Table of Contents |
---|
Overview
Data entry requires a signing key in order to establish that inputted data has come from an
...
authentic source.
...
Data entry items are identified by active identifiers.
...
Table: A hash grid table describing the different states of active and passive identifiers. The
...
states of active identifiers
...
are highlighted.
What is an Active identifier?
...
A controlled identifier that originates from an authentic source to identify an entity
...
that has the capacity to govern. An active identifier cannot be controlled by a passive identifier.
Technical requirements
Active identifiers are assigned to the Inputs domain. Technical requirements include:
- Cryptographic keys. In cryptography, a key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.
...