Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Main Goal of this meeting:    Approval of Harms Paper, Progress with IPTF

Attendees: Judith Fleenor Ryan Koble Keerthi Thomas Andrew Slack Bentley Farrington 


TimeItemLeadNotes
5 mins
  • Welcome & antitrust notice

  • Agenda review

Andrew

  • Antitrust Policy Notice: Attendees are reminded to adhere to the meeting agenda and not participate in activities prohibited under antitrust and competition laws. Only members of ToIP who have signed the necessary agreements are permitted to participate in this activity beyond an observer role.

  • Join ToIP if not already a member
    • Consent to meeting recording?
10 minsIntro's & UpdatesAndrew

Keerthi Thomas a new attendee Co-chair of GSWG, I work as a Senior Technologist for a UK Government funded innovation lab. I specialise in SSI especially in implementing and solving real world problems, I am interested in this group because SSI systems are often developed by software engineers for end-users who may not be technically savvy. I am interested in the human angle this TF is focusing on. I really appreciate you.


5minsHarms Paper approvalNicky

no additional comments or suggested changes to text https://trustoverip.org/wp-content/uploads/Overcoming-Human-Harm-Challenges-in-Digital-Identity-Ecosystems-V1.0-2022-11-16.pdf  except that it has an incorrect glossary.

a finalised paper with corrected glossary.  

a short cheat sheet : Practical Steps for Overcoming Human Harm Challenges in Digital Identity Ecosystems.  

Discussion: how to publish the cheat sheet; - Andrew Slack and Judith Fleenor suggested publishing together.

Judith Fleenor commented that both would be published together

Nicky Hickman to add cover sheet and add to template and then ensure that permalinks align, double check 1.1 and change permalink, send both to steering committee, send ASAP.

DECISION: Approved y/n to send to Steering Committee for 24/05 Plenary ? APPROVED following CC meeting is last week May and so send blog to CC for 26th.


Judith Fleenor recommended publishing a blog once approved & published.  Send to SC ASAP.

35minsInteraction Patterns Task ForceAll
  • Since the 1h bi-weekly calls are short and spread we will use this primarily to feedback on work done and to hold wallet walkthroughs. We will also have a weekly Friday co-working session to try and gather some momentum on the work.
  • If anyone wants to join these calls please drop a message/line 
  • Judith Fleenor commented that FIDO have done a lot of work on IP's for passkeys - connections at IIW to support IPTF.  https://fidoalliance.org/ux-guidelines/
  • Collaboratively define some scenarios which can be used to identify patterns Andrew Slack so far have been looking at archetypal use cases, but want to be very specific and really test the patterns to consider something real and grounded for different types of users.  Will help us pull out more obscure or contextual patterns.
  • Bentley Farrington we're being too generic at the moment, so tricky to get to specifics as to the actions of different actors.  Look at specific scenario's, contain scope to wallets, but hypothetical use cases to real-world scenario's allows us to develop user objectives and scenarios. Will give us more material to work with.
  • Judith Fleenor Attraction Pass TF - new chair also on hospitality TF at DIF for use cases across the entire traveller journey.  Kabir Maiga, is the new chair of the Attraction Pass TF, you might want to reach out to him on Slack, and see where your objectives overlap.
  • Andrew Slack Traveller journey in EU consortium traveller groups, Ryan Koble had a great example last week for a context that he's working in.  

In this call, are there others that any want to bring to the table?  Scenarios which create interactions or patterns that we're not used to.  e.g. no QR codes!?

In person and remote actions e.g. in air traveler scenario, travelling with minors / children and introducing guardianship

Keerthi Thomas commented that he would put in some of the use cases he's working on. EG drone pilot use case, had a human angle but other use cases e.g. in context of supply chain.  Right now avoiding enterprise wallets.  But definitely returning to this.

Nicky Hickman suggested looking at a coming of age IP, e.g. become personally liable for their own data.  In HX is a rite of passage, in governance requires different applications of policy.

Keerthi Thomas recalled 'redbook' conversation, is in UK assigned to every child, records vaccinations and health milestones.  Especially important for those in care, until 16 years of age then transferred to ownership of individual.  What Keerthi implemented was also family artifacts including photo's especially.  Included handover of care from social security worker who acts in the role of the guardian, is constantly changing.  EG Birth certificates as credentials in the wallet, how are they transferred from 1 social worker to another; (Multiple guardians).

Andrew Slack agreed needed to be examined.


Nicky Hickman also suggested looking at death of the individual.

Keerthi Thomas commented, guardianship for those w/dementia, also guardianship for data about a deceseased individual?  Handover of controller, no facility at the moment for multi-party control.  This is where KERI can play incl. key rotation

Bentley Farrington also commented non-human use cases e.g. animals/ pets, fewer legal frameworks make it interesting challenge.

Also interested in self-attested credentials e.g. within self-organizing social groups.

Ryan Koble Migratory farm worker scenario's will consider.

Andrew Slack commented IP interesting w/ different ecosystems credentials attempting to communicate. e.g. different languages

all please update those patterns in the Miro board, otherwise in Friday sessions we'll start expanding on those and walk through tasks to map the patterns.

`