- From: Joe Andrieu <joe@joeandrieu.com>
- Date: Mon, 13 Mar 2017 10:21:48 -0700
- To: Credentials Community Group <public-credentials@w3.org>
- Message-Id: <1489425708.465579.909765848.79DC7DD3@webmail.messagingengine.com>
Manu,
Here are my thoughts after our call last week about the RWoT demo.
The Joram 1.0.0 Engagement Model
https://docs.google.com/document/d/1GLejHAyOGcFZMDH23VpBK5as_474gt1tdYZIWkHm7c0/edit?usp=sharing,
currently in draft, is an attempt to describe the human interactions
when a Syrian refugee works his way through Greece, with an eye to
descripting requirements for a self-sovereign identity system. It is an
early step to formally understand how to support UN SDG 16.9. For
simplicity, I'll refer to this as the UNHCR use case.
Perhaps the key challenge in this use case is the lack of technology
owned or controlled by the typical refugee. In the engagement model, we
assume that the stewards--not the refugee--have access to a physical
device connected to the Internet, which is capable of properly accessing
a yet-to-be-defined Distributed Data Store. Conceptually, this is just a
smart phone.
The big question for us: can this engagement model be realized with
verifiable claims? What would VC need to support it?
The immediate question is: can we modify or configure Digital Bazaar's
digital wallet to provide a UNHCR experiential demo at Rebooting Web of
Trust IV in Paris?
To demonstrate Joram in a credible way, I think there are two keys we'd
need to demonstrate:
1. The use of a QR coded bracelet and pin as the refugee's
identification and authentication mechanism, enabling the refugee to
selectively share specific proofs/attributes with stewards.
2. The storing of the digital trail of non-repudiable observations,
accessible via the authentication and selection mechanism in #2.
And specifically, for the wallet you showed us in our call, I think
we'll need:
3. A change in the mental model of the wallet-device relationship. The
current wallet software assumes the controller of the device is the
controller of the wallet. In the UNHCR case, the device is controlled
by the steward, so linking to a wallet--which is controlled by the
refugee--should not form a long term permission for control over the
wallet, but rather provide a mechanism for the transfer of specific
attributes to the steward's system.
The strawman we've been working with includes a few core assumptions:
1. Steward software adheres to a recognized standard authentication
ceremony. This ceremony includes having the subject (1) unlock the
dataset with a pin, (2) manage selective disclosure of the dataset,
and (3) record the access in the data store with a photo of the
refugee. In other words, we are trusting the software to act to a
standard and for stewards to use non-compromised devices.
2. We're ok with access to the underlying datastore being
provisioned/permissioned based on UN criteria, and are comfortable
with the UN managing consensus and permissioning of steward
organizations. We don't need to resolve the question of how to
implement the engagement model in an open public ledger, because we
see significant benefit in the UN's role establishing rules of
governance and monitoring participants for bad behavior.
3. Our mental model for the datastore is not cards in the sense of
Information Cards or loyalty cards, but rather an accumulated context
of non-repudiable observations, which can be selectively presented by
the subject. The key to us is that any participant can write an
observation about a subject, and the subject controls which
attributes are shared with which recipients.
While we are pushing towards a user-driven or self-sovereign approach,
our particular scenario is fine with the role the UN--as a collective
collaborative governing body--establishing who can read/write to the
data store and how bad actors are policed and the resulting dataset is
granularly composable by distinct sharing ceremonies.
Proposal for the demo:
1. Issue participants a bracelet with a unique QR code
2. Associate a photo with that QR code
3. Associate a user-selected PIN with that QR code
4. Create several interactions where the bracelet + PIN + a photo check
(performed by the steward) authenticate the participant for access to
services. Ideas for interactions:
a. entrance to the event
b. getting food
c. giving a talk
d. drink tickets
5. As a bit of theater:
a. an intake scenario of Joram at the beach, taken to UN intake
officer, linking the participants experience to Joram
b. at the end, "accuse" a participant of a transgression, for
which the history of interactions provides evidence refuting
their guilt.
I'm not sure how much of that is feasible given the timeframe, but if we
can make a good pass at something like this, it would provide a catalyst
for discussion of best practices when the subject and/or controller of a
claim lacks the technology to manage their own keys, but does have the
moral and legal authority to manage consent and disclosure.
-j
--
Joe Andrieu, PMP
joe@joeandrieu.com
+1(805)705-8651
http://blog.joeandrieu.com
Received on Monday, 13 March 2017 17:22:16 UTC