Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Attendees:

Samuel Smith 

Kevin Griffin

Kent Bull  

Phil Feairheller 

Lance Byrd 

Rodolfo Miranda 

P Subrahmanyam 
Henk van Cann 

Click here for → Meeting Recording

Agenda

  • Announcements
    • Publishing requirements for data signatures inside XBRL and inclusion of ACDC Data Attestations.
      • Technical working group next step
    • Roots ID 6 month effort with Cardarno Foundation (supply chain, KERI, ACDC)
      • EGF Working group as a suggestion to get started with supply chain governance
    • Looking to get examples for CESR, for parsing events  
      • Creating events and KELS to start
    • ToIP TSWG Trust spanning layer task force continuing meetings, looking to adopt KERI (ACDC)

Reports implementation of ACDCs

  • vLEI
    • work items to update schema
    • RootsID vLEI from Provenant
      • Legal Entity vLEI and Offical Organization Role vLEI credentials for Rodolfo and Lance et al
  • ViRA
    • See above on the XBRL
  • HCF
  • Provenant upcoming announcements
    • MWC conference on Mobile World Congress
  • RootsID
  • QUI Identity
    • KERI first then ACDC (smile)


Discussion Items

  • W3C Face to Face outcomes
    • Scope to try resolve @context issues present within the W3C VC DM (multiple lengthy github issues)
      • ACDC can become a verifiable proof (external) with a uni-directional transform to the base media type of credential+ld+json 
      • Similar approach from w3c/vc-jwt (https://github.com/w3c/vc-jwt)
      • Help appreciated with review/comments/questions
      • uni vs bi directional
        • receiver can process an ACDC, transform produces a valid JSON-LD object that can be used for RDF
        • vc-acdc will be unidirectional
          • default @context is open to discussion
        • more complex example would be a vLEI transformation
        • vc dm is payload of an acdc
        • Issue for addition of payload  in ACDC up for discussion (https://github.com/trustoverip/tswg-acdc-specification/issues/74)
      • embedded proof follow similar pattern to how SAIDs work
        • adding proof inside the vc
      • external proof act as a container for the vc, the container contains the proof (Proof is on the ACDC)
    • Also presentations on VC Data Integrity Proofs and Holder Binding