Verify the Integrity of Credential
For security, it's necessary to verify the availability of the credential by checking whether the content of the credential is valid, expired, or revoked.
Usage
Credential provides a method to check whether the credential is complete, each element of the credential is qualified, it's verifiable, and has not been tampered with.
Listener obtains the error information set in the verification process and locates the points of failure of specific deep calls.
Credential offers a method of checking if the credential expires. The validity period of the credential cannot be greater than that of the document of the DID.
Credential offers a method of checking whether the credential is revoked.
Credential offers a method of comprehensively verifying whether the credential is valid, which includes the above three rules.
Last updated