- From: <meetings@w3c-ccg.org>
- Date: Tue, 3 Mar 2026 15:56:25 -0800
- To: public-credentials@w3.org
- Message-ID: <CA+ChqYfoeKNFAgN3Wb2q689-5Snghd958Cz5HY=hFPa3dRYLSQ@mail.gmail.com>
This meeting of the Verifiable Issuers and Verifiers call focused on the evolving data model and its applications, with particular attention to interoperability and use cases. Key discussions revolved around the renaming of the group, the practical implementation of verifiable recognition credentials, and how these credentials can integrate with existing trust lists and federated identity systems. The group explored ways to make the specification more decentralized and extensible, aiming to accommodate various existing data formats and future integrations. *Topics Covered:* - *Group Renaming:* A mailing list discussion and upcoming ranked-choice poll are underway to rename the Verifiable Issuers and Verifiers group. - *Verifiable Recognition Credential Model:* The group is shifting towards a simpler, high-level language for verifiable recognition, focusing on entities and their recognized actions rather than a single, generalized data model. This approach aims for decentralization and compatibility with existing systems. - *Interoperability with Existing Systems:* Discussions explored how the verifiable recognition credential model can reference and integrate with various existing trust lists, registries, and federated identity systems like UD wallet, OpenID Federation, EBSI, and the Czech blockchain. The approach is to reference, sign, and potentially hash these external resources. - *Use Case Application:* There's a recognized need to apply the developed model to various use cases to identify rough edges and ensure its comprehensiveness, with a call for more content to be added to the use cases document. - *Protocol Agnosticism:* The verifiable recognition credential model is intended to be protocol-agnostic, allowing for its use in different communication streams and protocols like VCOM and potentially OIDC for VP. - *Holder-Based Delivery and Discovery:* The discussion touched upon how verifiable recognition credentials can be requested, presented, and discovered by holders and verifiers through various mechanisms, including publishing them in service directories. - *Output Validation Clarity:* The need for more explicit definitions regarding the handling of multiple values for attributes, particularly in output validation, was discussed, focusing on the distinction between single triples versus multiple triples for representing data schemas. The current spec text was identified as potentially confusing when interpreted as RDF. - *Data URL Specification:* Ted Thibodeau Jr. raised an issue regarding the permissibility of data URLs within the specification, suggesting a need for clearer definitions. - *Governance and Expectation Setting:* The importance of governance in issuing verifiable recognition credentials, especially concerning the validity of schemas used in output validation, was highlighted. This includes ensuring that issuers maintain the integrity of referenced schemas and lists. *Action Items:* - *Manu's Mailing List:* Participants are encouraged to chime in on the mailing list regarding the renaming of the group and await the upcoming ranked-choice poll. - *Isaac Henderson:* Isaac will review the use cases document and provide comments for the next meeting. - *Benjamin Young:* Benjamin will create a "super issue" to begin discussing and identifying other communities and ecosystems for potential integration. - *Dave Longley:* Dave will add a comment to issue #48 on the mailing list with his thoughts on holder-based delivery in relation to verifiable recognition credentials. - *Benjamin Young:* Benjamin will try to engage Stephen Curran to attend future calls to discuss issue #46 concerning UNP and DID lookups. - *Ted Thibodeau Jr. and Dave Longley:* Ted and Dave will work on refining the language in the spec to clarify the representation of output validation, particularly concerning multiple data schemas and the distinction between JSON modeling and RDF triples. Benjamin will post the drafted RDF translation for comment. - *Benjamin Young:* Benjamin will investigate the possibility of creating a PR for issue #44 related to data URLs, or Ted can send one. - *Benjamin Young:* Benjamin will add a comment to issue #43 regarding the removal of outdated comments from the use cases document. - *Dave Longley and Benjamin Young:* Dave and Benjamin will consider creating an issue to illustrate an example that combines referencing other lists and defining output validation schemas within a single verifiable recognition credential. - *Isaac Henderson:* Isaac will send an email to the CCG mailing list to schedule a demo of his previous implementation of a unified approach for a future call. Text: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-2026-03-03.md Video: https://meet.w3c-ccg.org/archives/w3c-ccg-ccg-incubation-2026-03-03.mp4 *osb-nmyo-muh (2026-03-03 11:00 GMT-5) - Transcript* *Attendees* Benjamin Young, Dave Longley, Denken Chen, Elaine Wooton, Isaac Henderson, Parth Bhatt, Ted Thibodeau Jr *Transcript* Benjamin Young: Hey, good morning. Parth Bhatt: Hello. Benjamin Young: We'll probably give it till 5 after. I'm not sure how many people are going to show. Manu I know is away. Long may show up and we can talk about what to do next. Benjamin Young: Hey Dave, I might give it just a couple more minutes in case a land or others show up and then we'll get started. Benjamin Young: Hey Isaac, we're giving it about another minute for folks to wander in and… Isaac Henderson: Hi everyone. Benjamin Young: then we'll get started. Benjamin Young: Okay, I don't think there's a thundering horde waiting to show up, so we will go ahead and start. this is the verifiable issuers and verifiers call. which may be being renamed and there's a email about that on the mailing list that's worth your time if you have interest in speaking up on that. Let me see if I can find the issue. Okay, it's in chat here. We lost it. Benjamin Young: So this issue is from Manu just saying there's a vote mailing list so if you have thoughts about the renaming, please chime in on that mailing list and then