You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/guides/billing/subscription/manage-payment-method.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -47,6 +47,6 @@ The Single Euro Payments Area (SEPA) is an initiative of the European Union to s
47
47
In order to debit a SEPA payment, BLOOCK must collect their customer's name and bank account number in IBAN format. During the payment flow, customers must accept a mandate that gives to BLOOCK an authorization to debit the account.
48
48
This is the mandate you are accepting when you make a SEPA payment, it will appear below the Subscribe button.
49
49
50
-
By providing your IBAN and confirming this payment, you authorise (A) Enchainté Tech SL and Stripe, our payment service provider and/or PPRO, its local service provider, to send instructions to your bank to debit your account and (B) your bank to debit your account in accordance with those instructions. You are entitled to a refund from your bank under the terms and conditions of your agreement with your bank. A refund must be claimed within 8 weeks starting from the date on which your account was debited.
50
+
By providing your IBAN and confirming this payment, you authorize (A) BLOOCK HUB SL and Stripe, our payment service provider and/or PPRO, its local service provider, to send instructions to your bank to debit your account and (B) your bank to debit your account in accordance with those instructions. You are entitled to a refund from your bank under the terms and conditions of your agreement with your bank. A refund must be claimed within 8 weeks starting from the date on which your account was debited.
Copy file name to clipboardExpand all lines: docs/guides/platform/certifier.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,7 +7,7 @@ sidebar_position: 3
7
7
You can learn more about Certifier here or watch a demonstration of its use through our [YouTube channel.](https://youtu.be/vLzZnNDOCXk?si=tHLeU-Sq47WuZ4yo)
8
8
:::
9
9
10
-
The Certifier tool allows you to test BLOOCK's suite of products modularly without needing integration. Seal your documents, sign, generate access control mechanisms, and host your documents simply and securely.
10
+
The Certifier tool allows you to test BLOOCK's suite of products without needing integration. Seal your documents, sign, generate access control mechanisms, and host your documents simply and securely.
11
11
12
12
This is the latest version of the Certifier tool, designed for visual testing. It allows users to upload files and perform modular testing across multiple BLOOCK products without the need for integration via SDK or API.
13
13
@@ -33,7 +33,7 @@ In this case, the system inserts metadata into the file to validate the signatur
In the third step of the process with Descentralized Storage, users can activate the option to save the files to ensure their availability. If this option is selected, the system can generate an automatic validation link.
36
+
In the third step of the process with Decentralized Storage, users can activate the option to save the files to ensure their availability. If this option is selected, the system can generate an automatic validation link.
Copy file name to clipboardExpand all lines: docs/guides/platform/products.mdx
+3-3Lines changed: 3 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ sidebar_position: 4
5
5
6
6
In this section, users can find product dashboards for every product. In these specific sections, users can visualize detailed information about each product's usage, control integration, and access functionalities that visually enable the creation of tools for managing each of them.
7
7
8
-
## Decentralized Timesptamping
8
+
## Decentralized Timestamping
9
9
10
10
The Decentralized Timestamping product ensures data integrity through a tamper-proof system to securely seal information fingerprints. This process verifies data existence by leveraging permissionless distributed ledgers. To delve deeper into this product, you can review the Decentralized Timestamping section.
11
11
@@ -33,7 +33,7 @@ Also, users can find detailed information about each of these anchors, such as g
33
33
34
34
## Digital Identity
35
35
36
-
Self-sovereign identity (SSI) capabilities enable secure, non-repudiable, and privacy-preserving authentications that can be reused across multiple platforms. For more information about this product and its integration, you can review the Digital Identity section.
36
+
Self-sovereign identity (SSI) capabilities enable secure, undeniable, and privacy-preserving authentications that can be reused across multiple platforms. For more information about this product and its integration, you can review the Digital Identity section.
37
37
38
38
In this section of BLOOCK's management, users can access general metrics regarding the usage of this product, such as the number of credentials issued during this billing period and the number of credential revocations.
