- From: <meetings@w3c-ccg.org>
- Date: Thu, 22 Jan 2026 15:44:41 -0800
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYf9yqG4CmF8u_TV=J=qkoJsXumODFevDqYFth4kJ6M-iA@mail.gmail.com>
Meeting Summary: W3C CCG Incubation Call - 2026/01/22 *Date:* 2026/01/22 *Time:* 10:00 EST *Attendees:* Dave Longley, David C, Manu Sporny, Parth Bhatt, Patrick St-Louis, Phillip Long, Ted Thibodeau Jr Topics Covered - *Call Purpose and Scope:* Clarification of the call's focus, which has shifted from general incubation to specific work on verifiable issuers and verifiers, particularly the data model. - *Verifiable Recognition Credential Data Model:* In-depth discussion and review of a draft Pull Request (PR) for the verifiable recognition credential data model. - *Use Cases for Verifiable Issuers/Verifiers:* Discussion of three core use cases driving the data model: educational sector vetting, industry consortium recognition, and European trust list requirements. - *Data Model Design Considerations:* Exploration of issues such as data model size, portability, decentralization, extensibility, historical logging, and the concept of "recognized by." - *General Properties and Type Definitions:* Discussion on the inclusion and placement of general properties (like legalName, imageURL, digestMultibase) and type definitions within the data model. - *Recognized Action and Recognized By:* Significant discussion around how to best model the relationship between a recognized entity, the actions they are recognized for, and the entity that provides that recognition. Key Points - *Call Focus:* The call is currently focused on refining the verifiable issuers and verifiers specification, specifically the data model, to achieve consensus before adoption by the VCWG. - *VC as a Foundation:* The work is being built upon Verifiable Credentials (VCs), allowing for individual VCs to be issued based on lists or registries, and enabling interoperability with other VC features. - *Use Case Driven Development:* The data model is being designed to accommodate a range of use cases, from simple organization lists to complex decentralized recognition systems and compliance with European data models. - *Addressing Size and Portability:* Concerns about large VC sizes are being addressed through potential mechanisms like external pointers to lists, selective disclosure, and the possibility of smaller subset VCs. - *Decentralization and Agnosticism:* The model aims for decentralization, allowing for recognition at various levels (local to global) and is not strictly government-centric. - *"Recognized By" Ambiguity:* A significant point of discussion was the placement and purpose of the "recognized by" field, particularly in relation to recognized actions, with several proposals made to integrate it more effectively. - *History and Logging:* The possibility of integrating history logs for credentials was mentioned, with a note that this might be addressed at a different architectural layer or through existing European work. - *Recursive Trust:* The data model supports recursive relationships for trust, where an issuer can be recognized by another entity, and so on, ultimately relying on individual root-of-trust configurations. - *Next Steps:* The team plans to iterate on the PR based on the feedback, particularly concerning the "recognized by" field and general properties, and will revisit these discussions in future calls. The inclusion of Dmitri in future discussions related to the "recognized by" property was suggested. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-2026-01-22.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-2026-01-22.mp4 *CCG Incubation - 2026/01/22 10:00 EST - Transcript* *Attendees* Dave Longley, David C, Manu Sporny, Parth Bhatt, Patrick St-Louis, Phillip Long, Ted Thibodeau Jr *Transcript* Phillip Long: Good morning. Patrick St-Louis: Hey, good morning. Manu Sporny: at morning. Patrick St-Louis: I was asked to host the call yesterday. I'm happy to do so and facilitates the conversation. Patrick St-Louis: I'm not too familiar with the ongoing topic, but I can c surely lead us into it. Manu Sporny: Thank you,… Manu Sporny: Patrick. much appreciated. I do have a PR for us to look at today, which would probably, take up a decent chunk of the call. and I can also kind of point out where we were on the last call once we start the call. Manu Sporny: So h have it as Patrick St-Louis: Sounds good. Patrick St-Louis: Could you clarify something? So on the call page it says this is the incubation or is this the verifier initial recall or… Patrick St-Louis: is it a bit of both or Perfect. Manu Sporny: It's a bit of both. Manu Sporny: So, it used to be the incubation call and we were incubating all of the specifications that were going into the VC working group. A large chunk of those were we finished incubation and we put it in this specification, the verifiable issuers and verifiers thing has taken a lot longer. we're still trying to get to consensus around the data model. we are making finally some progress I think over the past month and a half. and… Patrick St-Louis: Manu Sporny: so we need to get it into better shape before the VCWG adopts So we've been renaming but then what to rename the calls to is in question because we don't know if we like the name verifiable issuers and verifiers. So we're trying to settle on a good name before we rename the call. But yeah I think the only thing we're working on in these calls right now is the verifiable issuers and… Manu Sporny: verifiers list. Patrick St-Louis: And… Patrick St-Louis: how different is this from something like confidence method? Manu Sporny: You mean the purpose of the specification or how the call is run? Patrick St-Louis: I mean conceptually because I thought the confidence method was to add to be able to assert something. Manu Sporny: It's quite different. Yeah, confidence method is about knowing… Patrick St-Louis: Okay. Yeah. Manu Sporny: knowing who the subject is can you do a proof of possession or something like that. the verifiable issuers verifiers work is about someone an entity out there