- From: <meetings@w3c-ccg.org>
- Date: Thu, 3 Apr 2025 00:05:46 +0200
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYcvVA3_U2G7f4ORuM=Sd43ty_VQZrbz8tbusrOv9hbNhQ@mail.gmail.com>
osb-nmyo-muh Meeting Summary (2025-04-02) *Topics Covered:* 1. *Verifiable Issuers and Verifiers:* The group discussed a specification for verifiable issuers and verifiers, aiming to ensure users can trust the source of credentials and the legitimacy of verification requests. The existing ETSI standard was mentioned, and the plan is to create a JSON-based profile of this standard, potentially adding or modifying fields as needed for broader international use. Collaboration with ETSI and the VCEDU community is planned to align efforts. The specification is considered ready to be handed off to the Verifiable Credential Working Group (VCWG). 2. *Verifiable Credential Barcodes:* The group reviewed the specification for embedding verifiable credentials in standard barcodes (QR codes, PDF417). The key goal is to provide authenticity and integrity to physical documents by cryptographically protecting both the VC and existing data on the document. The specification is considered mature, but some non-normative sections (privacy considerations, security considerations) require further work. Discussions centered on: - Generalizing beyond AMVA driver's licenses to support other international standards. - Adding support for "bare" VCs (without data integrity features) in QR codes. - Addressing the dependence on pre-standard technologies like SeaBoard LD and Core LD. - Clarifying how to handle the placement of signatures in jurisdiction-specific fields within PDF417 barcodes. *Key Points:* - Several specifications are nearing readiness for transition to the VCWG. - Collaboration with other groups (ETSI, VCEDU, Credential Engine) is crucial for alignment. - The Verifiable Credential Barcodes specification requires minor updates before submission to the VCWG (primarily adding support for bare VCs in QR codes and clarifying some points regarding PDF417 barcodes). - Multiple independent implementations of the Verifiable Credential Barcodes specification already exist. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-and-promotion-2025-04-02.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-and-promotion-2025-04-02.mp4 *osb-nmyo-muh (2025-04-02 11:01 GMT-4) - Transcript* *Attendees* Benjamin Young, Dave Longley, David C, Elaine Wooton, Harrison Tang, Hiroyuki Sano, James Chartrand, John's Notetaker, Kayode Ezike, Manu Sporny, Parth Bhatt, Wesley Smith *Transcript* David C: I've been here a few minutes and I was looking through my notes and it said starts at 300 p.m. every week, but it's actually 4 p.m. So, I think we got messed up with this, change to summertime. David C: And maybe the calling notice needs to go out again with correct information. Yeah. Okay. Thanks. Manu Sporny: Yeah. Yeah,… Manu Sporny: David, we're changing over to the new system currently and so it will go out as a calendar invite which will hopefully automatically sync with everybody's calls. yeah, we got off track with the whole summertime thing. Yep. All right. I am noting that there are quite a few people here. So let's go ahead and get started. we're going to start with some introductions today. but let me kind of cover our agenda for today. So let me go ahead and pull this up. Manu Sporny: as folks know, we have been incubating work in this group that we are hoping to transition over to the verifiable credential working group, the global standards working group for verifiable credentials the credentials community group has been incubating a large number of specifications that are getting ready to be able to be promoted to global standards track. We're going to be talking about two of those work items today. The first one, David Chadwick is going to give us a presentation on verifiable, issuer and verifiers, which is something he's been involved with, for a while now. we're going to kind of just get a high level overview of that and where the work is right now. Manu Sporny: and then the bottom half of the call will be focused on verifiable credential barcodes in the things that we would need to update or change before we hand the work off to the official standard setting, the verifiable credential working group. So that's what we have on the agenda today. let's go ahead and do some quick introductions for folks that are new to the call. so, I'll just call the new folks and, please feel free to give us a couple of sentences on who you are and, what you're interested in. David Chadwick, we know you, but, why don't you go ahead and introduce yourself since you're presenting today. David C: Hi. David Chadri. I've been around this space longer than I can remember and I have been the joint editor with Isaac Henderson from frownhoffer of the verifiable issuers and verifiers specification. And we implemented this a few years ago in an NGI Atlantic project. and this was so that users with their wallets could know that the credentials they were getting from issuers were trustworthy and contained the right information and that the verifiers they were sending information to were also trustworthy and were asking for the right information according to GDPR. Thanks. Manu Sporny: Thank you, David. Elaine Wooten, if you don't mind introducing yourself. Oops, she dropped. We'll go to Parth bot next and… Parth Bhatt: Thank you so much,… Manu Sporny: then we'll come back around to Elaine. Parth Bhatt: Hello everyone. Part here. I'm a technical product manager and I have been working with the enterprise businesses in terms of helping them how to leverage identity and associated protocols including verifiable credentials and everything in their existing use case. And I'm here because I wanted to contribute in the opensource technical specs in terms of developing these standards. So nice to meet you all. Manu Sporny: Wonderful. Thank you part for the intro and welcome to the group. wonderful to see you here. all right. I don't see Elaine joining back. so why don't we just start and go into the presentation David on the ble issuers verifiers. 