I think Manu is going to send out a ranked choice poll sometime next week about it or later this week probably. so that's kind of the bigger concrete thing going on. Isaac, I think maybe you've been here in the past, Benjamin Young: but would you like to take a minute to introduce yourself? Isaac Henderson: Yeah, sure. Isaac Henderson: Yeah. yeah. So, I'm c from working in, Fronoff based in Germany on Stutkat. Yeah. So I was also part of working or this draft from myself and David worked on this previously and also last two months I was on parent leave so that's why I couldn't join and I saw a good progress or I think in the past 2 months or 3 months I think it was really interesting that it's also manual also mentioned in the email that it is progressing towards a working group I'm happy to contribute 00:05:00 Isaac Henderson: And yeah, so I'm looking forward and also looking forward to contribute to this work further because I think David is retired currently and I think he's also taking away a while. So I think so he might not join… Isaac Henderson: but yeah so I also definitely am happy to contribute my inputs and also later I can have some couple of comments on the names maybe I will also talk about that. Benjamin Young: Okay. Yeah. Isaac Henderson: Thank you. Benjamin Young: No, that sounds great. yeah,… Benjamin Young: I knew I'd seen your name floating around mostly in emails, I guess. it's great to have you here because I think that was a farewell email from David. So he might wander back in, but I don't think we can expect him to be regular anymore. Yeah. thank you for being here. great. we can talk a little bit about the document title change, if anyone has thoughts on that. but I think, the goal was to do that mostly over the rank choice voting thing. Isaac Henderson: Yeah, that's true. Benjamin Young: does anybody want to discuss the document title or should we tackle some issues Isaac Henderson: Yeah, sure. Isaac Henderson: I can jump in or I can also have so I find it interesting as a verifiable recognition. so I also went through the document of the current status of where it is for example. Please correct me if I am wrong. so currently the aim because previously we were trying to create a generalized data model which can be used by issuers or verifiers or wallets for identifying the verifiable or the trustworthy one. Isaac Henderson: Trust is a complicated name for example but currently you want to represent those trust the service provider or the relying parties as a verifiable credential if I'm understanding it right and the list is also a form of verifiable credential so that means all these data endpoints or the metadatas will be represented as a verified Isaac Henderson: tribal credential right for example and if who is controlling the list that is something is up to discussion or who is going to issue those credential can it be selfisssued and how and who is able to validate those trustworthiness behind that issuance for example so that was also something for me to I was trying to understand based on the current proposal actually and the application behind how is it going to be implemented or how it is synchronizing with the current developments with the UD wallet any other certification schemes where it is planned so how our work is going to be taken over there so that this is also something which I'm looking to identify and… Isaac Henderson: understand actually the scope of where we are going so that I can also come up with better names so thank Benjamin Young: Yeah, that's great. Benjamin Young: That's great. go ahead, Dave. Dave Longley: To speak to some of that. so over the last few weeks, I guess maybe it's been a couple months as well. what we have found in this work is that there are a number of different groups that have their own data models and lists of things and software around those for parsing all that. And we didn't want to require those groups to necessarily change any of those bits of their software. But we wanted it to be compatible with issuing verifiable credentials that could list these other entities both as for a directory use case where you can describe what these other entities are and then link to these other lists that they have that are in these other formats with this other software that already works. Dave Longley: And we found that trying to make a single unified data model that covers some of the things that are in the UD lists would probably be a little bit challenging and… Isaac Henderson: Mhm. Yeah. Dave Longley: probably there wouldn't be a good incentive for them to switch over if they've written all the software to consume that already. but what we did want to do is make sure that that model sort of takes the authoritative approach that there's an authority that's allowed to do this and allowed to do that and so on. And we wanted the spec that we were producing to talk more about recognition and… Isaac Henderson: Mhm. Yeah. 00:10:00 Dave Longley: be more decentralized so that anyone can say anything about anything and anyone can talk about who they recognize to issue this credential or ask for this or whatever. Isaac Henderson: Yeah. Yeah. Dave Longley: And so we sort of pivoted in that direction and came up with a very simple highle language for talking about you can recognize these entities and you can recognize them to take these certain actions like issue this type of credential and then we associate a JSON schema with that just as an example. and that made the spec a lot simpler and it gave us the ability to link into these other systems and allow them to reuse it. And so anyone using this spec can consume these VCs and then link out to these other systems if they have software that works with those other systems. So that was sort of the unifying approach we had. Make it more decentralized,… Isaac Henderson: That sounds a great approach actually. Dave Longley: make it work with these other systems and make it extensible to work with other systems that other people might bring to us that we don't know anything about today. Isaac Henderson: I think so for example then you're planning to have because I think I'm trying to understand because the current list of UD wallet or for example other registries