publishing a list of recognized entities that takes certain actions. So that's very generalized, but the idea is how does a college board, Patrick St-Louis: Yeah. Yeah. Manu Sporny: a university board publish a list of all of the universities and… David C: All right. Manu Sporny: colleges that are accredited, or how does a province or a state get on a list of approved issuing authorities for driver's licenses or fishing licenses or whatever. Phillip Long: Yeah. Manu Sporny: So that's what this work is about. Patrick St-Louis: So it's very adjacent to trust registries and… Patrick St-Louis: those types of conversation. Manu Sporny: Manu Sporny: Yeah. Yes. Patrick St-Louis: Overused. Manu Sporny: I mean, and it is trust list and trust registries, but we specifically don't want to use that language because we think it's the wrong language to use. it's the wrong lang. Patrick St-Louis: Okay. Manu Sporny: Some subset of us think it's just completely the wrong language to use. because trust is very much based on perspective and… Patrick St-Louis: Sounds good. Manu Sporny: just because somebody publishes a trust list doesn't mean that everybody needs to trust it, so we focus on, an entity that recognizes another entity to do a specific action,… Phillip Long: Absolutely. Manu Sporny: that's where we are today, that can change tomorrow or next week or whatever, but Patrick St-Louis: So, that answers my question. I'm sure I'll have more, but for now I'm satiated. let's get started. So, yes, welcome to the call everyone. I'll be hosting a call today. I've been asked to do this for reasons. So, I'm happy to facilitate the conversation. As I mentioned, I've been on this call previously. I've been once or twice. It's been a while. so I'm not too aware of the latest work, but I'll definitely be able to catch up fairly quick as I'm well aware of other initiatives at WTC, including the CCG. so today is 22nd of January 2026. 00:05:00 Patrick St-Louis: This is the WTC credential community group incubation call or for some from what I understood it became a verifiable verifier and issuers call. so this is what the conversation will be around. this is a WC meeting so all WC policies are into effect. so if you're not familiar with those please do so. I'm not too familiar on the agenda today. I've heard there's a significant PR we'll be reviewing. right before we do this, I'd like to give some time for reintroduction. Maybe I can start really quickly. Some people on the call might be familiar with me, other ones not so much. so I'm a developer. I've been working with digital identity for six years now. Patrick St-Louis: I mostly work with the government of British Columbia. However, I also work on other initiatives and also single project active with the literary and the open wallet foundation this for the most part. so yeah, I'm happy to be here and looking forward what the conversations will be like. if anyone else wants to introduce themselves, I'll leave a couple seconds of silence for you to do so. Phillip Long: I think you'll find most of us each other in the call. Patrick St-Louis: Okay, that's what I assume. you never know. next Phillip Long: Yes, I think Adam had his hand up by the way. Patrick St-Louis: Yes. that's the part now. Manu Sporny: No. Phillip Long: Okay. Manu Sporny: That's okay. just for the next item on the agenda. Patrick St-Louis: So if there's any suggested topic for the agenda or also any community updates please let us know and I will let you manu introduce probably your topic. Manu Sporny: Thanks, Parick. yeah, I don't have any community updates or… Manu Sporny: anything of that nature. I Let me go ahead and share my screen here. Patrick St-Louis: Yep. … Patrick St-Louis: please take over. Manu Sporny: Manu Sporny: There over the past couple of weeks we have been talking about the data model right we've been trying to unify the data model around and I'll provide a link to the spreadsheet in the chat channel we've been trying to unify the data model around three kind of core focal use cases the first one is one that Dmitri raised kind of on behalf of the education sector. they have a need to publish a list of just vetted entities they know who these entities are and they just want to publish a list about the name of a picture associated with the entity's web page, that sort of thing. So that is just one use case. Manu Sporny: It's kind of a your organization, use case. and that's probably the simplest one that we have. the next use case is one that we digital bazaar proposed which is focused on a kind of industry consortiums that want to be able to publish information on who in the consortium or who in a specific market vertical is allowed Manu Sporny: to lish certain of ials or is recognized to publish certain types of credentials. but the other strong requirement we have is it needs to be fully decentralized meaning meaning that publishing this thing could be just a local group in your town. or it could be a local government listing, a set of, for example, building contractors or electricians in the area. all the way up to, a national government, and then global, United Nations, publishing these things. So it needs to be scalable from the very very smallest thing all the way up to a big thing. 