiers","","nested-cooperative-delegated-identifiers","","https://github.com/weboftrust/WOT-terms/wiki/nested-cooperative-delegated-identifiers","","3","","","","#REF!","","","","","","","NO INPUT"],["124","K","n","y","non-establishment-event","","non-establishment event","","https://github.com/weboftrust/WOT-terms/wiki/non-establishment-event","","3","","","","#REF!","","","","","","","NO INPUT"],["125","G","n","y","non-fungible-token","","non-fungible token","","https://github.com/weboftrust/WOT-terms/wiki/non-fungible-token","","2","","","","#REF!","","","","","","","NO INPUT"],["126","G","a","","non-normative","","non-normative","the purpose of non-normative theories is not to give answers, but rather to describe possibilities or predict results of certain actions","https://github.com/weboftrust/WOT-terms/wiki/non-normative","","1","","","","#REF!","","","","","","","Non-normative theories do not provide answers but describe possibilities or predict outcomes of specific actions."],["127","S","a","","non-repudiable","","non-repudiable","a statement's author cannot successfully dispute its authorship or the validity of an associated contract, signature or commitment.","https://github.com/weboftrust/WOT-terms/wiki/non-repudiable","","2","","","","#REF!","","","","","","","The author of a statement cannot dispute its authorship or the validity of an associated contract, signature, or commitment."],["128","G","a","","non-transferable","","non-transferable","No capacity to transfer (the control over) a certain digital asset in an unobstructed or loss-less manner.","https://github.com/weboftrust/WOT-terms/wiki/non-transferable","","1","","","","#REF!","","","","","","","No ability to transfer a digital asset without any obstruction or loss."],["129","G","a","","normative","","normative","a theory that tells you what you should do - what action you should take","https://github.com/weboftrust/WOT-terms/wiki/normative","","1","","","","#REF!","","","","","","","A theory that explains the appropriate action to take."],["130","G","r","y","one-way-function","","one-way function","a one-way function is a function that is easy to compute on every input, but hard to invert given the image of a random input","https://github.com/weboftrust/WOT-terms/wiki/one-way-function","","2","","","","#REF!","","","","","","","A one-way function is easy to compute on all inputs but difficult to reverse given the image of a random input."],["131","G","n","","payload","","payload","the payload of an item in KERI is a specific cryptographic building block","https://github.com/weboftrust/WOT-terms/wiki/payload","","1","","","","#REF!","","","","","","","The payload of an item in KERI is a cryptographic building block."],["132","G","n","","pretty-good-privacy","","pretty-good-privacy","","https://github.com/weboftrust/WOT-terms/wiki/pretty-good-privacy","","1","","","","#REF!","","","","","","","NO INPUT"],["133","K","n","y","primary-root-of-trust","","primary root-of-trust","","https://github.com/weboftrust/WOT-terms/wiki/primary-root-of-trust","","2","","","","#REF!","","","","","","","NO INPUT"],["134","G","n","","primitive","","primitive","","https://github.com/weboftrust/WOT-terms/wiki/primitive","","1","","","","#REF!","","","","","","","NO INPUT"],["135","G","n","","proof-of-authority","","proof-of-authority","proof that somebody or something has certain rights or permissions on data","https://github.com/weboftrust/WOT-terms/wiki/proof-of-authority","","2","","","","#REF!","","","","","","","proof of rights or permissions on data"],["136","K","n","","proof-of-authorship","","proof-of-authorship","proof that somebody or something has originally created certain content","https://github.com/weboftrust/WOT-terms/wiki/proof-of-authorship","","2","","","","#REF!","","","","","","","Evidence that someone or something has created specific content."],["137","G","n","","provenance","","provenance","historic documentation of cryptographic verifiable key states , data consistency and cedentials","https://github.com/weboftrust/WOT-terms/wiki/provenance","","2","","","","#REF!","","","","","","","Historical documentation of cryptographic key states, data consistency, and credentials."],["138","G","n","","public-key-infrastructure","","public-key-infrastructure","set of roles, policies, hardware, software and procedures needed to create, manage, distribute, use, store and revoke digital certificates","https://github.com/weboftrust/WOT-terms/wiki/public-key-infrastructure","","2","","","","#REF!","","","","","","","Set of roles, policies, hardware, software, and procedures required for creating, managing, distributing, utilizing, storing, and revoking digital certificates."],["139","K","n","y","public-verifiable-credential-registry","","public verifiable-credential registry","a Verifiable Data Registry that tracks the issuance/revocation state of credentials","https://github.com/weboftrust/WOT-terms/wiki/public-verifiable-credential-registry","","3","1","","","#REF!","","","","","","","A Verifiable Data Registry tracks the issuing and revoking of credentials."],["140","G","n","","race-condition","","race-condition","the condition where a system's substantive behavior is dependent on the sequence or timing of external uncontrollable events","https://github.com/weboftrust/WOT-terms/wiki/race-condition","","3","","","","#REF!","","","","","","","The condition where a system's behavior depends on external uncontrollable events' sequence or timing."],["141","K","n","","receipt-log","","receipt-log","ordered record of all key event receipts for a given set of witnesses","https://github.com/weboftrust/WOT-terms/wiki/receipt-log","","3","","","","#REF!","","","","","","","A record of key event receipts for witnesses."],["142","G","n","","receipt","","receipt","event message or reference with one or more witness signatures","https://github.com/weboftrust/WOT-terms/wiki/receipt","","3","","","","#REF!","","","","","","","event message with witness signatures"],["143","K","n","","registrar","","registrar","identifiers that serve as backers for each transaction event log under its provenance","https://github.com/weboftrust/WOT-terms/wiki/registrar","","3","","","","#REF!","","","","","","","Identifiers back each transaction event log to establish its provenance."],["144","G","n","","root-of-trust","","root-of-trust","trust in end-verifiable digital signatures from asymmetric key cryptography, replaces human basis-of-trust","https://github.com/weboftrust/WOT-terms/wiki/root-of-trust","","2","","","","#REF!","","","","","","","End-verifiable digital signatures from asymmetric key cryptography replace human basis-of-trust."],["145","K","v","","rotation","","rotation","the operation of revoking and replacing the set of authoritative key pairs for an AID","https://github.com/weboftrust/WOT-terms/wiki/rotation","","2","","","","#REF!","","","","","","","revoking and replacing authoritative key pairs for an AID"],["146","K","r","y","secondary-root-of-trust","","secondary root-of-trust","a root-of-trust that, for its secure attribution, depends on another primary root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/secondary-root-of-trust","","3","","","","#REF!","","","","","","","A root-of-trust depends on a primary root-of-trust for secure attribution."],["147","S","r","y","secure-asset-transfer-protocol","","secure asset-transfer protocol","an IETF protocol for moving assets between blockchains","https://github.com/weboftrust/WOT-terms/wiki/secure-asset-transfer-protocol","","3","","","","#REF!","","","","","","","An IETF protocol for transferring assets across blockchains."],["148","S","v","","secure-attribution","","secure-attribution","is 'whodunit?!' in cyberspace","https://github.com/weboftrust/WOT-terms/wiki/secure-attribution","","3","","","","#REF!","","","","","","","Whodunit in cyberspace!"],["149","G","n","","seed","","seed","a pseudorandomly generated number, often expressed in representation of a series of words","https://github.com/weboftrust/WOT-terms/wiki/seed","","1","","","","#REF!","","","","","","","A randomly generated number, usually expressed as a series of words."],["150","S","r","y","self-addressing-data","","self-addressing data","an encryption program that provides cryptographic privacy and authentication for data communication","https://github.com/weboftrust/WOT-terms/wiki/self-addressing-data","","3","","","","#REF!","","","","","","","An encryption program that ensures data communication's cryptographic privacy and authentication."],["151","S","r","y","self-certifying-identifier","","self-certifying identifier","cryptographically binds an identifier to a public and private key pair","https://github.com/weboftrust/WOT-terms/wiki/self-certifying-identifier","","3","","","","#REF!","","","","","","","Cryptographically binds an identifier to a key pair."],["152","K","a","","self-framing","","self-framing","A textual encoding that includes type, size, and value is self-framing; and thus parseable without needing any additional delimiting characters.","https://github.com/weboftrust/WOT-terms/wiki/self-framing","","3","","","","#REF!","","","","","","","A self-framing textual encoding includes type, size, and value, making it parseable without any extra delimiting characters."],["153","S","n","y","self-sovereign-identity","","self-sovereign identity","","https://github.com/weboftrust/WOT-terms/wiki/self-sovereign-identity","","2","","","","#REF!","","","","","","","NO INPUT"],["154","G","n","","signed-digest","","signed-digest","","https://github.com/weboftrust/WOT-terms/wiki/signed-digest","","2","","","","#REF!","","","","","","","NO INPUT"],["155","G","n","","spanning-layer","","spanning-layer","","https://github.com/weboftrust/WOT-terms/wiki/spanning-layer","","3","","","","#REF!","","","","","","","NO INPUT"],["156","K","r","y","text-binary-concatenation-composability","","text-binary-concatenation composability","When any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.","https://github.com/weboftrust/WOT-terms/wiki/text-binary-concatenation-composability","","3","","","","#REF!","","","","","","","When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss."],["157","K","n","","transaction-event-log","","transaction-event-log","The set of transactions that determine registry state form a log called a Transaction Event Log (TEL) and is cryptographically linked to corresponding controlling KEL.","https://github.com/weboftrust/WOT-terms/wiki/transaction-event-log","","3","","","","#REF!","","","","","","","The transactions that determine the registry state form a log called Transaction Event Log (TEL) and are cryptographically linked to the corresponding controlling KEL."],["158","G","r","","transmission-control-protocol","","transmission-control-protocol","TCP is one of the main protocols of the Internet protocol suite","https://github.com/weboftrust/WOT-terms/wiki/transmission-control-protocol","","1","","","","#REF!","","","","","","","TCP is a key protocol in the Internet protocol suite."],["159","S","r","","trust-domain","","trust-domain","A trust domain is the ecosystem of interactions that rely on a trust basis. A trust basis binds controllers, identifiers, and key-pairs.","https://github.com/weboftrust/WOT-terms/wiki/trust-domain","","1","","","","#REF!","","","","","","","A trust domain is an ecosystem of interactions relying on trust. It binds controllers, identifiers, and key pairs."],["160","G","v","","validator","","validator","the capability to determine whether or not (verified) data is valid to be used for some specific purpose(s).","https://github.com/weboftrust/WOT-terms/wiki/validator","","2","1","","","#REF!","","","","","","","the ability to verify data's validity for a specific purpose."],["161","G","r","","veracity","","veracity","the quest for the truth","https://github.com/weboftrust/WOT-terms/wiki/veracity","","2","","","","#REF!","","","","","","","The Truth Quest"],["162","G","n","","verifiable-data-structure","","verifiable-data-structure","a verifiable data structure is a data structure that incorporates cryptographic techniques to ensure the integrity and authenticity of its contents","https://github.com/weboftrust/WOT-terms/wiki/verifiable-data-structure","","3","","","","#REF!","","","","","","","A verifiable data structure is a structure that uses cryptographic techniques to guarantee the integrity and authenticity of its contents."],["163","G","a","","verifiable","","verifiable","able to cryptographically verify a certain data structure on its consistency and its authenticity.","https://github.com/weboftrust/WOT-terms/wiki/verifiable","","2","","","","#REF!","","","","","","","Capable of cryptographically verifying a specific data structure for consistency and authenticity."],["164","G","n","","verifier","","verifier","the entity that (cryptogrpahically) verifies data received from peers (check structure, signatures, dates)","https://github.com/weboftrust/WOT-terms/wiki/verifier","","2","","","","#REF!","","","","","","","The entity verifies received data from peers by checking its structure, signatures, and dates using cryptography."],["165","G","n","","version","","version","is a class of systems responsible for managing changes to computer programs, documents, large web sites, or other collections of information","https://github.com/weboftrust/WOT-terms/wiki/version","","1","","","","#REF!","","","","","","","Version:\nVersion control is responsible for managing changes to computer programs, documents, web sites, or other collections of information."],["166","K","n","","virtual-credential-transaction-event-log","","virtual-credential-transaction-event-log","will track the issued or revoked state of each virtual credential (VC)","https://github.com/weboftrust/WOT-terms/wiki/virtual-credential-transaction-event-log","","3","","","","#REF!","","","","","","","NO INPUT"],["167","G","r","","web-of-trust","","web-of-trust","In cryptography, a web of trust is a concept to establish the authenticity of the binding between a public key and its owner.","https://github.com/weboftrust/WOT-terms/wiki/web-of-trust","","2","","","","#REF!","","","","","","","NO INPUT"],["168","K","n","y","well-known-witnesses","","well-known witnesses","Predictable witness identifier creation by using known salts to initialize their key stores. For testing purposes only!","https://github.com/weboftrust/WOT-terms/wiki/well-known-witnesses","","3","","","","#REF!","","","","","","","NO INPUT"],["171","G","n","","repo","repo","repo","Software repository","https://github.com/weboftrust/WOT-terms/wiki/repo","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m27s","2","","","","#REF!","","","","","","","Software Repo"],["173","G","n","","coroutines","coroutines","coroutines","Computer programs that can be suspended and resumed at will.","https://github.com/weboftrust/WOT-terms/wiki/coroutines","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s","1","","","","#REF!","","","","","","","Suspend and resume computer programs at will."],["174","G","r","","input-output","I/O","input-output","Input / output","https://github.com/weboftrust/WOT-terms/wiki/input-output","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s","1","","","","#REF!","","","","","","","Input/Output"],["175","G","n","","hio","hio","hio","Hierarchical asynchronous coroutines and I/O in Python","https://github.com/weboftrust/WOT-terms/wiki/hio","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m41s","3","","","","#REF!","","","","","","","Hierarchical async coroutines and I/O in Python."],["178","G","n","","clone","clone","clone","A copy of a system that is - and works exactly as the original","https://github.com/weboftrust/WOT-terms/wiki/clone","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=00m55s","2","","","","#REF!","","","","","","","A replica system that is functioning exactly like the original."],["179","G","n","","branch","branch","branch","A duplicate of an object under version control for further separate modification","https://github.com/weboftrust/WOT-terms/wiki/branch","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m00s","2","","","","#REF!","","","","","","","A duplicate object under version control for separate modifications."],["180","K","n","","kli","kli","kli","KERI command line interface","https://github.com/weboftrust/WOT-terms/wiki/kli","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m12s","3","","","","#REF!","","","","","","","Keri CLI"],["183","S","n","","verifiable-credential","verifiable credentials","verifiable-credential","the digital variant of our daily live's credentials (ike passport, driver's license), but in a machine-verifiable way","https://github.com/weboftrust/WOT-terms/wiki/verifiable-credential","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m26s","1","","","","#REF!","","","","","","","The digital version of our daily life credentials, such as passports and driver's licenses, but in a machine-verifiable format."],["185","G","n","","sub-shell","sub