W3C home > Mailing lists > Public > public-credentials@w3.org > August 2017

Re: Schemas or Models of Credentials and Issuers

From: Adam Sobieski <adamsobieski@hotmail.com>
Date: Wed, 30 Aug 2017 22:52:24 +0000
To: Mike Lodder <mike.lodder@evernym.com>, David Chadwick <D.W.Chadwick@kent.ac.uk>
CC: "public-credentials@w3.org" <public-credentials@w3.org>
Message-ID: <DM5PR01MB3275E040E5863B607030013DC59C0@DM5PR01MB3275.prod.exchangelabs.com>
Updating:

“While querying digital wallets is still a pioneer topic and a work in progress, we can envision that a verifiable profile is composed by a user, utilizing a set of credentials, in response to a query or request. We can envision that a set of attributes may be requested; each attribute may be optional or required for a request; for each attribute, one or more credentials may be required; for each attribute, data and metadata about pertinent credentials and issuers may be specified or described, defining acceptable credentials per attribute.”

I'm also thinking about account verification concurrent to the emergence of issuers. Early issuers might include operating systems (in particular those with app stores) and banks. We can envision that, at some point, governments will be issuers. I'm thinking about the processes of versioning account verification processes as issuers and as entire categories of issuers emerge. Summarily, account verification needn't be a one time thing, it may occur a few times as issuers emerge.


Best regards,
Adam

From: Mike Lodder<mailto:mike.lodder@evernym.com>
Sent: ‎Wednesday‎, ‎August‎ ‎30‎, ‎2017 ‎10‎:‎25‎ ‎AM
To: David Chadwick<mailto:D.W.Chadwick@kent.ac.uk>
Cc: public-credentials@w3.org<mailto:public-credentials@w3.org>

Digital Wallets are a very fascinating subject for me too.
It may also be necessary to describe recommendations for the various types of digital wallets and how they are accessed.
Web, file, browser, hardware each could have their own recommendations for authentication and authorization.  As the risk of exposure of the contents increases we should recommend increasing layers of authentication.  A claim that is from the government is far more valuable to me than self issued claims so I will want to   require at least 2 or more forms of authentication.  A US social security number claim might require passive forms of authentication like where the user is accessing it from, which program or browser is used.

The idea of self-issued claims is needed.  I claim that I use a particular bank could later be verified by the bank issuing me a follow up claim or signing my self issued claim.

On Wed, Aug 30, 2017 at 5:40 AM, David Chadwick <D.W.Chadwick@kent.ac.uk<mailto:D.W.Chadwick@kent.ac.uk>> wrote:
The issue is not so much about who can issue VCs, because in fact anyone
can. The issue is more about verifier trust in the issuer. How does a
verifier determine who should be trusted to issue credential X,
regardless of whether X is self issued or a reputation type of
credentials.

On 29/08/2017 19:32, Steven Rowat wrote:
> On 2017-08-29 1:28 AM, Adam Sobieski wrote:
>> Credentials Community Group,
>>
>> In a decentralized identity model, various issuers can provide
>> identifying credentials (nations, states, cities, universities, banks,
>> companies, etc.).
>
> This is perhaps an unnecessary aside, but would this list also include:
> self-issued
> reputation issued
>
> credentials?
>
> For the first, I believe it's been discussed in the past in this group
> that there are situations where a person, or entity, would like to issue
> their own credential.
>
> But perhaps the reputation one is more important. I mean both the small
> scale -- two people with Passports identify person X as being known --
> as well as large-scale: 4,000 reviewers on a music site decide to bestow
> "Best of category" on work Y, and issue it as a credential.
>
> Steven
>
>
>
>
>>
>> While querying digital wallets is still a pioneer topic and a work in
>> progress, we can envision that a verifiable profile is composed by a
>> user, utilizing a set of credentials, in response to a query or
>> request. We can envision that a set of attributes may be requested,
>> each attribute may be optional or required for a request, and, for
>> each attribute, data and metadata about pertinent credentials and
>> issuers may be specified or described, defining acceptable credentials
>> per attribute.
>>
>> Topical is describing credentials’ and issuers’ data and metadata so
>> that a verifier can ensure that a verifiable profile is composed from
>> a set of acceptable credentials. I would like to ask about schemas or
>> models of credentials and issuers.
>>
>>
>> Best regards,
>> Adam Sobieski
>>
>
>




--
Mike Lodder
Senior Crypto Engineer

[X]
Received on Wednesday, 30 August 2017 22:52:48 UTC

This archive was generated by hypermail 2.4.0 : Thursday, 24 March 2022 20:24:45 UTC