00:10:00 Manu Sporny: and we don't want to overemphasize the authority of one of these organizations. We're trying to keep it as peer and decentralized as possible. it would be nice if governments, used it as well, but, we're not building for government. if that makes sense or specifically for okay so that's second set of use cases and then third set of use cases are ones that David Chadwick and Isaac had raised around the train work and the European work around trust list trust registries that sort of thing and being able to fully express the data model in Europe is also a requirement Manu Sporny: because they do have a data model for this and so we're trying to make sure that that data model is fully expressible with what we're doing. And so what we have here is everything that was in the spec and we were trying to reconcile all of these things. We have refined it over the last couple of weeks. So there are some general properties that can go on each one of these entities, organizations, people whatever and then we are trying to settle on what are the class names, what are the property names, what can you have in each one. Manu Sporny: last time we got far enough along for me to raise a PR. but we were trying to figure out what are we talking about here? Recognized entities or recognized issuers or recognized actions that are attached to recognized, issuers or entities. So, we were bike shedding largely in trying to figure out what the best data model is here. we also got to talking about some of the list operators and trust service provider things that were there. David made a very good suggestion that we were struggling a bit going top down. So David suggested maybe we try going bottom up. So I expect we'll try a bit of that today. But we got far enough last time for me to raise a draft PR for us to take a look at. Manu Sporny: So this is our verifiable issuers verifiers repository. We have kind of two PRs that have been stuck, based on the discussion that we're hap having. I opened a new PR for the verifiable recognition credential. and this PR tries out some of the language that we had last time. So I'm going to go and look at the preview for this. and it's additive only. It doesn't try and remove anything from the spec just yet. there's a data model section that we have and then the sections that were added were sections 4.1 through 4.5. but let's focus on the verifiable recognition credential because this is at the top. Manu Sporny: And then there are examples here of what our current data model looks like based on our conversation last week. and so what I'd like to do is take a little bit of time to look through this and then look at the examples and then see if the examples are working out in the way that we thought they would. and then if we're happy with that, then go into discussing our third use case, which is the European use cases and representing that data model. Let me pause there for half a second to see if there are any questions, concerns, anything of that nature. And let me bring up this link here. Please go ahead, Patrick. Patrick St-Louis: not to make sure just to point out so looking at this I'm happy that this is a verifiable credential that was going to be my question is there a possibility besides being in this list or registry to have the member be issued a credential but since from what I understand the registry itself is a credential I think that's very useful I'm thinking about linked verifiable credential… Patrick St-Louis: who is all these things all of a sudden it makes this compatible with all these other features so yeah I'm just happy to see that if I understood what it's going Oops. 00:15:00 Manu Sporny: Yes. Yes. Manu Sporny: You're understanding is completely correct. Yes. That was another driving reason for why the thing's a VC. and that's a good point. I don't think we call it out as one of the focal things like that's one of the goals is that an individual should be able to get one of these just for the credential they have. So let's say that they have a university degree they should be able to also get the recognition credential from the university or from somewhere it doesn't matter where but using that they should be able to present both their university degree and… Manu Sporny: the recognition credential in a peer fashion so that the verifier doesn't need to go out and fetch anything right I mean clearly they'll have a root of trust or… Patrick St-Louis: Yeah. Yeah. Manu Sporny: root of authority or something like that the verifier will But as long as you are there in the credential then everything should work out. Patrick St-Louis: Yeah, I'll put myself like you. Dave Longley: And I was just going to say and if you have that rooe of trust, when we're done with this, if we've modeled everything correctly, you could get started building that route of trust building your tree of trust from the first verifiable recognition credential you get in and using that to verify other verifiable recognition credentials. So you can build that tree from there and that' hopefully whatever I just said will all also make sense with whenever we're ready for comments on this one. I've got a few comments on what we have in the PR. Patrick St-Louis: Can I go? Manu Sporny: Absolutely. Patrick St-Louis: It's I'm sorry. yes, I will go. my one maybe concern I would have would be the size that this credential could take over time. and I'm wondering if it's possible to have a sort of a partner credential, which is a smaller version with just one of the subject, If one of the subjects says, "Yeah, I want this list, but I'd like to have more portable or a smaller version of this credential that just talks about me." And that credential could, have a way to discover the full list or anything of the sort. Patrick St-Louis: That matter. Manu Sporny: Yes. Yeah,… Manu Sporny: that is supported today with what we have here. and that is a concern what happens when you have 5,000 entities on this list and each entity can do five or six different actions. all of a sudden you've got a multiund kilobyte up to a megabyte, VC, which we don't really want. there's no reason why you couldn't split it out into a separate thing. you could split it into multiple different lists, but then the question is how do people find these other lists? so that is work we still need to do and okay, so the data model definitely supports that, but how do you signal it so that So, we need to probably work on that a bit. David C: I can come in there Manu because I think we've already done it. We did it in one of the older versions actually that the verifiable credential actually what it contains is a pointer to an external URL with because we've already got that facility within verifiable credentials to have a pointer and to have a hash of the pointer to make sure that it's not been altered and then you go off to the web page and that web page can be as big as you want and you can