Technical Documentation

This page introduces Transmute VDP's layered architecture.

The Verifiable Data Platform is modularly built from contemporary, best practice frameworks. This overview is intended as a high-level architectural platform introduction.

Transmute is a major contributor to open source specifications and standards. Everything we do is standards-based! So this architectural overview will indicate also how and where these standards apply to the Verifiable Data Platform.

Web Application

The Verifiable Data Platform web application provides a user-intuitive way to perform common business workflows, seamlessly powered by cutting edge technologies. The Verifiable Data Platform web app is intended for non-technical users, focusing primarily on best-of-breed user experience and business-friendly terminology.

The Verifiable Data Platform web application guide can be found here.

Technically, the a progressive web app, optimized for modern browser-based user interfaces. Underneath, it utilizes the API for accessing platform services and resources.

Application Programming Interface

All interaction with the Verifiable Data Platform goes via the VDP API. The API is targeted technical users and developers, seeking to programmatically automate workflows. The API is strictly aligned to REST principles, and significant effort has been made to provide an intuitive resource model, all with the primary goal of making developers work fast, efficient and independent.

The subsequent Technical Documentation introduces essential elements of working with the VDP API. The full VDP API OAS can be found here.

Core Application

At the core, the Verifiable Data Platform implements a range of the main w3c standards, notably the cryptographic elements supporting the Verifiable Credentials spec, JSON-LD capabilities for strong semantic management, and Universal Wallet-based persistence capabilities.

Supporting the standard functionalities, the platform core offers business-oriented user- and resource management features, built upon an enterprise-grade security model.

Last updated