diff --git a/terms.html b/terms.html index b94ec7de..5fbe503d 100644 --- a/terms.html +++ b/terms.html @@ -1,33 +1,34 @@
-This document attempts to communicate the concepts outlined in the -decentralized identifier space by using specialized terms to discuss -specific concepts. This terminology is included below and linked to throughout -the document to aid the reader: +This section defines the terms used in this specification and throughout +decentralized identifier infrastructure. A link to these terms is +included whenever they appear in this specification.
#
). DID fragment syntax is identical to the URI fragment syntax.
+(#
). DID fragment syntax is identical to URI fragment syntax.
/
). DID path syntax is identical to the URI path
-syntax.
+slash (/
) character and ends with either a question mark (?
)
+character or a fragment hash sign (#
) character (or the end of the
+DID URL). DID path syntax is identical to URI path syntax. See
+.
?
). DID query syntax is identical to the URI query syntax.
- ?
). DID query syntax is identical to URI query
+syntax. See .
did:
as defined in the
+section of the DID Core specification.
+Each DID method specification must define a specific DID
+scheme that works with that specific DID method. In a specific DID method
+scheme, the DID method name must follow the first colon and terminate with the
+second colon, e.g., did:example:
?
character
-followed by a DID query, and optional #
character followed
-by a DID fragment.
+A DID plus any additional syntactic component that conforms to the
+definition in . This includes an optional DID path,
+optional DID query (and its leading ?
character), and
+optional DID fragment (and its leading #
character).
-A set of parameters that can be used to independently verify a proof according to -a particular method. For example, a public key can be used as a verification -method with respect to a digital signature; in such usage, it verifies that the -signer possessed the associated private key. +A set of parameters that can be used together with a process or protocol to +independently verify a proof. For example, a public key can be used as a +verification method with respect to a digital signature; in such usage, it +verifies that the signer possessed the associated private key.
-"Verification" and "proof" in this definition are intended to apply broadly. A public -key might be used during Diffie-Hellman key exchange to negotiate a shared symmetric -key for encryption. This guarantees the integrity of the key agreement process. It -is thus another type of verification method, even though descriptions of the process -might not use the words "verification" and "proof." +"Verification" and "proof" in this definition are intended to apply broadly. For +example, a public key might be used during Diffie-Hellman key exchange to +negotiate a shared symmetric key for encryption. This guarantees the integrity +of the key agreement process. It is thus another type of verification method, +even though descriptions of the process might not use the words "verification" +or "proof."
-A verification relationship expresses the relationship between the DID -subject and a verification method. An example of a verification -relationship is . +An expression of the relationship between the DID subject and a +verification method. An example of a verification relationship is +.