validate that it's not been changed because you've got the hash David C: of it inside the verifiable credential. and I think there's an example we did have an example in this document earlier on. I don't know if it's still there or not but it was originally. So that's to do with the size thing by having this external list that's pointed to Patrick St-Louis: Go ahead, If you want to reply to that, Manu Sporny: Yeah, I mean that's right, David. so that is one way of doing it. I guess I was speaking to us exploring the space a bit more to make sure that that is the way we want to do it. absolutely, we can do it that way. however that might be slightly different from what Patrick was talking about which is breaking off a subset of the list for keeping in your wallet. and I don't know if we've really discussed at what point is it too big right I mean clearly it's use case dependent and different market verticals will have different opinions on it. 00:20:00 Manu Sporny: Another thing we haven't discussed is do we want to be able to say that this list is a part of a bigger collection of lists and see also these other lists. we don't necessarily have that in the specification today. So I'm just noting that we can solve the problem in a multiple different ways. we probably need to,… Manu Sporny: provide some guidance in the specification on these are the ways you could address the problem. Or if we want to just say, no, we really want to be specific about there's one really good way of doing this. that's Patrick St-Louis: Yeah. David C: I Yes. David C: So I think that there could be certainly multiple ways and the way we did it in the train project is different DNS entries had the lists and the D and you could point to other DNS entries from different entries. So you could actually have a web chain of entries in the DNS. so that's another way of doing it. But instead of having DNS entries, you could have verifiable credentials because a verifiable credential can be regarded as a single DNS entry. I hope that didn't confuse you,… David C: Patrick, talking about the DNS, but Patrick St-Louis: I think I'm slowly yeah,… Patrick St-Louis: I just need to put that into context. I think I understand two things. So, another I'm going to say argument or reason for smaller lists, You could have so I'm thinking about very link verifiable presentation or more specifically something like who is use case in web where it's just an issuer they put a bunch of credential about them in a presentation and this is sort of a list of anyone can pick any credential that pertains to their use case and if they're part of five list then we have the size issue times five right Patrick St-Louis: which can only grow. So I think having a way to express in a smaller size with only one single subject would be very useful. My other question or more comment has to do with a topic that's very popular these days with sort of a history or log events and the sales specification. I'm wondering if there was some thought about, having some kind of log of this list that coexist with the list or if there was a mechanism to do this. has this been considered when people are removed or blacklisted? I don't know. yes man. Manu Sporny: yes at a high level no it's not in the spec yet I think what we're probably waiting on is for the verifiable history cell discussion to get to closer consensus on what if there is going to be a common log format which I think all of us hope there's going to be a common log format. I think if that happens then all of a sudden you can basically take this credential and shove it in the log and… Patrick St-Louis: Yeah. All right. Manu Sporny: every time it changes removing whatever you add it to the log entry and then you can get a good nice verifiable witnessed log of how this credential has changed over time. So my hope is that problem is solved at a different architectural layer. certainly can be solved at a different architectural layer. but again I think it's a good kind of future discussion for us to have on okay how do you go back in time if you need to yep it go ahead David C: Yeah, the European original work has history logs in it. Phillip Long: Oops. David C: So it does actually have the history. So you can actually find out which was the last list, when does the current list expire,… things like that. but we didn't put that into this specific spec because it does increase the complexity quite a lot. David C: Patrick St-Louis: Yes. Yes. Patrick St-Louis: Dave Dave Longley: Yeah, regarding size concerns and privacy concerns, I also wanted to mention that selective disclosure could be very helpful with these lists. this is actually one of the few use cases where just having selective disclosure alone can be a good utility without necessarily needing unlinkability. where you could have a large list of recognized issuers for example and… 00:25:00 Dave Longley: you are looking to present a credential that has been issued by one of those and you could just selectively disclose that single issuer from the list and perhaps dramatically cut down on the size of it in your presentation. David C: The other way… David C: which creates a lot of overhead potentially for the list issuer is that instead of the list issuer issuing one list of everybody that it recognizes. It could actually issue separate verifiable credentials to every entity in that list, distribute them out to all those entities and then those entities as Manuel said earlier on can present that verifiable credential along with their own verifiable credentials to say look I'm a recognized issuer of verifiable credentials and I have this other recognized issuer credential from the big guy who says I am recognized. David C: So in that way you've got it totally distributed that every recognized recognized verifiable credentials only contains one subject Patrick St-Louis: Yeah, I'm wondering if it would make sense instead of having one credential with multiple credential subject to have a presentation with multiple credential in it. Is that something because I feel like in that case the credential would be