00:05:00 David C: Thanks. So, as I said in the introduction, I think it's really important for especially naive users, who've got a wallet and are downloading credentials from potentially anywhere in the world, that the credentials they're getting are valid and trustworthy. you might say, maybe they should only download credentials from issues that they already know and trust. David C: but that really is not necessarily the case because on the web today when you go to websites you don't necessarily know that they're trustworthy. You hope they are but often the name of the site doesn't even match the name of the company. and we had a really good example of some weird and wonderful site that was actually owned by Microsoft. So everybody would say that Microsoft is trustworthy. they might say that but they wouldn't have known that this website by the URL was actually Microsoft so the idea is that the issuers will be vetted by a trusted third party. David C: that third party will issue a list of trusted issuers and the user only needs to trust a trusted third party and if that trusted third party is run by the government or an offshoot of the government which in Europe today then they're used on pretty solid ground by trusting the issuer of the trusted list and in the trusted list for issuers then not only did they find out who the trusted issuers are, but there's also information about the schema of the issued credentials. so that the wallet will check and can check that the credential it gets matches the schema that the trust list issuer has said goes along with that trusted issuer. David C: So, you cannot be attributes that you weren't expecting and that the entity that verified the issue isn't expecting because it checks that it matches the screen the schema. And then if we switch to the verifiers, then it's important when you're giving away personal information that the verifier conforms to GDPR in Europe. that is I mean in the different states of America you've got different privacy legislation but in essence you need to know that this verifier is not going to misuse your personal information and so what the list of trusted verifiers contains is not only that this is a verifier but this is the request that he will be sending to the wallet and there are standards now for the request there are there at least David C: three standards for the format of this request. There's diff PE and that's versions one, two, and I 2 something. and there's the W3C spec that manu has been working with on making presentation requests, I think it called. And then there's also the ODIC the dis DCP as it is now is also having its own policy statements for requesting credentials. David C: So what the trusted list issue can do is that the verifier is trustworthy check the policy that it says it will issue for a particular resource and then the wallet when it gets the request can check that the request actually matches and that the verifier is not asking for an undue set of attributes and that ensures that the verifier conforms to GDPR bec because the list issuer will have checked that and so the user can then send his attributes in sure knowledge that his personal information is not going to be misused. So that's in essence the concept behind the work. David C: in terms of standardization, there was already an Etsy standard for trusted lists and this was produced I think 10 years ago under EI-1 and that's been implemented throughout Europe and that has a European list of lists and that's the top level and so Europe points to all the trusted lists within Europe the different countries and then from this list of lists you can get the trusted list for your particular country and then you can actually find out who are the trusted issuers in your country and who are the trusted verifiers. You can do that every country in Europe. So for the ex standard actually is in XML. So the data structures are in XML. clearly we don't want XML today because wallets in general won't be processing XML. we wanted it in JSON. 00:10:00 David C: So one of the things we did in this particular standard is converted the SC XML into JSON and we also went through all the fields and we eliminated fields that we didn't think were necessary for the first cut of this standard. So for example the Etsy trusted list allows you not only to find out who is trusted today but who was trusted in the past because it keeps his history. So you can actually look through the history to find out the state of people who trusted maybe five years ago. So we haven't got that in this particular version of the draft because we thought that was a sort of bells and whistles that wasn't essential to the fundamental problem with it which is can the user now trust the verifier that's asking for his credentials or the issuer that wants to give him credentials. David C: and so I've made contact with the Etsy people and Etsy have been requested to update their spec to conform to EDA 2. from EDAS one and so what they're working on now is a data model for trusted lists and then that data model can be mapped into XML, JSON, ASN1 or other formats. So they're making their next version of the standard format independent and they're hoping to have that standard published by the end of this year. that's I've got a meeting with them. David C: I was hoping to have