Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
Free 30-min Web3 Consultation
Book Consultation
Smart Contract Security Audits
View Audit Services
Custom DeFi Protocol Development
Explore DeFi
Full-Stack Web3 dApp Development
View App Services
LABS
Glossary

Trust over IP (ToIP)

Trust over IP (ToIP) is a layered architecture and governance framework for creating interoperable digital trust ecosystems that integrate decentralized identity (DID) and verifiable credentials (VCs).
Chainscore © 2026
definition
DECENTRALIZED IDENTITY FRAMEWORK

What is Trust over IP (ToIP)?

Trust over IP (ToIP) is a comprehensive, open-source technical framework for creating and verifying digital trust across the internet, built on a layered architecture that combines decentralized identity, verifiable credentials, and blockchain technology.

Trust over IP (ToIP) is a layered architecture and governance model, developed under the Linux Foundation, that provides a complete foundation for internet-scale digital trust. It establishes a decentralized public key infrastructure (DPKI) where identifiers and their cryptographic keys are controlled by the entities they represent, not by centralized authorities. This framework enables secure, private, and portable digital interactions by separating the trust layer from the application and transport layers of the internet, much like how HTTPS added security to HTTP.

The ToIP stack is defined by four distinct layers. The Utility Layer (Layer 1) consists of public, permissioned, or private ledgers (e.g., Hyperledger Indy, Sovrin) that provide a root of trust for decentralized identifiers (DIDs). The Agent Layer (Layer 2) includes wallets and agents that manage DIDs, keys, and facilitate secure peer-to-peer messaging. The Credential Layer (Layer 3) defines the formats and protocols for issuing, holding, and verifying W3C Verifiable Credentials. Finally, the Governance Layer (Layer 4) is crucial, specifying the legal, business, and technical rules that all participants in a trust ecosystem must follow to ensure interoperability and accountability.

A core principle of ToIP is cryptographic verifiability. Instead of relying on a central database, trust is established through cryptographic proofs. For example, a university can issue a verifiable credential (a digital diploma) to a graduate. The graduate stores it in their digital wallet. When applying for a job, they can present a verifiable presentation of this credential directly to the employer, who can cryptographically verify its authenticity against the public keys recorded on the relevant decentralized ledger, without needing to contact the university. This enables selective disclosure and minimizes data exposure.

ToIP is designed for ecosystem interoperability. Different organizations, governments, and industries can establish their own governance frameworks for specific use cases—such as Know Your Customer (KYC), educational credentials, or supply chain provenance—while ensuring their technical components can interact seamlessly. This avoids the creation of new digital silos. The framework is technology-agnostic, allowing for the integration of various blockchain protocols, cryptographic suites, and agent implementations, provided they adhere to the layered model and open standards.

Practical applications of ToIP are emerging across sectors. In digital identity, it enables self-sovereign identity (SSI) models where individuals control their personal data. In supply chains, it provides an immutable and verifiable chain of custody for goods. In finance, it can streamline compliance through reusable, verified credentials. By providing a shared trust protocol for the internet, ToIP aims to solve long-standing problems of online identity fraud, data breaches, and lack of user consent, paving the way for more secure and equitable digital economies.

etymology
TERM ORIGINS

Etymology and Origin

This section traces the linguistic and conceptual roots of the term 'Trust over IP,' exploring its emergence from the convergence of digital identity, decentralized systems, and internet protocol design.

The term Trust over IP (ToIP) is a compound noun formed from the core concepts of trust and Internet Protocol (IP). It was coined to describe a specific architectural framework for establishing digital trust that is as foundational and interoperable as the TCP/IP stack is for internet connectivity. The name deliberately echoes the layered model of the internet's core protocols, signaling an ambition to provide a universal, standardized foundation for verifiable credentials and decentralized identity.

The concept emerged in the late 2010s from collaborative work within the Decentralized Identity Foundation (DIF) and the W3C Credentials Community Group. Key architects, including pioneers in SSI (Self-Sovereign Identity), sought a name that moved beyond the technical jargon of blockchain and cryptography to describe the utility being built: a new trust layer for the internet. The 'over IP' suffix explicitly positions ToIP not as a replacement for the internet, but as a complementary suite of protocols that operate on top of it, enabling trusted exchanges between any parties.

