Recording

Attendees

John Phillips, Jo Spencer, Neil Thomson

Main Goal of this Meeting

See Agenda Items

Agenda Items and Notes (including all relevant links)

TimeAgenda ItemLeadNotes
5 min
  • Start recording
  • Welcome & antitrust notice
  • Introduction of new members
  • Agenda review
Chairs
  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.
  • New Members:
20 minsUniversal Credential Adapters
Feature diagram with VC Consent Broker (renamed VC “Exchange Services”). This diagram was inspired by the papers/blogs by Mathieu Glaude (universal VC adapter) blog and Kaliya Young’s response (Proxy Issuer)
15 minsUse of Intermediaries for Holder/Issuer ServicesJohn, Jo, Neil
  • For Issuers of the current paper, plastic or other electronic forms of credentials, issuing of VCs are an extension of whatever they are doing now 
  • VCs and interactions between Parties need Use Cases & Mental Models to capture Context and which detail all the participating ecosystem components
  • Capturing interactions, possibly in fine-grained detail will be key for Parties and Issuers, likely through logging
  • Use by 3rd Party intermediaries (e.g., Holder, Verifier) are a possible solution for a number of “VC Exchange” types and workflows, but will require establishing trust of with all the participating Parties
  • Consent is an unresolved problem which may see use of API to translate complex uses of data (and consequences) to non-experts
  • Current credential presentations approaches may have limitations in the real world
  • Verifiable Credential purpose/intended use/TermsofUse (W3C Data Model) should be carefully crafted and leveraged for Verifier governance (on use of credentials  data)
5 minsDiscussion on experience w Aadhaar (India UIDAI ID) Sankarshan

Sankarshan’s comments on the experiences of the Aadhaar (India Digital Identity UIDAI ID), where the lack of regulation on Verifiers caused issues related to the capture of private information (including identity, which (for Aadhaar is based on a biometrics)

5 mins
  • Review decisions/action items
  • Planning for next meeting 
Chairs

Screenshots/Diagrams (numbered for reference in notes above)

For Universal Credential Adapters and Use of Intermediaries Discussion

  • Original diagram (as shown in recording)

  • Updated diagram based on feedback

Decisions

  • Sample Decision Item

Action Items

  • Sample Action Item


  • No labels