individual but still bundled together in one document. Is that make sense? Or menu. Okay. Manu Sporny: it is possible with this data model. So that is another deployment mechanism that is possible. here we might want to jump into looking at the data model because we can point out kind of where all these things are possible. But you correct I mean I'm not hearing anything that is not supported by the current data model we have which is great because one way to know whether or not we've actually got a useful data model is to go through all these different variations and see if the data model as is today supports those variations. that's Patrick St-Louis: Very good. That's all from me personally. if there's not any more questions, I'm happy to move forward. Dave. Dave Longley: I did not know if I did have some comments on the specific PR, but I didn't know if we were going to walk through it first and then I would have Okay, I'll leave it to Manu Sporny: Yeah. let me walk through it and… Manu Sporny: the structure and then your comments as we go would be so the entry point here and just I'm sharing the link in the chat channel to make sure everyone can bring this up on screen. the kind of high top level entry point is a verifiable recognition credential. so again we're not fully settled on the name here. but it worked out fairly decently. it felt a little awkward in places. Manu Sporny: but overall the type names seem to be so you have a VC and the top level object is a verifiable recognition credential. that thing is a standard C data model 20 thing. it has ID type issuer valid from valid until and credential subject. So it's a standard VC at the top level. and each credential subject. Manu Sporny: So one of the things we wanted to say about the issuer is that it is a standard issuer as defined in the BC data model but there are some other general properties that you can decorate the issuer with and I haven't put in descriptions here but the general properties that you can kind of decorate objects with are legal name image URL are they same as some other identifier to description. and then, digest multibase is in there. It doesn't apply to issuers, but it does apply to some other the lists themselves. Manu Sporny: Go ahead Dave. Dave Longley: So, one other thing we might want to put in here is a type like recognizing issuer or something along those lines. So that might be of some value to have since we're talking about having a specific type of issue with these other fields and it provides some additional information. Phillip Long: What is that? Manu Sporny: I think let's see it that's here in recognized entity. Phillip Long: I want Manu Sporny: I don't know if we've gotten to that yet. Dave Longley: So that we haven't gotten there yet, but that's not necessarily the same thing. that I'm talking about having an attribute on the issuer entity itself as opposed to the reverse of that. 00:30:00 Manu Sporny: Okay. so on the issuer there would be a recognized I see… Dave Longley: No, a type and I put in the chat here maybe recognizing issuer. We can bike shed that. But you can type issuer fields and that gives you useful type information but all I don't know that we have a type in the V VCDM for just an issuer. Manu Sporny: what you're saying. Got So, the issuer itself would be of type. Manu Sporny: It would be a type of issuer, but it would also be a recognizing issuer is what you're saying. That's true. Dave Longley: It's implicit but this would be an explicit type. around Manu Sporny: Yep. Yep. Yeah. David C: So I wonder… if it suggests that that should actually go in 4.1 and be a generic property for The type I'm talking about Dave. Yeah. David C: Manu Sporny: Let's see. Dave Longley: Yeah, I would expect a type could be on any entity that we talk about. Dave Longley: And I don't know if we need to repeat that here. I guess we're repeating some VCDM has type built in. David C: Yeah. … Phillip Long: It's Get Dave Longley: But I guess that might be worth talking about as a general property. Manu Sporny: One thing,… Manu Sporny: one thing I don't like about this general property section is it's kind of hard to reason through. I tried to do it because in the JSONLDD context that is probably how we're going to do this. but you look at things like digest multibase and you're like why in the world is that like a general property? You have to really kind of understand … David C: David C: Remove it then. If you can't argue for it, remove it. All the other ones are quite Manu Sporny: no, but we have to allow it. No, it definitely is allowed, let me put two alternatives here. So, we can have a general property section and say all of these properties can be put on any object. The other approach is that we can be very specific about what properties can exist and we'll just do the magic of the JSON LD context behind the scenes but in the spec it'll just very clearly lay out like you can have these properties Manu Sporny: Dave Longley: the argument for that property in particular is specifically avoiding the HTTP range 14 discussion that has plagued people forever … Dave Longley: which is what is the difference between the expression of digital information about a particular entity and the entity themselves. since you can only ever in a digital document be talking about the digital information about an entity And so the digest multibase is related to the URL property here. a person doesn't necessarily themselves as an entity depending on how you conceptualize a person have a URL. Similarly they don't have a digest multibase but those mechanically refer to digital information that's being expressed about a person. which is all of this information that's on the screen. So, we really needed to go down the rabbit hole of explaining… David C: And I don't think it's difficult manu to put the description in there is it for each of these personally I prefer general properties. Taste. Dave Longley: why those things are There's an argument for it. Dave Longley: It's just highly technical. Manu Sporny: No it's not. Manu Sporny: I guess the question is what would