Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

Table of Contents

Overview

Data entry requires a signing key in order to establish that inputted data has come from an

...

authentic source.

...

 Data entry items are identified by active identifiers. 

...

Image Added

Table: A hash grid table describing the different states of active and passive identifiers. The

...

states of active identifiers

...

 are highlighted. 

What is an Active identifier?

...

A controlled identifier that originates from an authentic source to identify an entity

...

that has the capacity to govern. An active identifier cannot be controlled by a passive identifier.

Technical requirements

Active identifiers are assigned to the Inputs domain. Technical requirements include:

  • Cryptographic keysIn cryptography, a key is a string of characters used within an encryption algorithm for altering data so that it appears random. Like a physical key, it locks (encrypts) data so that only someone with the right key can unlock (decrypt) it.

...