@@ -478,7 +478,7 @@ <h3>Ecosystem Overview</h3>
478
478
UUIDs and [=verification material=], might just act as namespaces for
479
479
identifiers. Examples of verifiable data registries include trusted databases,
480
480
decentralized databases, government ID databases, and distributed ledgers. Often,
481
- more than one type of verifiable data registry utilized in an ecosystem.
481
+ more than one type of verifiable data registry used in an ecosystem.
482
482
</ dd >
483
483
</ dl >
484
484
@@ -1301,7 +1301,7 @@ <h3>Contexts</h3>
1301
1301
</ dd >
1302
1302
</ dl >
1303
1303
1304
- < pre class ="example nohighlight " title ="Usage of the @context property ">
1304
+ < pre class ="example nohighlight " title ="Use of the @context property ">
1305
1305
{
1306
1306
< span class ="highlight "> "@context": [
1307
1307
"https://www.w3.org/ns/credentials/v2",
@@ -1392,7 +1392,7 @@ <h3>Identifiers</h3>
1392
1392
</ dd >
1393
1393
</ dl >
1394
1394
1395
- < pre class ="example nohighlight vc " title ="Usage of the id property "
1395
+ < pre class ="example nohighlight vc " title ="Use of the id property "
1396
1396
data-vc-vm ="https://university.example/issuers/565049#key-1 ">
1397
1397
{
1398
1398
"@context": [
@@ -1463,7 +1463,7 @@ <h3>Types</h3>
1463
1463
</ dd >
1464
1464
</ dl >
1465
1465
1466
- < pre class ="example nohighlight vc " title ="Usage of the type property "
1466
+ < pre class ="example nohighlight vc " title ="Use of the type property "
1467
1467
data-vc-vm ="https://university.example/issuers/565049#key-1 ">
1468
1468
{
1469
1469
"@context": [
@@ -1684,7 +1684,7 @@ <h3>Names and Descriptions</h3>
1684
1684
</ dl >
1685
1685
1686
1686
< pre class ="example nohighlight vc "
1687
- title ="Usage of the name and description property "
1687
+ title ="Use of the name and description properties "
1688
1688
data-vc-vm ="https://university.example/issuers/565049#key-1 ">
1689
1689
{
1690
1690
"@context": [
@@ -1732,7 +1732,7 @@ <h3>Names and Descriptions</h3>
1732
1732
</ p >
1733
1733
1734
1734
< pre class ="example nohighlight "
1735
- title ="Usage of the name and description property ">
1735
+ title ="Use of the name and description properties ">
1736
1736
{
1737
1737
"@context": [
1738
1738
"https://www.w3.org/ns/credentials/v2",
@@ -1835,7 +1835,7 @@ <h3>Issuer</h3>
1835
1835
</ dd >
1836
1836
</ dl >
1837
1837
1838
- < pre class ="example nohighlight vc " title ="Usage of issuer property "
1838
+ < pre class ="example nohighlight vc " title ="Use of the issuer property "
1839
1839
data-vc-vm ="https://university.example/issuers/14#key-1 ">
1840
1840
{
1841
1841
"@context": [
@@ -1862,7 +1862,7 @@ <h3>Issuer</h3>
1862
1862
</ p >
1863
1863
1864
1864
< pre class ="example nohighlight vc "
1865
- title ="Usage of issuer expanded property "
1865
+ title ="Expanded use of the issuer property "
1866
1866
data-vc-vm ="did:example:76e12ec712ebc6f1c221ebfeb1f#key-1 ">
1867
1867
{
1868
1868
"@context": [
@@ -1921,7 +1921,7 @@ <h3>Credential Subject</h3>
1921
1921
</ dl >
1922
1922
1923
1923
< pre class ="example nohighlight vc "
1924
- title ="Usage of the credentialSubject property "
1924
+ title ="Use of the credentialSubject property "
1925
1925
data-vc-vm ="https://university.example/issuers/565049#key-1 ">
1926
1926
{
1927
1927
"@context": [
@@ -2020,7 +2020,7 @@ <h3>Validity Period</h3>
2020
2020
</ dl >
2021
2021
2022
2022
< pre class ="example nohighlight vc "
2023
- title ="Usage of validFrom and validUntil property "
2023
+ title ="Use of the validFrom and validUntil properties "
2024
2024
data-vc-vm ="https://university.example/issuers/14#key-1 ">
2025
2025
{
2026
2026
"@context": [
@@ -2094,7 +2094,7 @@ <h3>Status</h3>
2094
2094
</ p >
2095
2095
2096
2096
< pre class ="example nohighlight "
2097
- title ="Usage of the status property ">
2097
+ title ="Use of the status property ">
2098
2098
{
2099
2099
"@context": [
2100
2100
