Layer Three: Data Exchange Protocols

Layers Three and Four are where ​human trust​ is established and maintained. On the technical side of the stack, Layer Three is the home of the​ verifiable credential trust triangle​ discussed in Part Three. This is the layer where issuers, holders, and verifiers exchange credentials and proofs using credential exchange protocols​ that run on top of DIDComm. Note that these are just one example of the kind of trusted data exchange protocols that can operate at Layer Three — many other types of secure messaging and workflow automation protocols can be implemented at this layer.

toip_layer3

On the governance half of the stack, Layer Three is where the governance trust triangle​ comes into full play. Almost any digital credential that will be issued by multiple issuers and/or accepted by a wide range of verifiers needs a ​credential governance framework​. It will define what issuers will issue what credentials under what policies to what holders with what level(s) of assurance — and under what trust mark(s). This is the information verifiers need to make their own trust decisions about relying on a proof from the credential — just as the Mastercard operating rules tell merchants exactly what they can expect when accepting a Mastercard.