Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials

"Hart, Charlie" <charlie.hart@hal.hitachi.com> Wed, 03 August 2022 15:48 UTC

Return-Path: <charlie.hart@hal.hitachi.com>
X-Original-To: scitt@ietfa.amsl.com
Delivered-To: scitt@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 5C17FC147920 for <scitt@ietfa.amsl.com>; Wed, 3 Aug 2022 08:48:44 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -6.906
X-Spam-Level:
X-Spam-Status: No, score=-6.906 tagged_above=-999 required=5 tests=[AC_DIV_BONANZA=0.001, BAYES_00=-1.9, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_HI=-5, SPF_PASS=-0.001, T_SCC_BODY_TEXT_LINE=-0.01, URIBL_BLOCKED=0.001, URIBL_DBL_BLOCKED_OPENDNS=0.001, URIBL_ZEN_BLOCKED_OPENDNS=0.001] autolearn=ham autolearn_force=no
Received: from mail.ietf.org ([50.223.129.194]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id SoucKW29lxKp for <scitt@ietfa.amsl.com>; Wed, 3 Aug 2022 08:48:39 -0700 (PDT)
Received: from esa.hc514-86.ap.iphmx.com (esa.hc514-86.ap.iphmx.com [139.138.45.249]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 28A50C15A73D for <scitt@ietf.org>; Wed, 3 Aug 2022 08:48:38 -0700 (PDT)
IronPort-SDR: mlhswbI79JfpLWoXx+Nca1J3UNklzq7Tr1iGlFIGF7hipS1tiLVBVOsYT4VDWxojpemOx3zBd+ zVJkkQsCrjjYcBOPYCNztXM0SJB8g27eJNE7oFOxOEvbQ92Wbebay18aBfPVeTEYp7Z2/fcZ0d 7VtHmTYyxSVziLs0tpFtLbePMKCqpnQ8x+CmO1vkDtLBE0J3adS/k4z56Oh6cb7NCl8N4GXgUw 7LGlQ04FfhFOMhJO+XR3gNAoO/RstGHBmxqcU5ZJNb+aDCwCJ/51uBm+k9uzSrKIsl47Qb5GMS 1Ik=
X-IronPort-AV: E=Sophos;i="5.93,214,1654560000"; d="png'150?scan'150,208,217,150";a="122167119"
Received: from mail-tycjpn01lp2172.outbound.protection.outlook.com (HELO JPN01-TYC-obe.outbound.protection.outlook.com) ([104.47.23.172]) by ob1.hc514-86.ap.iphmx.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Aug 2022 15:48:35 +0000
ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=Kgi4r8Te2gQLGCiuPB9vjHSZ91hQs3Na2N/N7IRYiA79mLMZfLzlBpiuMhVOUZeWEJTtU4yoh6QaxjxouunqxoPcKvBfnoYfMPnGRFtv37PRVXuHdyd3WRwMBJ+dSETKTSz4J49plWHEtLod5uzwwJLt4OFe5L3s0BM4DuCYz3Gr9ri7Kmc3vhdtmZEKKTa09DIHDpjyWUIT5wZIG7w3G4IqRV7AhvKLxzJ/RbsgTWaKU/piuYMmvXvWUNpebuy2DxhZOrFIvnp3On//4bqCJ8FU/lGXPpHAZ1UHlzQOMHvxAkHcxkLoRrvFKh2H85Sh5YMv2bMSI9JntD4T2RR2/w==
ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=g/qB82TGDBQeQwWYl+ouHJlJzVG9oVb2zDsS5E4xQN8=; b=lTsFqBHkj3sNkF+odVBzJgmE8T6NKmkbliolv2RFZDppwgH4xv/lrdtCHzKYeFsViPTfVvMq5Z3OF7nNSqOpfqGrAtJ4mc2HZxtKuOn7SJVdnI8HB/+VBaQ0SavXpZf1xXBOQ61QnoTBa31Q8Bxs2wsxoQHfBxov5EJKlWHMOGZzkFiU0c1/7a5ApjIAO9VpmcF6qFzn+gk9LB8F49gX0bacWiRaa2AcLUMNrHYL/IiKAPUpXNATC+EA/FfxKy5I2zCg8Lbji8KlwZCw3m1qLh600XJfKgBeRc6mwoj7piQrJAFTbv4GZcQmFoXqPn6Wf3ZlRFWQitkxHE2i1KLwoQ==
ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=hal.hitachi.com; dmarc=pass action=none header.from=hal.hitachi.com; dkim=pass header.d=hal.hitachi.com; arc=none
Received: from OS3PR01MB7527.jpnprd01.prod.outlook.com (2603:1096:604:14d::11) by OSZPR01MB8220.jpnprd01.prod.outlook.com (2603:1096:604:1a5::11) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.5482.12; Wed, 3 Aug 2022 15:48:34 +0000
Received: from OS3PR01MB7527.jpnprd01.prod.outlook.com ([fe80::1d32:1f65:2fde:7234]) by OS3PR01MB7527.jpnprd01.prod.outlook.com ([fe80::1d32:1f65:2fde:7234%7]) with mapi id 15.20.5482.016; Wed, 3 Aug 2022 15:48:34 +0000
From: "Hart, Charlie" <charlie.hart@hal.hitachi.com>
To: 'Orie Steele' <orie@transmute.industries>, "dick@reliableenergyanalytics.com" <dick@reliableenergyanalytics.com>
CC: 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org>, "scitt@ietf.org" <scitt@ietf.org>
Thread-Topic: [EXT]Re: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials
Thread-Index: AQHYps+odH19N95Hn0qaR6Hr5hWLgq2dIpOAgAAEUQCAAATUgIAAJ28y
Date: Wed, 03 Aug 2022 15:48:34 +0000
Message-ID: <OS3PR01MB75270FA0BFF65C76B2AD2D58D19C9@OS3PR01MB7527.jpnprd01.prod.outlook.com>
References: <CAN8C-_K-w5QQqrZDS9VH2-gzOO9e+HS8b9nGvG+ZBjJ-PM-MCw@mail.gmail.com> <LV2PR21MB3350154C13FA8A6F9D940FA79C9C9@LV2PR21MB3350.namprd21.prod.outlook.com> <13e501d8a738$1b277ed0$51767c70$@reliableenergyanalytics.com> <CAN8C-_JvDwS4CTBJMm9YN8jdXnLATPg0j3xO5BFs+yraWZc2Yg@mail.gmail.com> <144801d8a73c$adb8dec0$092a9c40$@reliableenergyanalytics.com>
In-Reply-To: <144801d8a73c$adb8dec0$092a9c40$@reliableenergyanalytics.com>
Accept-Language: en-US
Content-Language: en-US
X-MS-Has-Attach: yes
X-MS-TNEF-Correlator:
msip_labels:
authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=hal.hitachi.com;
x-ms-publictraffictype: Email
x-ms-office365-filtering-correlation-id: 7fb0f72b-fe34-407f-f662-08da75679f56
x-ms-traffictypediagnostic: OSZPR01MB8220:EE_
x-outbound-auth: hmi5pk8xKUiLsPJx
x-ms-exchange-senderadcheck: 1
x-ms-exchange-antispam-relay: 0
x-microsoft-antispam: BCL:0;
x-microsoft-antispam-message-info: arXRVrVcoz6v8ygc586UjbGd7AqPTUKyR+MAUxAUmxMUyxmokdniMLGSptzw0qrTiPNfXmLnAYYQtCS7YOy/5kaOfONbGFYtdJgwB5QBnsWA8Trb8AaZXSsp1L4q2HMPPQ7FT2MIKgjsQI+UMVKECyTaHM94cM0XLRpFpscmHCp0E0oVdh+IJIz6z+9ADZQtCOrvumPPM278fMZYuiUbCv/7Jsyhj5N7BqCwvhjMUnQFQ1R0w5zbAv1jPU5udCwUoFGEr0Ea36qOyLW26POzViCSfbseWNtly54f7VcHYESUnehS3X4uNZD1tIZt0yxfK+otS1XAbZliR/0JFe2wIrJJjbqb3m4ldifv6vmZv7TI9RLDPwIx8zbRd6FwrSgzcJrEWrxXWRnEJuGHCYtEKHZ71ehbiSw+c4A0PLCv51BfReKmrzsE1KJ/VdNoMqord+6UQ1nYa2voaF+TDx4UuObNwktckFPlaYDyB9sPC+YTt4ETrtFU9gbnw40J1PizpMaM4a3rGmML74mFleY6oU26ctw+q7xtMVTJTW3yYw4/9nDDevXEfDea1URbFxcJa1OLaXzcsfCPUNkZhpNHzm1bM5C94NdB8Fj4FST2MgwBYYcofVCJe6dBMyFADray3j4H1S54spuqeYBPSBrmn5Cu58IT8G15mVQyFcD+DsTft6HQKwKeVRH03XpckSXwXFga7aVyd/igdfM6QOIqZEdTAvLL0TyNUF9nHjB+3UaaQeyrkUhUg9suwGuqVK+xTCzdE3yfUFokKKolW2eSJhkxA4LorM5IzYldbsatnSnJeJ8Z65r3dksgsqAw6VmtXxG1Hzwq4PlA2PmxlrcFTQ==