"https://www.w3.org/ns/credentials/v2",
@@ -2127,7 +2127,7 @@ <h3>Status</h3>
2127
2127
</ p >
2128
2128
2129
2129
< pre class ="example nohighlight "
2130
- title ="Usage of multiple entries for the status property ">
2130
+ title ="Use of multiple entries for the status property ">
2131
2131
{
2132
2132
"@context": [
2133
2133
"https://www.w3.org/ns/credentials/v2",
@@ -2253,7 +2253,7 @@ <h3>Data Schemas</h3>
2253
2253
</ p >
2254
2254
2255
2255
< pre class ="example nohighlight "
2256
- title ="Usage of the credentialSchema property to perform JSON schema validation ">
2256
+ title ="Using the credentialSchema property to perform JSON schema validation ">
2257
2257
{
2258
2258
"@context": [
2259
2259
"https://www.w3.org/ns/credentials/v2",
@@ -2321,7 +2321,7 @@ <h3>Securing Mechanisms</h3>
2321
2321
</ p >
2322
2322
2323
2323
< pre class ="example nohighlight "
2324
- title ="A verifiable credential utilizing an embedded proof ">
2324
+ title ="A verifiable credential using an embedded proof ">
2325
2325
{
2326
2326
"@context": [
2327
2327
"https://www.w3.org/ns/credentials/v2",
@@ -3212,7 +3212,7 @@ <h2>Integrity of Related Resources</h2>
3212
3212
</ p >
3213
3213
3214
3214
< pre class ="example nohighlight "
3215
- title ="Usage of the relatedResource and digestSRI property ">
3215
+ title ="Use of the relatedResource and digestSRI properties ">
3216
3216
"relatedResource": [{
3217
3217
"id": "https://www.w3.org/ns/credentials/v2",
3218
3218
"digestSRI":
@@ -3225,7 +3225,7 @@ <h2>Integrity of Related Resources</h2>
3225
3225
</ pre >
3226
3226
3227
3227
< pre class ="example nohighlight "
3228
- title ="Usage of the relatedResource and digestMultibase property ">
3228
+ title ="Use of the relatedResource and digestMultibase properties ">
3229
3229
"relatedResource": [{
3230
3230
"id": "https://www.w3.org/ns/credentials/v2",
3231
3231
"digestMultibase": "uEres1usWcWCmW7uolIW2uA0CjQ8iRV14eGaZStJL73Vz"
@@ -3280,7 +3280,7 @@ <h3>Refreshing</h3>
3280
3280
</ dl >
3281
3281
3282
3282
< pre class ="example nohighlight "
3283
- title ="Usage of the refreshService property by an issuer ">
3283
+ title ="Use of the refreshService property by an issuer ">
3284
3284
{
3285
3285
"@context": [
3286
3286
"https://www.w3.org/2018/credentials/v1",
@@ -3325,7 +3325,7 @@ <h3>Refreshing</h3>
3325
3325
< h3 > Terms of Use</ h3 >
3326
3326
3327
3327
< p >
3328
- Terms of use can be utilized by an [=issuer=] or a [=holder=] to
3328
+ Terms of use can be used by an [=issuer=] or a [=holder=] to
3329
3329
communicate the terms under which a [=verifiable credential=] or
3330
3330
[=verifiable presentation=] was issued. The [=issuer=] places their terms
3331
3331
of use inside the [=verifiable credential=]. The [=holder=] places their
@@ -3374,7 +3374,7 @@ <h3>Terms of Use</h3>
3374
3374
</ dl >
3375
3375
3376
3376
< pre class ="example nohighlight "
3377
- title ="Usage of the termsOfUse property by an issuer ">
3377
+ title ="Use of the termsOfUse property by an issuer ">
3378
3378
{
3379
3379
{
3380
3380
"@context": [
@@ -3432,9 +3432,9 @@ <h3>Terms of Use</h3>
3432
3432
< p >
3433
3433
This feature is expected to be used by government-issued [=verifiable
3434
3434
credentials=] to instruct digital wallets to limit their use to similar
3435
- government organizations in an attempt to protect citizens from unexpected usage
3435
+ government organizations in an attempt to protect citizens from unexpected use
3436
3436
of sensitive data. Similarly, some [=verifiable credentials=] issued by private
3437
- industry are expected to limit usage to within departments inside the
3437
+ industry are expected to limit use to within departments inside the
3438
3438
organization, or during business hours. Implementers are urged to read more
3439
3439
about this evolving feature in the appropriate section of the Verifiable
3440
3440
Credentials Implementation Guidelines [[?VC-IMP-GUIDE]] document.
