Key Network Procedures
The LearnCard Network protocol is built upon a set of standardized procedures, or actions, that enable various interactions. This page provides a conceptual overview of each key procedure and its purpose
Conceptual Interaction Examples
Interactions on the LearnCloud Network follow defined patterns and utilize a set of core procedures. These ensure that when credentials are exchanged or presented, all parties understand the steps involved and can trust the process.
To illustrate how these interactions work, let's consider two common scenarios:
Core Procedures
The interactions described above are made possible by a set of standardized "Core Procedures" within the LearnCloud Network protocol. These procedures define the common language and steps for managing credentials. Here's a conceptual overview of the main ones:
Construct Credential: The initial step of assembling the necessary information for a new credential, based on a defined template and the subject's details, preparing it for official issuance.
Issue Credential: An Issuer applies their unique digital signature to a constructed credential, transforming it into a secure, tamper-proof Verifiable Credential ready for use on the network.
Exchange Credential: Defines how a signed Verifiable Credential is securely transmitted from one party (like an Issuer) to another (like a Holder).
Verify & Validate Credential: The process by which a recipient of a credential checks its digital signature to ensure authenticity and integrity (Verify) and checks its content against expected rules or schemas (Validate).
Store Credential: A procedure for a Holder to securely store their received credentials in their chosen repository or digital wallet.
Construct Presentation: The process by which a Holder selects one or more of their credentials and prepares them to be shared with a Verifier in a structured format.
Prove Presentation (Sign Presentation): The Holder applies their digital signature to the constructed presentation, creating a Verifiable Presentation that proves they are the one sharing the credentials.
Exchange Presentation: Defines how a signed Verifiable Presentation is securely transmitted from a Holder to a Verifier.
Verify & Validate Presentation: The process by which a Verifier checks the Holder's signature on the presentation (Verify) and then proceeds to verify and validate the individual credentials contained within it.
Additionally, Supplemental Procedures exist to support these core actions, such as:
Select Identifier: Managing and retrieving DIDs.
Request Issuance/Presentation: Formalizing requests for credentials or presentations.
Credential Templates: Accessing standardized templates for creating credentials.
Query VCs: Searching or filtering stored credentials.
These procedures, working together, form the backbone of trustworthy and interoperable digital credential interactions on the LearnCloud Network.
Last updated
Was this helpful?