x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:OS3PR01MB7527.jpnprd01.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230016)(4636009)(136003)(366004)(396003)(376002)(346002)(39860400002)(91956017)(5660300002)(186003)(64756008)(83380400001)(52536014)(40140700001)(4326008)(66446008)(66946007)(33656002)(8936002)(66556008)(8676002)(76116006)(2906002)(19627405001)(66476007)(478600001)(19627235002)(166002)(71200400001)(53546011)(26005)(86362001)(9686003)(110136005)(55016003)(41300700001)(966005)(7696005)(54906003)(6506007)(316002)(38100700002)(99936003)(82960400001)(122000001)(38070700005); DIR:OUT; SFP:1101;
x-ms-exchange-antispam-messagedata-chunkcount: 1
x-ms-exchange-antispam-messagedata-0: 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
Content-Type: multipart/related; boundary="_005_OS3PR01MB75270FA0BFF65C76B2AD2D58D19C9OS3PR01MB7527jpnp_"; type="multipart/alternative"
MIME-Version: 1.0
X-OriginatorOrg: hal.hitachi.com
X-MS-Exchange-CrossTenant-AuthAs: Internal
X-MS-Exchange-CrossTenant-AuthSource: OS3PR01MB7527.jpnprd01.prod.outlook.com
X-MS-Exchange-CrossTenant-Network-Message-Id: 7fb0f72b-fe34-407f-f662-08da75679f56
X-MS-Exchange-CrossTenant-originalarrivaltime: 03 Aug 2022 15:48:34.1380 (UTC)
X-MS-Exchange-CrossTenant-fromentityheader: Hosted
X-MS-Exchange-CrossTenant-id: f54277c9-dafe-44aa-85a4-73d5c7c52450
X-MS-Exchange-CrossTenant-mailboxtype: HOSTED
X-MS-Exchange-CrossTenant-userprincipalname: dsLcGKMt3rx/4REuyqtK3emnPtZaAj3faGecGQ14y9OLK4z7uLFS24c06QVLs81ziu2bPTChKKDwXcYmQYmZqx8sd6ycSz3eoSUyUwCX4B8=
X-MS-Exchange-Transport-CrossTenantHeadersStamped: OSZPR01MB8220
Archived-At: <https://mailarchive.ietf.org/arch/msg/scitt/Z17WtUzQrr1UM4_lNovayrp1S_g>
Subject: Re: [SCITT] [EXT]Re: Endor: A SCITT PoC for W3C Verifiable Credentials
X-BeenThere: scitt@ietf.org
X-Mailman-Version: 2.1.39
Precedence: list
List-Id: "Supply Chain Integrity, Transparency, and Trust" <scitt.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/scitt>, <mailto:scitt-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/scitt/>
List-Post: <mailto:scitt@ietf.org>
List-Help: <mailto:scitt-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/scitt>, <mailto:scitt-request@ietf.org?subject=subscribe>
X-List-Received-Date: Wed, 03 Aug 2022 15:48:44 -0000

