Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Data entry requires a signing key in order to establish that inputted data has come from an authenticable authentic source. Authenticable  Data entry items are identified by active identifiers. 

Image RemovedImage Added

Table: A hash grid table describing the different states of active and passive identifiers. The states of active identifiers are highlighted. 

What is an Active identifier?

An authenticable identifier used A controlled identifier that originates from an authentic source to identify an entity which that has the capacity to govern. An active identifier cannot be controlled by a passive identifier.

...

Active identifiers are assigned to the Inputs domain. Technical requirements include:

...