Hyperledger Indy is one of the blockchain projects carried out by the is one of the blockchain projects carried out by the Hyperledger platform powered by the Linux Foundation. It’s mainly a collection of projects made for decentralized identity and also a privatized distributed ledger. Hyperledger Indy is the latest tech that got a promotion from incubation to active status. Moreover, with Hyperledger Indy, users can create digital identities with the help of a special library provided by indy that can be used as a key to access the private indy blockchain.





Moreover, the Hyperledger Indy architecture is providing extensive tools, with the latest library support. The best part is that each identity is made up of Hyperledger Indy architecture as well as its artefacts and it is cross-operational across multiple platforms and applications.





Thus, it means that the users alone can access the indy blockchain with a ban on trespassers on a particular account





ARCHITECTURE OF Hyperledger INDY









HOLDER:

The holder is also an entity that controls one or more credentials. It can be a person or even a device.





ISSUER:

An entity who creates verifiable credentials associates it with a particular subject and transmits it to a holder. Issuers represent who request private identity inside a private blockchain





INSPECTOR-VERIFIER:

Inspector verifier denotes the person who accepts multiple verifiable credentials(specified by a proof request) for processing. Verifiers include employers, security personnel, and websites





IDENTITY_REGITRY:

Mediates the creation and verification of subject identifiers. Identifier registries include the all-digital identity documents of the user. It holds the record of the identity of a single user

Key Features of Hyperledger Indy

Self-sovereignty:

Hyperledger Indy framework stores identities on a distributed ledger. There are special artefacts which are used to manage identities(credentials. Basically, these artefacts will include cryptographic materials, such as public keys, certificates and many more and the owner of the key can do any action in the blockchain





Privacy:

By default, the platform will make sure all your privacy. In reality, the Hyperledger Indy will make sure to contempt the privacy and how it can operate smoothly with any third party.

Moreover, a user can experience excessive security features in a decentralized system.





Verifiable claims:

The identity claims may have similar private documents of a person such as in driving license or birth certificate or in the passport. But you can combine all the variable identities to make it a single reusable identity. Thus by making all identities altogether, one can also provide the ease of carrying a single id.

Purpose-built:

It’s purely built for identity management in the decentralized network. Hyperledger Indy can be integrated with any organization's existing software that needs to enhance the identity-related section. So, the users don’t have to go for any other solution, it allows users to incorporate with the existing platform.





Decentralized Identifiers (DIDs):

According to the Hyperledger Indy, all the decentralized identities are unique in nature and no need any third party or centralized system in between. Therefore, every user on the platform will have a unique identity that will belong to a single user.





Identity Correlation-resistant:

Hyperledger Indy is an identity correlation-resistant. So, the user doesn’t have to worry about leaving any gap from one ID to another.

Moreover, there’s exists the least possibility of the platform getting connected two or more IDs. Similarly, the platform will not get connected if it’s two similar identifications for a single user in the ledger.

User Benefits of Hyperledger Indy

Control : Users gain supreme authority over their identity.

Transparency : The information is accessible to all.No matter the information gets encrypted.

Access : Restricted access. For instance, only users get through decrypted data.

Interoperability : Users can share identities across the network where they have access.

Consent : Approval setting for accessing pertinent information.

Existence : User gains independent and full existence on the ledger.

Longevity : Identity remains for a longer run on the ledger. It prolongs until the user deletes their identities.

Portability : It is easy for users to send their IDs to other devices.

Protection : Always adheres to data and user rights.