or open ID federation so they are represented in a different format for example right in a JSON or XML or whatnot so are you planning to just reference those URLs in your Isaac Henderson: list and then sign it and so whenever there's an update coming in the open ID federation list or for example or in Etsy list or whatnot then it gets updated and also the pointer gets referenced or hash for example so inside so this is something is also we are considering in it or… Isaac Henderson: is it just okay okay mhm H. Dave Longley: Yes. Yeah. Dave Longley: Yeah. and there are two options there. You could sign if there's a URL that you want to allow to change and when you fetch the URL,… Isaac Henderson: Yeah. Yeah. Dave Longley: it has some kind of digital signature behind it. So those changes are okay. Then you don't have to include a hash of the content in your VC and… Isaac Henderson: Mhm. Okay. Dave Longley: you can allow that to evolve over time. You also have the option of sort of pinning it and saying when I issued this VC this was the hash for that content and… Isaac Henderson: Mhm. H okay. Dave Longley: that is the only list I ever wanted to talk about with this VC and I will issue a new VC if I want to include new content. with this model and with this spec you have the option to do either one of those things. Isaac Henderson: Because couple of years back we have developed already an implementation of this unified approach So maybe I could also share the link with you. So you can have a look into this one. so this is also something where we provide an unified signature approach where different credential formats can be represented as a VC and also the hash because we based on a hashbased approach actually because we don't want to use the Jardis or Sardis suits actually but rather we want to use this kind of VC as a signature trust list URI and a hash and this we already implemented and Isaac Henderson: I think we also implemented as a part of an Eclipse foundation project for Kaya X trust infrastructure and I think this is something which if you are planning to incorporate into the reference architecture I think we already have an implementation or… Isaac Henderson: yeah we could also provide some support on that if that's something interesting. Dave Longley: Yeah, this looks Yeah,… Dave Longley: this looks very similar to I think some of the names and things would change to bring this up to date,… Isaac Henderson: Yeah exactly. Dave Longley: but I think… Isaac Henderson: Mhm. Okay. Dave Longley: what you just described is very compatible with the model that is in the spec today. So I think there's a lot this can easily work together. Isaac Henderson: Great. Because I was also trying to understand when we have multiple credential. you can have for each and every list a separate signature because I was trying to understand when you want to reference multiple list in a single VC because whenever it's going to get it signed who is because different persons or different authorities or not authorities different institutions might be in charge of updating this list and so that's why I was just trying to think about having each credential for a list or having you Isaac Henderson: multiple list in a single credential. what do you think about that actually? Dave Longley: Yeah, I think that gets into a topic I think the group should start covering sooner rather than later,… Isaac Henderson: Yeah. Mhm. Yeah. Dave Longley: which is let's take the model that we have that we've come to over a number of months now and start trying to apply it to a bunch of different use cases and make sure that the model that we have can address those use cases And so if you're bringing those might be use cases that are already in our use cases document that need some update. but they might also be newer or it's good to have fresh eyes on them. And so We should say we have this use case. We have this new data model that we think is going to work for the use cases we're interested in. Let's see if it does and let's work our way through some examples and see… 00:15:00 Dave Longley: if we've got any rough edges we need to, make adjustments for or just make sure it works out. Isaac Henderson: Mhm. Yeah,… Isaac Henderson: sounds good. Yeah. Benjamin Young: And it summarizes most of the issues there. Benjamin Young: I think certainly the newest ones are ensure compatibility with create example demonstrating yeah and even some of the older ones are that way too. So I think you're both trending the right direction that we now need to take this model we've come up with and apply it and see what falls out. I did link to the use cases document which is a separate one now from the main specification that's worth looking through if you haven't seen it. Benjamin Young: I doubt everything is covered. but it would be great to channel more content into that soon. Benjamin Young: Isaac, did you have any other thoughts or questions on that general point or… Isaac Henderson: You mean the use cases right… Isaac Henderson: which you shared with the link Okay. Benjamin Young: Yeah. or just where you were trending with how does this fit wondering if it does? is there any part of that you wanted to dig into more before we Isaac Henderson: I think this use cases was done or it was done quite a while back I think it's worth looking into it and also updating the details accordingly actually I would say because I know this was done couple of three years back this verifiable issue use case and verifiable especially but maybe I could look onto it and… Isaac Henderson: also give a read on that and maybe comments on before for the next meeting for example. Benjamin Young: That'd be awesome. Benjamin Young: Thank you. Isaac Henderson: Yeah, but are we planning to go into these use cases or should we also go because since we are considering in a high level meta should we talk about other existing ecosystems which are currently existing by considering for example UD wallet is one what do you call this MDL and also the check blockchain and stuff like that. compatible with both so use cases across blockchain world and also the normal one. Isaac Henderson: Did you have any thoughts on that or how did you plan to go further? Benjamin