Etymologically, 'trust' in this context is defined technically as verifiable confidence in the authenticity, provenance, and permissions of a digital entity. This is a shift from the traditional, institution-based trust model to a cryptographic and protocol-based one. The term's adoption was solidified with the formation of the Trust over IP Foundation under the Linux Foundation in 2020, which established it as the official name for a complete architecture of layered specifications, including governance frameworks, credential formats, and communication protocols designed to make digital trust as ubiquitous as digital communication.

key-features
ARCHITECTURAL COMPONENTS

Key Features of the ToIP Framework

The Trust over IP (ToIP) framework is a complete architecture for Internet-scale digital trust, combining decentralized identity with verifiable credentials across four distinct layers.

01

Layer 1: The Trust Support Layer

This is the foundational decentralized ledger layer that provides a global, public root of trust for Decentralized Identifiers (DIDs). It ensures the immutability and availability of DID documents, enabling any entity to resolve a DID to its associated cryptographic keys and service endpoints. Examples include Hyperledger Indy, Sovrin, and other public or permissioned ledgers designed for identity.

02

Layer 2: The Trust Spanning Layer

This layer provides the protocols for secure, private communication and credential exchange between digital wallets. It uses agent-to-agent protocols and DIDComm to create encrypted, peer-to-peer messaging channels. This allows holders and verifiers to interact directly without routing sensitive data through centralized servers, enabling privacy-preserving interactions.

03

Layer 3: The Credential Layer

This layer defines the data formats and protocols for issuing, holding, and verifying W3C Verifiable Credentials (VCs). It standardizes how claims are cryptographically signed by an issuer, stored in a digital wallet, and presented as a Verifiable Presentation to a relying party. This layer ensures credentials are tamper-evident, privacy-respecting, and interoperable across different ecosystems.

04

Layer 4: The Ecosystem Governance Layer

The top layer defines the human governance frameworks required for trust ecosystems to operate. This includes Trust Assurance Frameworks, business rules, liability models, and accreditation standards for issuers and verifiers. Governance Frameworks (GFs) establish the legal and operational rules that give verifiable credentials their real-world meaning and enforceability.

05

Decentralized Identifiers (DIDs)

A core ToIP primitive, a DID is a globally unique identifier that an entity controls without a central registry. It resolves to a DID Document containing public keys and service endpoints. DIDs enable self-sovereign identity, allowing entities to prove control and establish secure connections. Examples include did:ethr: for Ethereum or did:web: for web domains.

06

Digital Wallets & Agents

User-controlled software that stores cryptographic keys, manages DIDs, and holds Verifiable Credentials. Wallets use agents—software processes that run protocols from Layers 2 and 3. They enable users to selectively disclose credentials, maintain multiple identities, and interact autonomously with other agents, forming the user-centric cornerstone of the ToIP stack.

four-layer-architecture
TRUST OVER IP (TOIP) FRAMEWORK

The Four-Layer Architecture

A foundational model for creating interoperable, decentralized digital trust ecosystems, separating concerns into distinct technical and governance layers.

The Four-Layer Architecture is a conceptual framework developed by the Trust over IP (ToIP) Foundation to provide a complete, interoperable stack for digital trust. It systematically divides the complex problem of establishing trust into four discrete layers: two technical (Layer 1: Utility and Layer 2: Protocol) and two governance (Layer 3: Credential and Layer 4: Ecosystem). This separation of concerns allows different organizations to specialize in and govern specific components, enabling scalable and portable trust across diverse networks and jurisdictions. The architecture is designed to be technology-agnostic, supporting various Distributed Ledger Technologies (DLTs), cryptographic suites, and credential formats.

The two lower, technical layers form the Trust Spanning Protocol. Layer 1: Utility provides the foundational, publicly accessible decentralized identifier (DID) registry and verifiable data registry, such as a permissionless blockchain or other DLT, which acts as a root of trust for public keys and schemas. Layer 2: Protocol defines the agent-to-agent communication protocols for exchanging verifiable credentials (VCs) and verifiable presentations (VPs), including standards like DIDComm. These layers ensure the secure, machine-verifiable exchange of cryptographic trust, independent of any specific business context or legal framework.