@@ -3544,7 +3544,7 @@ <h3>Evidence</h3>
3544
3544
< p class ="note "
3545
3545
title ="Evidence has a different purpose from securing mechanisms ">
3546
3546
The `evidence` [=property=] provides information that is different from and
3547
- information to the securing mechanism utilized . The `evidence` [=property=] is
3547
+ information to the securing mechanism used . The `evidence` [=property=] is
3548
3548
used to express supporting information, such as documentary evidence, related to
3549
3549
the [=verifiable credential=]. In contrast, the securing mechanism is used to
3550
3550
express machine-verifiable mathematical proofs related to the authenticity of
@@ -3800,7 +3800,7 @@ <h3>Representing Time</h3>
3800
3800
< p >
3801
3801
This specification attempts to increase the number of universally recognized
3802
3802
combinations of dates and times, and reduce the potential for
3803
- misinterpretation of time values, by utilizing the
3803
+ misinterpretation of time values, by using the
3804
3804
`dateTimeStamp` construction first established by the [< a
3805
3805
data-cite ="XMLSCHEMA11-2#dateTimeStamp "> XMLSCHEMA11-2</ a > ] specification. In
3806
3806
order to reduce misinterpretations between different time zones, all time values
@@ -3993,7 +3993,7 @@ <h3>Ecosystem Compatibility</h3>
3993
3993
a [=conforming document=].
3994
3994
</ li >
3995
3995
< li >
3996
- SHOULD ensure that all semantics utilized in the transformed
3996
+ SHOULD ensure that all semantics used in the transformed
3997
3997
[=conforming document=] follow best practices for Linked Data. See
3998
3998
Section [[[#getting-started]]], Section
3999
3999
[[[#extensibility]]], and Linked Data Best Practices [[?LD-BP]]
@@ -4004,7 +4004,7 @@ <h3>Ecosystem Compatibility</h3>
4004
4004
< p class ="note " title ="What constitutes a verifiable credential? ">
4005
4005
Readers are advised that a digital credential is only considered compatible with
4006
4006
the W3C Verifiable Credentials ecosystem if it is a [=conforming document=]
4007
- and it utilizes at least one securing mechanism, as described by their
4007
+ and it uses at least one securing mechanism, as described by their
4008
4008
respective requirements in this specification. While some communities might call
4009
4009
some digital credential formats that are not [=conforming documents=]
4010
4010
"verifiable credentials", doing so does NOT make that digital credential
@@ -4273,10 +4273,10 @@ <h3>Notable JSON-LD Features</h3>
4273
4273
< h3 > Restrictions on JSON-LD</ h3 >
4274
4274
4275
4275
< p >
4276
- In order to increase interoperability, this specification restricts the usage of
4276
+ In order to increase interoperability, this specification restricts the use of
4277
4277
JSON-LD representations of the data model. JSON-LD < a
4278
4278
href ="https://www.w3.org/TR/json-ld/#compacted-document-form "> compacted document
4279
- form</ a > MUST be utilized for all representations of the data model using the
4279
+ form</ a > MUST be used for all representations of the data model using the
4280
4280
`application/vc` or `application/vp` media type.
