22A/ The Verifiable Credentials Functional Stack

From IIW

The Verifiable Credential Stack


Thursday 22A

Convener: Timothy Ruff

Notes-taker(s): Neil Thomson

Tags for the session - technology discussed/ideas considered:

VCs/Verifiable Credentials, SSI, ToIP, Business of SSI


Discussion notes, key understandings, outstanding questions, observations, and, if appropriate to this discussion: action items, next steps:


Story

1956 Malcom McLean – inventor of the shipping container – contributed more to world trade than any other changes in 50 previous years.

Cost of $5/ton -> 16 cents. Took 10 years due to resistance to change

Verifiable Credentials is the shipping container of Authentication.

There is disagreement about a lot of the ways forward (block chain vs. KERI)

What is being getting a huge support for is verifiable credentials

LER – learning and employment record – for Universities – as a standard on course accreditation via verifiable credentials

What are the contents of a credential to verify, but the concept is a done deal

How data moves today is similar to pre-container shipping. Add verifiable credentials to the data and it becomes containerized

Prove to a lender I still have a job. The only way to do is via equavac or call previous

employers. With verifiable credentials, that problem goes away.

Looking at SSI, possible places for verifiable credential storage – (all currently in play)

• Blockchain vs. KERI vs. Wallet vs. database

Individual is courier about own stuff. They can make a claim, which an employer can validate and hand that back to the user (to store in “wallet”).

The following (unlike the TOIP stack) is a VC container centric stack

22a.png

There is a blog on this

Where does VC from layer 2 go – BC, DB or Wallet

Layer 3 – we are going to be awash in VCs. With performance improvements in VC processing, this will explode with thousands per person (which can be very short time frame) and millions per organization. This provides traceability of verified transactions.

What if a university id generates many VCs for all access on campus.

Verifiers can now track when a user has accessed their services

Layer 4 is where it touches users – new payment systems, voting systems, etc. all VC driven. Example – enable student to take selfy for ID purposes that becomes a VC

Managmeent of VCs MAY be simple (currently are not) and can be distributed (as well partitioned) and specialized.

What are the points for “bespoke” code vs. off-the shelf – V4 is likelyto be the most customized, lower layers more standardized (as you go down).Interoperability from 3 down is required.

Force big tech to hand stuff back to people so they can port their VCs and “stuf” to other vendors (VCs as portable model)

To be competitive at layer 4, those VCs must be portable (vs. lock in)

Connections – in layer 2, but connection management will be critical

Killer use of SSI is point to point connections to support CRM communication.

Can’t verify a credential without the connection.

Connections are created as required, but connection management (about what connections can be contructed and are validated) are critical

Idea: Credential Connection – e.g. service account at electrical supplier – supplier provides credential validated connection to the connection, which allows user to delegate use of that account to someone else.

Example of performance improvements

• KERI – issuance, verifiation

• BBS+ builds on zero knowledge proofs, which are scaleable milliseconds vs. seconds

• <undisclosed developer> revocation (formerly difficult) now simple/fast

Any area is open to disruption is when there is a data imbalance (e.g. simplification and lower transaction time/cost is a killer)

Lacking discussion in SSI space – how are you going to make mone?

Actually Tinsic sessions on SSI stat of the business are AT IIW31 (Riley Hughes chicken and egg)

Where am I going to build vs. buy.

Anticipated – wallets built into phones (alternative – cloud wallets provided with services, etc.)

Verifiable COVID-19 credentials – is a Layer 2 problem, user has to carry around the credential in a wallet and/or app?

Airlines have to verify and track all the user/s credentials – layer 3

Layer 4 – is where you have to hide all the complexity – they should NOT have to deal with the NASCAR problem.

QR interface is Layer 4

Trust Triangle for agrigulture – and how farmers fit. Farmers don’t control their data and are not at the table in discussing (so far). Farmers want it and are willing to invest. No one wants to be the first to put the baby in the car seat in the autonoumous car. So building the entire stack is a challenge as it does not exist (yet).

Can you transfer a VC. You can’t as a VC is only issued to a unique Identity (person).

While a vehicle has an independent ID, which can have VCs which are tranferable from one person to another.