Young: Yeah,… Benjamin Young: I don't think there is a plan and… Isaac Henderson: Okay. Mhm. Benjamin Young: we can make one right now. I think maybe what we can do on this call is look at the few issues that are here that pertain to either use cases or… Isaac Henderson: Yeah. Yeah. Benjamin Young: just like number 49 and number 48 48 in particular looks very much like the kind of thing that you're describing. Benjamin Young: And so I wonder if we should, draft a super issue to start us out discussing what are the other communities we know of where we want to try and… Isaac Henderson: Exactly. Mhm. Benjamin Young: connect the dots and then we can break that out into separate issues. Maybe why don't we try that? Isaac Henderson: I think that might be good because the UNP one is more specific to the verifiable credential model or… Isaac Henderson: the data model but there are also other as we discussed right open ID federation or trust list which are beyond that. Yeah. Mhm. Benjamin Young: Okay. … Benjamin Young: So, I'm going to start this issue. and we have the UNP one. will preview better than it looks in the text. Benjamin Young: And there were several others that you just mentioned. The … Isaac Henderson: So one thing I could yeah tell is the Etsy one the UD wallet trust list for example and… Isaac Henderson: the next one is the open ID federation and there's also blockchain based things like EC1 that's a European blockchain E EB EBSI EBS. 00:20:00 Benjamin Young: can you spell that for me? I EBSI. Isaac Henderson: Yeah. And… Benjamin Young: Thanks. I knew I'd seen it. Isaac Henderson: and then another one is the Czech blockchain for example. So they also have a did based trust chain based on verifiable credential C ch. Yeah. Yeah. Benjamin Young: T H E Q D right here. Okay. Isaac Henderson: Check blockchain. Yeah. Okay. Benjamin Young: I think this second one is the one that David was mostly focused on representing for and I don't know that it's completely handled. It'd be good to have more eyes on it from folks that know this space. do you have contacts that checked or Okay. Isaac Henderson: Yeah, I I have contacts checked and also the epsy one so I know how the trust framework or the list looks like and with the UD wallet currently it's still developing so we could start with the schema Benjamin Young: Right. Isaac Henderson: which is currently existing from the Etsy whatever is currently available and we could try to use that because the UD wallet is open source and we could try to build upon that actually yeah and open ID federation I'm not sure where it is currently applied or is it being used somewhere else or still I'm not sure actually Mhm. Dave Longley: Yeah, we might want to get feedback from Dimmitri on that because I know that they're doing some work over in the education space with that and looking to get some more privacy benefits out of using the VC model here. Isaac Henderson: Okay. Dave Longley: And so he might have some input. Isaac Henderson: And how about the valist from what is it called MDL for example? Yeah. Dave Longley: Yeah, we should mention they've got some trust hierarchy stuff as well for MDL. Benjamin Young: Very technical. Benjamin Young: We'll run with that. Dave Longley: Yeah, that's right. Dave Longley: And for each of these, we're not looking to look in,… Dave Longley: crack those open and look inside of them and take pieces out of them. We're looking to see that we can make our data model reference and talk about those things in useful ways and even unify them. So if you have a given issuer that might issue both VCs and MDL and something in that is used in the education space or anything along those lines… Isaac Henderson: Yeah. Mhm. Isaac Henderson: Mhm. Dave Longley: then by having a verifiable recognition credential there might be some utility in unifying that working with directories helping digital wallets express information about those things. Dave Longley: there's lots of places where those things can become unified with this data model. it would also be good to demonstrate in any given one of these cases if they wanted to express something that they do express today in their model. Isaac Henderson: Mhm. Yeah. Dave Longley: Here's how you could express it in the model here, but that's not a requirement for them to move over to it and they might not be incentivized to. But there might be some advantage that they might see … Isaac Henderson: Mhm. That's true actually. Dave Longley: if they have an example that shows how to do Isaac Henderson: And one thing we might also need to I think just because especially since it's a new credential for example it would be good to also think about where it is going to be referenced right for example is it going to be part of the credential or is it going to be part of the policies at the verifier side or is it going to be integrated into the trust or in the list for example right so this is also something have you thought about that or discussed already Yeah. Dave Longley: And there's a couple of other issues that were just open I guess they came in from the mailing list around where do these verifiable recognition credential or… Isaac Henderson: Mhm. Yeah. Dave Longley: where do you link to them? where could you discover them? And each one of those things can have, a different answer. So there is a goal to allow holders to present them when requested. Isaac Henderson: Mhm. Dave Longley: There's a goal issu for verifiers to present them when they're making a request to holders or holders could ask for them. there's also this concept of publishing them did document at a… 00:25:00 Isaac Henderson: Yeah. Mhm. Dave Longley: who is service or something. Dave Longley: So you could publish them there and so they can be discoverable in that way. And so there's a couple of other issues around that and… Isaac Henderson: Mhm. Yeah. Dave Longley: I think we wanted all of the above approach for you you can put these things into the various streams where you're communicating between parties. Yep. Isaac Henderson: 's Yeah. I think that's A good point actually and the one which list which I shared with you actually in the link. So this one we try to do with the document and also with So