Re: Adopting National Identity Card Management Systems with DID Systems
toggle quoted messageShow quoted text
Regarding the deployment of DIDs in today's word this topic will often come up.
Taking into consideration that the already existing and owned card could provide a layer of authentication on top of other methods assigned to the DID of choice, it could boost the trust level of certain transactions involving DIDs.
If the card system is already in place it is better to keep it as it is and add capabilities to the DID based next gen service by utilizing the existing card, however, if the two system are deployed at the same time we can, potentially, create a subset of personal data used on the card as a "public" ID that can be used against services without the need for additional consent from user perspective using verifiable credentials. -
but the more use-cases we hear the better this answer can get
On Wed, Feb 5, 2020 at 12:32 PM Eric Welton (Korsimoro) <eric@...
Thank you for the fantastic start.
This topic is near and dear to my heart. In EU there is active
effort to explore DID (W3C DID) and eIDAS integration - I believe
we have some members of this mailing list who might be able to
comment on eIDAS efforts?
Ultimately I think it comes down to relating credentials on
different trust infrastructures using the public-key registration
as the point of contact. If the same public key is registered in
two systems, that provides a very strong link between the subjects
- whether they are individuals or institutions. If a document can
be signed in two contexts, using the same private-key, then there
is a strong justification to "combining" or "linking" those
records - assuming appropriate consent-receipt management
practices are in play.
I would love to hear more about the specific use case you have in
mind - i think that many of us are faced with similar use-cases.
Thank you again for the great start!
On 2/5/20 6:08 PM, Taner Dursun wrote:
Discussing the future of national identity card management systems
(NICMS) in the DID era.
Transformations or co-depolyment of existing NICMSs that most of
them are providing some cryptographic authentication capabilities.
Or developing usage scenarios for a transition phase in order to
Join firstname.lastname@example.org to automatically receive all group messages.