-
Notifications
You must be signed in to change notification settings - Fork 6
identifier system
a system for uniquely identifying (public) identities
The International Standard Name Identifier (ISNI) is an identifier system for uniquely identifying the public identities of contributors to media content such as books, television programmes, and newspaper articles. Such an identifier consists of 16 digits. It can optionally be displayed as divided into four blocks. More info on Wikipedia page
- Completeness. Every unique object must be assigned an identifier.
- Uniqueness. Each identifier is a unique sequence.
- Exclusivity. Each identifier is assigned to a unique object, and to no other object.
- Authenticity. The objects that receive identification must be verified as the objects that they are intended to be.
- Aggregation. There must be a mechanism to aggregate all of the data, and only that data, that is properly associated with the identifier (i.e., to bundle all of the data that belong to the uniquely identified object).
- Permanence. The identifiers and the associated data must be permanent.
- Reconciliation. There should be a mechanism whereby the data associated with a unique, identified object in one resource can be merged with the data held in another resource, for the same unique object. This process, which requires comparison, authentication, and merging, is known as reconciliation.
- Immutability. In addition to being permanent (i.e., never destroyed or lost), the identifier must never change (
- Security. The identifier system should be as little vulnerable to malicious attack as possible.
- Documentation and quality assurance. Protocols must be written for establishing the identifier system, for assigning identifiers, for protecting the system, and for monitoring the system.
- Centrality. The subject's identifier is the central "key" to which every event for the subject is attached.
- Autonomy. An identifier system has a life of its own.
By (@henkvancann) based on this source
KERI is an thin-layered identifier system generator, offering globally portable identifiers, secure attribution to their root-of-trust, and chained verifiable credential containers (ACDC) to them.
Verifiable Credentials (VCs) and the emerging role of the LEI: Verifiable Credentials are digitally signed credentials that are not only tamper-resistant but capable of being verified in decentralized manner. vLEIs are based on the Trust over IP Authentic Chained Data Container (ACDC) specification (based on the Key Event Receipt Infrastructure (KERI) protocol (github.com/WebOfTrust/keri), both Internet Engineering Task Force (IETF) draft specifications). Verifiable Credentials are digitally signed credentials that are not only tamper-resistant but capable of being verified in decentralized manner. vLEIs are based on the Trust over IP Authentic Chained Data Container (ACDC) specification (based on the Key Event Receipt Infrastructure (KERI) protocol (github.com/WebOfTrust/keri), both Internet Engineering Task Force (IETF) draft specifications). More info on GLEIF site