39
39
@@ -51,7 +51,7 @@ In the Issuers tab of the Digital Identity homepage, users can access more detai
The next tab displays the Credential Schemas created by the user. These schemas serve as templates for the credentials that issuers will issue. In this section, we can see the schema name, its URL, and the creation date. Additionally, we have the option to archive these schemas once they are no longer in use.
Copy file name to clipboardExpand all lines: docs/guides/products/identity/concepts/functional-flow.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -89,4 +89,4 @@ If you want to use our verification process, here is how it works:
89
89
90
90
Finally, Issuer may decide to revoke or invalidate any credential. Therefore, you will have to execute the [revocation](./core.mdx#revocation) process.
91
91
Having a credential revoked what it means is that the Holder will not be able to generate any [proof](./core.mdx#proofs).
92
-
When you revoke a credential what we are doing is generate a new [Sparse Merkle Tree Proof](./core.mdx#sparse-merkle-tree-proof) of revoation. Therefore, we need the [Issuer's state](./core.mdx#state-transition) to be processed once the revocation action is executed. And obviously this state transition will be marked by the [interval](./core.mdx#issuer-intervals) we have set. **It is important to note that the effect of the revocation will not be visible until this Issuer state transition is executed**.
92
+
When you revoke a credential what we are doing is generate a new [Sparse Merkle Tree Proof](./core.mdx#sparse-merkle-tree-proof) of revocation. Therefore, we need the [Issuer's state](./core.mdx#state-transition) to be processed once the revocation action is executed. And obviously this state transition will be marked by the [interval](./core.mdx#issuer-intervals) we have set. **It is important to note that the effect of the revocation will not be visible until this Issuer state transition is executed**.
Copy file name to clipboardExpand all lines: docs/guides/products/identity/features/credential-revocation.mdx
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -5,7 +5,7 @@ sidebar_position: 5
5
5
6
6
Finally, Issuer may decide to revoke or invalidate any credential. Therefore, you will have to execute the [revocation](#revocation) process.
7
7
Having a credential revoked what it means is that the Holder will not be able to generate any [proof](#proofs).
8
-
When you revoke a credential what we are doing is generate a new [Sparse Merkle Tree Proof](#proof) of revoation. Therefore, we need the [Issuer's state](#state-transition) to be processed once the revocation action is executed. And obviously this state transition will be marked by the [interval](#issuer-intervals) we have set. **It is important to note that the effect of the revocation will not be visible until this Issuer state transition is executed**.
8
+
When you revoke a credential what we are doing is generate a new [Sparse Merkle Tree Proof](#proof) of revocation. Therefore, we need the [Issuer's state](#state-transition) to be processed once the revocation action is executed. And obviously this state transition will be marked by the [interval](#issuer-intervals) we have set. **It is important to note that the effect of the revocation will not be visible until this Issuer state transition is executed**.
Copy file name to clipboardExpand all lines: docs/guides/products/identity/overview.mdx
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -9,7 +9,7 @@ Welcome to our Digital Identity solution, where privacy-first digital identities
9
9
10
10
#### Privacy-First Digital Identities:
11
11
12
-
- Utilize self-sovereign identity capabilities to enable secure, non-repudiable, and privacy-preserving authentications usable across multiple platforms.
12
+
- Utilize self-sovereign identity capabilities to enable secure, undeniable, and privacy-preserving authentications usable across multiple platforms.
13
13
- Provision digital identities at scale, ensuring absolute privacy and security without compromising decentralization.
14
14
15
15
#### Scalable Identity Provisioning:
@@ -29,7 +29,7 @@ Welcome to our Digital Identity solution, where privacy-first digital identities
29
29
30
30
#### Transparency and Accountability:
31
31
32
-
- Obtain non-repudiable and verifiable traceability of all user authentications and digital interactions, preventing identity theft and bolstering identifications.
32
+
- Obtain undeniable and verifiable traceability of all user authentications and digital interactions, preventing identity theft and bolstering identifications.
33
33
- Guarantee adherence to tailored access policies, strengthening access control and security measures.
34
34
- Strengthen authentication security and non-repudiation by gathering undeniable evidence of access and interactions.
0 commit comments