a meeting this morning, but we didn't quite mesh and I could have given you more updates on it back, but I'll be having a meeting within the next week with the ETI people. where I'm going to explain to them what we've done with our work. and then, they might take some of it on board or not. and so the question really for this group is what do we want to do about standardization? And my feeling now knowing what Etsy is doing is that I think this document that we've got should become a profile of the Etsy work when it's finished. and we profile it and discard fields we don't think are important for us. and we might need to add additional extra ones or optional ones that they've got or mandate optional ones. David C: In fact, what we've done in this fields that are optional in the IES1 we've made more or less mandatory in this such as the schema for example the schema they have a concept of additional information. So we've used that to publish the schema. so I'll throw the floor open to questions at the moment if anybody Yeah,… David C: Manu Manu Sporny: That was great David. Manu Sporny: Thank I think my highlevel question. so this is good. somebody else is working on the data model. and we should be able to profile it into the specification. I think that that sounds great. we need to understand, if and I think David,… Manu Sporny: you're about to have a conversation with them about this, but we need to understand if Etsy is okay with us profiling some of this stuff at W3C or if they want to do that work themselves. it, calls into question should this spec be done at Etsy or should it be done at W3C? and I don't think we know the answer to that question yet without asking them, right, David? Or have you had Mhm. David C: Yeah. But that… David C: what we have to bear in mind is that sorry it's Etsy not EPS it's Etsy it's a European standardization organization so it is driven purely for the requirements of Europe whereas W3C is totally international and we should so we've got a broader public if you like a broader clientele than exit than exit and… Manu Sporny: Mhm. Yeah. David C: therefore I think there will David C: value in us profiling it because there may be things that Europe are not interested in that the worldwide community are and vice versa. Yeah manu Yeah. Manu Sporny: Manu Sporny: Plus one to that. That makes sense to me. I guess the next question is there is I know and maybe James or Coyote you can speak to this. I know in the verifiable credential for education group in that community I think there was a presentation just this week right Monday about issuer and verifier lists. David is there overlap with that community? 00:15:00 Manu Sporny: I mean clearly we would have to have a discussion with the VCEDU folks because I know Dimmitri is working quite a bit on trusted issuer verifier lists. do we know what the overlap there is yet? David C: No, I missed that. David C: I unfortunately missed that. it was sort of later in the day. that would have been really interesting for me to attend. David C: So I don't know what the overlap is actually at the moment. No, And I don't know if they know. Manu Sporny: Okay, there's a recording. Manu Sporny: There's a recording of it. David C: Yeah. Right. Manu Sporny: So we can come in. David C: Yeah. Yeah, that's right. Yeah. So, Manu Sporny: Okay, Coyote, you're on the queue. Kayode Ezike: Yeah, that's Yeah. and it's funny because there's also right now a concurrent call with led by Crunch Engine and DCC around a ongoing project that they've been doing around registries as well. David C: Yeah. Isaac. Kayode Ezike: I think it's always been a monthly thing. I think they're wrapping up in a couple months or maybe even sooner than that. But I wonder if that's also something that you should pay attention to. It's called issu registry. some AG advisory group or something but something that's worth looking into either with a credential engine or dcc through Kerry or Jeene Kitchens happy to maybe send some Context of contact. Manu Sporny: Yes, that would be great, and then David, I don't know both you and Isaac are interested in kind of chatting with that community as well. I mean it feels like there is momentum here clearly and there has been work done clearly and so we just need to make sure that we've got as many of the communities working on this stuff aligned on David C: isn't actually. Manu Sporny: what the path forward is so that we can make one proposal to the ential rechartering thing. as far as timing is concerned, David Coyote, do you have any thoughts on timing? Right now, it feels like putting the standards track in the next two months might be too early. Manu Sporny: But within the next 6 months seems like it might work. So, we might want to carve out some space in the next charter to include this. but note that the other work needs to be done in the other communities before we can really put our shoulder to the wheel and get this thing done as a global standard. thoughts on kind of timing David C: … David C: we finished this David C: So this is our final draft unless people find raise issues and errors. But as far as Isaac and myself are concerned, we've now finished our work. Manu Sporny: So, you're saying this is as far as you're concerned,… David C: Yeah,… Manu Sporny: this is ready to be handed over to the verifiable credential working group. David C: I mean And it's ready to be implemented by because as I said we did implement a couple of years ago under the NGI Atlantic project. Manu Sporny: Okay. David C: and also this is our implementation based on train some people know will know about train but train is the trusted list work that's done by frownhuffer and it's also been used by the United Nations World Health