shell","sub-shell","a child shell started up from - and contained in another parent shell","https://github.com/weboftrust/WOT-terms/wiki/sub-shell","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=01m46s","1","","","","#REF!","","","","","","","A child shell started from and contained within a parent shell."],["186","S","n","","agent","agent","agent","a representative for an identity","https://github.com/weboftrust/WOT-terms/wiki/agent","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s","2","","","","#REF!","","","","","","","identity representative"],["187","G","n","","cloud-agent","cloud agent","cloud-agent","is software installed on the cloud server instances for security, monitoring, and analysis","https://github.com/weboftrust/WOT-terms/wiki/cloud-agent","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m01s","2","","","","#REF!","","","","","","","The software is installed on cloud server instances for security, monitoring, and analysis."],["190","G","n","","user-interface","U/I","user-interface","A user interface (UI) is the space where interactions between humans and machines occur.","https://github.com/weboftrust/WOT-terms/wiki/user-interface","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m16s","1","","","","#REF!","","","","","","","A user interface (UI) is where humans and machines interact."],["191","G","r","","multisig","multi-sig","multisig","A digital signature scheme which allows a group of users to sign a single piece of digital data.","https://github.com/weboftrust/WOT-terms/wiki/multisig","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s","1","","","","#REF!","","","","","","","A digital signature scheme enables a group of users to sign a single piece of digital data."],["192","G","n","","identifier-system","identifier","identifier-system","Something to uniquely identify (public) identities, pointing to something or someone else.","https://github.com/weboftrust/WOT-terms/wiki/identifier-system","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m29s","2","","","","#REF!","","","","","","","A unique identifier for public identities, referring to something or someone else."],["193","G","n","","wallet","wallet","wallet","A wallet is a collection of data stores, made up of a keystore, local and remote key event log database and credential database.","https://github.com/weboftrust/WOT-terms/wiki/wallet","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m34s","3","","","","#REF!","","","","","","","A wallet includes a keystore, local and remote key event log database, and a credential database."],["195","K","n","","witness","witnesses","witness","Entity that may receive, verify, and store key events for an identifier","https://github.com/weboftrust/WOT-terms/wiki/witness","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s","3","","","","#REF!","","","","","","","Entity that receives, verifies, and stores key events for an identifier."],["196","K","n","","watcher","watchers","watcher","Guarantee that KERI logs are immutable","https://github.com/weboftrust/WOT-terms/wiki/watcher","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=02m44s","3","","","","#REF!","","","","","","","Ensure KERI logs are immutable."],["197","G","v","","key-management","key management","key-management","Management of cryptographic keys in a crypto-system.","https://github.com/weboftrust/WOT-terms/wiki/key-management","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m16s","3","","","","#REF!","","","","","","","Managing cryptographic keys in a crypto-system."],["199","S","n","y","single-signature-identifier","single sig identifier","single-signature identifier","An identifier that is controlled by a one-of-one signing keypair","https://github.com/weboftrust/WOT-terms/wiki/single-signature-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m27s","2","","","","#REF!","","","","","","","An identifier controlled by a unique signing keypair."],["200","G","n","","keystore","key store","keystore","A keystore in KERI is the encrypted data store that hold the private keys for a collection of AIDs.","https://github.com/weboftrust/WOT-terms/wiki/keystore","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m33s","3","","","","#REF!","","","","","","","A keystore in KERI is an encrypted data store that holds the private keys for a collection of AIDs."],["201","S","r","","key-event","key events","key-event","Events happening to controlling keys of an identifier recorded in a Key Event Log (KEL).","https://github.com/weboftrust/WOT-terms/wiki/key-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s","2","1","","","#REF!","","","","","","","Events happening to control keys of an identifier are recorded in a Key Event Log (KEL)."],["202","S","r","","interaction-event","interaction event","interaction-event","Anchors external data to the key-state as established by the most recent prior establishment event","https://github.com/weboftrust/WOT-terms/wiki/interaction-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s","3","","","","#REF!","","","","","","","Anchoring external data to the key-state established by the most recent establishment event."],["203","S","r","","rotation-event","rotation event","rotation-event","Changes the key-state which includes a change to the set of authoritative keypairs for an AID","https://github.com/weboftrust/WOT-terms/wiki/rotation-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m39s","3","","","","#REF!","","","","","","","Changes the key-state, including a change to the set of authoritative keypairs for an AID."],["204","G","n","","signing-threshold","signing thresholds","signing-threshold","Minimum number of valid signatures to satisfy the requirement for successful validation","https://github.com/weboftrust/WOT-terms/wiki/signing-threshold","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=04m48s","3","","","","#REF!","","","","","","","Minimum number of valid signatures for successful validation requirement."],["205","K","n","","key-event-log","KEL","key-event-log","Key Event Log is the native KERI verifiable data structure","https://github.com/weboftrust/WOT-terms/wiki/key-event-log","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m01s","3","1","","","#REF!","","","","","","","Key Event Log is the KERI's native verifiable data structure."],["206","G","v","","verify-signature","verify signatures","verify-signature","Applying an algorithm that either accepts or rejects the message's claim to authenticity; when you can succesfully verify a signature","https://github.com/weboftrust/WOT-terms/wiki/verify-signature","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=05m32s","2","","","","#REF!","","","","","","","Applying an algorithm to verify the authenticity of a message by accepting or rejecting its claim when a signature can be successfully verified."],["207","G","r","","peer-to-peer","peer-to-peer communications","peer-to-peer","Peers are equally privileged, equipotent participants in a network","https://github.com/weboftrust/WOT-terms/wiki/peer-to-peer","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m13s","2","","","","#REF!","","","","","","","Peers are equally privileged and equipotent participants in a network."],["209","G","n","","salt","salts","salt","Random data that is used as an additional input to a cryptographic one-way function","https://github.com/weboftrust/WOT-terms/wiki/salt","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=06m50s","3","","","","#REF!","","","","","","","Random data used as an additional input for a cryptographic one-way function."],["210","K","v","","delegation","delegation","delegation","Delegation can be defined as “the act of empowering to act for another”","https://github.com/weboftrust/WOT-terms/wiki/delegation","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s","3","","","","#REF!","","","","","","","Delegation is the act of empowering someone to act on behalf of another."],["211","K","r","","multi-sig-delegation","multi-sig delegation","multi-sig-delegation","delegated identifiers under multi-signature control","https://github.com/weboftrust/WOT-terms/wiki/multi-sig-delegation","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=07m44s","3","","","","#REF!","","","","","","","Multi-signature control for delegated identifiers."],["213","S","n","","transferable-identifier","transferable","transferable-identifier","Control over identifier can be transferred by rotating keys","https://github.com/weboftrust/WOT-terms/wiki/transferable-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=08m34s","3","","","","#REF!","","","","","","","Keys can transfer control over identifiers by rotating them."],["215","G","n","","configuration-files","configuration file","configuration-files","File used to configure the parameters and initial settings for some computer programs","https://github.com/weboftrust/WOT-terms/wiki/configuration-files","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=09m16s","1","","","","#REF!","","","","","","","This file configures parameters and initial settings for computer programs."],["219","G","r","","transfer_Protocol","post and put","transfer_Protocol","HTTP request methods to indicate the desired action to be performed on the identified resource","https://github.com/weboftrust/WOT-terms/wiki/transfer_Protocol","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=10m17s","2","","","","#REF!","","","","","","","HTTP request methods indicate the desired action on the identified resource."],["221","G","n","","passcode","passcode","passcode","Secret data, typically a string of characters, usually used to confirm a user's identity","https://github.com/weboftrust/WOT-terms/wiki/passcode","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m06s","2","","","","#REF!","","","","","","","Secret data, often a string of characters, commonly utilized for user identity verification."],["222","G","v","","key-stretching","stretched into an encryption key","key-stretching","make a possibly weak key, typically a password or passphrase, more secure against a brute-force attack by increasing the resources","https://github.com/weboftrust/WOT-terms/wiki/key-stretching","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=11m11s","3","","","","#REF!","","","","","","","Enhance the security of a potentially weak key, such as a password or passphrase, against brute-force attacks by increasing available resources."],["224","K","n","y","non-transferable-identifier","non-transferable identifier","non-transferable-identifier","Controlling keys over this identifier cannot be rotated and therefore this identifier is non-transferable to other control","https://github.com/weboftrust/WOT-terms/wiki/non-transferable-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=14m28s","3","","","","#REF!","","","","","","","Keys cannot be rotated for this identifier, making it non-transferable for control elsewhere."],["226","K","n","","threshold-signature-scheme","witness threshold","threshold-signature-scheme","The minimum number of valid witness signatures required","https://github.com/weboftrust/WOT-terms/wiki/threshold-signature-scheme","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m37s","3","","","","#REF!","","","","","","","Minimum required witness signatures."],["227","K","v","","pre-rotation","pre-rotation","pre-rotation","commitment to next rotated key set in previous rotation or inception event","https://github.com/weboftrust/WOT-terms/wiki/pre-rotation","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=15m54s","3","","","","#REF!","","","","","","","commitment to the next key set rotated in the previous rotation or inception event."],["228","K","n","","prefix","prefixes","prefix","A prefix that is composed of a basic Base-64 (URL safe) derivation code pre-pended to Base-64 encoding of a basic public digital signing key","https://github.com/weboftrust/WOT-terms/wiki/prefix","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m47s","3","","","","#REF!","","","","","","","The prefix is a combination of a Base-64 derivation code and the Base-64 encoding of a public digital signing key."],["229","G","n","","base64","base64","base64","A group of binary-to-text encoding schemes that represent binary data","https://github.com/weboftrust/WOT-terms/wiki/base64","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s","3","","","","#REF!","","","","","","","Binary-to-text encoding schemes represent binary data."],["230","K","a","","qualified","qualified","qualified","when qualified, a cryptographic primitive includes a prepended derivation code","https://github.com/weboftrust/WOT-terms/wiki/qualified","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s","3","","","","#REF!","","","","","","","When qualified, a cryptographic primitive includes a derived code prepended."],["231","K","n","","derivation-code","derivation code","derivation-code","A special character that encodes the derivation process, pre-pended to the identifier","https://github.com/weboftrust/WOT-terms/wiki/derivation-code","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m53s","3","","","","#REF!","","","","","","","A special character that encodes the derivation process, added to the identifier."],["232","G","n","","blake3","Blake3 hash","blake3","BLAKE3 is a relatively young (2020) cryptographic hash function based on Bao and BLAKE2.","https://github.com/weboftrust/WOT-terms/wiki/blake3","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=16m57s","3","","","","#REF!","","","","","","","BLAKE3 is a new cryptographic hash function, released in 2020, that builds upon Bao and BLAKE2."],["233","G","n","","data-anchor","anchor data into","data-anchor","Data anchors are digests of digital data, that uniquely identify this data","https://github.com/weboftrust/WOT-terms/wiki/data-anchor","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m14s","3","","","","#REF!","","","","","","","Data anchors are digital data digests that uniquely identify the data."],["234","S","n","","autonomic-identifier","AID","autonomic-identifier","An identifier that is self-certifying and self-sovereign","https://github.com/weboftrust/WOT-terms/wiki/autonomic-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m50s","3","","","","#REF!","","","","","","","A self-certifying and self-sovereign identifier."],["236","G","n","","digest","digest","digest","Verifiable cryptographic commitment. It's a collision resistant hash of content","https://github.com/weboftrust/WOT-terms/wiki/digest","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=17m57s","2","1","","","#REF!","","","","","","","Verifiable cryptographic commitment is a collision-resistant content hash."],["237","K","r","","issuance-event","issuance event","issuance-event","The inception event of a verifiable credential","https://github.com/weboftrust/WOT-terms/wiki/issuance-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m02s","3","","","","#REF!","","","","","","","The inception event of a verifiable credential."],["238","K","n","","public-transaction-event-log","public transaction event log","public-transaction-event-log","Is a hash linked data structure of transactions that can be used to track state","https://github.com/weboftrust/WOT-terms/wiki/public-transaction-event-log","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=18m05s","3","","","","#REF!","","","","","","","A hash linked data structure is used to track state in transactions."],["239","G","n","","Rust","","Rust","programming language","https://github.com/weboftrust/WOT-terms/wiki/Rust","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m34s","3","","","","#REF!","","","","","","","Programming Language"],["240","K","r","","establishment-event","establishment","establishment-event","An event that establishes control authority","https://github.com/weboftrust/WOT-terms/wiki/establishment-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=19m39s","3","","","","#REF!","","","","","","","A control authority event"],["242","K","r","","indexed-signature","indexed signatures","indexed-signature","Used when signing anything with a multi-key autonomic identifier, a verifier knows which of the multiple public keys was used","https://github.com/weboftrust/WOT-terms/wiki/indexed-signature","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=23m46s","3","","","","#REF!","","","","","","","When signing with a multi-key autonomic identifier, a verifier can determine which specific public key was used."],["245","K","n","y","self-addressing-identifier","self-addressing identifiers","self-addressing identifier","An identifier that is deterministically generated from and embedded in the content it identifies, making it and its data mutually tamper-evident","https://github.com/weboftrust/WOT-terms/wiki/self-addressing-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=25m29s","3","","","","#REF!","","","","","","","An identifier is deterministically generated from and embedded in the content it identifies, making