Explore W3C-compliant DID resolution, verifiable credentials, and SYMBI Trust Framework that powers Sonate
Experience Sonate featuring SYMBI Trust Framework live with production-ready trust infrastructure — no signup required
Email:
demo@symbi-trust.comPassword:
demo123Demo Limits: 3 conversations • 10 messages per conversation • Data purged every 24 hours
SYMBI Trust Protocol supports four W3C-compliant DID methods, providing flexibility for different enterprise requirements.
Enterprise gold standard - DNS-based, no blockchain required
// Resolve a did:web identifier
const did = "did:web:example.com:user:alice"
const result = await resolveDID(did)
// Returns DID Document
{
"@context": "https://w3id.org/did/v1",
"id": "did:web:example.com:user:alice",
"verificationMethod": [{
"id": "...",
"type": "Ed25519VerificationKey2020",
"publicKeyMultibase": "z6Mk..."
}]
}Zero-infrastructure trust receipts - perfect for testing
// Resolve a did:key identifier
const did = "did:key:z6MkhaXgBZDvotDkL..."
const result = await resolveDID(did)
// Self-verifying, no network calls
{
"@context": "https://w3id.org/did/v1",
"id": "did:key:z6MkhaXgBZDvotDkL...",
"verificationMethod": [{
"type": "Ed25519VerificationKey2020"
}]
}Ethereum-based decentralized identity
// Resolve a did:ethr identifier
const did = "did:ethr:0xb9c5714089..."
const result = await resolveDID(did)
// Ethereum registry lookup
{
"@context": "https://w3id.org/did/v1",
"id": "did:ethr:0xb9c5714089...",
"controller": "0xb9c5714089...",
"verificationMethod": [...]
}Bitcoin-anchored Sidetree (Microsoft)
// Resolve a did:ion identifier
const did = "did:ion:EiClkZMDxPK..."
const result = await resolveDID(did)
// Bitcoin-anchored identity
{
"@context": "https://w3id.org/did/v1",
"id": "did:ion:EiClkZMDxPK...",
"verificationMethod": [...],
"service": [...]
}Cryptographically signed credentials that prove AI agent capabilities, training data, and trust scores
// Issue a Verifiable Credential
const credential = {
"@context": ["https://www.w3.org/2018/credentials/v1"],
"type": ["VerifiableCredential", "AIAgentCapability"],
"issuer": "did:web:ycq.com:issuer",
"issuanceDate": "2024-10-10T12:00:00Z",
"credentialSubject": {
"id": "did:key:z6MkhaXgBZDvotDkL...",
"agentCapabilities": [
"natural-language-processing",
"sentiment-analysis",
"compliance-checking"
],
"trustScore": 0.94,
"trainingDataset": "enterprise-2024-v3",
"accuracyMetrics": {
"precision": 0.92,
"recall": 0.89
}
},
"proof": {
"type": "Ed25519Signature2020",
"created": "2024-10-10T12:00:00Z",
"verificationMethod": "did:web:ycq.com:issuer#key-1",
"proofPurpose": "assertionMethod",
"jws": "eyJhbGciOiJFZERTQSIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..."
}
}W3C Status List 2021 allows revocation checking without revealing which credential is being checked (privacy-preserving)
// Check revocation status
const credential = { /* VC with credentialStatus */ }
const isRevoked = await checkRevocationStatus(credential)
// Status List lookup (bitstring)
{
"@context": ["https://www.w3.org/2018/credentials/v1"],
"type": ["VerifiableCredential", "StatusList2021Credential"],
"issuer": "did:web:ycq.com:issuer",
"credentialSubject": {
"type": "StatusList2021",
"statusPurpose": "revocation",
"encodedList": "H4sIAAAAAAAAA..." // Compressed bitstring
}
}
// Result
{
"isRevoked": false,
"statusListIndex": 42,
"checkedAt": "2024-10-10T12:30:00Z"
}Every trust operation is logged with Ed25519 signatures in Sonate Ledger's append-only, hash-chained structure
// Example audit log entry
{
"event_id": "evt_20241010_123045_a7f8b2",
"timestamp": "2024-10-10T12:30:45.892Z",
"event_type": "did_resolution",
"did": "did:web:example.com:user:alice",
"resolution_method": "did:web",
"resolution_time_ms": 47,
"cache_hit": true,
"signature": {
"algorithm": "Ed25519",
"public_key": "3c2a8f9b1e4d...",
"signature": "9a7f3e2c8b5d..."
},
"previous_hash": "sha256:b8c3f7e9a2d4...",
"current_hash": "sha256:e4f9c2a7d3b8..."
}
// Verify audit trail integrity
const isValid = await verifyAuditChain(eventId)
// Returns: true (all signatures valid, no breaks in hash chain)Lookup agent identity using did:web resolver → verify agent exists and retrieve verification methods
Check cryptographic signature on capability VC → verify issuer → validate credential schema
Query Status List 2021 → check bitstring index → confirm credential not revoked
Sign verification result with Ed25519 → append to Sonate Ledger hash chain → provide immutable audit record
Agent identity verified, capabilities confirmed, revocation checked, audit trail created → ready for trusted AI operations
Total time: ~100ms • All operations cached for performance • W3C-compliant • Regulator-verifiable
Launch the interactive platform demo to experience production-ready trust infrastructure in action