Organization in some of the work they've been doing. so what train does is it effectively publishes the lists which are like epic exconformant lists using the DNS. So the DNS is where you go to find out your list. we've got papers describing this and that's quite nice because it means you've automatically can navigate to trusted list providers without having some source. obviously the DNS is an external source, but you're already using the DNS. David C: So you're leveraging systems that are already built into your infrastructure to find the roots of trust. Manu Sporny: Okay, that sounds good. Manu Sporny: Okay, so David, you and Isaac feel this is ready to be moved over to VCWG. We need to get confirmation from VCEDU, the verifiable credential education folks to see if this is aligned or not. who wants to take kind of the action to do that? David, do you want to do that? Coyote, I don't want to. Okay. David C: Yeah, he sent me a list. David C: I'm just going to click on that in the Credential engines. 00:20:00 Kayode Ezike: Yeah, that's for yes. David C: Yeah. Issue registry advis group. Okay. no. This is only issue registry. David C: So, are they doing verifiers as well not? Kayode Ezike: So they are also interested in that part of their work was exploring the different solutions that are out there. So they did actually take a look into the is verifiable issue verifier as well as federation 1.0 0 from open ID and I think another one from BIFF. they ultimately landed on the federation 1.0 but yeah so they have also explored that but for the prototype they were mostly kind of seeing how they can leverage this for the issuer use case but as you can see there's still a few more dates left in the meeting. I guess only one more actually for next month. David C: Yeah, it's just Matt May the 7th,… Kayode Ezike: But yeah,… David C: isn't it? Yeah, that's right. Yeah. Yeah. Kayode Ezike: but it might maybe be worth reaching out. David C: Yeah. Yeah. David C: I'll join and see if I can I'm not sure whether I'm around May the December, but I'll request to join it. and then for the EDU one, what I'll do is I'll listen to the broadcast from last Monday. David C: Because as you said it was recorded, I find the minutes are not very good. The minutes that are automatically taken are not that good, are they? Manu Sporny: Yep. No,… Manu Sporny: no, but the recording should give you… David C: Yeah. Yeah. Manu Sporny: what you need. And Okay. David C: Okay. Manu Sporny: right. David C: Thank you very much. Manu Sporny: Thank you so much, David, for giving us that overview. we've got some concrete next steps that you'll follow up on, David, and we'll check back in a week three to see what you've been able to kind of learn about what other groups are doing. I think that's it for that item. we are now going to switch over to the verifiable credential barcodes work and I think you're going to take us through kind of a high level where we are with this particular specification what might need to be done so on and so forth. Manu Sporny: But before we do that, we had some new people join. maybe we could get some in Elaine, are you able to intro Elaine Wooton: Yeah, I apologize. I lost the audio earlier and there's nothing. I couldn't figure out what's going on, but I managed to get back. so I was a career fed. My last day was Monday. And my basic subject area is idity secure documents and I'm huge huge proponent of adding graphic elements of some kind to pretty much everything in the world. and obviously this is one of the ways of doing that. Elaine Wooton: So I appreciate that I can participate. I'm also a standards development geeky person. So, I'm excited to join the gang with you all. Manu Sporny: Welcome. Manu Sporny: Welcome to the group, Wonderful to see you here. James, I know you've introduced yourself before, but, you mind doing a quick intro to yourself? James Chartrand: Yeah, no problem. so I work in the digital credentials consortium at MIT along with to be tree sagadoodle sagadulan krie lamoy and a couple of others and coyote for a little while as and I'm just here today to learn a little bit more about all of these things and in particular about the one that we're just about to talk about, the verifiable credential barcodes. And I did want to quickly say about the prior question of what VCEDU is doing with verifiable registries. The person to talk to there is Dimmitri. if David could get in touch with Dimmitri could very quickly I think talk through the issues and that's it for me. Manu Sporny: Great to see you again, James. … James Chartrand: Yeah. Manu Sporny: thanks for joining us today. And yeah, and we Dimmitri is a well well-known well-known person in the community, so we'll follow up with him as well. Wes, over to you. could you please take us through just at a high level what we're trying to do with the verifiable credential barcode spec and then I think we'll want to spend most of the next 30 minutes focused on what needs to be updated or… Manu Sporny: fixed or changed before we hand this thing over to the verifiable credential working group over to us. Wesley Smith: Yeah, absolutely. Wesley Smith: Do you mind letting me screen share so I can drive? Manu Sporny: Yep. There we go. Yep, we can see it. 00:25:00 Wesley Smith: How's that Okay, so I think it seems like there's a mix of people on this call in terms of, prior exposure or experience with this work. So I'm going to spend just a few minutes giving a kind of brief highle overview of how it works, what it does, and so on and so forth before I get to the kind of next steps portion and talk about what needs to be done going forward. So what is verified barcodes? Essentially, it's about embedding verifiable credentials