in DNS the URI record we were also trying to create a link so that we were giving an option for users or entities for example to use IPFS nodes or whatn not so this is also something which we demonstrated it and maybe in upcoming sessions when we have time I could also show one of our integrations with a relying party with policies how we did that and maybe that's something if that is also interesting. Isaac Henderson: if that's interesting for a group then I can also show that in a small demo here. Benjamin Young: Yeah. … Dave Longley: Yeah, I think using one of these calls to do a demo like that would be great. Dave Longley: Go pen. Benjamin Young: yeah, it would be we are kind of in a trough between a whole flurry of action and queuing up the next actions. I don't want to put you on the spot, Isaac, to do a demo now and… Isaac Henderson: Isaac Henderson: No, not now actually. Benjamin Young: it might Well,… Isaac Henderson: in the coming weeks if you have time for the agenda. Benjamin Young: hopefully get you a bigger audience,… Isaac Henderson: So yeah,… Benjamin Young: Okay, that sounds great. Benjamin Young: And if you want to offer that on the mailing list, or just save it, here's what you'd like to demo, then we can,… Isaac Henderson: okay. Yeah,… Benjamin Young: pick an upcoming Tuesday to schedule that for. Isaac Henderson: where I could send you by email or for example. Benjamin Young: Yeah, that'd be fine. Isaac Henderson: Okay. Mhm. Benjamin Young: Just to the CCG mailing list,… Isaac Henderson: Perfect. Yeah. Benjamin Young: that'd be great. Okay, let's take a little bit of time to look at maybe some of these other issues. And I'm still waiting on permission level enough to close things, but we can leave comments on stuff. this one seems sort of related to our general conversation so far. Dave Longley: Yeah, I'm not sure if we end up I mean one way we can talk about this is we could reference the VCOM spec and talk about how either party in an exchange could request or share a verifiable recognition credential. So we could talk about that. we could also talk about it just more at a higher level. but it might be nice to be able to link to a specific way to do it in a particular protocol. but we should definitely in this spec talk about how protocols can have different parties share these credentials or… Dave Longley: request these credentials. Isaac Henderson: Mhm. Benjamin Young: So, more than just use case additions. Benjamin Young: I'm just making sure to call out that it's okay. Dave Longley: Yeah, I think we'd want to ground it in a use case or… Dave Longley: two. it's like why would I do this? So here's a use case or two. and then we can talk about how it can be done. if you have any other use case that could reuse that primitive. Benjamin Young: Right. Okay. Benjamin Young: Anyone have interest in taking this on or drafting some piece of it? Dave Longley: I'm wondering if it would be nice if Stephen Curran came to one of these calls to tell us when you clicked on that link did he give us his specific use case? I don't know… Benjamin Young: He mentions did… Dave Longley: if Right. Benjamin Young: who is because that's his primary focus at the moment. Benjamin Young: is it? Yeah. Dave Longley: Yeah, we might want to come up with a good use case for… Dave Longley: what we're trying to cover. So, I don't know if today is the best time to do that. We might want to get some other people on the call. But I think a good way to address this issue is to say here's a good use case or two for what we're trying to do with this particular feature and then it'll be more obvious to someone who could write a PR around it to do an example and so 00:30:00 Benjamin Young: How's this? I'll delegate to somebody not yet in the group and see if we can get Stephen to join us. Dave Longley: Yeah. I think at a high level what comes to my mind on this issue a holder show is going to engage in an exchange with a verifier but the holder wants information from the verifier about who they are first and so they might say here are the parties I recognize to that I would be willing to present this credential to and… Benjamin Young: … Dave Longley: so that's where my mind went with this but It could go in some other direction. Benjamin Young: would you be up for sharing that in text on the issue or copying and pasting out of the transcription that just happened? Dave Longley: Yeah, I'll open up the issue and leave a little note. Benjamin Young: That'd be awesome. anyone else want to share anything related to this issue? Otherwise, I think it's kind of a exploratory one for whoever wants to pick it up. Isaac Henderson: So I'm just trying to understand so this is holder based delivery is it specific to some protocol or is it something we are thinking it in quite general terms actually for example in the open ID for VP or… Isaac Henderson: so ditcom for example so is it specific to that protocol base or is it something protocol agnostic? Okay. Benjamin Young: Yeah, I think the imagined context for both Manu and… Benjamin Young: Dave is bol, but I think it's meant to be protocol agnostic and I think Stephen is mostly just focused on where that did lookups could be entangled in that process. Benjamin Young: And he's wanting to make sure that I did who is lookup can be part of that chain or flow is probably a better word. Isaac Henderson: Okay. Yeah. Isaac Henderson: Because I think then we might not address the broader spec of this UD trust list. So then our scope also might get redu reduced So then we can concentrate only certain because the UD wallets so currently they are completely going with the open id for VP so this protocol is already fixed for example. so that's why I was just thinking so when we focus on dits then our scope also might get reduced or how do you see that for example Isaac Henderson: Mhm. Yeah. Dave Longley: So I think in our spec we should at least talk in a high level about if your protocol allows you to request credentials or present credentials then here is how these are the types of credentials you could request and present and then we might link to specific protocols that can show how to do that in an example. And certainly you could do that in VCOM and