it and its data tamper-evident."],["246","K","n","","backer","backer","backer","Backers include both regular KERI witnesses and ledger-registered backers","https://github.com/weboftrust/WOT-terms/wiki/backer","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m48s","3","","","","#REF!","","","","","","","Backers include regular KERI witnesses and ledger-registered supporters."],["247","K","n","","ledger-backer","ledger backer","ledger-backer","A witness in KERI that is ledger-registered","https://github.com/weboftrust/WOT-terms/wiki/ledger-backer","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s","3","","","","#REF!","","","","","","","A registered witness in KERI."],["248","K","n","","witness","witness backer","witness","A native KERI witness whose control authority is established in a KEL","https://github.com/weboftrust/WOT-terms/wiki/witness","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=27m55s","3","","","","#REF!","","","","","","","A KERI witness, native to KEL, has established control authority."],["249","K","n","","verifiable-legal-entity-identifier","vLEI","verifiable-legal-entity-identifier","Digital verifiable credentials issued by (delegates) of GLEIF to prove that information about a legel entity is verifiably authentic","https://github.com/weboftrust/WOT-terms/wiki/verifiable-legal-entity-identifier","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m17s","3","","","","#REF!","","","","","","","Digital verifiable credentials issued by GLEIF delegates to verify the authenticity of information about a legal entity."],["250","S","n","","ssi-system","SSI system","ssi-system","SSI Infrastructure consisting of the technological components that are deployed all over the world","https://github.com/weboftrust/WOT-terms/wiki/ssi-system","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m22s","1","","","","#REF!","","","","","","","SSI Infrastructure consists of technological components deployed worldwide."],["252","K","v","","transfer-off-ledger","transfer off a ledger","transfer-off-ledger","The act of transferring control authority over an identifier from a ledger (or blockchain) to the native verifiable KERI data structure KEL","https://github.com/weboftrust/WOT-terms/wiki/transfer-off-ledger","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=30m39s","3","","","","#REF!","","","","","","","Transferring control authority of an identifier from a ledger or blockchain to the KEL data structure in KERI."],["255","G","n","","service-endpoint","service endpoints","service-endpoint","A web service endpoint which is a URL at which clients of specific service can get access to the service.","https://github.com/weboftrust/WOT-terms/wiki/service-endpoint","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=32m54s","2","","","","#REF!","","","","","","","A web service endpoint is a URL where clients can access a specific service."],["256","G","n","","uniform-resource-locator","URLs","uniform-resource-locator","A reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it","https://github.com/weboftrust/WOT-terms/wiki/uniform-resource-locator","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m00s","1","","","","#REF!","","","","","","","A web resource reference that specifies its location on a computer network and a retrieval mechanism."],["257","G","n","","ip-address","ip-address","ip-address","A numerical label such as '192.0.2.1' that is connected to a computer network that uses the Internet Protocol for communication","https://github.com/weboftrust/WOT-terms/wiki/ip-address","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=33m42s","1","","","","#REF!","","","","","","","A numerical label, like '192.0.2.1', connected to a computer network using the Internet Protocol for communication."],["258","G","n","","tcp-endpoint","TCP endpoint","tcp-endpoint","This is a service endpoint of the web transmission control protocol","https://github.com/weboftrust/WOT-terms/wiki/tcp-endpoint","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=34m00s","2","","","","#REF!","","","","","","","This is a web transmission control protocol endpoint."],["259","K","n","","inquisitor","inquisitor","inquisitor","Someone (in a validating role) that launches an inquiry at some KERI witness","https://github.com/weboftrust/WOT-terms/wiki/inquisitor","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=37m19s","3","","","","#REF!","","","","","","","A person (in a validating role) who questions a KERI witness."],["260","G","v","","replay-attack","","replay-attack","intercept and then fraudulently delays or resend a message to misdirect the receiver into doing what the attacker wants","https://github.com/weboftrust/WOT-terms/wiki/replay-attack","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=49m13s","3","","","","#REF!","","","","","","","Intercepting a message and fraudulently delaying or resending it to misdirect the receiver into complying with the attacker's desires."],["261","G","n","","XBRL","","XBRL","extensible business reporting language, standard for digital business reporting","https://github.com/weboftrust/WOT-terms/wiki/XBRL","","1","","","","","","","","","","","Extensible Business Reporting Language (XBRL), a digital standard for business reporting."],["262","G","n","","extensible-business-reporting-language","","extensible-business-reporting-language","XBRL, standard for digital business reporting","https://github.com/weboftrust/WOT-terms/wiki/extensible-business-reporting-language","","1","","","","","","","","","","","XBRL is the standard for digital business reporting."],["263","K","n","","locked-state","locked state","locked-state","default state of an encrypted KERI data store with a passcode","https://github.com/weboftrust/WOT-terms/wiki/locked-state","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=52m22s","3","","","","#REF!","","","","","","","The default state of an encrypted KERI data store with a passcode."],["265","K","r","y","out-of-band-introduction","data OOBIs","out-of-band introduction","data out-of-band introductions","https://github.com/weboftrust/WOT-terms/wiki/out-of-band-introduction","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m48s","3","","","","#REF!","","","","","","","Data out-of-band intros"],["266","K","r","y","out-of-band-introduction","credential schema OOBIs","out-of-band introduction","credential schema out-of-band introductions","https://github.com/weboftrust/WOT-terms/wiki/out-of-band-introduction","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=53m54s","3","","","","#REF!","","","","","","","Credentials schema introductions outside of the main channel."],["267","K","n","","keep","keep","keep","is KERI's and ACDC's depreciated crypto wallet, a task orientated application for managing AIDs in ecosystems, e.g. the vLEI Ecosystem","https://github.com/weboftrust/WOT-terms/wiki/keep","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=54m12s","3","","","","#REF!","","","","","","","This is a deprecated crypto wallet by KERI and ACDC. It is a task-oriented app for managing AIDs in ecosystems such as the vLEI Ecosystem."],["268","G","r","","zero-trust","zero trust","zero-trust","a Zero Trust approach trusts no one","https://github.com/weboftrust/WOT-terms/wiki/zero-trust","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m37s","2","","","","#REF!","","","","","","","In a Zero Trust approach, no one is trusted."],["270","K","r","","revocation-event","revocation events","revocation-event","An event that revokes control authority over an identifier","https://github.com/weboftrust/WOT-terms/wiki/revocation-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=55m58s","2","","","","#REF!","","","","","","","An event revoking control authority over an identifier."],["272","K","n","","escrow-state","escrow states","escrow-state","The current state of all the temporary storage locations (what events are waiting for what other information) that KERI protocol needs to keep track of, due to its fully asynchronous nature.","https://github.com/weboftrust/WOT-terms/wiki/escrow-state","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=56m59s","3","","","","#REF!","","","","","","","The current state of all temporary storage locations that the KERI protocol needs to keep track of, due to its fully asynchronous nature (events waiting for other information)."],["273","K","r","y","server-sent-event","server-sent events","server-sent event","Mailbox notifications, a streaming service for the agent U/I, to get notifications from the KERI system itself","https://github.com/weboftrust/WOT-terms/wiki/server-sent-event","https://youtu.be/GqjsRuu0V5A?list=PLXVbQu7JH_LHVhs0rZ9Bb8ocyKlPljkaG&t=57m19s","3","","","","#REF!","","","","","","","Mailbox notifications is a streaming service for the agent U/I, providing notifications directly from the KERI system."],["274","G","n","","seal","","seal","cryptographic proof in a secondary root-of-trust that is anchored in a primary-root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/seal","","2","1","","","#REF!","","","","","","","cryptographic proof in a secondary root-of-trust anchored in a primary root-of-trust"],["275","S","a","","authoritative","","authoritative","(control over) an identifier is 'authoritative' because it can be considered accurate, renowned, honourable and / or respected","https://github.com/weboftrust/WOT-terms/wiki/authoritative","","3","1","","","#REF!","","","","","","","An identifier has control and is considered authoritative when it is accurate, renowned, honorable, and respected."],["276","K","n","","QVI","","QVI","qualified vlei issuer, contracting party qualified by GLEIF","https://github.com/weboftrust/WOT-terms/wiki/QVI","","2","","","","#REF!","","","","1","","","Qualified vlei issuer, contracting party qualified by GLEIF."],["277","K","n","","qualified-vlei-issuer","","qualified-vlei-issuer","QVI, contracting party qualified by GLEIF","https://github.com/weboftrust/WOT-terms/wiki/qualified-vlei-issuer","","2","","","","#REF!","","","","1","","","QVI, a contracting party qualified by GLEIF."],["278","K","n","","ghost-credential","","ghost-credential","a valid credential within in a 90 days grace period","https://github.com/weboftrust/WOT-terms/wiki/ghost-credential","","2","","","","#REF!","","","","1","","","a valid credential within a 90-day grace period"],["279","K","n","","redundant-credential","","redundant-credential","multiple -, independently valid credentials issued by the same issuer","https://github.com/weboftrust/WOT-terms/wiki/redundant-credential","","2","","","","#REF!","","","","1","","","Multiple independently valid credentials issued by the same issuer."],["280","K","r","","engagement-context-role","","engagement-context-role","A person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/engagement-context-role","","2","","","","#REF!","","","","1","","","A person represents the Legal Entity in a role and is issued an ECR vLEI Credential."],["281","K","r","","ECR","","ECR","A person that represents the Legal Entity in a context role and is issued an ECR vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/ECR","","2","","","","#REF!","","","","1","","","A person represents the Legal Entity in a role and is issued an ECR vLEI Credential."],["282","K","n","","gleif-authorized-representative","","gleif authorized representative","A GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/gleif-authorized-representative","","2","","","","#REF!","","","","1","","","A GLEIF representative authorized to verify and issue the QVI vLEI Credential."],["283","K","n","","GAR","","GAR","A GLEIF representative authorized to perform verification needed to issue the QVI vLEI Credential.","https://github.com/weboftrust/WOT-terms/wiki/GAR","","2","","","","#REF!","","","","1","","","A GLEIF representative authorized to verify and issue the QVI vLEI Credential."],["284","G","n","","GLEIF","","GLEIF","Global Legal Entity Identifier Foundation","https://github.com/weboftrust/WOT-terms/wiki/GLEIF","","1","","","","#REF!","","","","1","","","Global LEI Foundation."],["285","K","n","","DAR","","DAR","A representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.","https://github.com/weboftrust/WOT-terms/wiki/DAR","","2","","","","#REF!","","","","1","","","A representative authorized by a Legal Entity to act on its behalf officially."],["286","K","n","","designated-authorized-representative","","designated-authorized-representative","A representative of a Legal Entity authorized by the Legal Entity to act officially on behalf of the Legal Entity.","https://github.com/weboftrust/WOT-terms/wiki/designated-authorized-representative","","2","","","","#REF!","","","","1","","","A representative authorized by a Legal Entity to act on its behalf officially."],["287","K","n","","AVR","","AVR","authorized vlei representative","https://github.com/weboftrust/WOT-terms/wiki/AVR","","2","","","","#REF!","","","","1","","","Authorized Vlei representative."],["288","K","n","","authorized-vlei-representative","","authorized-vlei-representative","a representative of a Legal Entity that's authorized to request issuance and revocation of credentials","https://github.com/weboftrust/WOT-terms/wiki/authorized-vlei-representative","","2","","","","#REF!","","","","1","","","a representative of a legal entity authorized to request issuance and revocation of credentials"],["289","G","n","","LEI","","LEI","Legal Entity Institute","https://github.com/weboftrust/WOT-terms/wiki/LEI","","2","","","","#REF!","","","","1","","","Legal Entity Institute."],["290","G","n","","legal-entity","","legal-entity","unique parties that are legally or financially responsible for financial transactions or have the legal right to enter into legal contracts","https://github.com/weboftrust/WOT-terms/wiki/legal-entity","","2","","","","#REF!","","","","1","#NAME?","","parties legally or financially responsible for transactions or with the legal right to enter contracts"],["291","K","r","","OOR","","OOR","official organizational role, a person holding a vLEI credential person and representing the Legal Entity","https://github.com/weboftrust/WOT-terms/wiki/OOR","","2","","","","#REF!","","","","1","","","official organizational role, a person holding a vLEI credential and representing the Legal Entity"],["292","K","r","","official-organizational-role","","official-organizational-role","OOR, a person holding a vLEI credential person and representing the Legal Entity","https://github.com/weboftrust/WOT-terms/wiki/official-organizational-role","","2","","","","#REF!","","","","1","","","OOR, a person holding a vLEI credential and representing the Legal Entity"],["293","K","n","y","qvi-authorized-representative","","qvi-authorized representative","QAR, conducts QVI operations with GLEIF and Legal Entities","https://github.com/weboftrust/WOT-terms/wiki/qvi-authorized-representative","","2","","","","#REF!","","","","1","","","QAR conducts QVI operations in collaboration with GLEIF and Legal Entities."],["294","K","n","","QAR","","QAR","qvi authorized representative, conducts QVI operations with GLEIF and Legal Entities","https://github.com/weboftrust/WOT-terms/wiki/QAR","","2","","","","#REF!","","","","1","","","Authorized representative conducts QVI operations with GLEIF and legal entities."],["295","K","n","","vlei-ecosystem-governance-framework","","vlei-ecosystem-governance-framework","a document that defines the information security, privacy, availability, confidentiality and processing integrity policies that apply","https://github.com/weboftrust/WOT-terms/wiki/vlei-ecosystem-governance-framework","","2","","","","#REF!","","","","1","","","This document defines the policies for information security, privacy, availability, confidentiality, and processing integrity."],["296","K","v","","solicited-issuance","","solicited-issuance","issuance of Legal Entity vLEI / OOR / ECR Credentials upon receipt by the QAR","https://github.com/weboftrust/WOT-terms/wiki/solicited-issuance","","2","","","","#REF!","","","","1","","","issuing vLEI/OOR/ECR Credentials upon QAR's receipt."],["297","K","v","","unsolicited-issuance","","unsolicited-issuance","issuance of a Legal Entity vLEI Credential upon notice by a QAR to its AVR(s)","https://github.com/weboftrust/WOT-terms/wiki/unsolicited-issuance","","2","","","","#REF!","","","","1","","","QAR notifies AVR(s) to issue a vLEI Credential to Legal Entity."],["298","G","n","","governance-framework","","governance-framework","a set of rules how to apply technology","https://github.com/weboftrust/WOT-terms/wiki/governance-framework","","2","","","","#REF!","","","","1","","","A set of rules on how to apply technology."],["299","K","n","","GLEIS","","GLEIS","Global Legal Entity Identifier System","https://github.com/weboftrust/WOT-terms/wiki/GLEIS","","2","","","","#REF!","","","","1","","","Global LEI System"],["300","K","n","","vlei-credential","","vlei-credential","verifiable Legal Entity