- From: Christopher Allen <ChristopherA@lifewithalacrity.com>
- Date: Tue, 12 Jun 2018 15:43:46 -0700
- To: "John, Anil" <anil.john@hq.dhs.gov>
- Cc: W3C Credentials CG <public-credentials@w3.org>
- Message-ID: <CACrqygC4Ah1nUsVN-a-PZbRFVsnBYb5gXERh7gAQhR4f_sABPA@mail.gmail.com>
Concept ACK I particularly like the idea of public credentials that can be used to authorize (ocap?) access to private information. I might add that there could be four levels — public open, public non-correlatable, private non-correlatable, private correlatable with consent proof. — Christopher Allen [via iPhone] On Tue, Jun 12, 2018 at 12:01 PM John, Anil <anil.john@hq.dhs.gov> wrote: > Name > > ------------------- > > Public Pointers to Private Data > > > > > > Background > > ------------------- > > When sharing information between multiple organizations, each participant > typically segregates data that is publicly visible from data that is > considered private. It is useful for organizations to provide the public > information in a way that is cryptographically verifiable and includes the > ability to point to data stores containing associated private information. > This private information should only be accessible to authorized entities > on an automated, case by case basis. > > > > > > Need > > -------------------- > > A national customs and border authority facilitating and enforcing the > movement of goods across its border is automating and streamlining the > sharing of relevant documentation from trade organizations. The customs > authority asks each trade organization to self-issue an identifier that > enables them to create digital signatures for the purposes of signing > documentation and authenticating themselves. When a trade organization > ships goods across the border, it uses the identifier to digitally sign and > share data that is visible to the customs authority and other trade > members. When and what data was provided by the trade organization is > auditable, including pointers to private, trade-sensitive, access > controlled data. When the customs authority is performing an inspection, > (a) it reads and verifies the public data and private pointers, (b) > retrieves a cryptographic access token that only they can use to access the > private data, and (c) accesses the private data using the cryptographic > access token. > > > > > > Challenge > > ------------------- > > While the public records are accessible to the customs authority and the > trade organizations, the private records are only accessible to the customs > authority or someone that they delegate the access token to. There are > three protocols at play here: (1) accessing the public records, (2) using > the access token for private access, and (3) the mechanism used to > authenticate during the private access and the subsequent authorization to > see the relevant private data. > > > > > > Distinction > > ------------------- > > This use case identifies the notion that DIDs and DID Documents will > enable architectural models and protocols that have a public and private > component to them. The identification of each actor in the ecosystem and > all three protocols in the challenge are dependent on the authentication > and authorization mechanisms supported/referenced by DIDs and DID Documents. > > > > This use case also suggests that naturally delegatable authentication and > authorization mechanisms should be considered in order to reduce > operational overhead and avoid privilege escalation problems when accessing > these private systems. > > > > > > Best Regards, > > > > - Anil > > > > Anil John > > Cyber Security R&D Program Manager > > Science and Technology Directorate > > US Department of Homeland Security > > Washington, DC, USA > > anil.john@hq.dhs.gov > > > > Email Response Time – 24 Hours > > >
Received on Tuesday, 12 June 2018 22:44:22 UTC