Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Overview

Data entry requires a signing key in order to establish that inputted data has come from an authenticable source. Authenticable entry items are identified by active identifiers. 

Image Modified

Table: A hash grid table describing the different states of active and passive identifiers. The

...

states of active identifiers

...

 are highlighted. 

What is an Active identifier?

An authenticable identifier used to identify an entity which has the capacity to govern. An active identifier cannot be controlled by a passive identifier.

Technical requirements

Active identifiers are assigned to the Inputs domain. Technical requirements include:

  • Cryptographic keysIn cryptography, a key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

...