in standard barcodes, things like a QR code or a PDF 417. and there are a few reasons why we want to do this. Wesley Smith: so we have a couple goals with this work, right? One goal is to give things like authenticity and integrity to a physical document, right? We want to have reason to believe that a physical document came from the organization that it claims to have come from, sub issuing authority. and we also want to have reason to believe that it hasn't been tampered with or changed. and so to that end we add verifiable credentials in the form of a barcode on the physical credential that do a couple things. One is provide authenticity as I mentioned but another is actually digitally protect the data that already exists on the card. So verifiable credentials in general there is a digital signature over that payload over the verifiable credential. Wesley Smith: the verifiable credential barcodes work takes it one step further and it says not only are we going to digitally sign the verifiable credential that we add to add to the document we're also going to have that digital signature be over the data that was already on the card and so for example if you have a machine readable zone on the card that MRZ is protected by the digital signature in the barcode and similarly if there's something like a PDF 417 this is a PDF a 417 barcode you'll see on the back of a driver's license. in there there is a verifiable credential, but there's also a bunch of other data and the digital signature in the verifiable credential signs over not only the VC itself, but the rest of the data in the barcode as well. So that's sort of the goal is not only to add a verifiable credential that gives you authenticity, but also to provide integrity over the data that's already in the credential. Wesley Smith: and so to that end, if you actually look at one of these verifiable credentials, you'll note that there isn't very much data in the credential subject portion. And that's because the data is already on the card, The data that we're trying to cryptographically protect is not just the verifiable credential that we're adding, but it's the stuff that's already there. So that data doesn't need to go in the credential itself because it's elsewhere in a machine readable form on the card. and that's basically it in the specification. We go over obviously in detail the mechanisms by which we do this and we give some examples and test vectors. I believe we give both so we give an example employment authorization document and a driver's license both from Utopia. Wesley Smith: and that's basically that there are mechanisms to put verifiable credential barcodes in both QR codes and PDF 417 specified in the document. and yeah, I think that's it for kind of a brief overview. All right. So, I'll talk a little bit about what the next steps are for this specification. So, in general, this is a fairly mature specification. both normative and informative sections are for the fairly complete. We have test vectors. We know of multiple independent implementations that have successfully tested against those test vectors. so we think the specification is in a pretty good place. With that said, there is work that is still to be non-normative sections of the specification need work. Wesley Smith: for example, privacy considerations need to be added. things along those lines as well as of course the standard security considerations and the standard writing grammar all that sort of stuff that kind of review. as I said we do have reason to believe that the normative sections of the document the algorithms and the are in a pretty good place because we have multiple independent implementations. however there might need to be some kind of formalization of that process or confirmation of that. One thing I will note to the group is that there is a strong dependence in this specification on seabboard LD and core LD is another pre-standard technology. 00:30:00 Wesley Smith: so just noting that is potentially something that the group will have to work through as VC barcodes as this spec goes to the standardization process that there is a dependence on a technology that is also a pre-standard and not yet a full standard. and I think that's about it. I don't know if there's anything that stands out as something that the group will need to address in the immediate term. Manu go ahead. Manu Sporny: Yeah, I mean plus one for that analysis. I think that's certainly spot on. Wes, a couple of things jumped out at me. So I'm going to start raising issues on the spec just as we talk. Manu Sporny: I think one of the privacy let's see. Is this a private? Let's say it's a add security consideration for cloning attacks, right? One of the things we can't guard against never mind. Wesley Smith: We do have that… Wesley Smith: but understood. Manu Sporny: Is that in the spec right now? Wesley Smith: Yes. Yeah. I'm sharing the P Manu Sporny: Why is it not showing up? Is it in privacy consideration, security consider mind. It's in security. Never mind. I'm not going to raise that issue since it's already done. the other thing that I could see there is that we call out VA specifically AMA driver's license scannable information is this thing that we call out and the protected component index covers that. Manu Sporny: I think we want to generalize this to just international driver's licenses have a good story about how other than North America and countries use the prot component index. Any thoughts on that is that just I mean and we definitely don't need to figure that out here like that can be done in the official working group. Wesley Smith: Yeah. So, my thoughts are strongly agree that we need to have some way for other communities to hook into