people prefer? Do you want a general property section or do you want me to repeat this in each object? Okay. Phillip Long: fire. Yeah,… Phillip Long: I would agree with that as well. Yeah. Dave Longley: Yeah. If… Dave Longley: if those can really appear on any of the things any entity we talk about then let's just do it once. If we find that it cannot… Dave Longley: if we find that it can only appear there are exceptions we can talk about that in the spec as Manu Sporny: And… Manu Sporny: that's fine. I mean I don't have a strong opinion one way or the other I guess question for the group is what was it? let's see there are things like the other question for the group is do we want to restrict it in the JSON LD context … David C: Where? Manu Sporny: where we a verifiable recognition credential is really going to be fairly constrained in the type of information it has. Manu Sporny: It's going to have stuff that's basically in our data model and we're not really expecting it to be, greatly extended. If people want to extend it, they can do that and they can provide their own context and do the extension like that. so in the JSONLDD context do we want to restrict these fields to digest multibase doesn't make sense on list operator or recognized entity or a recognized action for example 00:35:00 Patrick St-Louis: Doesn't just a BCDM 2.0 context in itself already have name,… Patrick St-Louis: description, and digest multibase on every field. Manu Sporny: Yeah, I think you're right. Manu Sporny: Yeah. Patrick St-Louis: ID for the body is kind of a separate thing. But I think for these three Yeah. Manu Sporny: So, we wouldn't even have to Yeah. You're right. Yeah. And I think what we would be doing here is we would be adding legal name to be able to be put on image and URL to be able to put on everything as well as name as and… David C: Okay. Patrick St-Louis: same as maybe Yeah. Manu Sporny: description. Yeah,… Manu Sporny: I mean so some of these are already in the VCDM2 context. Dave Longley: So yeah,… Dave Longley: I wanted to jump in here. if we have a type on here, it gives us more power to decide. So if there is a type for these entities in our data model, wherever that type is present on a given object, you could include these properties. So we have that option. I think we can sort that out over time whether we want to make these global properties that you can use to augment anything or if we want to have it be type based or some combination. I don't think we have to make that decision on the PR today. Manu Sporny: Okay, that is very helpful. Okay, thank you everyone for that feedback. That gives us a very clear direction. So, we're going to keep the general properties section. We'll add some descriptions here. Dave will add the type and then we'll make another pass iteration. and we'll take a look at it during the next call. That was very helpful for general properties. Okay, so going back to the verifiable recognition credential we just talked about the general properties on the issuer and then we've got standard from valid until then the credential subject is meant to be a set of recognized entities. so a recognized entity let me just show an example of what one of these looks like. Manu Sporny: So this is an example of a recognized entity. this is the university example. so there's some kind of learning commission. There's a board that decides who the accredited universities and colleges That's the issue. I probably need to expand this a bit more. but the credential subjects are recognized entities. And so this is a university and this is a community college. and for each one of these recognized entities. It's got a type recognized entity. It's got a name which is kind of a casual name that you call that thing. And then it has their legal name. So the name is example tech but the legal name is example polytechnic university. You have an image like a logo for the university. You've got a URL. Manu Sporny: So you go to the URL to learn more about the university description and who this recognized entity is recognized by. So they're recognized by the learning commission. keep in mind that this is your organization KYO use case that Dmitri brought up and so this is all he wanted to list. It's not recognized actions or anything like that. It's just the learning commission knows about this university and this is the information associated with that university. let me stop there. Go ahead, Patrick. Patrick St-Louis: So two question the first one. So this is a pattern I've seen on some of the UNP credential as well. So you have the issuer and then here recognized So in the UNPS have sometime they have the issuer and then the credential subject they have a issued by which is the same ID as the issuer and I see the kind of similar thing happening here is this really required isn't this implied Hey,… Phillip Long: f***** good. Patrick St-Louis: this right. Manu Sporny: I can answer real quick. Dave Longley: Yeah, go ahead. Manu Sporny: The issuer may not always be the recognizing entity. There may be some kind of complex relationship there that needs to be expressed. So we expect in most cases the issue and the recognized buy will be the same. But that's not true for every use case. Patrick St-Louis: And then re really quick my second point. Patrick St-Louis: So one of the unanswered question I believe at the moment with most trust registry is the sort of catch 22 of the issuer of the registry which registry are they part of and how do you trust this issuer and where does this end? Is this a issue that this will tackle or you're going to just stop as this list and say yeah you just need to know the issuer of this list or… 00:40:00 Patrick St-Louis: is there going to be a sort of recursive who's the issuer of the issuer and so on. David C: Yeah, the data model certainly caters for the recursion. So that this learning commission could indeed be the subject in another credential that's issued by the national government for example and because there may be more than just the learning commission… David C: who is an issuer. Patrick St-Louis: Yeah. Yeah. Patrick St-Louis: But then you get to that level up like So you mentioned the government, right? So that's a special case. David C: Yeah. … Patrick St-Louis: It's like a pretty strong authority. But if we try to move away from government and be very agnostic, where does this end? Right? It never ends. David C: no, it ends with you. Patrick St-Louis: Gets through. Yes. David C: In other words, everybody is their own root of trust and configured into their system has to be their root of trust. So if I trust Learning Commission, I don't need anyone else. Phillip Long: Oops. David C: But if I only trust my government, then I'd expect my government to say that the learning commission was a subject of a credential issued by my government. Patrick St-Louis: Okay. Dave Longley: So, I'm on the queue for something else. but yes to what David just said. You've always got a Even if your root of trust is to trust some awesome new magic graph of trust in the future, that would still be a root of trust to trust that thing. So, it's got to end somewhere where you've got a thumbs up and then you can grow from there. I'm just on the queue to make a note that I want to talk more about recognized by when we get to the next section. Manu Sporny: Okay, sounds good. I think that's it for recognize entry entity. I want to make sure that I capture everything. keep general properties section as is. Manu Sporny: This Okay, there we go. David C: add definitions and… David C: and add type. Manu Sporny: Yeah, and that's up here. okay. David C: Sorry. Yes. Manu Sporny: All right. that's good. let me All right. All right. Manu Sporny: So this is effectively what a recognized entity looks like in the KYC use case. And then in the other kind of decentralized what are they recognized to do. we keep everything else the same and we just add this field recognized to and a recognized action. we don't need to go into depth there, but I just wanted to point out we will eventually go into depth later on, but I wanted to point out that the data model is additive, which is I think what we wanted and it worked out really well. So that was nice to go ahead Dave. Dave Longley: So this is where I don't need to dig into the details of recognize action. But when analyzing any one of these data models, I like to think about the case where I've set up my own trust system. I'm consuming these credentials. I've decided, as they come into the system, I check to make sure they're all wellformed. they meet my trust rules and so on. And then I might merge that information to do something with it. So at the end of this I might have a list of a bunch of recognized entities that were recognized by a variety of different parties to do a variety of different actions. And if I go down and I've merged all this in a big graph of information and I go to look to see whether an entity is recognized to do a particular action, I might still want to know recognized by by which recognizing entity to do that action. And so that field will not be there when you merge all this. Dave Longley: it will be there when you merge all the information, but it's just going to be a huge list of everybody that recognized that particular entity, but not what And so I was expecting recognized by to be part of the recognized action because then it keeps that information together. So if I have a list of actions, I know who recognizes those particular actions. Right now in the model, I can't do that. And I understand why recognized by was up there for the directory use case, but I'm not and I hear the argument the issuer might be different from who did the recognition. but we're going to want to sort that out. It feels like we want that information inside of the recognized action. And then the question is whether it needs to be somewhere else or if there's a better way to handle the question Patrick raised. 00:45:00 Manu Sporny: Yeah, that's a good point. so the options are duplicate it or move it into here. But if we move it into here, then make it an either or… Dave Longley: There might be some other kind of recognized action that covers the directory case as well… Manu Sporny: thing. … Dave Longley: but I don't know… Manu Sporny: I didn't follow that last statement. Okay. Dave Longley: what that action would be to be convoluted right now the recognized action is to appear on a registry if he did that then it would just fit into the recognized action section. But there might be a more natural way to express that. But Patrick's on the queue. Patrick St-Louis: Is it reasonable to just be one or the other like you just mentioned? you can either have the recognize by as a string or you do a recognize to object and… Dave Longley: Yeah, the answer to that is no. Patrick St-Louis: you have recognized by in there. Dave Longley: I can answer that quickly. The answer to that is no is because when I merge this, I will have one or the other depend from all these different sources. So I want to have my big graph of information… Dave Longley: where I can go to any given recognized entity based on their ID and find out in the merge of everything who has what the actions are and by whom and David C: Yeah, Dave,… David C: I understand what you're saying there. You're assuming that a single entity can perform multiple actions, multiple different actions, but that each of those actions are actually recognized by different superior authorities. Dave Longley: And in fact when we say different actions they might all be issuance actions but for different credentials is probably the most common case. So it A recognizes these three credentials from this university and… Dave Longley: recognizer B recognizes these other four. There may or may not be overlap but if I trust both of those recognizers I would accept all six let's say with the overlap but I don't want to get that confused. Yep. David C: Mhm. Got you. David C: Yeah. Yeah. Got you. Manu Sporny: All good points. how should I change the clearly recognized by needs to be possible to put in recognized action. Manu Sporny: Okay. Dave Longley: Yeah, that minimally put it in the recognized