Identifier","https://github.com/weboftrust/WOT-terms/wiki/vlei-credential","","2","","","","#REF!","","","","1","","","Verifiable LEI"],["301","K","r","","legal-entity-engagement-context-role-vlei-credential-governance-framework","","legal-entity-engagement-context-role-vlei-credential-governance-framework","A document that details the requirements for vLEI Role Credentials issued to representatives of a Legal Entity in functional - or other context of engagement.","https://github.com/weboftrust/WOT-terms/wiki/legal-entity-engagement-context-role-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["302","K","n","","vlei-role-credential","","vlei-role-credential","A vLEI credential that attests a role.","https://github.com/weboftrust/WOT-terms/wiki/vlei-role-credential","","2","","","","#REF!","","","","1","","","NO INPUT"],["303","K","n","","legal-entity-official-organizational-role-vlei-credential-governance-framework","","legal-entity-official-organizational-role-vlei-credential-governance-framework","A document that details the requirements for vLEI Role Credentials issued to official representatives of a Legal Entity.","https://github.com/weboftrust/WOT-terms/wiki/legal-entity-official-organizational-role-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["304","K","n","","legal-entity-vlei-credential-governance-framework","","legal-entity-vlei-credential-governance-framework","A document that details the requirements for vLEI Credential issued by a Qualified vLEI Issuer to a Legal Entity","https://github.com/weboftrust/WOT-terms/wiki/legal-entity-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["305","K","n","","qualified-vlei-issuer-vlei-credential-governance-framework","","qualified-vlei-issuer-vlei-credential-governance-framework","A document that details the requirements to enable this Credential to be issued by GLEIF to Qualified vLEI Issuers","https://github.com/weboftrust/WOT-terms/wiki/qualified-vlei-issuer-vlei-credential-governance-framework","","2","","","","#REF!","","","","1","","","NO INPUT"],["306","S","n","","DID","","DID","Decentralized Identifier","https://github.com/weboftrust/WOT-terms/wiki/DID","","2","","","","#REF!","","","","","","","DID"],["307","S","n","","decentralized-identifier","","decentralized-identifier","Decentralized identifiers (DIDs) enable verifiable, decentralized digital identity, refering to a person, organization, thing, data model, abstract entity, etc.","https://github.com/weboftrust/WOT-terms/wiki/decentralized-identifier","","1","","","","#REF!","","","","","","","NO INPUT"],["308","K","v","","partial-pre-rotation","","partial-pre-rotation","change of control but partially keep some keys unexposed while exposing others as needed.","https://github.com/weboftrust/WOT-terms/wiki/partial-pre-rotation","","3","","","","#REF!","","1","","","","","Change control but partially keep certain keys undisclosed while exposing others as required."],["309","K","v","","partial-rotation","","partial-rotation","change of control but partially keep some keys unexposed while exposing others as needed.","https://github.com/weboftrust/WOT-terms/wiki/partial-rotation","","3","","","","#REF!","","1","","","","","Change control but partially keep certain keys undisclosed while exposing others as required."],["310","K","v","","custodial-rotation","","custodial-rotation","change of control that is split between two key sets","https://github.com/weboftrust/WOT-terms/wiki/custodial-rotation","","3","","","","#REF!","","1","","","","","Change of control split between two key sets."],["311","K","v","","reserve-rotation","","reserve-rotation","preparatory key pairs being held in reserve and not exposed","https://github.com/weboftrust/WOT-terms/wiki/reserve-rotation","","3","","","","#REF!","","1","","","","","Preparation key pairs reserved and not exposed."],["312","K","n","","custodial-agent","","custodial-agent","a custodian who has been granted signing authority and usually also being the host of the running agent software.","https://github.com/weboftrust/WOT-terms/wiki/custodial-agent","","3","","","","#REF!","","1","","","","","A custodian typically granted signing authority and also acts as the host for the running agent software."],["313","S","r","","signing-authority","","signing-authority","the authority to sign on behalf of the controller of an identifier","https://github.com/weboftrust/WOT-terms/wiki/signing-authority","","3","","","","#REF!","","1","","","","","the authority to sign for the controller of an identifier"],["314","S","r","","rotation-authority","","rotation-authority","the (exclusive) right to change control over an identifier","https://github.com/weboftrust/WOT-terms/wiki/rotation-authority","","3","","","","#REF!","","1","","","","","The exclusive right to change control of an identifier."],["315","G","n","y","trans-contextual-value","","trans-contextual value","value that is transferrable between contexts","https://github.com/weboftrust/WOT-terms/wiki/trans-contextual-value","","1","","","","#REF!","","1","","","","","Transferable value across contexts."],["316","G","r","","source-of-truth","","source-of-truth","a trusted data source that gives a complete picture of the truth about a data object.","https://github.com/weboftrust/WOT-terms/wiki/source-of-truth","","1","","","","#REF!","","1","","","","","a reliable data source providing a comprehensive view of the truth about a data object."],["317","G","v","","authorization","","authorization","specifying access rights or privileges to resources","https://github.com/weboftrust/WOT-terms/wiki/authorization","","1","","","1","#REF!","1","1","","","","","specifying access rights to resources"],["318","G","r","","application-programming-interface","","application-programming-interface","a way for two or more computer programs to communicate with each other.","https://github.com/weboftrust/WOT-terms/wiki/application-programming-interface","","1","","","","#REF!","1","1","","","","","A method for multiple computer programs to communicate with each other."],["319","G","n","","API","","API","an application Programming Interface, a way for two or more computer programs to communicate with each other.","https://github.com/weboftrust/WOT-terms/wiki/API","","1","","","","#REF!","1","1","","","","","An API is a way for computer programs to communicate with each other."],["320","G","n","","key-pair","","key-pair","a public key and its corresponding private key.","https://github.com/weboftrust/WOT-terms/wiki/key-pair","","1","","","1","#REF!","1","1","","","","","a public key and its corresponding private key."],["321","G","n","","owner","","owner","a role that exercizes its legal, rightful or natural title to control something.","https://github.com/weboftrust/WOT-terms/wiki/owner","","1","","","","#REF!","1","1","1","1","","","A role that exercises its legal, rightful, or natural authority to control something."],["322","G","r","","ownership","","ownership","a relationship between two, one of these (the owner) is entitled to enjoy, dispose of, and control the other sovereignly.","https://github.com/weboftrust/WOT-terms/wiki/ownership","","1","","","","#REF!","1","1","1","1","","","In a relationship between two individuals, one (the owner) has the entitlement to enjoy, dispose of, and control the other entirely."],["323","G","n","","self-sovereignty","","self-sovereignty","the characteristic of every party that it is autonomous in managing and operating its own knowledge","https://github.com/weboftrust/WOT-terms/wiki/self-sovereignty","","1","","","","#REF!","1","1","","1","","","Every party is autonomous in managing and operating its own knowledge."],["324","K","r","","presentation-exchange","","presentation-exchange","an exchange that provides disclosure of one or more ACDCs between a Discloser and a Disclosee.","https://github.com/weboftrust/WOT-terms/wiki/presentation-exchange","","3","","1","","#REF!","","","","","","","an exchange that discloses one or more ACDCs between a Discloser and a Disclosee."],["325","G","n","","discloser","","discloser","an ACDC in a disclosure is disclosed by the Discloser.","https://github.com/trustoverip/acdc/wiki/discloser","","1","","1","","#REF!","","","","","","","The Discloser discloses an ACDC in a disclosure."],["326","G","n","","disclosee","","disclosee","an ACDC in a disclosure is disclosed to the Disclosee.","https://github.com/trustoverip/acdc/wiki/disclosee","","1","","1","","#REF!","","","","","","","An ACDC in a disclosure is revealed to the Disclosee."],["327","G","n","","issuer","","issuer","an ACDC is issued by the Issuer. The Issuer identifier (AID) appears in the top level of the ACDC.","https://github.com/trustoverip/acdc/wiki/issuer","","1","","1","","#REF!","","","","","","","An ACDC is issued by the Issuer and contains the Issuer identifier (AID) in the top level."],["328","G","n","","issuee","","issuee","an ACDC is optionally issued to the Issuee.","https://github.com/trustoverip/acdc/wiki/issuee","","1","","1","","#REF!","","","","","","","An ACDC can be optionally issued to the recipient."],["329","K","r","","issuance-exchange","","issuance-exchange","a special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDC","https://github.com/trustoverip/acdc/wiki/issuance-exchange","","3","","1","","#REF!","","","","","","","This is a special case of a presentation exchange where the Discloser is the Issuer of the origin (Primary) ACDC."],["330","K","r","","chain-link-confidentiality","","chain-link confidentiality","chains together a sequence of Disclosees. Each Disclosee in the sequence in turn is the Discloser to the next Disclosee.","https://github.com/trustoverip/acdc/wiki/chain-link-confidentiality","","3","","1","","#REF!","","","","","","","This text chains a sequence of Disclosees, where each Disclosee becomes the Discloser to the next."],["331","K","v","","graduated-disclosure","","graduated-disclosure","disclosure performed by a presentation exchange that has cross-variant Issuer commitment verifiability as an essential property.","https://github.com/trustoverip/acdc/wiki/graduated-disclosure","","3","","1","","#REF!","","","","","","","Disclosure is performed by a presentation exchange with cross-variant Issuer commitment verifiability as an essential property."],["332","K","n","y","top-level-section","","top-level section","are the fields of an ACDC compact variant.","https://github.com/trustoverip/acdc/wiki/top-level-section","","2","","1","","#REF!","","","","","","","These fields are part of an ACDC compact variant."],["333","K","r","","compact-variant","","compact-variant","an Issuer commitment via a signature to any variant of ACDC","https://github.com/trustoverip/acdc/wiki/compact-variant","","3","","1","","#REF!","","","","","","","an Issuer signs a commitment to any variant of ACDC."],["334","K","v","y","contractually-protected-disclosure","","contractually-protected disclosure","the most elaborate form of disclosure by an IPEX. Contractually protected disclosure includes both chain-link confidential and contingent disclosure.","https://github.com/trustoverip/acdc/wiki/contractually-protected-disclosure","","3","","1","","#REF!","","","","","","","The most detailed form of disclosure by an IPEX includes contractually protected disclosure, which encompasses both chain-link confidential and contingent disclosure."],["335","G","n","","ricardian-contract","","ricardian-contract","a method of recording a document as a contract at law, and linking it securely to other systems","https://github.com/trustoverip/acdc/wiki/ricardian-contract","","2","","1","","#REF!","","","","","","","A way to record a document as a secure contract and link it to other systems."],["336","K","v","","contingent-disclosure","","contingent-disclosure","","https://github.com/trustoverip/acdc/wiki/contingent-disclosure","","3","","1","","#REF!","","","","","","","NO INPUT"],["337","G","v","","eclipse-attack","","eclipse-attack","an eclipse attack is a P2P network-based attack, an attacker tries to isolate a node from the rest of the network","https://github.com/weboftrust/WOT-terms/wiki/eclipse-attack","","2","","","","#REF!","","1","","","","","An eclipse attack is a P2P network attack where the attacker attempts to isolate a node from the network."],["338","K","n","","promiscuous-mode","","promiscuous-mode","the indiscriminate mode a watcher (network) runs in.","https://github.com/weboftrust/WOT-terms/wiki/promiscuous-mode","","3","","","","#REF!","","","","","","","The mode of a watcher in a network."],["339","G","n","","protocol","","protocol","a code of correct conduct, in our case specifically communication protocols, cryptographic protocols, and decentralized network protocols","https://github.com/weboftrust/WOT-terms/wiki/protocol","","1","1","1","1","#REF!","1","1","","","","","Our code of conduct includes communication, cryptographic, and decentralized network protocols."],["340","G","n","y","pseudo-random-number","","pseudo-random number","a value that is statistically random, but it is (repeatedly) derived from a known starting point","https://github.com/weboftrust/WOT-terms/wiki/pseudo-random-number","","1","","","","","","","","","","","A randomly derived value from a known starting point."],["341","G","v","","validate","","validate","a decision to accept an outcome","https://github.com/weboftrust/WOT-terms/wiki/validate","","1","","","","","","","","","","","deciding to accept an outcome"],["342","S","v","","verify","","verify","the act, by or on behalf of a party, of determining whether that data is authentic, not expired, and conforms to other specifications.","https://github.com/weboftrust/WOT-terms/wiki/verify","","2"],["343","S","n","","persistent-identifier","","persistent-identifier","Control over this type of long-living identifier can be transferred by rotating keys.","https://github.com/weboftrust/WOT-terms/wiki/persistent-identifier","","2","","","","","","","","","","","Keys can rotate to transfer control of long-living identifiers."],["344","K","r","","interleaved-serialization","","interleaved-serialization","Serializations of different types interleaved in an overarching format","https://github.com/weboftrust/WOT-terms/wiki/interleaved-serialization","","2","","","","","","","","","","","Different types of serializations are interleaved in an overarching format."],["345","S","r","","collective-signature","","collective-signature","Multisignature scheme for a single resulting pubic key","https://github.com/weboftrust/WOT-terms/wiki/collective-signature","","2","","","","","","","","","","","Multisignature scheme for a single public key."],["346","G","n","","graph-fragment","","graph-fragment","an ACDC is a verifiable data structure and part of a graph consisting of a node fragment and edge fragments","https://github.com/weboftrust/WOT-terms/wiki/graph-fragment","","2","","","","","","","","","","","ACDC is a verifiable data structure that forms part of a graph, including a node fragment and edge fragments."],["347","G","r","","persistent-data-structure","","persistent-data-structure","an append only verifiable data structure. Hence, making them immutable means distributable and concurrency-friendly. What we sign may not change.","https://github.com/weboftrust/WOT-terms/wiki/persistent-data-structure","","2","","","","","","","","","","","An append-only, verifiable data structure makes them immutable, which enables distribution and concurrency. What we sign cannot be changed."],["348","G","r","","collision","","collision","a circumstance where two or more identifiers in a given namespace or a given scope cannot be unambiguously resolved","https://github.com/weboftrust/WOT-terms/wiki/collision","","1","","","","","","","","","","","A situation where two or more identifiers in a namespace or scope cannot be resolved unambiguously."],["349","G","n","","schema-namespace-registry","","schema-namespace-registry","a centrally managed schema registry where corporations or individuals reserve schemas within a specific namespace in order to have an interoperable schema that is labeled with a corporation-specific or individual-specific namespace","https://github.com/weboftrust/WOT-terms/wiki/schema-namespace-registry","","2","","","","","","","","","","","A centrally managed schema registry allows corporations or individuals to reserve interoperable schemas within a specific namespace. These labeled schemas are assigned a corporation-specific or individual-specific namespace."],["350","G","n","","schema-registry","","schema-registry","registry for credential schemas based on namespaces","https://github.com/weboftrust/WOT-terms/wiki/schema-registry","","2","","","","","","","","","","","Registry for schemas based on namespaces."],["351","G","n","","domain-name","","domain-name","is a string that identifies a realm of administrative autonomy on the internet","https://github.com/weboftrust/WOT-terms/wiki/domain-name","","1","","","","","","","","","","","A string that identifies an internet administrative realm."],["352","K","n","","domain","","domain","","https://github.com/weboftrust/WOT-terms/wiki/domain","","1","","","","","","","","","","","General term for an autonomous space identifier."],["353","G","n","","registry","","registry","an official digital record book, usually refering to one means to a specific instance, within a multi-tenant registry.","https://github.com/weboftrust/WOT-terms/wiki/registry","","1","","","","","","","","","","","An official digital record book typically refers to a specific instance within a multi-tenant registry."],["354","G","r","","composability","","composability","When any set of self-framing concatenated primitives expressed in either the text domain or binary domain may be converted as a group to the other domain and back again without loss.","https://github.com/weboftrust/WOT-terms/wiki/composability","","2","","","","","","","","","","","When a group of self-framing concatenated primitives can be converted from one domain (text or binary) to the other and vice versa without any loss."],["356","G","a","","interoperable","","interoperable","Interoperability is a characteristic of a product or system to work with other products or systems.","https://github.com/weboftrust/WOT-terms/wiki/interoperable","","1","","","","","","","","","","","Interoperability is the ability of a product or system to work with others."],["357","G","r","","interoperability","","interoperability","Interoperability is a characteristic of a product or system to work with other products or systems.","https://github.com/weboftrust/WOT-terms/wiki/interoperability","","1","","","","","","","","","","","Interoperability is the ability of a product or system to work with others."],["358","G","n","","cryptographic-primitive","","cryptographic-primitive","Well-established, low-level cryptographic algorithm that is frequently used to build cryptographic protocols for computer security systems; e.g. one-way hash functions and encryption functions.","https://github.com/weboftrust/WOT-terms/wiki/cryptographic-primitive","","1","","","","","","","","","","","A well-known cryptographic algorithm commonly used in computer security systems for creating cryptographic protocols such as one-way hash functions and encryption functions."],["359","G","v","","concatenation","","concatenation","the operation of joining character strings end-to-end. E.g. 