Layer One: Public Utilities

The first two layers of the ToIP stack are designed to provide ​technical trust​ — the assurance that one machine can establish a secure, private connection with another machine. To do this using ​ public key cryptography, you must be able to strongly verify the ​public key​ of the party you are connecting to. The W3C Decentralized Identifier (DID) specification​ solves this problem without using centralized​ certificate authorities by standardizing how you can permanently identify and verify a public key stored on a blockchain or other distributed system.
This solution gives rise to public utilities that serve as strong cryptographic roots-of-trust​ for the DIDs and public keys of verifiable credential issuers. ToIP Layer One utilities can be implemented using any technology that can provide the necessary trust assurances, e.g., blockchains (of any kind), distributed ledgers, decentralized file systems, distributed hash tables, and so on.

toip_layer1

Although technical trust is machine-to-machine, implementing technical trust still requires humans to design, code, test, and certify these systems. This is the job of Layer One utility governance frameworks​ that specify the policies under which a utility is implemented and operated such that it can be trusted by the higher layers.