Re: Adopting National Identity Card Management Systems with DID Systems

Balázs Némethi

Regarding the deployment of DIDs in today's word this topic will often come up. 
Taking into consideration that the already existing and owned card could provide a layer of authentication on top of other methods assigned to the DID of choice, it could boost the trust level of certain transactions involving DIDs. 

If the card system is already in place it is better to keep it as it is and add capabilities to the DID based next gen service by utilizing the existing card, however, if the two system are deployed at the same time we can, potentially, create a subset of personal data used on the card as a "public" ID that can be used against services without the need for additional consent from user perspective using verifiable credentials. - 

but the more use-cases we hear the better this answer can get 

On Wed, Feb 5, 2020 at 12:32 PM Eric Welton (Korsimoro) <eric@...> wrote:

Taner Durson,

Thank you for the fantastic start.

This topic is near and dear to my heart.  In EU there is active effort to explore DID (W3C DID) and eIDAS integration - I believe we have some members of this mailing list who might be able to comment on eIDAS efforts?

Ultimately I think it comes down to relating credentials on different trust infrastructures using the public-key registration as the point of contact.  If the same public key is registered in two systems, that provides a very strong link between the subjects - whether they are individuals or institutions.  If a document can be signed in two contexts, using the same private-key, then there is a strong justification to "combining" or "linking" those records - assuming appropriate consent-receipt management practices are in play.

I would love to hear more about the specific use case you have in mind - i think that many of us are faced with similar use-cases.

Thank you again for the great start!



On 2/5/20 6:08 PM, Taner Dursun wrote:
Discussing the future of national identity card management systems (NICMS) in the DID era.

Transformations or co-depolyment of existing NICMSs that most of them are providing some cryptographic authentication capabilities.
Or developing usage scenarios for a transition phase in order to replace them.

Balázs Némethi

Join to automatically receive all group messages.