A ticket is tyipcally issued only to a specific identity (say as VC), which the ticket issuer can make transferable or locked – would be an aspect of the ticket’s credential.

Identities vs. credential vs. connection – the distinction is fuzzy

Farmer use case discussion

Supply chain includes supliers distributers and processors

Farmer has to put data into the system (including personal information and economic records), with no control (vs. VC). Yet grocers have to provide traceability to the farmer for various reasons.

There are use cases.

The easy part of the problem is to envision the future state (end game and the benefits). The hard part is where to start and how to fund it. Farmer level is cooperative non-profit. Figuring out who plays what role.

Before you get to the stack – Running Lean – by Ash Maria – for taking an idea and turning into profits. Problem/Solution fit (before Problem/Market fit) and how are you going to (initiallyl) make money.

The money maker is ideally a tiny slice that pays big (saves costs or makes money for customer)

Value proposition that the client will pay for.

Has a processor that would pay for it (need to refine)

Use the “Lean Canvas”

Verifiable credentils with multiple presentations (e.g. VC contains multiple claims). Or would university issue multiple VCs per student.

No currently facility to update an existing VC once issued. Currently will have multiple credentials.

Potential for VC “set” which is a collection of related VCs.

Frustrating that the SSI adoption rate is slow.

T. Ruff has been talking about VCs for 4 years

Need to understand: VCs and Data Access/Transfer

What is new – the user owns their data and directly controls connections and use

Porting VC to IoT – in context of passive and active identifiers/crentials (was a session during this IIW

All the ingredients are there to day to secure IOT

In talking with a mortgage processor – the ability to have a persistent conection to the borrower and lender. Many potential VCs involved in a mortage broker scenario.

Could reduce mortgage processing from 1+ month to 2 weeks.

Another use case – VCs for criminal record checks for non-profits (primarily a cost at the police level in Canada).

GOOTB – get out of the building and talk to an actual customer. Threshold is a minimum of 20 customer conversations, then validate with another 20 more. THEN you can talk with the money.

Best way to fund is with revenue – pre-orders from customer is very credible

Back to MVP – minimal viable product

Credential Master – volume credential manager at layer 3, based on sales force


Chat:


From RuffTimo : brb

From John Court : Most here in OZ just insist on seeing some recent payslips !

From Debbie Bucci : actually the ask customer to physically produce w2 for 4 weeks ... so the verifiable claim seems to align - if my employer would be able to release ...

From Debbie Bucci : yep

From Dan Robertson (he/him) : And with ZK proofs, that process can preserve privacy much better than the "here are my W2s" model we have now...

From Ashok Dhakar : When you relational database, will it allow to use NoSQL databases as well?

From John Court : Layer 1 - Physical, Layer 2 - Communications, Layer 3 - Session/Management, Layer 4 Application …..hmmm seems to follow a well known pattern

From Karen Hand : Does anyone have a ballpark idea on cost and time to implement a MVP for a simple trust triangle?

From Debbie Bucci : Revocation has alway been an issue ...

From Gabe Cohen : ZK revocations, yes

From Neil Thomson : https://medium.com/@rufftimo/verifiable-credentials-arent-credentials-they-re-containers-fab5b3ae5c0 Timo Ruff credential blog

From Neil Thomson : Riley Hughes (Trinsic) has done two sessions on SSI business Chicken and Egg @ this IIW - recorded

From John Court : I guess that makes it a Bearer VC

From Neil Thomson : Running Lean book https://www.oreilly.com/library/view/running-lean-2nd/9781449321529/

From Will Groah : Always enlightening to hear your perspective, Timothy. We are currently working a the business model aspect of converging VCs with background checks, particularly if cases where the user is paying for the background check. Interested on your quick perspective and/or perhaps offline discussion.

From Vic Cooper : https://www.albertosavoia.com/therightit.html

From Neil Thomson : Technololgy is complicated. You need to get to the point where "you can ignore the man behind the curtain"

From RuffTimo : Thanks Will!

From Karen Hand : For us, we have the relationships and reputation which is putting us in the boardrooms. Has been very important.

From Mawaki : Vic, your link doesn't seem to work.