Thanks Dick. That is really helpful for SCITT a lot of related projects I am working on.

Charlie
________________________________
From: SCITT <scitt-bounces@ietf.org> on behalf of Dick Brooks <dick@reliableenergyanalytics.com>
Sent: Wednesday, August 3, 2022 9:26 AM
To: 'Orie Steele' <orie@transmute.industries>
Cc: 'Steve Lasker' <Steve.Lasker=40microsoft.com@dmarc.ietf.org>; scitt@ietf.org <scitt@ietf.org>
Subject: [EXT]Re: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials


Orie,



Here is a high-level overview of the authentication mechanism and tracking used today for OASIS, inter-tie electricity scheduling.



Everything starts with the NAESB registry (EIR); https://www.naesb.org/pdf4/webregistry_mo_registration_quick_ref_guide_v1.0_0417.pdf<https://secure-web.cisco.com/1IukwuhEQqregcVfBu_YTf7qloyu0S9CLEMvuw998GuhDfEFcipDth2Xtizyt11QWJE_rg9tKWNdFy9sR6AYzFs5C9RVZkYIdTyO90iI560dk7KjlRPsssiji4ni2uFgQoviKwbEitz9W0A-Jkx8qlZ-bf02dT2GpXl7-qqNgMCReV-n9bPYr7-gF7wRDuDdEpNTctYLkQFh_ODy3F4KcLc2yzJA66rSl-AObqSJo6LSNwG5QHs27-jxMPvsyvzy25FLEf6Q2NCVCA80ajyeRx-DLlAeVOtx8sKKHCAdqS60vvgk6XONNeacK9KVifmF7/https%3A%2F%2Fwww.naesb.org%2Fpdf4%2Fwebregistry_mo_registration_quick_ref_guide_v1.0_0417.pdf>



Entities involved in inter-tie electricity transactions must register with NAESB’s EIR, see link above.

The registration process requires a party to obtain a NAESB compliant X.509 certificate from an accredited certificate authority (ACA); https://www.naesb.org/pdf4/ac_authorities_2022.pdf<https://secure-web.cisco.com/1T_py857nSLdfkwTRZ1F7IUeOLa0Mr0av8bfeuUJwVfOrnlR9B8EzOzxv92Uz4iu2yhDeR4WKL_eKK39aC0HZNHbI0L6S2ynYyf3MIqoWrhcKic931Qc8ha00DiNeKcev3mIQGWSdmm3oQWFZZeYhZ_XBpcojw3HL66SqprENJXYRuXx_69m7-vIbXr6m_muJ25A0-WOODvl0ZvSKLB5bCCNQHy8CETUnFlhi7KK4XlPGw6ngc0NPELIFd66qeSsonDSqajtS6_XsVDeQZ9afWewRkWRR2CS3RPxKELdvgtWbTLdNUMEo_OVauUoZUAaf/https%3A%2F%2Fwww.naesb.org%2Fpdf4%2Fac_authorities_2022.pdf>



Entities use their digital certificates for identification in OASIS; https://www.naesbwry.oati.com/NAESBWRY/sys-index.wml<https://secure-web.cisco.com/1K2p4qEguxjMHN9-wdAstRzAre5VeA0Zed0mvgfndElWXB3ORaiJPQc8AT7JJNrTMjapfMno_fFQCf0Y62gyPgnjQbEmdVMFYieaur2q043F0tN564aUJcAdmTBs4wbQV9V3zBPE-_4E3LKMveTRd4EEA3R0FVZKKh4vLBs4hzSu8wqJmm85OMK7l0hlniB0BYAgK4rRAKxGyo9m2gQbGh64ogBMsxFwFgbsiArp0Y6fdpXW0-RGp2kcNruYE4OtklUzkSHLHYNwG_4xj3QZVT0CcrM1parwb_zHxkQwcXBjyXQwqawaXGq5azf6Ymysk/https%3A%2F%2Fwww.naesbwry.oati.com%2FNAESBWRY%2Fsys-index.wml>



Inter-tie transactions are scheduled and tracked, using an E-TAG; https://en.wikipedia.org/wiki/NERC_Tag<https://secure-web.cisco.com/1jg0PAl4xaAUqdpMj0XlwOYUgtyWJ8AEDByMI06i_FhGx7hBsVedp3De0cfsLDJrOWQk0OpLsHA-LZhek33mGBHnd1yGGQeO7gyBdmpJ8iJUh1jEMhZRFRhVJl0de4TxzOc-JCGbVPgYXa-8-oyvGUdvqCL1u0riyE5i35ZXxhgFrK5jS167ftdpGerze8DpFzv01q-lfBzQY3KxMikI7Aq599QaeahZrP9NaHPsunaoGrxrKD2WGOgLGAbiIogZvwqD6F-rbN2lIbrdeJZSVYw42P3L69rJ7XlgeaYjhgkVyPIJ1HC1whjq-NLkd-N0k/https%3A%2F%2Fen.wikipedia.org%2Fwiki%2FNERC_Tag>



E-TAG’s are used to “connect the dots” and settle transactions that flow across Balancing Authroities.



Hope this helps.