you might be able to do that with some of the upcoming versions of oid for example… Dave Longley: because they have an interactive presentation piece of it. Isaac Henderson: Yeah. Heat. Dave Longley: So there might be ways to do it with some of the draft specs. so we might focus on VCOM since that's also in the W3C work at this time and that'll be a little easier. Dave Longley: But we should definitely talk about it at a high level … Dave Longley: if your protocol supports requesting and… Dave Longley: presenting credentials, here's something you can Isaac Henderson: Yeah, that's true. Benjamin Young: Yeah, that makes sense. Benjamin Young: Okay, I think we will move on to the next issue if that's all right. Which Wait a minute. Yeah, these are very related. Benjamin Young: is more of the same. I think this is more the specifics of is the concrete inter relation of the two formats but it's interdependent with 48. wait he says 40. Okay, he's stacked 49, and 50 are all related. So, let's go to 48. Or maybe he picked the wrong one. Does anybody know if UNP uses did who is? 00:35:00 Benjamin Young: I think Manu got his Stevens crossed. Isaac Henderson: I know UNP uses the did web actually… Isaac Henderson: but I'm not sure did web VH actually so VH is something new or… Benjamin Young: Right. Right. Isaac Henderson: least in the did UNP because I think that's supposedly specific for this battery pass or the product passports so I'm not sure so whether they are using did VH as of Benjamin Young: So that's practical action on somebody who can do both. which is maybe Stephen again. anyone here know the UNTP bits, especially the digital identity anchor content is over here. Dave Longley: Someone who's not on the call today, I don't remember if Patrick attends these calls, but he might have some input in this area and… Dave Longley: we can certainly get it off the mailing list as well. Yes. Benjamin Young: Right. Okay. Benjamin Young: As in Patrick's and Louise. No, you're good. I think we have two Patrick's, but the active Patrick is the one you're talking about. So, this is a digital identity anchor demo or one of them. And somebody who knows both things could give that a look. Okay. Yeah, I may do that one out of band and not ping Patrick here. Benjamin Young: Okay, Ted, we got the one by you. Did you want to speak to this at all? Ted Thibodeau Jr: No, there's a mute button here somewhere. what is this one? Benjamin Young: Multialing attributes need more explicit definitions. … Ted Thibodeau Jr: Open this two weeks ago. Okay. … Benjamin Young: it's recent history. Ted Thibodeau Jr: no, I have no words today. I'm sorry. Benjamin Young: That was way back in February. Ted Thibodeau Jr: Back before the dawn of time. I got it. Dave Longley: Yeah, I think this one might have been about whether you pick a value out of the output validation field and just one value will do or… Benjamin Young: You're good. Dave Longley: whether you must validate all of them. it's something around getting clarity around how to use the output validation. Uh-huh. Ted Thibodeau Jr: I'm sorry. No, you're close, Dave, but not at all in the right direction. no the question is whether a value which can hold an attribute which can have multiple values assigned should have those in multiple triples or should have a single triple with commaepparated values. Right? So if you look at the last paragraph of the opener there is a definite difference between Ted Thibodeau Jr: One value of red, And three values of red, white, and blue. Dave Longley: I get what you're asking. and… Benjamin Young: I'm going to bring up this chunk of spec text. Dave Longley: I'm trying to translate it because it's sort of metaphorical since the values for output validation I think are themselves objects that have their own troubles about them. yeah,… 00:40:00 Dave Longley: if we have an example, I think output validation has a schema type or something along those lines in there,… Ted Thibodeau Jr: This one says right that it can have it that it's validation schema. Ted Thibodeau Jr: It's one or more data schemas and… Dave Longley: And so,… Ted Thibodeau Jr: there's got to be some identifier for these schemas. And that gets even further down the line. is this something that's a plain text identifier or is this a URI identifier? Dave Longley: Yeah, I think we probably need to make sure the language better reflects what we've written down in the examples. Dave Longley: … Dave Longley: if we look at the examples I get a certain intuition for what's expected there and how we formalized it is probably unclear in the way that you're I think. Benjamin Young: We do say that it must have an ID and… Benjamin Young: be a URL identifying the schema file. Benjamin Young: I don't know if that solves what you're asking. Ed. Mhm. Ted Thibodeau Jr: It's still the challenge of must be one or… Ted Thibodeau Jr: more data schemas even if you're identifying them with URLs. Dave Longley: Yeah, you're looking for it to say is the value itself one or… Dave Longley: more or… Dave Longley: are there one or more actual values to that there are many triples as opposed to one triple that points to some big bucket of things. Is that right? Ted Thibodeau Jr: something like that. Ted Thibodeau Jr: It's Benjamin Young: Yeah, the value is not a container of any kind. Dave Longley: Yeah, we're talking about it being a set of these as opposed I don't know that that would solve your problem. Benjamin Young: It's a bag if you want to get particular. It's an RDF bag. Dave Longley: So, I think someone needs to take a stab at some better language. we don't want the one single string red, white and blue thing. That's not what we're looking for. We are saying that if this were to turn be turned in, expressed as triples, it's going to be some blank node identifier for recognized two and then it will have several triples. if you had several output validation values, there would be that blank node would appear as the subject in many triples where the predicate is output validation and the value is some or all of those other ids that appear in the output validation value like that learning commission. URL so it's not the red, white and… Dave Longley: blue all in a single string