The two upper, governance layers constitute the Trust Task Force. Layer 3: Credential establishes the business, legal, and technical rules for specific types of verifiable credentials, such as a digital driver's license or a university degree. This includes defining the credential schema, issuance and revocation procedures, and the liability model. Layer 4: Ecosystem governs the entire trust community, defining the overarching purpose, membership rules, dispute resolution mechanisms, and certification requirements for credential issuers, verifiers, and holders participating in that specific trust ecosystem, such as a global trade network or a healthcare consortium.

governance-frameworks
TRUST OVER IP (TOIP)

Governance Frameworks (GFs)

Trust over IP (ToIP) is a layered architecture for creating, managing, and exchanging digital trust credentials across different networks and jurisdictions. It provides a complete, interoperable foundation for decentralized identity and verifiable credentials.

01

Four-Layer Architecture

The ToIP stack is defined by four distinct layers that separate technical trust from human trust.

  • Layer 1: Utility Layer: The decentralized ledger or peer-to-peer network that provides a root of trust for public keys and decentralized identifiers (DIDs).
  • Layer 2: Agent Layer: The software agents (wallets, edge devices) that manage keys, DIDs, and perform cryptographic operations for holders and verifiers.
  • Layer 3: Credential Layer: The ecosystem for issuing, holding, and verifying W3C Verifiable Credentials and W3C Verifiable Presentations.
  • Layer 4: Governance Layer: The human-centric rules, policies, and standards that define how trust is established and maintained between participating organizations and individuals.
02

Governance Frameworks (GFs)

A ToIP Governance Framework (GF) is a formal specification for Layer 4, defining the rules of the road for a specific trust ecosystem. It answers critical questions about identity assurance, credential schemas, liability, and dispute resolution. Key components include:

  • Governance Authority: The entity responsible for maintaining the GF.
  • Controlled Documents: The specific policies, standards, and requirements participants must follow.
  • Roles & Responsibilities: Definitions for Issuers, Holders, Verifiers, and other ecosystem actors.
  • Risk Assessment & Liability: Clear rules for managing trust failures and assigning accountability.
03

Trust Registries

A Trust Registry is a critical component of a ToIP Governance Framework, acting as a verifiable, machine-readable directory of trusted entities. It answers the question: "Who is authorized to do what?" in the ecosystem.

  • Lists Authorized Participants: Registers approved Issuers, Verifiers, and accredited credential schemas.
  • Machine-Verifiable: Uses DIDs and Verifiable Credentials to allow automated agents to check authorization status.
  • Decentralized Operation: Can be implemented on a blockchain or other decentralized systems to avoid a single point of control or failure.
  • Example: A university trust registry would list which departments are authorized to issue digital diplomas.
04

Interoperability & Standards

ToIP is built on and promotes open, global standards to ensure systems can work together across organizational and national boundaries.

  • Core Standards: Heavily relies on W3C Decentralized Identifiers (DIDs) and W3C Verifiable Credentials (VCs).
  • Hyperledger Aries: A common open-source project for implementing the Agent and Credential layers, providing interoperable protocols like DIDComm for secure messaging.
  • SSI Principles: Embodies principles of Self-Sovereign Identity (SSI), giving individuals control over their credentials and data sharing.
  • Cross-Ecosystem Trust: The layered design allows different governance frameworks to interoperate by establishing mutual recognition agreements at Layer 4.
05

Real-World Applications

ToIP architecture is being deployed to solve complex trust challenges across industries.

  • Digital Wallets & Credentials: Government-issued digital driver's licenses (e.g., mDL) and employee ID badges.
  • Supply Chain Provenance: Verifying the ethical sourcing and authenticity of products from origin to consumer.
  • Healthcare: Secure, patient-controlled sharing of medical records and vaccination credentials between providers.
  • Finance & KYC: Streamlining Know Your Customer (KYC) processes, allowing reusable identity verification to reduce friction and cost.
examples
TRUST OVER IP (TOIP)

Examples and Use Cases

Trust over IP (ToIP) is a layered architecture for creating, exchanging, and verifying digital credentials across different networks and jurisdictions. These examples illustrate its practical applications in identity and access management.

01

Self-Sovereign Identity (SSI)

ToIP provides the foundational architecture for Self-Sovereign Identity (SSI), enabling individuals to own and control their verifiable credentials without relying on a central authority. Users store credentials in a digital wallet and present cryptographically signed proofs.

  • Example: A citizen receives a digital driver's license from a government issuer, stores it in their wallet, and presents it to a car rental service (verifier) without revealing unnecessary personal data.
02

Cross-Border Digital Travel Credentials

ToIP standards are being piloted for secure and privacy-preserving digital travel credentials. This allows airlines and border control agencies from different countries to verify passenger identities and health statuses (e.g., vaccination records) efficiently.