Thanks,



Dick Brooks

[cid:image001.png@01D8A719.8E73E2D0]  [cid:image003.png@01D8A71B.24F12A50]

Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership



Never trust software, always verify and report!<https://secure-web.cisco.com/1uy0clDWHgs8Om4IdyHuQzeSluoA8y61U3xQt6svGk4U9mgvOzG2j87xdGPNZwfL_6NeZLyvs2RtDXbQkJ-uy5FySOKYDraC9BCS46sTnuZZuNABtffYE50uYM3Wm6rGdSXPbIPyLIo1S9U5eKgRY62SvXzyvZStiEIy-g4zrHrqiwoZ4G2AfwJHqEMJbnR-Z8wwwLfANn8naHWq7IhHtieZojGBeisJx2LyDGehov7fBpcHgRQuNF-I-Idh5jB6CnEp4puLs01qMMVa-dVd11j8FHVTLpLcooV6gqqaabRENW_QqNKXvWegEhvV1Ow4u/https%3A%2F%2Freliableenergyanalytics.com%2Fproducts>http://www.reliableenergyanalytics.com<http://secure-web.cisco.com/1GaJ6l5AOFj6kxiBsMksWncl4vuiZ-pUmsWTXCh5o60xFuI9fXHdmN1JPI17VWNKtRAJykdCd5QOfGdmalJsZes_8gztMRvB-TvoYWb6WOAm14Usouk0VNKr4H31T9BT5T0w1SnOo7YCh-3jVo0P2A80_8zELCxl4Ngnjzy7TfQm5dwNV_k8eKhiVi6wwvKSudLmuLC5ig0f-n4vQfqd3zlefh4egnP1zyrbhWoo50tuzH3ceMULrOjDHUs9QVKGe8Q74awwW_o1b6KYbqOP7Z8sQrpBMjf_ClYd-WXRlq6NNIXX0Ncd2niPfogZIcU6Y/http%3A%2F%2Fwww.reliableenergyanalytics.com%2F>

Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>

Tel: +1 978-696-1788



From: Orie Steele <orie@transmute.industries>
Sent: Wednesday, August 3, 2022 9:09 AM
To: dick <dick@reliableenergyanalytics.com>
Cc: Steve Lasker <Steve.Lasker=40microsoft.com@dmarc.ietf.org>; scitt@ietf.org
Subject: Re: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials



Thanks!



I am interested in applying Verifiable Credentials to energy use cases, even if we don't have customers in that sector today.

The calls are open (https://github.com/w3c-ccg/traceability-vocab#meetings<https://secure-web.cisco.com/1HgK84MRR4bzXYAE7Niaeb8pYlkoyIfmiR0g4Dwj3DQJAh8OlSJW5p7TckF_9U5dHGeGuxJhuDgslYxAZNOsxcRUvIxstDWa3DOjtKeNjD-_Hps6IsgjIJjvkoJM6z6RXWAtxjfWtD3HV63XpkV_CEsvexRY-o5lFOUDFBoLvOST5pm3bbQJt3vdY1-67GIT9kXmrMYnnWWXvjuDcZkNODE1fmxIV1SYT7tQT9JveadGh5Z92HkOF2nqx92HaLeF53pxMJ1kYS8DiFQiewlQiLm9iNH3U9ZkX9n0d4hCRmD8Sp062hKxDB9F-2b8UFejS/https%3A%2F%2Fgithub.com%2Fw3c-ccg%2Ftraceability-vocab%23meetings>), but fair warning that most of the work happens on github async, and we usually just process issues and PRs during call time.

There are also aspects of Verifiable Credentials that I believe are relevant to the structure of endorsements / receipts:

The concept of "evidence":