metaphor. they are separate. So we just need language that makes that a little more obvious. Benjamin Young: And is that an issue with output validation or… Benjamin Young: is that an issue with recognized t? Dave Longley: I think it's with output validation the language that's causing the confusion is one or… Benjamin Young: Okay. Dave Longley: more data schemas as opposed there might be other language that we can find in one of these other specs that talks about sets or something. Usually we use sets because we map this to the infraspec and that's an easier way to do the specification than calling it an RDF bag or… Benjamin Young: Do we want to make it an actual set in the JSON LD or… Dave Longley: whatever. I think we only do that when you always want it to be a set of laurel items even… Benjamin Young: do we tend to avoid that and make a whole new class? Benjamin Young: right? Dave Longley: if there's just one in the set. I don't think that's the case here and it's probably commonly will just be one. Dave Longley: So we wouldn't want to go out of our way to force that sort of structure. Ted Thibodeau Jr: Yeah, I should be more rigorous in… Ted Thibodeau Jr: I describe what's going on. the issue is whether expressing multiple data schemas should be done with a single triple or multiple data schemas require multiple triples. Dave Longley: It's multiple triples to reference those data schemas by ID and then there will be other triples about those schemas themselves using that ID and… Ted Thibodeau Jr: Yeah, those are irrelevant. Dave Longley: the subject. Ted Thibodeau Jr: It's a question of so there's a subject here which is not talked about in this little blurb. That subject has a property of output validation with a value with d value being one or more data schemas. That's problematic. 00:45:00 Dave Longley: Yeah, the description is talking about it from a JSON modeling perspective and then how that maps to RDF triples that is a function of the fact that it's JSON LD and it has a way to map to that and so the pec and the spec level text is referring to it as a JSON model. So if you're reading that text as if it's describing RDF, I think it's only going to be confusing. there's probably something we can do to better make that to make that more obvious, but what Benjamin is typing into the issue there is… Dave Longley: how it would translate into RDF. Benjamin Young: And I will copy in some better stuff real quick. Ted Thibodeau Jr: I'm sure I'll reply to whatever goes into it. Ted Thibodeau Jr: We don't have to solve it this minute. Benjamin Young: I don't necessarily need to post this,… Benjamin Young: but I can if that's helpful. it's only when they start talking back that you need to worry mostly about… Ted Thibodeau Jr: It's probably better than nothing. Ted Thibodeau Jr: It'll prompt further conversation from somebody, which may just be me, but that's all right. I talk to empty rooms all the time. Benjamin Young: what they're going to say. Benjamin Young: Is this kind of getting close to the point? Ted Thibodeau Jr: Yes, I think so. Benjamin Young: Good periods. Dave Longley: Don't forget to close all that in triple back text or something, Benjamin. for GitHub. Benjamin Young: Yeah, you're not worried about my periods. too much cording on this keyboard. There we go. Benjamin Young: And then this is this down here. Ted Thibodeau Jr: That turtle was fine. Benjamin Young: I will post this since I took all this time to type it. I think that's less lack of preset prefixes and everything. It's not a valid turtle, but whatever. There we go. Now they're prefixless terms. okay. Don't know if this is helpful. Is turn off. Benjamin Young: There you go. Okay, cool. That was fun. what else do we have? Some comments happening up here. no, that wasn't me. That was Dave. Dave Longley: That was just a comment you asked me to make earlier. Benjamin Young: Terry, sweet. Look at you checking off your to-do list items. okay. And we were just looking at 46. Benjamin Young: Let's pop into 44. This is also you from two weeks ago. yeah. This one I did peek into. It's a Ted Thibodeau Jr: Jes and… Ted Thibodeau Jr: this one is again if it's must be a URL then saying that URL can be data scheme expressing image data is perfectly fine But it must be URL or… Ted Thibodeau Jr: image data. Benjamin Young: Right. Something like that. 00:50:00 Benjamin Young: For anybody who knows data URLs, this is kind of a softball pitch because Ted's already done most of the work right there. Ted Thibodeau Jr: Madness. There are worse things. Benjamin Young: Or Ted, you can send a PR for your issue pretty much. I know you like commenting on other people's PRs more than sending them. Think you're afraid we're all going to fix your grammar, but I'm not sure that's possible. Benjamin Young: this is probably I'm gonna ignore 43. The comics are still there. They're just now in the use cases. That's another lowhanging fruit thing. Somebody can remove those. There's consensus to take them explain that output validation requires governance. Okay, he's just missing spec text if somebody wants to tackle that. and to be clear, we're not going to be getting a whole ton of time from Mono on this spec in the future. So, these requests aren't just ambient filler. Benjamin Young: We do need people to step up and start pring. Benjamin Young: This is kind of use casey. Isaac Henderson: I have a doubt regarding this previous one actually the output validation. Isaac Henderson: Is it part of so normally these validations are done at the verifier side right for example or… Benjamin Young: Yeah. Yeah. Isaac Henderson: verifier or holder side and should we mention that explicitly as part of our credential or what is the reason actually why we have this Okay. Dave Longley: I think this issue,… Benjamin Young: to this. God, no. No. Dave Longley: Dave Longley: sorry to jump Q. I think this issue is just about putting text into the spec that says if you're going to issue a verifiable recognition credential, you need to go through the process of actually making sure that the schemas that you're saying you want in there are valid so that when a verifier does go to use it,… Dave Longley: it's one can do something you weren't expecting