Sovereign Technology

From IIW
Jump to: navigation, search

Sovereign Technology

Tuesday 1J Convener: Adrian Gropper

Notes-taker(s): Adrian Gropper

Tags for the session - technology discussed/ideas considered:

Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:

Sovereign Technology  (e.g.: has no privacy policy)

Components

  1. Policy Assertions (e.g.: DNT)
  2. Authentication (e.g.: FIDO)
  3. Longitudinal Notification Endpoint (e.g.: email address)
  4. Non-repudiable Link (e.g.: biometric )
  5. White-List of IDPs (for Requesting Party claims)
  6. Backup and Recovery (e.g.: m of n)
  7. Delegation (e.g. parent of a minor)
  8. Competence tests (e.g.: partial delegation to a minor) 

Next step: Associate protocols with each of the 8 components.

IMG 0330.JPG