- https://www.w3.org/TR/vc-data-model/#evidence<https://secure-web.cisco.com/1q-6jNVM6JiTVpXBQDNrSw3REGqFIliEx86xQ3m1hKtfX38eVvCRSGYTej4K2SK8mdFcn2JqBZgNoMPS_rcXVBpyF1l5PmPOoFcCN-jmLI5CobgwDRSgnNTCovBIYUYq-zsaSmiiEAjGR8kgswrCi8csy-ZzBotSGM-M-GgM63-EeON2WUp7tplgZcM0drfvbvSkPmJNyhQ7IVz_JWZxPH45UgBXDwg3rEsIvPQjU2jV8dtlLOSr9PG4zRhRFcn9AsvFV6OrKVwmbgHSCHZuRW-k3T397qO__A7xJXOWprvooFuCc9y3ROkMuPUf12DNw/https%3A%2F%2Fwww.w3.org%2FTR%2Fvc-data-model%2F%23evidence>
- https://datatracker.ietf.org/doc/html/draft-ietf-cose-countersign#section-3.1<https://secure-web.cisco.com/13CILjI0celZHQgVsa-DDsoLq4Y6By6DHs7W3LY0H0AaoPvolfKPwURAqZMWPsqbcYMf_kWUKJ-sA8NLPu8wziluBz0l68B1CFniaOfUMqbMnF6C6XI8csVpayR5nSduP0DzdtYVrex3bRpGSYyBCgbFgdA9HbqgX48TPfCCsHHqaKMfCgJpqP1qqkn_Rvw8fRnwCncrbvhrPVrZR2672B85djLFYzQp6QkfNZLX2m7CyYa7EPkxXYtqpqrgKQ86Yl61tsyZjFCIlMY3qaHk_-T7iJ8rYjvtEwV0uGSDPKFXIQ-beS1aVt3d7utZHCYYa/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Fdraft-ietf-cose-countersign%23section-3.1>
- https://datatracker.ietf.org/doc/html/rfc4998<https://secure-web.cisco.com/17DAGq2foFEYXkhjzWI_n3yyo-dU8HMigJwlon4x4SGlq2nwnPypo_SZZqn_HVrT0rymuTwcEF4muUKWKqsOGLkvOVa-LFd_al2zZ_lLftgtmhzFQhRFS7caOQJT0nf29VQs3woHnI7EoIfq1qF_87Py293jXAOIKL085OwcNuJbugCi46HG7Aoa0iPHiyavETuibYIlyB9E0dX9ck-eC39YMnZLGZAbf_U_zNKqeI-AYJbaKiKSYOMap89Xfp9wsrscC0zBwrQyJbQeJeX0W6bmWhWAyUuBgeHltrwzsA_eV6OT02qMLpg525iRIanpK/https%3A%2F%2Fdatatracker.ietf.org%2Fdoc%2Fhtml%2Frfc4998>



As one example.

I am hopeful that the next version of the Verifiable Credentials specification can point more directly to IETF RFCs to make its arguments,
even if the json data model can't be updated to support CBOR / COSE as a first class citizen this round.
Perhaps the next charter for that WG might support this better, if we pave the way with examples.

Regards,

OS



On Wed, Aug 3, 2022, 7:54 AM Dick Brooks <dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>> wrote:

I agree. This paper by Orie, Michael, Brian and Mahmoud is very useful as guide for terminology and semantics.



I can provide the authors with a description of how we track electricity transactions for inter-tie scheduling, called OASIS a NAESB standard, if interested.



Thanks,



Dick Brooks



Active Member of the CISA Critical Manufacturing Sector,

Sector Coordinating Council – A Public-Private Partnership



Never trust software, always verify and report!<https://secure-web.cisco.com/1uy0clDWHgs8Om4IdyHuQzeSluoA8y61U3xQt6svGk4U9mgvOzG2j87xdGPNZwfL_6NeZLyvs2RtDXbQkJ-uy5FySOKYDraC9BCS46sTnuZZuNABtffYE50uYM3Wm6rGdSXPbIPyLIo1S9U5eKgRY62SvXzyvZStiEIy-g4zrHrqiwoZ4G2AfwJHqEMJbnR-Z8wwwLfANn8naHWq7IhHtieZojGBeisJx2LyDGehov7fBpcHgRQuNF-I-Idh5jB6CnEp4puLs01qMMVa-dVd11j8FHVTLpLcooV6gqqaabRENW_QqNKXvWegEhvV1Ow4u/https%3A%2F%2Freliableenergyanalytics.com%2Fproducts>http://www.reliableenergyanalytics.com<http://secure-web.cisco.com/1GaJ6l5AOFj6kxiBsMksWncl4vuiZ-pUmsWTXCh5o60xFuI9fXHdmN1JPI17VWNKtRAJykdCd5QOfGdmalJsZes_8gztMRvB-TvoYWb6WOAm14Usouk0VNKr4H31T9BT5T0w1SnOo7YCh-3jVo0P2A80_8zELCxl4Ngnjzy7TfQm5dwNV_k8eKhiVi6wwvKSudLmuLC5ig0f-n4vQfqd3zlefh4egnP1zyrbhWoo50tuzH3ceMULrOjDHUs9QVKGe8Q74awwW_o1b6KYbqOP7Z8sQrpBMjf_ClYd-WXRlq6NNIXX0Ncd2niPfogZIcU6Y/http%3A%2F%2Fwww.reliableenergyanalytics.com%2F>