them to do. Yeah. So this is just covering the sort of the soft aspect of if you're going to issue such a credential and you're going to put out output validation, make sure the schemas are… Isaac Henderson: Okay. Yeah. Isaac Henderson: Mhm. Yeah. Dave Longley: what you want. You don't just throw a schema in there and don't check it as the party that's doing the issuing because a verifier will use that schema. they have no idea. they assume that you've made a good schema. Isaac Henderson: Yeah, that's true Yeah. This depends on how when we have multiple list or in together. So that depends or when we have only one list then it can also be part of the type or context right for example. or not really or it can Yeah. Okay. Dave Longley: So where this particular output validation thing appears on a particular recognize to action. So if you recognize a particular party to issue certain credentials then that's where these schemas appear. And we decided in this spec to use JSON schema for the credentials that are being issued because we felt like it would cover any format for that can be expressed in JSON anyway. Isaac Henderson: So then for example if there's some change in the schema then it also needs to be reflected in the credential right. So the person who is maintaining the list they need to also preissue the credential again or so this needs to be part of the governance for example. Dave Longley: Yeah, that's right. Dave Longley: If Yep. and… Isaac Henderson: Okay. Yeah. Benjamin Young: Yeah. I think it's mostly about expectation setting,… Benjamin Young: right? Dave Longley: And Part of the text around that would be, some people would still be using the older version. and so you would issue a new one and only once the old one expires would you know that everyone would have moved on to the new Isaac Henderson: Okay. Because for me when I see this list one I feel like this itself is kind of looking like a list of list right so this is the kind of list of service providers so not rather pointing to a list so this is a kind of the first one right for example because here these are the different credential ids or different service providers or who are authorized to issue certain ID 00:55:00 Isaac Henderson: or credentials in a university so there's no other extra list but this is the list which is being maintained by them. Dave Longley: I think the answer to your question is I'm trying to make sure I'm interpreting all the things that you're saying the right way. Isaac Henderson: Okay. Mhm. Dave Longley: So by ids types of credentials. Yes. those are indirectly referenced by the schema. Dave Longley: The schema ID can be whatever you want it to be when you dreference that will have actual type and… Isaac Henderson: Mhm. Yeah. Dave Longley: context information about the credentials in there. And then at least in this example there could be other ways to link to other lists and to help deal with scalability and so on but at least in this example there's some higher level I'm trying to avoid using the word authority there's some higher level recognizer that has bunch of sub entities that it recognizes to issue Isaac Henderson: Okay. Dave Longley: to associates bachelor's degrees, and so on. And so that higher level party is the one that has to make sure that those schemas are correct for… Dave Longley: what they're putting out there. If that made sense. Isaac Henderson: Okay. Yeah,… Isaac Henderson: that makes sense. then this itself is a trust model for set of known issuers, So, okay, that's fine. So, then this is one aspect and then the next aspect is referencing different other existing trust list or it's not trust list or verifiable list. So, these are the two aspects you're covering as part of this verified Yeah. Mhm. Dave Longley: And in this one Yes. Dave Longley: And in this one credential, if we looked at that first example tech that hang on, we're moving around. Benjamin Young: Sorry. Dave Longley: It's all right. Benjamin Young: First example and this example. Dave Longley: My In example two in the first credential subject there, the name of that thing is example example polytechnic university. that we have another property that's is called recognized in and that could also appear here and it can list as many of these other lists as you want and… Isaac Henderson: Yeah. Mhm. Dave Longley: so all of that happens in the same place. So the bit about governance should say you're responsible for making sure those lists are right. You're responsible for making sure the schemas are correct if you list any of that. Isaac Henderson: Yeah. Mhm. Dave Longley: And you do all of that when you issue this credential. Isaac Henderson: Mhm. Okay. Benjamin Young: which I think there's some of that right here in examples Yeah. Dave Longley: Yeah. It is unfortunate if we don't have an example that puts both there together because people might get the wrong idea that you have to choose. Benjamin Young: Should we make an issue for that? Dave Longley: Yeah, probably. Benjamin Young: What was the other one recognized too? Benjamin Young: And sweet. Dave Longley: and recognized in. Benjamin Young: Okay, we are down to two minutes, so I'm going to suggest we not unccort another genie. anyone have any other thoughts or questions or things they want to see us discuss on future calls? We did great today. We got all the way down to the last five or so. we even discussed one of those. So, really just about four left. Okay. Yeah. Isaac Henderson: Great. Thank you. Benjamin Young: Thanks for coming everybody. Isaac, thanks for joining the group and… Isaac Henderson: Thank you. Benjamin Young: hope to see you in future. Isaac Henderson: Yeah, So, we'll try to join next week. Benjamin Young: Yeah, also hi Dink and… Isaac Henderson: Okay,… Benjamin Young: thanks for coming. I know it's like crazy early where you are. Thanks for tuning in. Isaac Henderson: thank you everyone. Have a nice day. Benjamin Young: All righty. Isaac Henderson: Thank you. Byebye. Benjamin Young: Thanks all. Bye. Meeting ended after 00:59:53 👋 *This editable transcript was computer generated and might contain errors. People can also change the text after it was created.*
Received on Tuesday, 3 March 2026 23:56:35 UTC