'snow' and 'ball' becomes 'snowball'","https://github.com/weboftrust/WOT-terms/wiki/concatenation","","1","","","","","","","","","","","The process of combining character strings to create a single string. For example, 'snow' and 'ball' combine to form 'snowball'."],["360","G","v","","multiplexing","","multiplexing","is a method by which multiple analog or digital signals are combined into one signal over a shared medium. The aim is to share a scarce resource.","https://github.com/weboftrust/WOT-terms/wiki/multiplexing","","2","","","","","","","","","","","Signal combining is a method to merge multiple analog or digital signals into a single shared signal. It aims to efficiently distribute limited resources."],["361","G","v","","pipelining","","pipelining","a set of data processing elements connected in series, where the output of one element is the input of the next one.","https://github.com/weboftrust/WOT-terms/wiki/pipelining","","2","","","","","","","","","","","A series of connected data processing elements, where the output of one element becomes the input for the next."],["362","K","n","","group-framing-code","","group-framing-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/group-framing-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["363","K","r","","hierarchical-composition","","hierarchical-composition","encoding protocol that is composable in a hierarchy and enables pipelining of complex streams in either text or compact binary","https://github.com/weboftrust/WOT-terms/wiki/hierarchical-composition","","3","","","","","","","","","","","Composable and hierarchical encoding protocol enables pipelining of complex streams in text or binary formats."],["364","K","n","","frame-code","","frame-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/frame-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["365","K","n","","count-code","","count-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/count-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["366","K","n","","group-code","","group-code","codes that can be specified to support groups of primitives. Grouping enables pipelining.","https://github.com/weboftrust/WOT-terms/wiki/group-code","","3","","","","","","","","","","","Codes can be specified to support primitive groups, enabling pipelining."],["367","S","a","","transferable","","transferable","capable of loss-less transfer of control over identifiers, private keys, etc.","https://github.com/weboftrust/WOT-terms/wiki/transferable","","1","","","","","","","","","","","Capable of lossless transfer of control for identifiers, private keys, etc."],["368","G","v","","post-pad","","post-pad","the action and / or result of extending a string with trailing pad characters to align to a certain length in bits or bytes.","https://github.com/weboftrust/WOT-terms/wiki/post-pad","","3","","","","","","","","","","","Extending a string with pad characters to align it to a specific length in bits or bytes is the act or outcome."],["369","G","v","","pre-pad","","pre-pad","the action and / or result of prepending a string with leading pad characters to align to a certain length in bits or bytes.","https://github.com/weboftrust/WOT-terms/wiki/pre-pad","","3","","","","","","","","","","","Prepending a string with leading pad characters is the act of aligning it to a specific length in bits or bytes."],["370","K","v","","naive-conversion","","naive-conversion","a text to binary conversion or vice versa that doesn't anticipate on either composability and / or on the concatenation capability of the result of such an operation.","https://github.com/weboftrust/WOT-terms/wiki/naive-conversion","","3","","","","","","","","","","","A text to binary conversion that does not consider composability or concatenation capabilities of the output."],["371","G","n","","pad","","pad","is a character used to fill empty space","https://github.com/weboftrust/WOT-terms/wiki/pad","","2","","","","","","","","","","","Is a character used to fill empty space."],["372","G","n","","lead-bytes","","lead-bytes","pre-conversion added characters in a pre-padded way, used to fill empty space","https://github.com/weboftrust/WOT-terms/wiki/lead-bytes","","2","","","","","","","","","","","Pre-conversion characters were added to fill empty space in a pre-padded manner."],["373","G","n","","code-table","","code-table","a code table is the Internet's most comprehensive yet simple resource for browsing and searching for various codes.","https://github.com/weboftrust/WOT-terms/wiki/code-table","","1","","","","","","","","","","","A code table is the Internet's most comprehensive and user-friendly resource for browsing and searching various codes."],["374","K","n","","code-table-selector","","code-table-selector","the first character in the text code of CESR stream that determines which code table to use.","https://github.com/weboftrust/WOT-terms/wiki/code-table-selector","","3","","","","","","","","","","","The first character in the text code of CESR stream determines the code table to use."],["375","K","n","","sally","","sally","a vLEI Audit Reporting Agent that receives presentations of credentials and notices of revocation.","https://github.com/weboftrust/WOT-terms/wiki/sally","","3","","","","","","","","","","","A vLEI Audit Reporting Agent that receives credential presentations and revocation notices."],["376","K","n","","signify","","signify","is a web client (key) event signing - and key pair creation app that minimizes the use of KERI on the client.","https://github.com/weboftrust/WOT-terms/wiki/signify","","3","","","","","","","","","","","This is a web client app for event signing and key pair creation. It reduces the need for using KERI on the client."],["377","G","n","","escrow","","escrow","a third party temporarily holds money or property until a particular condition has been met. The verb refers to handling out of order events in KERI.","https://github.com/weboftrust/WOT-terms/wiki/escrow","","1","","","","","","","","","","","A third party temporarily holds funds or assets until a specific condition is met. The verb refers to managing out-of-sequence events in KERI."],["378","K","n","","keri-suite-search-engine","","keri-suite-search-engine","the Docusaurus self-education site of Web-of-Trust GitHub repo with Typesense search facilities","https://github.com/trustoverip/acdc/wiki/keri-suite-search-engine","","1","","","","","","","","","","","The Docusaurus self-education site for the Web-of-Trust GitHub repo now includes Typesense search capabilities."],["379","K","n","","field-map","","field-map","a traditional key:value pair renamed to avoid confusing with the cryptographic use of the term 'key'","https://github.com/weboftrust/WOT-terms/wiki/field-map","","3","","","","","","","","","","","A traditional key:value pair is renamed to avoid confusion with the cryptographic meaning of the term 'key'."],["380","K","r","","CLC","","CLC","chain-link confidential, a disclosure mechnism of credentials","https://github.com/weboftrust/WOT-terms/wiki/CLC","","3","","","","","","","","","","","Chain-link confidential is a mechanism for disclosing credentials."],["381","K","v","","cold-start-stream-parsing","","cold-start-stream-parsing","After a reboot a stream processor looks for framing information to know how to parse groups of elements in the stream.","https://github.com/weboftrust/WOT-terms/wiki/cold-start-stream-parsing","","3","","","","","","","","","","","After a reboot, a stream processor searches for framing information to determine how to parse element groups in the stream."],["382","K","a","","fully-compact","","fully-compact","the intermediate variant of a ACDC credential -> signed and its proofs anchored in key event logs.","https://github.com/weboftrust/WOT-terms/wiki/fully-compact","","3","","","","","","","","","","","The intermediate ACDC credential variant is signed and its proofs are anchored in key event logs."],["383","K","a","","most-compact","","most-compact","the most brief least disclosing version of an ACDC based credential.","https://github.com/weboftrust/WOT-terms/wiki/most-compact","","3","","","","","","","","","","","The shortest and least revealing ACDC credential version."],["384","K","a","","fully-expanded","","fully-expanded","the most extensive most disclosing and most user-friendly version of an ACDC based credential.","https://github.com/weboftrust/WOT-terms/wiki/fully-expanded","","3","","","","","","","","","","","the most comprehensive, revealing, and user-friendly ACDC-based credential."],["385","G","v","","RUN","","RUN","read, update, nullify -> the new peer-to-peer end-verifiable monotonic update policy","https://github.com/weboftrust/WOT-terms/wiki/RUN","","1","","","","","","","","","","","Read, update, nullify - the new P2P EV monotonic update policy."],["386","G","v","","CRUD","","CRUD","create, read, update, delete -> the traditional client-server database update policy","https://github.com/weboftrust/WOT-terms/wiki/CRUD","","1","","","","","","","","","","","The traditional client-server database update policy includes CRUD (Create, Read, Update, Delete) operations."],["387","G","n","","authentic-web","","authentic-web","a mental model in which the whole internet is considered as a one giant verifiable data structure","https://github.com/weboftrust/WOT-terms/wiki/authentic-web","","1","","","","","","","","","","","The internet is viewed as one giant, verifiable data structure."],["388","K","v","","run-off-the-crud","","run-off-the-crud","a decentralised controlling peer does not create records in the traditional sense of a server","https://github.com/weboftrust/WOT-terms/wiki/run-off-the-crud","","3","","","","","","","","","","","A decentralized controlling peer does not create traditional server records."],["389","G","n","","integrity","","integrity","the information is whole, complete, sound, in good order and unimpaired (not necessarily correct)","https://github.com/weboftrust/WOT-terms/wiki/integrity","","1","","","","","","","","","","","The information is complete, accurate, organized, and intact (not necessarily correct)."],["390","G","n","","verified-integrity","","verified-integrity","a proof of unambiguous assessment whether the information is/continues to be whole, sound and unimpaired","https://github.com/weboftrust/WOT-terms/wiki/verified-integrity","","2","","","","","","","","","","","A proof of clear assessment of whether the information remains intact, reliable, and undamaged."],["391","G","v","","complementary-integrity-verification","","complementary-integrity-verification","a mechanism that can verify integrity independent of needing access to a previous instance or reference version of the information for comparison","https://github.com/weboftrust/WOT-terms/wiki/complementary-integrity-verification","","3","","","","","","","","","","","a mechanism that can independently verify integrity without needing access to a previous instance or reference version for comparison."],["392","K","n","","prior-next-threshold","","prior-next-threshold","","https://github.com/weboftrust/WOT-terms/wiki/prior-next-threshold","","3","","","","","","","","","","","NO INPUT"],["393","K","n","","current-signing-threshold","","current-signing-threshold","","https://github.com/weboftrust/WOT-terms/wiki/current-signing-threshold","","2","","","","","","","","","","","NO INPUT"],["394","K","n","","dual-indexed-codes","","dual-indexed-codes","a context-specific coding scheme, for the common use case of thresholded multi-signature schemes in CESR","https://github.com/weboftrust/WOT-terms/wiki/dual-indexed-codes","","3","","","","","","","","","","","A specific coding scheme for thresholded multi-signature schemes in CESR."],["395","K","n","","keripy","","keripy","Python implementation of KERI","https://github.com/weboftrust/WOT-terms/wiki/keripy","","2","","","","","","","","","","","Python implementation of KERI"],["396","K","n","","keri-ox","","keri-ox","RUST implementation of KERI","https://github.com/weboftrust/WOT-terms/wiki/keri-ox","","2","","","","","","","","","","","RUST KERI Implementation"],["397","S","n","","pii","","pii","personally identifiable information","https://github.com/weboftrust/WOT-terms/wiki/pii","","1","","","","","","","","","","","PII"],["398","S","r","","contextual-linkability","","contextual-linkability","when data capture points provide enough context to be able to use statistical correlation to link existing data sets describing a person to that same person's disclosed attributes","https://github.com/trustoverip/acdc/wiki/contextual-linkability","","3","","","","","","","","","","","When data capture points give enough context to use statistical correlation in linking existing data sets describing a person to that person's disclosed attributes."],["399","K","r","","blinded-revocation-registry","","blinded-revocation-registry","a transaction event log hidden or blinded; the only way a verifier can observe the state is when the AID controller discloses it at presentation time","https://github.com/weboftrust/WOT-terms/wiki/blinded-revocation-registry","","3","","","","","","","","","","","A hidden or blinded transaction event log; the verifier can only observe the state when the AID controller discloses it during presentation."],["400","G","v","","rainbow-table-attack","","rainbow-table-attack","a password cracking method that uses a special table (a “rainbow table”) to crack the password hashes in a database","https://github.com/weboftrust/WOT-terms/wiki/rainbow-table-attack","","1","","","","","","","","","","","The method uses a special table, known as a \"rainbow table,\" to crack password hashes in a database."],["401","K","r","","SKWA","","SKWA","Simple KERI for Web Auth","https://github.com/weboftrust/WOT-terms/wiki/skwa","","3","","","","","","","","","","","Simple KERI for Web Authentication."],["402","K","n","","simple-keri-for-web-auth","","simple-keri-for-web-auth","A KERI implementation that sacrifices performance or other non-security feature for usability.","https://github.com/weboftrust/WOT-terms/wiki/simple-keri-for-web-auth","","3","","","","","","","","","","","A KERI implementation sacrificing performance or other non-security features for usability."],["403","K","r","","KRAM","","KRAM","KERI Request Authentication Method for replay protection","https://github.com/weboftrust/WOT-terms/wiki/KRAM","","3","","","","","","","","","","","Keri requests an authentication method for replay protection."],["404","K","r","","keri-request-authentication-method","","keri-request-authentication-method","KERI Request Authentication Method for replay