Consider these as the foundational architecture of Private Data Assets (PDAs). All PDAs built on the same data model come equipped with a uniform set of consumable claims.
Explore these in detail on the Gateway Explore
These are the cornerstone assets of the protocol. While owners maintain the autonomy to grant or deny permission for their PDAs, the issuing entities update the informational content.
Initiated by verifiers, these requests are sent directly to asset owners to solicit specific PDAs. The process is designed for efficient data retrieval and validation.
These templates streamline the generation of data requests, offering a standardized approach for verifiers to communicate their data requirements to PDA owners.
These are static snapshots of PDA data, made available to verifiers for review and utilization.
Each data proof comprises at least one PDA but can contain multiple PDAs depending on the verifier's requirements.
PDA owners manage the generation of these proofs for verifiers to consume subsequently.
Updated 2 months ago