this if they want to do things like add a VCB to a driver's license. I will note that the AMA specific thing the fact that this is related to AMA is important because without getting into the technical details too much there is some index that is created based on a data structure in the AMA specification for US driver's licenses and ID cards. So, we can't get away from the fact that we need information from the AMB spec for US driver's licenses, but I agree we should generalize so that that's not limiting people from other countries or other places to, add VCBs to their own driver's licenses or whatever form of identity document. Wesley Smith: Does that make sense? Manu Sporny: Certainly. I don't know who we talked to about that, but we'll probably want to The reason I'm wondering who we talk to about that is in the leazison section of the new recharter, we should probably include AMVA and we should probably include maybe it's ISO that we talked to about the international, fields and versions. So we'll want to include that in the charter. plus one of that. The shifting topics section 3.5 the extra information ECDSA crypto suite. Manu Sporny: I am guessing that we would probably want to move that into the ECDSA crypto suite specification as a How do we do that? we don't have to, but I think that's work that the VCWG probably needs to do. I don't think we can do anything about it here. Wesley Smith: So just for the group really quick,… Wesley Smith: there is a data integrity crypto suite that is currently specified in the verify credential barcodes work. This XI crypto suite that is almost identical to easy DSA RDFC 2019. The only difference is that instead of getting a hash of your document and a hash of your proof and then doing something with them, you add in a third hash and that is a hash of the other data on the card that you're protecting. Right? Wesley Smith: So it's like a hash of the machine readable zone essentially modulo a couple technical details. and that's what the ECDSA XI crypto suite is. Manu definitely agreed that it would make sense to put that in the EDS ECDSA RDFC 2019 spec, but I defer to you on the standardization process and how feasible that is and so on. 00:35:00 Manu Sporny: Yeah, the challenge there is that we are not going to be allowed to make new normative additions to the ECDSA crypto suite. I don't know how that would work. Go ahead Dave. Dave Longley: I would think it could be done in this spec and then a follow-on maintenance revision could be done to move things around … Dave Longley: because then would all be in normative standard space at that point in time. So that it might have to go through a two-step process, but I would think that Manu Sporny: Okay. Yep,… Manu Sporny: that makes sense to me. okay, that sounds good. is there anything that we were hoping would happen in this specification that's not already in there? Manu Sporny: I randomly picking something, we really wish we could have encoded these as jab codes or that new Microsoft multicolor CMK barcode format anything like that. Manu Sporny: Go ahead, Wes. Wesley Smith: So definitely we've talked a little bit about basically extending this in any direction right supporting more different barcode formats supporting more credential formats. Wesley Smith: One big thing that I want to note is right now this specification is around putting credentials in barcodes that also protect external data on the card and I think that we had discussed previously combining you can put a verifiable credential in a barcode even if it doesn't have this feature of protecting some external data as well right and so we had discussed Wesley Smith: may be combining the kind of specifications or prespecifications that say how to do that with this specification which we call verifiable credential barcodes because it's very confusing to see a verifiable credential in a barcode and be like no that's not a verifiable credential barcode because it doesn't have this extra feature right so that's something that we had talked about previously is adding support for VC barcodes that don't have some external protection if that makes sense. Manu Sporny: Yes, thank that is a big thing that I think we probably need to do before handing this spec over. it's not a big thing. we need to do that before handing the spec over. This is just raw verifiable credential in a QR code, as you said. So, that's a fairly easy thing to do. So, I'm raising an issue. So, add bare VCs in R code to spec. It's possible to put a bare VC I a verifiable presentation. Yeah. do we want VPs as QR codes? It's just kind of an open question to the group. Okay. Dave Longley: there might use cases for it. I don't see a reason to do a restriction at this time. Manu Sporny: all right. So, let's see. It's possible to put a bear VC or VP into a QR code. the specification isn't clear on how to do that and should probably in the section on how to achieve that using the VC barcodes So I think that is so may yeah maybe no the other issue is allow PDF 417 barcode types beyond AMBA drivers licenses. Manu Sporny: Ly the section on PDF 417 is specific to AMVA drivers licenses and should be expanded to support any sort of barcode data such as ones that might be put on birth education certificates. okay. 00:40:00 Manu Sporny: Yeah, I think So that's the second issue. any other issues that we need to raise that people can think of? Wesley Smith: Yeah. … Wesley Smith: I'd like to briefly mention this turbing stless entry stuff just because similar to the XI crypto suite, it is a slight modification of a different standards or standards track technology to make it work with the VC barcode stuff. specifically this is about how to use bitst string status list in