4281
4281
</ p >
4282
4282
@@ -4545,7 +4545,7 @@ <h2>Type-Specific Credential Processing</h2>
4545
4545
</ p >
4546
4546
4547
4547
< p >
4548
- < dfn > General JSON-LD processing</ dfn > is defined as a mechanism that utilizes a
4548
+ < dfn > General JSON-LD processing</ dfn > is defined as a mechanism that uses a
4549
4549
JSON-LD software library to process a [=conforming document=] by performing
4550
4550
various < a data-cite ="?JSON-LD11#forms-of-json-ld "> transformations</ a > .
4551
4551
< dfn > Type-specific credential processing</ dfn > is defined as a lighter-weight
@@ -4628,7 +4628,7 @@ <h2>Algorithms</h2>
4628
4628
< p >
4629
4629
This section contains algorithms that can be used by implementations to perform
4630
4630
common operations, such as [=verification=]. Conformance requirements phrased as
4631
- algorithms utilize normative concepts from the [[[INFRA]]] [[INFRA]]. See the
4631
+ algorithms use normative concepts from the [[[INFRA]]] [[INFRA]]. See the
4632
4632
section on < a data-cite ="INFRA#algorithm-conformance "> Algorithm Conformance</ a >
4633
4633
in the [[[INFRA]]] for more guidance on implementation requirements.
4634
4634
</ p >
@@ -5018,7 +5018,7 @@ <h3>Identifier-Based Correlation</h3>
5018
5018
5019
5019
< p >
5020
5020
Similarly, disclosing the [=credential=] identifier (as in
5021
- [[[#example-usage -of-the-id-property]]]) can lead to situations where multiple
5021
+ [[[#example-use -of-the-id-property]]]) can lead to situations where multiple
5022
5022
[=verifiers=], or an [=issuer=] and a [=verifier=], can collude to correlate the
5023
5023
[=holder=].
5024
5024
</ p >
@@ -5308,7 +5308,7 @@ <h3>Bearer Credentials</h3>
5308
5308
</ p >
5309
5309
5310
5310
< pre class ="example nohighlight vc "
5311
- title ="Usage of issuer properties "
5311
+ title ="Use of issuer properties "
5312
5312
data-vc-vm ="https://university.example/issuers/14#keys-1 ">
5313
5313
{
5314
5314
"@context": [
@@ -5593,11 +5593,11 @@ <h3>Patterns of Use</h3>
5593
5593
even compatible with necessary use. Sometimes, correlation is a requirement.
5594
5594
</ p >
5595
5595
< p >
5596
- For example, in some prescription drug monitoring programs, usage monitoring is
5597
- a requirement. Enforcement entities need to be able to confirm that individuals
5596
+ For example, in some prescription drug monitoring programs, monitoring prescription
5597
+ use is a requirement. Enforcement entities need to be able to confirm that individuals
5598
5598
are not cheating the system to get multiple prescriptions for controlled
5599
- substances. This statutory or regulatory need to correlate usage overrides
5600
- individual privacy concerns.
5599
+ substances. This statutory or regulatory need to correlate prescription
5600
+ use overrides individual privacy concerns.
5601
5601
</ p >
5602
5602
5603
5603
< p >
@@ -5609,8 +5609,8 @@ <h3>Patterns of Use</h3>
5609
5609
</ p >
5610
5610
5611
5611
< p >
5612
- Privacy violations of [=verifiable credential =] usage occur when unintended or
5613
- unexpected correlation arises from the presentation of those
5612
+ Privacy violations related to the use of [=verifiable credentials =] occur when
5613
+ unintended or unexpected correlation arises from the presentation of those
5614
5614
[=verifiable credentials=].
5615
5615
</ p >
5616
5616
</ section >
@@ -6198,7 +6198,7 @@ <h3>Code Injection</h3>
6198
6198
processing language and base direction information.
6199
6199
</ li >
6200
6200
< li >
6201
- It increases the security attack surface when utilizing this data model,
6201
+ It increases the security attack surface when using this data model,
6202
6202
because naively processing HTML could result in the execution of a `script`
6203
6203
tag that an attacker injected at some point during the data production process.
6204
6204
</ li >
@@ -6227,13 +6227,13 @@ <h2>Accessibility Considerations</h2>
6227
6227
makes this information unusable by a large subset of the population. It is
6228
6228
important to follow accessibility guidelines and standards, such as [[WCAG21]],
6229
6229
to ensure that all people, regardless of ability, can make use of this data.