protection","https://github.com/weboftrust/WOT-terms/wiki/keri-request-authentication-method","","3","","","","","","","","","","","Keri requests an authentication method for replay protection."],["405","K","n","","juror","","juror","performs duplicity detection on events and event receipts","https://github.com/weboftrust/WOT-terms/wiki/juror","","3","","","","","","","","","","","performs duplicate detection on events and event receipts"],["406","K","n","","jury","","jury","set of entities or components acting as jurors","https://github.com/weboftrust/WOT-terms/wiki/jury","","3","","","","","","","","","","","A group of entities or components that act as jurors."],["407","K","n","","opcode","","opcode","provide stream processing instructions that are more general and flexible","https://github.com/trustoverip/acdc/wiki/opcode","","3","","","","","","","","","","","Provide more general and flexible stream processing instructions."],["408","K","n","","version-code","","version-code","tells you which set of tables to load and it tells the table state.","https://github.com/weboftrust/WOT-terms/wiki/version-code","","3","","","","","","","","","","","NO INPUT"],["409","K","n","","strip-parameter","","strip-parameter","tells us what part of the CESR stream will be parsed by which code","https://github.com/weboftrust/WOT-terms/wiki/strip-parameter","","3","","","","","","","","","","","This text shows which code will parse each part of the CESR stream."],["410","K","n","","parside","","parside","parser library for Composable Event Streaming Representation (CESR)","https://github.com/weboftrust/WOT-terms/wiki/parside","","3","","","","","","","","","","","CESR parser library"],["411","K","n","","version-string","","version-string","a workaround to make JSON, CBOR and MGPK self-framing in CESR","https://github.com/weboftrust/WOT-terms/wiki/version-string","","3","","","","","","","","","","","A workaround to make JSON, CBOR, and MGPK self-framing in CESR."],["412","K","n","","cesride","","cesride","cryptographic primitives for use with Composable Event Streaming Representation (CESR)","https://github.com/weboftrust/WOT-terms/wiki/cesride","","3","","","","","","","","","","","Cryptographic primitives for CESR."],["413","K","n","","sniffer","","sniffer","the sniffer is part of Parside and detects if the CESR stream contains CESR binary, CESR Text, JSON, CBOR, MGPK","https://github.com/weboftrust/WOT-terms/wiki/sniffer","","3","","","","","","","","","","","The sniffer, which is part of Parside, detects CESR binary, CESR Text, JSON, CBOR, and MGPK in the CESR stream."],["414","G","n","","PRNG","","PRNG","Pseudorandom Number Generator","https://github.com/trustoverip/acdc/wiki/PRNG","","2","","","","","","","","","","","Pseudorandom Number Generator"],["415","G","n","","CSPRNG","","CSPRNG","Cryptographically Secure Pseudorandom Number Generator","https://github.com/trustoverip/acdc/wiki/CSPRNG","","2","","","","","","","","","","","Cryptographically Secure PRNG"],["416","G","n","","FFI","","FFI","Foreign Function Interface","https://github.com/weboftrust/WOT-terms/wiki/FFI","","2","","","","","","","","","","","Foreign Function Interface (FFI)"],["417","G","n","","foreign-function-interface","","foreign-function-interface","Is a mechanism by which a program written in one programming language that can call routines or make use of services written or compiled in another one","https://github.com/weboftrust/WOT-terms/wiki/foreign-function-interface","","2","","","","","","","","","","","It is a way for a program in one programming language to call routines or utilize services from another language."],["418","G","n","","HDK","","HDK","hierchical deterministic key","https://github.com/trustoverip/acdc/wiki/HDK","","1","","","","","","","","","","","Hierarchical deterministic key."],["419","G","n","","HSM","","HSM","hardware security module","https://github.com/trustoverip/acdc/wiki/HSM","","1","","","","","","","","","","","Hardware security module"],["420","K","v","","partial-disclosure","","partial-disclosure","an ACDC attribute section that can disclosed (a nested branch in a tree), you can either decide to disclose or not","https://github.com/trustoverip/acdc/wiki/partial-disclosure","","3","","","","","","","","","","","ACDC attribute section can be disclosed, like a nested branch in a tree. You have the option to disclose or not."],["421","K","v","","selective-disclosure","","selective-disclosure","selective disclosure is a list of field maps, that you can choose to blind and publish, however all are disclosured.","https://github.com/trustoverip/acdc/wiki/selective-disclosure","","3","","","","","","","","","","","Selective disclosure is a list of field maps that you can choose to blind and publish. However, all of them are disclosed."],["422","K","v","","full-disclosure","","full-disclosure","a disclosure of data in all its details","https://github.com/trustoverip/acdc/wiki/full-disclosure","","1","","","","","","","","","","","data disclosure"],["423","K","r","","threshold-of-accountable-duplicity","","threshold-of-accountable-duplicity","Controller provides itself with any degree of protection by giving a minimum number of confirming witnesses sufficient given a certain accountability.","https://github.com/weboftrust/WOT-terms/wiki/threshold-of-accountable-duplicity","","3","","","","","","","","","","","The controller protects itself by having a few confirming witnesses to ensure accountability."],["424","K","n","","TOAD","","TOAD","threshold of accountable duplicity; provided by controller concerning witnesses","https://github.com/weboftrust/WOT-terms/wiki/KERIA","","3","","","","","","","","","","","Accountable duplicity threshold provided by controller for witnesses."],["425","K","n","","keride","","keride","Rust library for Key Event Receipt Infrastructure","https://github.com/weboftrust/WOT-terms/wiki/keride","","3","","","","","","","","","","","Rust lib for Key Event Receipt"],["426","K","n","","KERIA","","KERIA","KERI agent in the cloud","","","3","","","","","","","","","","","KERI cloud agent"],["427","K","r","","Signifide","","Signifide","signing at the edge","https://github.com/weboftrust/WOT-terms/wiki/Signifide","","3","","","","","","","","","","","Signing on the edge."],["428","K","n","","kiwi","","kiwi","UI tooling for working with KERI","https://github.com/weboftrust/WOT-terms/wiki/kiwi","","3","","","","","","","","","","","UI tooling for KERI"],["429","G","n","","hardware-security-module","","hardware-security-module","a physical computing device that safeguards and manages secrets (most importantly digital keys)","https://github.com/weboftrust/WOT-terms/wiki/hardware-security-module","","1","","","","","","","","","","","A device that safeguards and manages secrets, specifically digital keys."],["430","G","n","","hierchical-deterministic-keys","","hierchical-deterministic keys","a type of deterministic bitcoin wallet derived from a known seed, that allow for the creation of child keys from the parent key","https://github.com/weboftrust/WOT-terms/wiki/hierchical-deterministic-keys","","1","","","","","","","","","","","A deterministic bitcoin wallet can be created from a known seed, allowing for the generation of child keys from the parent key."],["431","K","r","","SKRAP","","SKRAP","Signify/KERIA Request Authentication Protocol","https://github.com/weboftrust/WOT-terms/wiki/SKRAP","","3","","","","","","","","","","","Signify/KERIA Authentication Protocol Request"],["432","K","r","","signify-keria-request-authentication-protocol","","signify-keria-request-authentication-protocol","The KERIA service will expose 3 separate HTTP endpoints on 3 separate network interfaces","https://github.com/weboftrust/WOT-terms/wiki/signify-keria-request-authentication-protocol","","3","","","","","","","","","","","The KERIA service will have 3 HTTP endpoints on 3 network interfaces."],["433","S","n","","dead-attack","","dead-attack","an attack on an establishment event that occurs after the Key-state for that event has become stale","https://github.com/weboftrust/WOT-terms/wiki/dead-attack","","","","","","","","","","","","","NO INPUT"],["434","K","v","","prefixing","","prefixing","prefixing","https://github.com/weboftrust/WOT-terms/wiki/prefixing","","3","","","","","","","","","","","Prefixing"],["435","K","v","","pathing","","pathing","enables sending portions of a credential","https://github.com/weboftrust/WOT-terms/wiki/pathing","","3","","","","","","","","","","","enables sending parts of a credential"],["436","K","v","","parsing","","parsing","parsing","https://github.com/weboftrust/WOT-terms/wiki/parsing","","3","","","","","","","","","","","Parsing"],["437","K","r","","bespoke-credential","","bespoke-credential","It's a custom issuance of the presentation of other ACDCs, it serves as an on-the-fly contract with the issuee; it's a self-referencing and self-contained contract","https://github.com/trustoverip/acdc/wiki/bespoke-credential","","3","","","","","","","","","","","It is a customized presentation of other ACDCs. It serves as a contract with the issuee on-the-fly. It is a self-referencing and self-contained contract."],["438","K","n","","KERIMask","","KERIMask","A wallet similar to MetaMask that will connect to KERIA servers in order for a person to control AIDs from their browser.","https://github.com/weboftrust/WOT-terms/wiki/KERIMask","","3","","","","","","","","","","","A MetaMask-like wallet to connect to KERIA servers, enabling browser-based control of AIDs."],["439","K","n","","KERISSE","","KERISSE","KERI Suite Search Engine","https://github.com/weboftrust/WOT-terms/wiki/KERISSE","","1","","","","","","","","","","","KERI Search Engine"],["440","K","n","","keri-suite","","keri-suite","is the set of inter-related developments (KERI, ACDC, OOBI, CESR, IPEX, etc) under the Web-of -Trust user on Github","https://github.com/weboftrust/WOT-terms/wiki/keri-suite","","1","","","","","","","","","","","This is a collection of interconnected developments (KERI, ACDC, OOBI, CESR, IPEX, etc.) used by the Web-of-Trust user on Github."],["441","K","n","","ndigs","","ndigs","Digests of keys, used to prove control over keys or to hide keys","https://github.com/weboftrust/WOT-terms/wiki/ndigs","","3","","","","","","","","","","","Key digests are used to prove control over keys or conceal them."],["442","K","n","","verfer","","verfer","a primitive that represents a public key","https://github.com/weboftrust/WOT-terms/wiki/verfer","","3","","","","","","","","","","","A public key primitive."],["443","K","n","","diger","","diger","a primitive that represents a digest","https://github.com/weboftrust/WOT-terms/wiki/diger","","3","","","","","","","","","","","A primitive representing a digest."],["444","K","n","","cigar","","cigar","an unindexed signature","https://github.com/weboftrust/WOT-terms/wiki/cigar","","3","","","","","","","","","","","an unindexed signature."],["445","K","n","","siger","","siger","an indexed signature used within KERI when there are multiple current keys to an identifier","https://github.com/weboftrust/WOT-terms/wiki/siger","","3","","","","","","","","","","","An indexed signature is used in KERI when there are multiple current keys for an identifier."],["446","K","n","","signer","","signer","a primitive that represents a private key","https://github.com/weboftrust/WOT-terms/wiki/signer","","3","","","","","","","","","","","A primitive representing a private key."],["447","K","n","","salter","","salter","a primitive that represents a seed that has the ability to generate new Signers","https://github.com/weboftrust/WOT-terms/wiki/salter","","3","","","","","","","","","","","A seed that can generate new Signers."],["448","G","n","","LLM","","LLM","Large Language Model","https://github.com/weboftrust/WOT-terms/wiki/LLM","","2","","","","","","","","","","","Language Model"],["449","G","n","","large-language-model","","large-language-model","Is a language model consisting of a neural network with many parameters","https://github.com/weboftrust/WOT-terms/wiki/large-language-model","","2","","","","","","","","","","","The language model is a neural network with numerous parameters."],["450","K","n","","ixn","","ixn","Field name for Interaction Event; its content contains a hash pointer","https://github.com/weboftrust/WOT-terms/wiki/ixn","","3","","","","","","","","","","","Interaction Event Field: Contains a hash pointer."],["451","K","n","","rot","","rot","Field name for Rotation Event; its content contains a hash pointer","https://github.com/weboftrust/WOT-terms/wiki/rot","","3","","","","","","","","","","","Field name: Rotation Event\nContent: Contains a hash pointer"],["452","G","n","","JSON","","JSON","JavaScript Object Notation","https://github.com/weboftrust/WOT-terms/wiki/JSON","","1","","","","","","","","","","","JavaScript Object Notation"],["453","K","v","","icp","","icp","incept, inception","https://github.com/weboftrust/WOT-terms/wiki/icp","","3","","","","","","","","","","","inception"],["454","K","v","","vcp","","vcp","vdr incept, verifiable data registry inception","https://github.com/weboftrust/WOT-terms/wiki/vcp","","3","","","","","","","","","","","VDR, Verifiable Data Registry, inception"],["455","K","v","","bis","","bis","backed vc issue, registry-backed transaction event log credential issuance","https://github.com/weboftrust/WOT-terms/wiki/bis","","3","","","","","","","","","","","VC issuance, registry-backed transaction log for credential issuance."],["456","G","n","","concise-binary-object-representation","","concise-binary-object-representation","It is a binary data serialization format loosely based on JSON","https://github.com/weboftrust/WOT-terms/wiki/concise-binary-object-representation","","3","","","","","","","","","","","It's a binary data serialization format loosely based on JSON."],["457","K","v","","brv","","brv","backed vc revoke, registry-backed transaction event log credential revocation","https://github.com/weboftrust/WOT-terms/wiki/brv","","3","","","","","","","","","","","Revoked VC, registry-backed transaction event log for credential revocation."],["458","K","v","","vrt","","vrt","vdr rotate, verifiable data registry rotation","https://github.com/weboftrust/WOT-terms/wiki/vrt","","3","","","","","","","","","","","VDR Rotate: Verifiable Data Registry Rotation."],["459","K","r","","secure-private-authentic-confidentiality","","secure-private-authentic-confidentiality","","https://github.com/weboftrust/WOT-terms/wiki/secure-private-authentic-confidentiality","","3","","","","","","","","","","","NO INPUT"],["460","K","r","","SPAC","","SPAC","secure private authentic confidentiality","https://github.com/weboftrust/WOT-terms/wiki/SPAC","","3","","","","","","","","","","","Secured, private, authentic, confidential."],["461","S","r","","dead-drop","","dead-drop","a presenter controls the disclosure so you can't re-identify the data","https://github.com/weboftrust/WOT-terms/wiki/dead-drop","","3","","","","","","","","","","","The presenter controls the disclosure, preventing data re-identification."],["462","K","n","","ample","","ample","minimum required number of participants in an event to have a supermajority in the consensus agreement algorithm (KAACE) in KERI","https://github.com/weboftrust/WOT-terms/wiki/ample","","3","","","","","","","","","","","The minimum number of participants needed for a supermajority in the consensus agreement algorithm (KAACE) in KERI."],["463","G","r","","supermajority","","supermajority","Sufficient majority immune to certain kinds of attacks or faults","https://github.com/weboftrust/WOT-terms/wiki/supemajority","","3","","","","","","","","","","","Sufficient majority immune to certain attacks or faults."],["464","G","n","","CBOR","","CBOR","concise binary object representation","https://github.com/weboftrust/WOT-terms/wiki/CBOR","","2","","","","","","","","","","","Concise binary object rep"],["465","K","n","","tholder","","tholder","t-holder object that supports fractionally-weighted thresholds","https://github.com/weboftrust/WOT-terms/wiki/tholder","","3","","","","","","","","","","","T-holder object supporting fractional-weighted thresholds"],["466","K","n","","bexter","","bexter","A class (programming code) in CESR that preserves its integrity in a round-trip conversion even though it offers variable length text","https://github.com/weboftrust/WOT-terms/wiki/bexter","","3","","","","","","","","","","","A class in CESR that maintains its integrity in a round-trip conversion despite variable length text."],["467","K","r","","moobi","","moobi","to share a bunch of different end-points (oobis) all at once","https://github.com/weboftrust/WOT-terms/wiki/moobi","","3","","","","","","","","","","","to share multiple end-points (oobis) simultaneously"],["468","G","n","","ts-node","","ts-node","npm package that lets you run typescript from a shell","https://github.com/weboftrust/WOT-terms/wiki/ts-node","","3","","","","","","","","","","","npm package for running TypeScript