a very spacede efficient way. obviously we have a lot of constraints when we're putting VCs into barcodes of this size. We have literal physical space constraints right a driver's license is only so big and so we can only put so many bytes in one of tur bit string status list entry is how to use bit string status list in a maximally space efficient way. Wesley Smith: I just want to bring it up because again it's similar to XI crypto suite it is a slight modification of a different technology so I don't know if this is the same deal where the idea is standardize it here and then in some maintenance pass move it into biting status list or what the idea is but I want to bring that Manu Sporny: Go ahead,… Manu Sporny: Awesome. Dave Longley: Yeah, I would expect it to follow the same path. Dave Longley: And the two-step process actually has the additional benefit of being able to take the specs where we eventually push these things and link to the BCB spec or to the VCB spec as another set of material you should be reading if you're interested in using those features. so I think there's actually some advantage to doing it in that way anyway. Manu Sporny: Okay, the other thing going back to kind of the AMBA thing is we currently put the signature in jurisdiction specific field in a PDF 417 and we might want to provide guidance there. Manu Sporny: I mean the problem here is that in the EU or in the US people might start sticking these signatures in jurisdiction specific fields that then everyone picks a different one and they're now 15 different it's not difficult to do. You can probably detect these things fairly easily. but we might want to speak to some of that standardization. Manu Sporny: And it may be that we might want to ask for just a spec AMA or ISO for a very specific signature, field for this purpose. Go ahead, Wes. Wesley Smith: Yeah, a agreed. Wesley Smith: I was just going to say that I think that would be a place where we could really use Amlas input because they specify and standardize exactly what in a USPDF47, So, they have a lot of specification of this already. it would be a little bit strange for us to choose something that is supposed to work with their spec without discussing it with them. Manu Sporny: That sounds good. any other issues or concerns that people can think of for the verifiable credential barcode spec? I think right now we only have two There's really only one thing identified that we need to do, which is, the bare VCs in QR codes addition to the spec. Everything else feels like something that the working group can do. so I guess last call. Manu Sporny: Can anyone think of anything else that we need to do to this spec before we hand it over to the working group? Manu Sporny: Go ahead, Wes. Yeah,… Wesley Smith: Yeah,… Wesley Smith: I don't know exactly what falls within the working group's domain. I will note things small things like there is no privacy considerations section. I don't know if that is Manu Sporny: they can do that. Yeah, I mean clearly we do need to have a privacy consideration section, but that's something that's editorial that the group can work on, one of the things that might be interesting, once we get it into a working group, we will request a horizontal review by the security group at W3C and they may be interested in creating a kind of a global attack model for verifiable credential barcodes. same thing for the privacy group. 00:45:00 Manu Sporny: clearly we'll seek input from Electronic Frontier Foundation, ACLU and those folks primarily because they've been arguing for right to paper for quite a while and so this will be a good kind of temperature check on all right we're doing right to paper. what are the attack models? What are you concerned about? that sort of thing from a civil liberties perspective. All right. as we expected this was one of the more In fact, it's probably the most ready to be handed over to the working group even in front of the render method stuff. So let's talk next steps here. Manu Sporny: I think over the next so I don't think we need to meet about this again but over the next couple of weeks I think we need to add the bear VC's QR code stuff into the spec we might need to just raise an issue in the spec itself to say hey we want to go beyond just AMA driver's licenses here there's a plan to do that here's the issue that's tracking it we might also want to do a scan through the other issues. We've got six of them open and… Wesley Smith: Yeah, most of those don't require much. Manu Sporny: okay. Wesley Smith: And I expect most of those are things that the working group could handle. It's things like in the test vectors the check some digit is wrong in the barcode and things along those lines. things that are issues that are not at the level of the core technology in the specification. Manu Sporny: Okay, that sounds Okay. Yeah. I mean, so it sounds like we're in really good shape and the only thing that's blocking this from being handed over is the bare VCs and QR codes thing. that's largely what needs to be done. does anyone have any general questions about the specification? Anything else that we're planning to do with it? I think we've covered it in pretty good depth today, but anything else people want to have questions about James, we do intend this to be usable with education certificates, degrees, learner records, things like that. Manu Sporny: So interested in your thoughts what you saw today seems like it might work for those use cases. h, you're on the queue. Parth Bhatt: Yeah. are there any reference implementation which is currently in use of this standards Manu Sporny: Yes, there are implementations. I forget if ours is open or not yet. Wesley Smith: I know parts of ours is