Technical Demo: SYMBI Trust Protocol

Explore W3C-compliant DID resolution, verifiable credentials, and SYMBI Trust Framework that powers Sonate

Live Demo Available Now

🎯 Interactive Platform Demo

Experience Sonate featuring SYMBI Trust Framework live with production-ready trust infrastructure — no signup required

Demo Credentials

Email:

demo@symbi-trust.com

Password:

demo123

What You'apos;ll Experience

  • Cryptographic trust receipts for every AI interaction
  • Multi-provider AI comparison (OpenAI, Anthropic, Perplexity)
  • Real-time bias detection & compliance scoring
  • Interactive audit trail exploration
Launch Interactive Demo

Demo Limits: 3 conversations • 10 messages per conversation • Data purged every 24 hours

DID Resolution Across 4 Methods

SYMBI Trust Protocol supports four W3C-compliant DID methods, providing flexibility for different enterprise requirements.

1did:web

Enterprise gold standard - DNS-based, no blockchain required

// Resolve a did:web identifier
const did = "did:web:example.com:user:alice"
const result = await resolveDID(did)

// Returns DID Document
{
  "@context": "https://w3id.org/did/v1",
  "id": "did:web:example.com:user:alice",
  "verificationMethod": [{
    "id": "...",
    "type": "Ed25519VerificationKey2020",
    "publicKeyMultibase": "z6Mk..."
  }]
}

2did:key

Zero-infrastructure trust receipts - perfect for testing

// Resolve a did:key identifier
const did = "did:key:z6MkhaXgBZDvotDkL..."
const result = await resolveDID(did)

// Self-verifying, no network calls
{
  "@context": "https://w3id.org/did/v1",
  "id": "did:key:z6MkhaXgBZDvotDkL...",
  "verificationMethod": [{
    "type": "Ed25519VerificationKey2020"
  }]
}

3did:ethr

Ethereum-based decentralized identity

// Resolve a did:ethr identifier
const did = "did:ethr:0xb9c5714089..."
const result = await resolveDID(did)

// Ethereum registry lookup
{
  "@context": "https://w3id.org/did/v1",
  "id": "did:ethr:0xb9c5714089...",
  "controller": "0xb9c5714089...",
  "verificationMethod": [...]
}

4did:ion

Bitcoin-anchored Sidetree (Microsoft)

// Resolve a did:ion identifier
const did = "did:ion:EiClkZMDxPK..."
const result = await resolveDID(did)

// Bitcoin-anchored identity
{
  "@context": "https://w3id.org/did/v1",
  "id": "did:ion:EiClkZMDxPK...",
  "verificationMethod": [...],
  "service": [...]
}

Verifiable Credentials Issuance

Issue AI Agent Capability Credential

Cryptographically signed credentials that prove AI agent capabilities, training data, and trust scores

// Issue a Verifiable Credential
const credential = {
  "@context": ["https://www.w3.org/2018/credentials/v1"],
  "type": ["VerifiableCredential", "AIAgentCapability"],
  "issuer": "did:web:ycq.com:issuer",
  "issuanceDate": "2024-10-10T12:00:00Z",
  "credentialSubject": {
    "id": "did:key:z6MkhaXgBZDvotDkL...",
    "agentCapabilities": [
      "natural-language-processing",
      "sentiment-analysis",
      "compliance-checking"
    ],
    "trustScore": 0.94,
    "trainingDataset": "enterprise-2024-v3",
    "accuracyMetrics": {
      "precision": 0.92,
      "recall": 0.89
    }
  },
  "proof": {
    "type": "Ed25519Signature2020",
    "created": "2024-10-10T12:00:00Z",
    "verificationMethod": "did:web:ycq.com:issuer#key-1",
    "proofPurpose": "assertionMethod",
    "jws": "eyJhbGciOiJFZERTQSIsImI2NCI6ZmFsc2UsImNyaXQiOlsiYjY0Il19..."
  }
}

✓ Verification Steps

  • 1. Resolve issuer DID → verify issuer identity
  • 2. Verify cryptographic signature → ensure not tampered
  • 3. Check revocation status → ensure still valid
  • 4. Validate credential schema → ensure compliance

Privacy-Preserving Revocation (Status List 2021)

Check Credential Revocation Status

W3C Status List 2021 allows revocation checking without revealing which credential is being checked (privacy-preserving)

// Check revocation status
const credential = { /* VC with credentialStatus */ }
const isRevoked = await checkRevocationStatus(credential)

// Status List lookup (bitstring)
{
  "@context": ["https://www.w3.org/2018/credentials/v1"],
  "type": ["VerifiableCredential", "StatusList2021Credential"],
  "issuer": "did:web:ycq.com:issuer",
  "credentialSubject": {
    "type": "StatusList2021",
    "statusPurpose": "revocation",
    "encodedList": "H4sIAAAAAAAAA..."  // Compressed bitstring
  }
}

// Result
{
  "isRevoked": false,
  "statusListIndex": 42,
  "checkedAt": "2024-10-10T12:30:00Z"
}

✓ Privacy Benefits

  • • No credential correlation
  • • Batch checking (thousands at once)
  • • Compressed bitstring (efficient)

⚡ Performance

  • • Resolution latency: ~50ms
  • • Cache hit rate: 95%+
  • • Supports 100K+ credentials/list

Cryptographic Audit Trail

Complete Trust Chain Verification

Every trust operation is logged with Ed25519 signatures in Sonate Ledger's append-only, hash-chained structure

// Example audit log entry
{
  "event_id": "evt_20241010_123045_a7f8b2",
  "timestamp": "2024-10-10T12:30:45.892Z",
  "event_type": "did_resolution",
  "did": "did:web:example.com:user:alice",
  "resolution_method": "did:web",
  "resolution_time_ms": 47,
  "cache_hit": true,
  "signature": {
    "algorithm": "Ed25519",
    "public_key": "3c2a8f9b1e4d...",
    "signature": "9a7f3e2c8b5d..."
  },
  "previous_hash": "sha256:b8c3f7e9a2d4...",
  "current_hash": "sha256:e4f9c2a7d3b8..."
}

// Verify audit trail integrity
const isValid = await verifyAuditChain(eventId)
// Returns: true (all signatures valid, no breaks in hash chain)

Complete Trust Protocol Flow

End-to-End AI Agent Verification

1

Resolve AI Agent DID

Lookup agent identity using did:web resolver → verify agent exists and retrieve verification methods

2

Verify Agent Capability Credential

Check cryptographic signature on capability VC → verify issuer → validate credential schema

3

Check Revocation Status

Query Status List 2021 → check bitstring index → confirm credential not revoked

4

Log to Cryptographic Audit Trail

Sign verification result with Ed25519 → append to Sonate Ledger hash chain → provide immutable audit record

Trust Established

Agent identity verified, capabilities confirmed, revocation checked, audit trail created → ready for trusted AI operations

Total time: ~100ms • All operations cached for performance • W3C-compliant • Regulator-verifiable

Production Performance Metrics

47ms
Avg DID Resolution
95% cache hit rate
95%
Test Coverage
All 4 DID methods
4
DID Methods
web, key, ethr, ion
100K+
Credentials/List
Status List 2021

Ready to Experience Sonate?

Launch the interactive platform demo to experience production-ready trust infrastructure in action