Email: dick@reliableenergyanalytics.com<mailto:dick@reliableenergyanalytics.com>

Tel: +1 978-696-1788



From: SCITT <scitt-bounces@ietf.org<mailto:scitt-bounces@ietf.org>> On Behalf Of Steve Lasker
Sent: Tuesday, August 2, 2022 8:21 PM
To: Orie Steele <orie@transmute.industries<mailto:orie@transmute.industries>>; scitt@ietf.org<mailto:scitt@ietf.org>
Subject: Re: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials



Very cool, Orie.

Love the sandbox experiments





From: SCITT <scitt-bounces@ietf.org<mailto:scitt-bounces@ietf.org>> On Behalf Of Orie Steele
Sent: Saturday, July 30, 2022 2:08 PM
To: scitt@ietf.org<mailto:scitt@ietf.org>
Subject: [SCITT] Endor: A SCITT PoC for W3C Verifiable Credentials



I made this today:

https://github.com/OR13/endor<https://secure-web.cisco.com/1JdHGvnoZNb-fsV-unMzNkw21OKT7rRYo5H60Wa4K-Q4p7fB8jPlLTjzltfaxYOFnI68iv9RdZu4eeZzCvslBoPZThRfqgjbkIpAc_QAmXII8wXvclTmJp1PwWBck7W8vUKCgPgTPKwAgR4azwJsBLeLGe7E_NyiTmvg20gtS7omF01B7xzwXNs2jk4HRv9cwHQUOknpcyXaDoXN69mDdag7A6KlfSI3EnnlDQtYrlaKovDQmzajAmTkxfuCfWTP_pf0IHh1ylWT3YFkVxRBNLDyDNrCvdIUdSvpseyxcBy2VV7YxaRLm7g0FGZCbhIv6/https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fgithub.com%252FOR13%252Fendor%26data%3D05%257C01%257CSteve.Lasker%2540microsoft.com%257C79cb3d326bec41bf51ac08da726fb0f1%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637948121310174010%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DGdRRD0aMpzOJQIcqCyhajcz2NXRZH4irlRR31FFausk%253D%26reserved%3D0>

As it says in the readme, this is just a toy example I made up to experiment with.

The nice thing about endorsing W3C Verifiable Credentials is that they are already an abstraction that applies to "non software supply chain" use cases...

For example, we model cyber physical supply chain flows using them:

https://w3id.org/eability<https://secure-web.cisco.com/12vv3ms4fQAlyFEE4k1zPXuwNVQhbw5JZJG1gBL6pcqttkVpsiI3zrO00D8muCuDxuryJz9JNlTjNav5jhFZwmrDOzf2g002uvnOa4j5zplIUKqg9fIr9y-JZ4w5q4mXJXza6z62EHNy6BzBsjPIluYavv0fR109auX6z1titrQhnW1fmk_usfbPqwJgY780ZABU5QTV12sZSiHaInC4MzZokObYCrnulteZlYaIml9emeQtOkK5mYExh0HK13aas-6VpgxE3PbRyBO3h9W_wUt3BpoaWT0QrjMaAM3NSTsiDsayitR5Pm48JR4E_wr_U/https%3A%2F%2Fw3id.org%2Feability>

There are a number of organizations looking at oil and gas, steel, ecommerce, and agriculture supply chains.

Often they will share some common trade documents such as Bills of Lading or Commercial Invoices.

These are examples of "SCITT Artifact Types" which you might expect to see across various distinct supply chain use cases.

However, as is the case with Oil and Gas needing to account for fluid dynamics, and software needing to account for compilers, build servers and various source files, there are cases where you may need to model components of a supply chain with Verifiable Credentials that are highly specific to the use case.