open. For example, the ECDSAXI crypto suite is open. I don't know for sure if we have anything that I don't think we have any code that is like an end to end run through the test vectors if that makes sense. But I believe the components of you what you need to put that together are open from us. Wesley Smith: And on GitHub I've seen other companies implementations of the VCB's work. I haven't looked at them in detail, but I know that there are other open implementations as well. Parth Bhatt: understood. Thank you. Manu Sporny: If you're a asking because you're interested in doing an implementation, absolutely. We'd love to see more implementations. I think Spruce has one maybe that's out there. Wesley Smith: Screw says one. Manu Sporny: Okay. Parth Bhatt: Yeah, I will check it out. Manu Sporny: Okay. Great. James James Chartrand: Yeah, you just asked what I thought of it as far as the educational sector goes and I think it is something that's very necessary. So I'm really happy to see it and I'm really looking forward to seeing it mature a little bit more. I personally think that things like degrees which are traditionally printed on paper could really use something like this and in fact worked on a project at McMaster University where they were doing exactly this. James Chartrand: the paper copies of degrees that they issued which were PDFs contained a QR code that had a seabore LD encoded version of a verifiable credential asserting the statement of the degree. James Chartrand: So anyhow all that to say that I think this is wonderful Manu Sporny: Great. Awesome. Manu Sporny: That Thank you, always great to have that feedback. and I had totally totally forgotten that you were involved in the McMaster University thing. so that's great. okay. James, did you re raise your hand? Okay. 00:50:00 Kayode Ezike: That was me third. so just a really quick one because I do recall that there's something around the fact that there's only particular fields that are protected in that bar code. Is it made clear anywhere in fact that that limitation that is not supposed to be particular that you actually indicate when you do the signature that you're actually able to protect and that others And I'm not sure if I'm misre misunderstanding that or misrepresenting that so if that is covered properly in the spec. Yeah. Manu Sporny: we could use probably more language to make it more clear. so for those of you that are not familiar, there's this protected component index thing that's a part of the credential subject and that basically says hey this signature protects the person's the last name and their address but it doesn't cover for example their eye color or some jurisdiction specific field right in reason that we have that in there is that believe it or not some of these printing systems the things that print the IDs are so complex that they modify the data that the issuer gives them. Manu Sporny: So you'll have a DMV say print these thousands of cards and they go to the printing facility and then the printing facility will modify some of the data before they actually put it on the card and that is not known beforehand and the entity that's signing is not the printing facility. It's like the DMV. And for those use cases, that's why we can't protect some of these fields because the printing facilities actually modify the data before they're printed to the card and they have no ability to create the digital signature at that point in the process. Manu Sporny: So the protected component index basically says these are the things that are covered by the signature and… Manu Sporny: all the other fields are not. go ahead Wes Wesley Smith: Yeah, and… Wesley Smith: just to add to what you said, it's not just an issue of modification. It's an issue of a lot of these documents get produced in secure facilities and some of the values in these documents aren't actually known until the time of ing. for example, discrimination fields, identifiers for, what batch of card stock is being used on that day or whatever it is. Those are things that just cannot be known ahead of time. so you can't just take the whole barcode as it exists without the VC and put your signature over that. You can't do that. So you need to select out the pieces of data that you are going to sign and then specify how you kind of canonicalize a PDF 417 to get those put them in the right order, and then do your digital signature. Wesley Smith: And that's what protected component index is. Wesley Smith: And going back to what we were talking about earlier, that's why we need this AMA specific pointer is because we're using a data structure that's in the AMVA DLD specification in order to construct this index. Go Manu Sporny: Yep. Exactly. Manu Sporny: Exactly right. okay. I'm time check. we are at the end of the call. thank you everyone for the wonderful discussion today. thank you David for presenting on verifiable issuers and verifiers. Thank you Wes for presenting on the verifiable credential barcode stuff. I think we have a good understanding about where we are with so our meeting next week will move on to the other specs that we're incubating. I think we're going to probably pick up whichever ones are closest to being handed over. Manu Sporny: I think the render method one is pretty far up there. So, we'll at least do render method and we'll do another one if we have time. I'll send that out in the invite agenda for next week. All that's it for the call today. thank you everyone. have a wonderful week and we will meet again same channel. Elaine Wooton: Thanks. Bye. Manu Sporny: Thanks all. Fight. Parth Bhatt: Thank Meeting ended after 00:54:37 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Wednesday, 2 April 2025 22:05:56 UTC