  • Key Components: W3C Verifiable Credentials for the data format and DIDComm for secure, peer-to-peer messaging between wallets and verifiers.
03

Enterprise Employee & Customer Onboarding

Organizations use ToIP frameworks to streamline Know Your Customer (KYC) and employee verification. A bank can issue a reusable, verified credential after an initial KYC check, which the customer can then present to other trusted partners, reducing repetitive paperwork.

  • Benefit: Dramatically reduces friction, cost, and data duplication while enhancing user privacy through selective disclosure.
04

Supply Chain Provenance & Compliance

ToIP enables verifiable claims about a product's origin, ethical sourcing, or carbon footprint to travel with the physical goods. Each entity in the chain (manufacturer, shipper, retailer) can issue credentials about their role, creating an immutable chain of trust.

  • Use Case: A consumer scans a QR code on a product to instantly verify its organic certification and fair-trade credentials from the original farm.
05

Academic & Professional Credentialing

Universities and certification bodies can issue tamper-proof digital diplomas and badges as verifiable credentials. Graduates can share these credentials with employers or other institutions instantly, eliminating the need for manual transcript requests and verification.

  • Standards Involved: Leverages the Open Badges standard built on ToIP and W3C Verifiable Credentials specifications.
COMPARISON

ToIP vs. Traditional Trust Models

A structural comparison of the decentralized, layered Trust over IP (ToIP) framework against centralized and federated models.

Architectural FeatureTrust over IP (ToIP)Centralized Trust (e.g., PKI, CAs)Federated Trust (e.g., SAML, OIDC)

Trust Anchor

Decentralized Identifiers (DIDs) & Verifiable Credentials

Single Root Certificate Authority (CA)

Pre-configured federation metadata

Trust Establishment

Cryptographic verification of proofs

Validation of CA-issued certificates

Bilateral/metadata-based agreements

Governance Authority

Decentralized, layered (Technical, Governance, Legal)

Centralized (CA policy)

Consortium or Bilateral

Identity Portability

High (user-controlled wallets)

None (bound to issuing CA)

Limited (within federation circle)

Interoperability Layer

Standardized W3C DID & VC protocols

Proprietary or X.509 standards

Protocol-specific (SAML, OIDC assertions)

Verifier Dependency

None (can verify proofs offline)

Online Certificate Status Protocol (OCSP)/CRL

Identity Provider (IdP) availability

Resilience to Single Point of Failure

High

Low

Medium

Primary Use Case

Self-sovereign identity, cross-domain verifiable data

SSL/TLS, code signing, enterprise networks

Single Sign-On (SSO) for web applications

TRUST OVER IP (TOIP)

Common Misconceptions

Clarifying frequent misunderstandings about the Trust over IP (ToIP) framework and its relationship with decentralized identity and blockchain technology.

No, Trust over IP (ToIP) is not a blockchain, but a layered architecture framework for creating interoperable digital trust ecosystems. ToIP is protocol-agnostic and can utilize various underlying technologies, including but not limited to blockchains like Hyperledger Indy or Ethereum, as well as other distributed ledger technologies (DLTs) and even traditional databases. Its primary function is to define the standards and components—such as verifiable credentials, decentralized identifiers (DIDs), and governance frameworks—that allow different systems to establish trust, with blockchain serving as one possible tool in its utility layer for anchoring and verifying data.

TRUST OVER IP (TOIP)

Frequently Asked Questions (FAQ)

Trust over IP (ToIP) is a layered architecture for creating, exchanging, and verifying digital trust credentials across the internet. These FAQs address its core components, relationship with blockchain, and practical applications.

Trust over IP (ToIP) is a standardized, layered architecture for creating and verifying digital trust relationships across the internet, independent of any single vendor or platform. It works by combining four distinct layers: the Utility Layer (e.g., public blockchains or distributed ledgers for anchoring Decentralized Identifiers (DIDs)), the Agent Layer (software that manages credentials and communication), the Credential Layer (standards like W3C Verifiable Credentials for data format), and the Governance Layer (the legal and business rules governing a specific trust ecosystem). This modular design separates the trust infrastructure from applications, enabling interoperability.

ENQUIRY

Get In Touch
today.

Our experts will offer a free quote and a 30min call to discuss your project.

NDA Protected
24h Response
Directly to Engineering Team
10+
Protocols Shipped
$20M+
TVL Overall
NDA Protected Directly to Engineering Team