from a shell."],["469","K","n","","interceptor","","interceptor","a keria class that allows to push events happening inside the cloud agent to other backend processes","https://github.com/weboftrust/WOT-terms/wiki/interceptor","","3","","","","","","","","","","","A Keria class enables pushing cloud agent events to other backend processes."],["470","K","n","","salty-nonce-blinding-factor","","salty-nonce-blinding-factor","Selectively share a secret and hide information with this secret","https://github.com/weboftrust/WOT-terms/wiki/salty-nonce-blinding-factor","","3","","","","","","","","","","","NO INPUT"],["471","K","n","","ilk","","ilk","short for message type","https://github.com/weboftrust/WOT-terms/wiki/ilk","","3","","","","","","","","","","","Short for message type."],["472","K","v","","dip","","dip","delcept, delegated inception","https://github.com/weboftrust/WOT-terms/wiki/dip","","3","","","","","","","","","","","Delcept, Delegated Inception."],["473","K","v","","drt","","drt","deltate, delegated rotation","https://github.com/weboftrust/WOT-terms/wiki/drt","","3","","","","","","","","","","","Deltate: delegated rotation."],["474","K","n","","rct","","rct","receipt","https://github.com/weboftrust/WOT-terms/wiki/rct","","3","","","","","","","","","","","Receipt."],["475","K","n","","ksn","","ksn","sate, key state notice","https://github.com/weboftrust/WOT-terms/wiki/ksn","","3","","","","","","","","","","","State key notice"],["476","K","v","","qry","","qry","query","https://github.com/weboftrust/WOT-terms/wiki/qry","","3","","","","","","","","","","","Query."],["477","K","v","","rpy","","rpy","reply","https://github.com/weboftrust/WOT-terms/wiki/rpy","","3","","","","","","","","","","","Reply."],["478","K","v","","exn","","exn","exchange","https://github.com/weboftrust/WOT-terms/wiki/exn","","3","","","","","","","","","","","Exchange."],["479","K","v","","exp","","exp","expose, sealed data exposition","https://github.com/weboftrust/WOT-terms/wiki/exp","","3","","","","","","","","","","","Data exposure."],["480","K","v","","iss","","iss","vc issue, verifiable credential issuance","https://github.com/weboftrust/WOT-terms/wiki/iss","","3","","","","","","","","","","","VC issuance: verifiable credential issuance."],["481","K","v","","rev","","rev","vc revoke, verifiable credential revocation","https://github.com/weboftrust/WOT-terms/wiki/rev","","3","","","","","","","","","","","VC revocation, or verifiable credential revocation."],["482","K","n","","vdr","","vdr","verifiable data registry","https://github.com/weboftrust/WOT-terms/wiki/vdr","","3","","","","","","","","","","","Verifiable data registry."],["483","K","r","","KATE","","KATE","Kate = KERI at the Edge","https://github.com/weboftrust/WOT-terms/wiki/KATE","","3","","","","","","","","","","","Kate at the Edge = KERI"],["484","K","v","","spurn","","spurn","Reject","https://github.com/weboftrust/WOT-terms/wiki/spurn","","3","","","","","","","","","","","Reject."],["485","G","v","","dnd","","dnd","do not delegate","https://github.com/WebOfTrust/WOT-terms/wiki/dnd","","3","","","","","","","","","","","Don't delegate."],["486","G","v","","revocation","","revocation","The act of recall or annulment. It is the cancelling of an act, the recalling of a grant or privilege.","https://github.com/weboftrust/WOT-terms/wiki/revocation","","2","","","","","","","","","","","Recall or annulment is the act of canceling or recalling an act, grant, or privilege."],["487","G","n","","verifiable-data-registry","","verifiable-data-registry","a Verifiable Data Structure that actually holds content","https://github.com/weboftrust/WOT-terms/wiki/verifiable-data-registry","","3","","","","","","","","","","","A verifiable data structure that holds content securely."],["488","G","n","","VDR","","VDR","Verifiable Data Registry, a Verifiable Data Structure that actually holds content","https://github.com/weboftrust/WOT-terms/wiki/VDR","","3","","","","","","","","","","","Verifiable Data Registry, a structure that holds content and is verifiable."],["489","G","r","","E2E","","E2E","end-to-end","https://github.com/weboftrust/WOT-terms/wiki/E2E","","1","","","","","","","","","","","End-to-end."],["490","G","r","","end-to-end","","end-to-end","Inter-host communication and data flow transformations, considered in motion and at rest","https://github.com/weboftrust/WOT-terms/wiki/end-to-end","","1","","","","","","","","","","","Inter-host communication and data flow transformations, both in motion and at rest."],["491","K","v","","duplicity-detection","","duplicity-detection","A mechanism to detect duplicity in cryptographically secured event log","https://github.com/weboftrust/WOT-terms/wiki/duplicity-detection","","2","","","","","","","","","","","Detecting duplicity in cryptographically secured event log"],["492","G","r","y","double-spend-proof","","double-spend proof","Total global ordering of transactions so that you can't spend value twice","https://github.com/weboftrust/WOT-terms/wiki/double-spend-proof","","2","","","","","","","","","","","Global ordering prevents double spending."],["493","G","v","","MFA","","MFA","multi-factor authentication","https://github.com/weboftrust/WOT-terms/wiki/MFA","","1","","","","","","","","","","","Multi-factor authentication."],["494","G","v","y","multi-factor-authentication","","multi-factor authentication","Authentication by combining multiple security factors, e.g. what you know, what you have and what you are.","https://github.com/weboftrust/WOT-terms/wiki/multi-factor-authentication","","1","","","","","","","","","","","Authentication by combining multiple security factors, such as knowledge, possession, and identity."],["495","G","r","","threshold-structure-security","","threshold-structure-security","Allows for weaker key management or execution environment infrastructure individually, but achieves greater overall security by multiplying the number of attack surfaces","https://github.com/weboftrust/WOT-terms/wiki/threshold-structure-security","","3","","","","","","","","","","","Allows for weaker management or execution environment, but improves overall security by increasing attack surfaces."],["496","G","n","","TEE","","TEE","trusted-execution-environment; protected hardware/software/firmware security system","https://github.com/weboftrust/WOT-terms/wiki/TEE","","2","","","","","","","","","","","trusted execution environment: secure hardware/software/firmware system"],["497","G","n","","trusted-execution-environment","","trusted-execution-environment","Protected hardware/software/firmware security system","https://github.com/weboftrust/WOT-terms/wiki/trusted-execution-environment","","2","","","","","","","","","","","Protected hardware and software security system"],["498","G","r","","security-overlay-properties-trillema","","security-overlay-properties-trillema","an identifier system has some degree of any combination of the three properties authenticity, privacy and confidentiality, but not all three completely","https://github.com/weboftrust/WOT-terms/wiki/security-overlay-properties-trillema","","3","","","","","","","","","","","An identifier system possesses some combination of the three properties: authenticity, privacy, and confidentiality, but never all three to their fullest extent."],["499","S","r","","autonomic-trust-basis","","autonomic-trust-basis","to form this we use an AID as the root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/autonomic-trust-basis","","3","","","","","","","","","","","To create this, we utilize an AID as the root of trust."],["500","S","n","","autonomic-identifier","","autonomic-identifier","self-managing self-certifying identifier","https://github.com/weboftrust/WOT-terms/wiki/autonomic-identifier","","2","","","","","","","","","","","self-managing, self-certifying identifier."],["501","S","n","y","legitimized-human-meaningful-identifier","","legitimized human-meaningful identifier","identifier authorised through its autonomic identifier couplet","https://github.com/weboftrust/WOT-terms/wiki/legitimized-human-meaningful-identifier","","2","","","","","","","","","","","Authorized identifier through an autonomous identifier couplet."],["502","S","n","","LID","","LID","Legitimized (or authorised) human meaningful identifier","https://github.com/weboftrust/WOT-terms/wiki/LID","","2","","","","","","","","","","","Human meaningful ID"],["503","S","n","","security","","security","in identifier systems it means secure from exploit or compromise","https://github.com/weboftrust/WOT-terms/wiki/security","","1","","","","","","","","","","","In identifier systems, it refers to being secure against exploits or compromises."],["504","S","a","","secure","","secure","in identifier systems it means secure from exploit or compromise","https://github.com/weboftrust/WOT-terms/wiki/secure","","1","","","","","","","","","","","In identifier systems, it refers to being secure against exploits or compromises."],["505","K","r","","univalent","","univalent","having a unique and non-ambiguous identifier for each entity or resource","https://github.com/weboftrust/WOT-terms/wiki/univalent","","2","","","","","","","","","","","Each entity or resource should have a unique and unambiguous identifier."],["506","K","r","","multi-valent","","multi-valent","A situation in which a delegator may have multiple delegates thereby enabling elastic horizontal scalability.","https://github.com/weboftrust/WOT-terms/wiki/multi-valent","","2","","","","","","","","","","","NO INPUT"],["507","S","r","","security-cost-performance-architecture-trade-off","","security-cost-performance-architecture-trade-off","","https://github.com/weboftrust/WOT-terms/wiki/security-cost-performance-architecture-trade-off","","3","","","","","","","","","","","NO INPUT"],["508","K","r","","cooperative-delegation","","cooperative-delegation","A type of delegation that needs both a delegator and a delegate to be established","https://github.com/weboftrust/WOT-terms/wiki/cooperative-delegation","","3","","","","","","","","","","","NO INPUT"],["509","G","n","","TPM","","TPM","trusted platform module; a device that enhances the security and privacy by providing hardware-based cryptographic functions","https://github.com/weboftrust/WOT-terms/wiki/TPM","","3","","","","","","","","","","","Trusted Platform Module (TPM) is a device that enhances security and privacy through hardware-based cryptographic functions."],["510","G","n","","trusted-platform-module","","trusted-platform-module","A device that enhances the security and privacy by providing hardware-based cryptographic functions","https://github.com/weboftrust/WOT-terms/wiki/trusted-platform-module","","3","","","","","","","","","","","A device that enhances security and privacy using hardware-based cryptographic functions."],["511","K","r","","bivalent","","bivalent","Two independent key management infrastructures with no movement of private keys between the two.","https://github.com/weboftrust/WOT-terms/wiki/bivalent","","2","","","","","","","","","","","NO INPUT"],["512","S","n","","keri‐event‐stream","","keri‐event‐stream","A stream of verifiable KERI data, consisting of the key event log and other data such as a transaction event log","https://github.com/weboftrust/WOT-terms/wiki/keri‐event‐stream","","3","","","","","","","","","","","A verifiable stream of KERI data, including the key event log and other transaction event logs."],["513","S","n","","stale-key","","stale-key","A stale key is an outdated or expired encryption key that should no longer be used for securing data","https://github.com/weboftrust/WOT-terms/wiki/stale-key","","2","","","","","","","","","","","A stale key is an outdated or expired encryption key that shouldn't be used for securing data anymore."],["514","S","n","","stale-event","","stale-event","An outdated or irrelevant (key) event involving an expired encryption key that may compromise security","https://github.com/weboftrust/WOT-terms/wiki/stale-event","","2","","","","","","","","","","","An obsolete or irrelevant event related to an expired encryption key that could jeopardize security."],["515","G","r","","privacy","","privacy","Privacy is the ability of an individual or group to seclude themselves or information about themselves","https://github.com/weboftrust/WOT-terms/wiki/privacy","","1","","","","","","","","","","","Privacy is the ability for individuals or groups to hide themselves or their personal information."],["516","G","n","","confidentiality","","confidentiality","a set of rules or a promise that limits the access or places restrictions on certain types of information","https://github.com/weboftrust/WOT-terms/wiki/confidentiality","","1","","","","","","","","","","","Rules or promises that limit access or place restrictions on certain information."],["517","K","n","","RID","","RID","Root autonomic identifier","https://github.com/weboftrust/WOT-terms/wiki/RID","","3","","","","","","","","","","","Root identifier"],["518","K","n","","root-autonomic-identifier","","root-autonomic-identifier","An entity may provide the root-of-trust for some ecosystem (with delegations) via its root autonomic identier (AID).","https://github.com/weboftrust/WOT-terms/wiki/root-autonomic-identifier","","3","","","","","","","","","","","An entity can offer the root-of-trust for an ecosystem through its root autonomic identifier (AID) and delegations."],["519","K","a","","provenanced","","provenanced","The act of verifying authenticity or quality of documented history or origin of something","https://github.com/weboftrust/WOT-terms/wiki/provenanced","","2","","","","","","","","","","","Verifying the authenticity or origin of something."],["520","K","r","y","non-interactive-authentication-design","","non-interactive authentication design","Non-interactive Authentication Design","https://github.com/weboftrust/WOT-terms/wiki/non-interactive-authentication-design","","3","","","","","","","","","","","Non-interactive Authentication Design, shortened and with grammar corrected"],["521","K","r","","interactive-authentication-design","","interactive-authentication-design","secure authentication through an interactive mechanism that requires a set of requests and responses or challenge responses with challenge response replies","https://github.com/weboftrust/WOT-terms/wiki/interactive-authentication-design","","3","","","","","","","","","","","Secure authentication is achieved through an interactive mechanism that involves requesting and responding with challenge responses."],["522","S","r","","ESSR","","ESSR","Encrypt Sender, Sign the Receiver","https://github.com/weboftrust/WOT-terms/wiki/ESSR","","2","","","","","","","","","","","Encrypt sender, sign receiver."],["523","S","n","","VID","","VID","Verifiable Identifier","https://github.com/weboftrust/WOT-terms/wiki/VID","","2","","","","","","","","","","","Verifiable ID"],["524","S","r","","encrypt‐sender‐sign‐receiver","","encrypt‐sender‐sign‐receiver","Encrypt Sender, Sign the Receiver","https://github.com/weboftrust/WOT-terms/wiki/encrypt‐sender‐sign‐receiver","","2","","","","","","","","","","","Encrypt sender, sign receiver."],["525","S","n","","verifiable-identifier","","verifiable-identifier","Cryptographically verifiable authentic identifier","https://github.com/weboftrust/WOT-terms/wiki/verifiable-identifier","","2","","","","","","","","","","","Cryptographically verifiable identifier"],["526","S","n","","trust-spanning-protocol","","trust-spanning-protocol","Protocol using VIDs that signs every single message on the internet.","https://github.com/weboftrust/WOT-terms/wiki/trust-spanning-protocol","","2","","","","","","","","","","","Protocol using VIDs that signs every internet message."],["527","S","n","","TSP","","TSP","Trust spanning protocol, using VIDs that signs every single message on the internet.","https://github.com/weboftrust/WOT-terms/wiki/TSP","","2","","","","","","","","","","","TrustSpan protocol, utilizing VIDs to sign every internet message."],["528","S","v","","privacy-washing","","privacy-washing","De-identification so that it provides a personal data safe harbour and could be legally acceptable forwarded","https://github.com/weboftrust/WOT-terms/wiki/privacy-washing","","1","","","","","","","","","","","De-identification provides a safe harbor for personal data and can be legally acceptable when forwarded."],["529","S","n","","DKR","","DKR","Did:keri resolver","https://github.com/weboftrust/WOT-terms/wiki/DKR","","2","","","","","","","","","","","Did Keri resolve?"],["530","S","n","","reputation","","reputation","Consistent behaviour over time on the basis of which anyone else makes near-future decisions","https://github.com/weboftrust/WOT-terms/wiki/reputation","","1","","","","","","","","","","","Consistent behavior over time on which others base near-future decisions."],["531","S","r","","discovery","","discovery","a discovery mechanism helps to locate and verify digital identities without relying