6230
- This is especially important when establishing systems utilizing cryptography,
6230
+ This is especially important when establishing systems using cryptography,
6231
6231
which have historically created problems for assistive technologies.
6232
6232
</ p >
6233
6233
6234
6234
< p >
6235
6235
This section details the general accessibility considerations to take into
6236
- account when utilizing this data model.
6236
+ account when using this data model.
6237
6237
</ p >
6238
6238
6239
6239
< section class ="informative ">
@@ -6247,7 +6247,7 @@ <h3>Data First Approaches</h3>
6247
6247
</ p >
6248
6248
6249
6249
< p >
6250
- When utilizing this data model to create [=verifiable credentials=], it is
6250
+ When using this data model to create [=verifiable credentials=], it is
6251
6251
suggested that data model designers use a < em > data first</ em > approach. For
6252
6252
example, given the choice of using data or a graphical image to depict a
6253
6253
[=credential=], designers should express every element of the image, such as
@@ -6285,7 +6285,7 @@ <h2>Internationalization Considerations</h2>
6285
6285
6286
6286
< p >
6287
6287
This section outlines general internationalization considerations to take into
6288
- account when utilizing this data model and is intended to highlight specific
6288
+ account when using this data model and is intended to highlight specific
6289
6289
parts of the < em > Strings on the Web: Language and Direction Metadata</ em >
6290
6290
document [[STRING-META]] that implementers might be interested in reading.
6291
6291
</ p >
@@ -6441,9 +6441,9 @@ <h2>Validation</h2>
6441
6441
While this specification does not provide conformance criteria for the process
6442
6442
of the [=validation=] of [=verifiable credentials=] or
6443
6443
[=verifiable presentations=], readers might be curious about how the
6444
- information in this data model is expected to be utilized by [=verifiers=]
6444
+ information in this data model is expected to be used by [=verifiers=]
6445
6445
during the process of [=validation=]. This section captures a selection of
6446
- conversations held by the Working Group related to the expected usage of the
6446
+ conversations held by the Working Group related to the expected use of the
6447
6447
properties in this specification by [=verifiers=].
6448
6448
</ p >
6449
6449
@@ -6781,7 +6781,7 @@ <h3>Base Context</h3>
6781
6781
</ p >
6782
6782
< p >
6783
6783
It is strongly advised that all JSON-LD Context URLs used by an
6784
- application utilize the same mechanism, or a functionally equivalent mechanism,
6784
+ application use the same mechanism, or a functionally equivalent mechanism,
6785
6785
to ensure end-to-end security. Implementations are expected to throw errors
6786
6786
if a cryptographic hash value for a resource does not match the expected hash
6787
6787
value.
@@ -7055,7 +7055,7 @@ <h3>Differences between Contexts, Types, and CredentialSchemas</h3>
7055
7055
value could make it more difficult for verifiers to inform the holder which
7056
7056
[=verifiable credential=] they require. When a [=verifiable credential=]
7057
7057
has multiple subtypes, listing all of them in the `type`
7058
- property is sensible. The usage of the `type` property in a
7058
+ property is sensible. The use of the `type` property in a
7059
7059
[[JSON-LD11]] representation of a [=verifiable credential=] enables to enforce
7060
7060
the semantics of the [=verifiable credential=] because the machine is able to
7061
7061
check the semantics. With [[JSON-LD11]], the technology is not only describing the
@@ -7462,7 +7462,7 @@ <h2>Revision History</h2>
7462
7462
</ li >
7463
7463
< li >
7464
7464
Ensure that `dateTimeStamp` is used for time values. Provide further guidance
7465
- on proper usage of time values and timezones.
7465
+ on proper use of time values and timezones.
7466
7466
</ li >
7467
7467
< li >
7468
7468
Make `validFrom` optional.
@@ -7560,7 +7560,7 @@ <h2>Revision History</h2>
7560
7560
< li >
7561
7561
Update previous normative references that pointed to RFC3339 for date-time
7562
7562
details to now normatively reference the date-time details described in
7563
- XMLSCHEMA11-2 which more accurately reflects the usage in examples and
7563
+ XMLSCHEMA11-2 which more accurately reflect date-time use in examples and
7564
7564
libraries.
7565
7565
</ li >
7566
7566
0 commit comments