diff --git a/index.html b/index.html index fa9053faf..c34ecd3e0 100644 --- a/index.html +++ b/index.html @@ -1486,7 +1486,7 @@

Data Schemas

Data schemas are often useful when enforcing a particular structure on a given collection of data. There are at least two types of data schemas that this -specification contemplates. The first are data validation schemas, which are +specification contemplates. The first are data verification schemas, which are used to verify that the structure and contents of a verifiable credential are conformant to a published schema. The second are data encoding schemas, which are used to map the contents of a @@ -2854,7 +2854,7 @@

Verification

The group is currently discussing whether a mechanism should be provided -that enables linkages to JSON Schema or other optional validation mechanisms. +that enables linkages to JSON Schema or other optional verification mechanisms.

@@ -2967,7 +2967,7 @@

Proofs (Signatures)

The key MUST NOT be revoked or expired.
  • -The cryptographic signature MUST be valid. +The cryptographic signature MUST verify.
  • If the cryptographic suite expects a proofPurpose, it MUST exist @@ -2980,7 +2980,7 @@

    Proofs (Signatures)

    The digital signature provides a number of protections, other than tamper resistance, that are not immediately obvious. For example, a Linked Data Signature created property establishes a date and time before -which the credential SHOULD NOT be considered valid. The +which the credential SHOULD NOT be considered verified. The creator property enables the ability to dynamically discover information about the entity who created the data to ensure that the public key is not revoked or expired. The proofPurpose property diff --git a/terms.html b/terms.html index a6003eb1f..b76308120 100644 --- a/terms.html +++ b/terms.html @@ -136,8 +136,19 @@
    verification
    -The process of cryptographically demonstrating the authenticity of a -verifiable credential or verifiable presentation. +The evaluation of whether or not a verifiable credential or +verifiable presentation complies with this specification. +
    +
    validation
    +
    +The assurance that a verifiable credential system meets +the needs of the customer and other identified stakeholders. +
    +
    +This recommendation is constrained to verifying verifiable credentials and +verifiable presentations regardless of their usage. Validating verifiable +credentials or verifiable presentations is out of the scope if this +recommendation.
    verifier