on a central authority","https://github.com/weboftrust/WOT-terms/wiki/discovery","","1","","","","","","","","","","","A discovery mechanism allows locating and validating digital identities without relying on a central authority."],["532","S","r","","broken-object-level-authorization","","broken-object-level-authorization","or BOLA, refers to security flaws where users can access data they shouldn't","https://github.com/weboftrust/WOT-terms/wiki/broken-object-level-authorization","","3","","","","","","","","","","","BOLA stands for security flaws allowing unauthorized data access."],["533","S","n","","BOLA","","BOLA","Broken Object Level Authorization","https://github.com/weboftrust/WOT-terms/wiki/BOLA","","3","","","","","","","","","","","Broken Object-Level Authorization"],["534","K","v","","read-update-nullify","","read-update-nullify","or \"RUN\"; Read, update, nullify are actions you can take on data, no create or delete","https://github.com/weboftrust/WOT-terms/wiki/read-update-nullify","","3","","","","","","","","","","","\"RUN\": Read, update, and nullify are actions for data manipulation, without the ability to create or delete."],["535","K","v","","RUN","","RUN","read-update-nullify, actions you can take on data, no create or delete.","https://github.com/weboftrust/WOT-terms/wiki/RUN","","3","","","","","","","","","","","Read, update, and nullify data - these are the actions you can take. No creating or deleting is allowed."],["536","K","r","","direct-mode","","direct-mode","(one-to-one) trust mode in KERI, in which the identity controller establishes control via verified signatures of the controlling key-pair.","https://github.com/weboftrust/WOT-terms/wiki/direct-mode","","3","","","","","","","","","","","KREI employs a one-to-one trust mode where the identity controller gains control through verified signatures of the controlling key-pair."],["537","K","r","","indirect-mode","","indirect-mode","(one-to-many) trust mode in KERI, which extends the direct trust basis with witnessed key event receipt logs (KERL) for validating events.","https://github.com/weboftrust/WOT-terms/wiki/indirect-mode","","3","","","","","","","","","","","In KERI, there is a trust mode called one-to-many that adds witnessed key event receipt logs (KERL) to validate events."],["538","K","r","","end-role","","end-role","An end role is an authorization for one AID to serve in a role for another AID.","https://github.com/weboftrust/WOT-terms/wiki/end-role","","3","","","","","","","","","","","An end role authorizes one AID to serve in another AID's role."],["539","K","n","","hab","","hab","A Hab is a keystore for one identifier.","https://github.com/weboftrust/WOT-terms/wiki/hab","","3","","","","","","","","","","","A Hab is a store for one identifier."],["540","S","r","","identity-assurance","","identity-assurance","The heavy-lifting to be done to establish reputational trust, KERI is for attributional trust","https://github.com/weboftrust/WOT-terms/wiki/identity-assurance","","3","","","","","","","","","","","Establishing reputational trust requires significant effort, while KERI is aimed at achieving attributional trust."],["541","S","r","","attributional-trust","","attributional-trust","You can't have reputation without attributional trust, KERI offers cryptographic root-of-trust","https://github.com/weboftrust/WOT-terms/wiki/attributional-trust","","2"],["542","S","r","","reputational-trust","","reputational-trust","identity-assurance by a trusted party","https://github.com/weboftrust/WOT-terms/wiki/reputational-trust","","2"],["543","G","n","","ADR","","ADR","Architectural Decision Records","https://github.com/weboftrust/WOT-terms/wiki/ADR","","2"],["544","G","n","y","architectural-decision-record","","architectural-decision record","justified software design choice that addresses an architectural requirement","https://github.com/weboftrust/WOT-terms/wiki/architectural-decision-record","","2"],["545","G","n","","MIME-type","","MIME-type","Also 'media type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.","https://github.com/weboftrust/WOT-terms/wiki/MIME-type","","1"],["546","G","n","","media-type","","media-type","Also 'MIME type'; a standard way to indicate the nature and format of a file, like 'image/jpeg' for JPEG images, used on the internet.","https://github.com/weboftrust/WOT-terms/wiki/media-type","","1"],["547","K","n","","listed-identifier","","listed-identifier","a list in an ACDC of authorised did:webs identifier + method","https://github.com/weboftrust/WOT-terms/wiki/listed-identifier","","3"],["548","S","r","","designated-aliases","","designated-aliases","An AID controller can designate aliases which are AID controlled identifiers such as a did:keri, did:webs, etc","https://github.com/weboftrust/WOT-terms/wiki/designated-aliases","","2"],["549","K","a","","sniffable","","sniffable","A stream is sniffable as soon as it starts with a CESR group code or field map","https://github.com/weboftrust/WOT-terms/wiki/sniffable","","3"],["550","K","n","","reconciliation","","reconciliation","Reconciliation is the process in which you decide to accept a fork of the KEL or not.","https://github.com/weboftrust/WOT-terms/wiki/reconciliation","","2"],["551","S","n","","party","","party","an entity who participates or is concerned in an action, proceeding, plan, etc.","https://github.com/weboftrust/WOT-terms/wiki/party","","1"],["553","S","n","","verification","","verfication","An action an agent (of a principal) performs to determine the authenticity of a claim or other digital object using a cryptographic key.","https://github.com/weboftrust/WOT-terms/wiki/verification","","2"],["554","K","n","","kever","","kever","Kever is a key event verifier","https://github.com/weboftrust/WOT-terms/wiki/kever","","3"],["555","S","n","","kerific","","kerific","kerific is a front plugin or extension for Chrome and Brave, that matches words in text on the web that offers buttons to various SSI glossaries and definitions.","https://github.com/weboftrust/WOT-terms/wiki/kerific","","1"],["556","K","r","y","access-controlled-interaction","","access-controlled interaction","Access controlled actions like submitting a report","https://github.com/weboftrust/WOT-terms/wiki/access-controlled-interaction","","3"],["557","K","r","","registration-interaction","","registration-interaction","Setup/Registration interaction, new AID and authorization to establish access control","https://github.com/weboftrust/WOT-terms/wiki/registration-interaction","","3"],["558","K","r","","weight-of-weights","","weight-of-weights","a 2-layered weighting solution of the multisign in KERI","https://github.com/weboftrust/WOT-terms/wiki/weight-of-weights"],["559","K","n","","xip","","xip","A message that allows a transaction set to become duplicity evident","https://github.com/weboftrust/WOT-terms/wiki/xip","","2"],["560","K","n","","KAPI","","KAPI","KERI API","https://github.com/weboftrust/WOT-terms/wiki/KAPI","","1"],["561","S","a","","self-authenticating","","self-authenticating","self-certifying","https://github.com/weboftrust/WOT-terms/wiki/self-authenticating"],["562","K","n","","configuration-traits","","configuration-traits","A list of specially defined strings representing a configuration of a KEL","https://github.com/weboftrust/WOT-terms/wiki/configuration-traits","","3"],["563","K","a","","abandoned-identifier","","abandoned-identifier","An AID is abandoned when there is no further possibility to register any next key event in a KEL","https://github.com/WebOfTrust/WOT-terms/wiki/abandoned-identifier"],["564","K","n","","streamer","","streamer","A convenience class for supporting stream parsing, including nested CESR streams","https://github.com/WebOfTrust/WOT-terms/wiki/streamer"],["565","G","n","","canonicalization","","canonicalization","A process for converting data that has more than one possible representation into a \"standard\" form","https://github.com/WebOfTrust/WOT-terms/wiki/canonicalization"],["566","K","n","","current-threshold","","current-threshold","","https://github.com/WebOfTrust/WOT-terms/wiki/current-threshold"],["567","S","n","","end-verifiability","","end-verifiability","","https://github.com/WebOfTrust/WOT-terms/wiki/end‐verifiability","","2"],["568","G","n","","live-attack","","live-attack","","https://github.com/WebOfTrust/WOT-terms/wiki/live-attack"],["569","K","n","","keri’s-algorithm-for-witness-agreement","","keri’s-algorithm-for-witness-agreement","","https://github.com/WebOfTrust/WOT-terms/wiki/keri%E2%80%99s-algorithm-for-witness-agreement"],["570","K","n","","next-threshold","","next-threshold","","https://github.com/WebOfTrust/WOT-terms/wiki/next-threshold"],["571","K","n","","self-addressed-data","","self-addressed-data","","https://github.com/WebOfTrust/WOT-terms/wiki/self-addressed-data"],["569","K","n","","KAWA","","KAWA","","https://github.com/WebOfTrust/WOT-terms/wiki/KAWA"],["573","S","n","","attribute","","attribute","","https://github.com/WebOfTrust/WOT-terms/wiki/attribute"],["574","K","n","y","chain-link-confidential-disclosure","","chain-link confidential disclosure","","https://github.com/WebOfTrust/WOT-terms/wiki/chain-link-confidential-disclosure"],["575","K","n","","compact-disclosure","","compact-disclosure","","https://github.com/WebOfTrust/WOT-terms/wiki/compact-disclosure"],["576","K","n","","framing-code","","framing-code","","https://github.com/WebOfTrust/WOT-terms/wiki/framing-code"],["577","G","n","","stream","","stream","","https://github.com/WebOfTrust/WOT-terms/wiki/stream"],["578","S","n","","information-theoretic-security","","information-theoretic-security","","https://github.com/WebOfTrust/WOT-terms/wiki/information-theoretic-security"],["579","","n","","operator","","operator","","https://github.com/WebOfTrust/WOT-terms/wiki/operator"],["580","K","n","","percolated-discovery","","percolated-discovery","","https://github.com/WebOfTrust/WOT-terms/wiki/percolated-discovery"],["581","S","n","","ITPS","","ITPS","","https://github.com/WebOfTrust/WOT-terms/wiki/ITPS"],["582","K","n","","rules","","rules","","https://github.com/WebOfTrust/WOT-terms/wiki/rules"],["580","K","n","","percolated-information-discovery","","percolated-information-discovery","","https://github.com/WebOfTrust/WOT-terms/wiki/percolated-information-discovery"],["584","G","n","","semver","","semver","","https://github.com/WebOfTrust/WOT-terms/wiki/semver"],["585","K","n","","schema","","schema","","https://github.com/WebOfTrust/WOT-terms/wiki/schema"],["586","K","n","","targeted-acdc","","targeted-acdc","","https://github.com/WebOfTrust/WOT-terms/wiki/targeted-acdc"],["587","K","r","","unpermissioned-correlation","","unpermissioned-correlation","","https://github.com/WebOfTrust/WOT-terms/wiki/unpermissioned-correlation"],["588","K","n","","untargeted-acdc","","untargeted-acdc","","https://github.com/WebOfTrust/WOT-terms/wiki/untargeted-acdc"],["589","K","n","","weight","","weight","","https://github.com/WebOfTrust/WOT-terms/wiki/weight"],["590","K","n","","quadlet","","quadlet","","https://github.com/WebOfTrust/WOT-terms/wiki/quadlet"],["591","K","n","","stable","","stable","","https://github.com/WebOfTrust/WOT-terms/wiki/stable"],["592","G","n","","tritet","","tritet","","https://github.com/WebOfTrust/WOT-terms/wiki/tritet"],["593","G","n","","variable-length","","variable-length","","https://github.com/WebOfTrust/WOT-terms/wiki/variable-length"],["594","K","n","","KERIA-agent","","KERIA-agent","","https://github.com/WebOfTrust/WOT-terms/wiki/KERIA-agent"],["595","K","n","","base-media-type","","base-media-type","","https://github.com/WebOfTrust/WOT-terms/wiki/base-media-type"],["596","G","n","","javascript-object-notation","","javascript-object-notation","","https://github.com/WebOfTrust/WOT-terms/wiki/javascript-object-notation"],["597","S","n","","virtual-credential","","virtual-credential","","https://github.com/WebOfTrust/WOT-terms/wiki/virtual-credential"],["598","K","n","","proem","","proem","","https://github.com/WebOfTrust/WOT-terms/wiki/proem"],["599","G","r","y","zero-trust-computing","","zero-trust computing","","https://github.com/WebOfTrust/WOT-terms/wiki/zero-trust-computing"],["600","K","n","","CESR-version","","CESR-version","","https://github.com/WebOfTrust/WOT-terms/wiki/CESR-version"],["601","G","n","","MIME‐type","","MIME‐type","","https://github.com/WebOfTrust/WOT-terms/wiki/MIME‐type"],["602","K","n","","PID","","PID","","https://github.com/WebOfTrust/WOT-terms/wiki/PID"],["603","S","n","","authentic-data","","authentic-data","","https://github.com/WebOfTrust/WOT-terms/wiki/authentic-data"],["604","G","n","","authority","","authority","","https://github.com/WebOfTrust/WOT-terms/wiki/authority"],["605","K","n","","blind-oobi","","blind-oobi","","https://github.com/weboftrust/WOT-terms/wiki/blind-oobi"],["606","K","n","","bran","","bran","","https://github.com/weboftrust/WOT-terms/wiki/bran"],["607","K","a","","composable","","composable","","https://github.com/weboftrust/WOT-terms/wiki/composable"],["608","G","n","","edge","","edge","","https://github.com/weboftrust/WOT-terms/wiki/edge"],["609","K","r","","encrypt-sender-sign-receiver","","encrypt-sender-sign-receiver","","https://github.com/weboftrust/WOT-terms/wiki/encrypt-sender-sign-receiver"],["610","G","n","","entity","","entity","","https://github.com/weboftrust/WOT-terms/wiki/entity"],["611","K","n","","keri-event-stream","","keri-event-stream","","https://github.com/weboftrust/WOT-terms/wiki/keri-event-stream"],["612","K","n","","management-TEL","","management-TEL","management transaction event log","https://github.com/weboftrust/WOT-terms/wiki/management-TEL"],["613","G","n","","messagepack","","messagepack","","https://github.com/weboftrust/WOT-terms/wiki/messagepack"],["614","G","r","","perfect-security","","perfect-security","","https://github.com/weboftrust/WOT-terms/wiki/perfect-security"],["615","G","n","","post-quantum","","post-quantum","","https://github.com/weboftrust/WOT-terms/wiki/post-quantum"],["616","K","n","","vLEI","","vLEI","verifiable legal entity identifier","https://github.com/weboftrust/WOT-terms/wiki/vLEI"]]} ->>>>>>> upstream/main From 960c3e800f155b8ff64018410cff297dbc0a6613 Mon Sep 17 00:00:00 2001 From: GitHub Action Date: Mon, 16 Feb 2026 08:04:33 +0000 Subject: [PATCH 2/3] chore: fetch content from various external sources --- deploy-to-gh-pages.txt | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/deploy-to-gh-pages.txt b/deploy-to-gh-pages.txt index 8151f378a5..1da5938934 100644 --- a/deploy-to-gh-pages.txt +++ b/deploy-to-gh-pages.txt @@ -1 +1 @@ -3766 +2617 From 33eae63e8c53ead30b439e3b11b7fe45a3a6cbb5 Mon Sep 17 00:00:00 2001 From: Joseph Lee Hunsaker Date: Mon, 16 Feb 2026 01:19:43 -0700 Subject: [PATCH 3/3] Fix remaining merge conflict markers in self-authenticating.md and streamer.md Co-Authored-By: Claude Opus 4.6 --- docs/04_glossary/self-authenticating.md | 8 ++------ docs/04_glossary/streamer.md | 13 ++++--------- 2 files changed, 6 insertions(+), 15 deletions(-) diff --git a/docs/04_glossary/self-authenticating.md b/docs/04_glossary/self-authenticating.md index b91f300659..515b6197e9 100644 --- a/docs/04_glossary/self-authenticating.md +++ b/docs/04_glossary/self-authenticating.md @@ -1,7 +1,3 @@ # self authenticating -======= -# self authenticating -======= ->>>>>>> upstream/main -## See -[self-certifying](self-certifying-identifier) \ No newline at end of file +## See +[self-certifying](self-certifying-identifier) diff --git a/docs/04_glossary/streamer.md b/docs/04_glossary/streamer.md index b9e2e4e772..d5ba0deee5 100644 --- a/docs/04_glossary/streamer.md +++ b/docs/04_glossary/streamer.md @@ -1,15 +1,10 @@ # streamer ## Definition - A convenience class for supporting stream parsing, including nested (tunneled, encrypted) CESR streams. Streams can be a mixture/combination of different primitives, including other streams. A stream is a concatenation of primitives. - -======= -## Definition - A convenience class for supporting stream parsing, including nested (tunneled, encrypted) [CESR](CESR) streams. Streams can be a mixture/combination of different [primitives](primitive), including other streams. A stream is a concatenation of primitives. +A convenience class for supporting stream parsing, including nested (tunneled, encrypted) [CESR](CESR) streams. Streams can be a mixture/combination of different [primitives](primitive), including other streams. A stream is a concatenation of primitives. Source: Kent Bull in chat Zoom meeting KERI Aug 6, 2024. ## More ->>>>>>> upstream/main -It is akin to a cryptographic primitive yet is not a cryptographic primitive itself. +It is akin to a cryptographic primitive yet is not a cryptographic primitive itself. -It supports [ESSR](ESSR) by making it easier to handle tunneled streams. -Source: Kent Bull in chat Zoom meeting KERI Aug 6, 2024. \ No newline at end of file +It supports [ESSR](ESSR) by making it easier to handle tunneled streams. +Source: Kent Bull in chat Zoom meeting KERI Aug 6, 2024.