action and… Dave Longley: then we can see if we can dduplicate in some way. That's what I would say. Manu Sporny: right. let's see. So that would be add. Dave Longley: It might be the recognizer property at that point. because maybe the action is recognized by it it doesn't matter it's a bike shedding exercise it'll either be recognized by under the action or recognizer of the action. Manu Sporny: Okay. David C: Yeah, that feels wrong to me. David C: I mean to me at the same level of the model you've recognized to do X that they should be at the same level in my opinion. Dave Longley: Yeah, but the question is about a property of the action itself. David C: … Manu Sporny: ears and other David C: maybe the act maybe then it's a question of define the action better rather than just say issue the action is issue VC with this schema yeah. Dave Longley: We do have that. That's what output validation is,… David C: But I don't like the output validation. Dave Longley: I believe. monu David C: I wanted to raise that but Mano said we're going to go into depth for that later. I mean you could have action as an object, where you've got the issue and the schema are all parts of the action. I mean, I don't like the output validation anyway. s the way it is, it's not intuitive to me. Manu Sporny: Going back. Yeah. And we'll get to that discussion. Maybe not today because we're running out of time, but So, for recognize by I'll do something there and… David C: I don't agree with that one. Manu Sporny: we can review it. okay … David C: Then if you make a note, I don't agree with that one. Yeah. I no actually manu we did discuss this a week or… Manu Sporny: then I won't make the change. wait for consensus on the one point I wanted to highlight here is that this recognized by is important in the previous use case because this recognizing entity is the one that is saying that these properties are what they are. 00:50:00 Manu Sporny: There's some kind of weird modeling thing. David C: two ago and we said that it wasn't necessary there but you wanted to add it there because there's some data modeling property which I can't remember what it was but that if the credential subject gets separated off it's got the issuer there right that was… Manu Sporny: Yeah, that's right. David C: David C: why it's put in But that… Manu Sporny: And it could be different from the issuer, The issuer could have the authority to list a multiple different recognizing authorities. David C: but because I brought this up at the time then you would need that authority to say I'm giving the authority to this issuer to issue on my behalf… Manu Sporny: Yeah, that's right. David C: because otherwise anybody could issue on behalf of anyone. Manu Sporny: Yep. yeah. I absolutely agree. Manu Sporny: Yeah, there's something out of band that allows that kind of association to happen. David C: or… Manu Sporny: Either by policy, right? David C: another or… Dave Longley: It's in the schema about Yeah,… David C: another recognized credential. Yeah. So I mean Dave Longley: that field would be in the schema about another verifiable recognition credential. It's either in your root of trust to be able to say whatever you want or you have one of these credentials that has an issue a action for a verifiable recognition credential that has the recognize by field that either says star you can put whatever you want or… Dave Longley: you could put a list in there. Hopefully people followed that. Manu Sporny: Yep. Okay. Manu Sporny: So, let's come back to this, right? Because we need to figure out I mean certainly I guess we don't have consensus on what to do here. I think we wanted to let people go earlyish 5 to the hour. So, I think we might be done for today. are there any quick we're just going to have to come back to this, right? … Dave Longley: Yeah, I think one action to consider is… Manu Sporny: discuss the recognized by thing. I can add I'm not falling. Dave Longley: if there's a recognition action for just getting into a directory is… David C: Yeah, I agree with that, Dave. Dave Longley: if there's a way to do that then it could all be in one place. So you're recognized to do something always and… Manu Sporny: You mean there's a … Dave Longley: then underneath that if there's a way to model the directory use case then everything would be unified. Manu Sporny: got it. Dave Longley: So you're recognized to this is a little awkward… Phillip Long: Yeah. Yeah. Dave Longley: but if it was just you're recognized to appear in a directory then you would consume this credential and put them in a directory and based on who the recognizer was under the action. So the you'd be recognized to do an action. Manu Sporny: Yeah. Yeah. Dave Longley: You'd have a recognizer of the action. One of the actions would appear in a directory. Yeah. Manu Sporny: So the action is to exist. okay. Phillip Long: Right. Right. So, this is a good example of a use cases would help us here. Manu Sporny: All right. Phillip Long: Just really short ones to clarify these things because really help me. David C: Yeah, so when we talked to Dimmitri, it became obvious that there was a lot of implicit knowledge in his model and… Phillip Long: Yep. Thank you. David C: what we're wanting to do is really explicitly put it there. Manu Sporny: All right. Manu Sporny: I think that'll do it for today. back over to you, Patrick, to wrap up the call. Patrick St-Louis: Yeah. … Patrick St-Louis: thank you very much. And yeah, I think it would be interesting to include Dimmitri in this conversation. At least if this property was important for their use case, I feel like it would be worthwhile to have this discussion with him. thank you all for attending. we will adjoin the meeting. it's been great. David C: Okay, thank you very much. Patrick St-Louis: Very interesting stuff happening here. so yeah, I will close the meeting. I hope you all have a good rest of your week and we'll maybe see each other in the upcoming meetings. Thank you. Meeting ended after 00:54:59 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Thursday, 22 January 2026 23:44:51 UTC