If you can tolerate modeling in RDF, W3C Verifiable Credentials come with a built in abstract data model that integrates well with existing industry ontologies such as:

- https://www.ebi.ac.uk/chebi/<https://secure-web.cisco.com/1xFJzJsWalPbOckWorQVNuB3cCxcqr_4Pnqdh8BSqQrkm5N_-bHyC7w5_vXmkyt3-yiVfIj2Taw61Ngm4aT3AjD2Qv9jcxLAp632sCb0f7Z5opQ1IopQYFh035H3GJnum5M15fE7-kYGBh8eU24y4DJKQAGfZ6-2bMGAFBVdqq-7OCluOKHpJ7klc1xO775JEUod25j8sSRq32VCH023VBaqj9QgsfC-48IxN6LcJbg6jK3GgYWuUW9etiMl5z6YA0zskfxChMC6yEEFi8jPu3jPIy1SKm5Zu3HDbk7_-aS_gzJ-Kg45rGJrtq0L6Yh9Y/https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.ebi.ac.uk%252Fchebi%252F%26data%3D05%257C01%257CSteve.Lasker%2540microsoft.com%257C79cb3d326bec41bf51ac08da726fb0f1%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637948121310174010%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DbXykuDkWeLmveTLjWO5zepwu20MQ5H8LIcQJyCaKN%252BM%253D%26reserved%3D0>
- https://qudt.org/<https://secure-web.cisco.com/1wTZmUTRG0X-fSLt6dzZoQCNorRuSvOgI2Zkd9g1PT-Iict4ikGg0GMZvBAIgZsC1maaOAyMgHegWdFG3dXEcQrYKnrjpiOl7OWCtiRGcjVJC4W7PiyfkrkoEDMc-WVzXjqIc3RTjhCVEO2Hy1KcH5Xg8lqTshdNo9NGPllnHT63UctpLAAQ4N8tGBMfu3q7YUicxI0zcgap8yD60I8HL33SfI2MFnr2DphA42faHPK6e5mePI5N1MZuhmdt3ou2MvF4zqUj9xhZGwb3nRkquaaObQFWXt8G-nog2o8iwaQFLpUTsPJbOJlpOLnLalkAL/https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fqudt.org%252F%26data%3D05%257C01%257CSteve.Lasker%2540microsoft.com%257C79cb3d326bec41bf51ac08da726fb0f1%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637948121310174010%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DQOs%252F5MIMJSm%252BkqzHSSxV6MtsA4mOIzanJ6Vwtpl4NO8%253D%26reserved%3D0>

My main complaint against W3C Verifiable Credentials is the limitation to JSON representations, if we could represent RDF in CBOR, we would have the best of both worlds with the main remaining disadvantage being the namespace overhead inherent in RDF.

If you drop that, you will likely need some registry or algorithm process for handling collisions and interoperability, but there are various solutions to those problems.

If you feel I butchered any of the concepts or terminology, feel free to yell at me here or on github issues, as I said, I made this today, it's not reflective of actual SCITT architecture, it was just to explore the space.

Regards,

OS




--

ORIE STEELE

Chief Technical Officer

www.transmute.industries<http://secure-web.cisco.com/1Pqu2CqEyHo4isckQh51PNnQ8tUbRhJ7fbWyn-w7XWT8mKjJG9jHB52pzDC91cVOUDvvB6yXP7TPyKL-6KQw4nyDVUvafmadZHo9d8Ch-lC1xIGYylhkgiUeEJlkJzb-8_bPpc3HM-numNyVUnz3wy-QWiv7Bwzc0EZvjlrk8l2zMTP7sgOAXQE64zUCay7yyWGYJm91CoHDytU3DDP8fEQdoS8GBRvo94T1w1wYmTEFjJWuq9_05ol76LbaYkHTQoZhRROFIusDfu9XNDv5Ofj1Xk0y_YmZkz6KS0Mx2eClGFuUIOo_FtTiX7i0x16EI/http%3A%2F%2Fwww.transmute.industries>



<https://secure-web.cisco.com/1bjrCBfGOdTl68S8z6MFmy6wdIgVCWKbGADYlzl4y7EFMpUY8fg0a2mP8VxR-hBXz6ktNIMpcPQQAW2u5iYC5iO-VnAhuontHbB4F8lXraq2NcsVvj3TAuLJZCrq0xtX6PCuxXYWUPX7kGfxmnICud6wXL1nmaadXy4jbbFg2AGQun-ogbW6StxcF5fYiNWuWEIXnn6y8txrzzkivVAn8kZ1iNr0RXTNJUkPgXppB3fYQymeETqMcQHjiI-6S-d9DegSgZlFq5Q4Q9uZZor9LVcXLifVEZCoGHLxPs2EISxGxD4Qh0uKFFJdrgUkKYBKj/https%3A%2F%2Fnam06.safelinks.protection.outlook.com%2F%3Furl%3Dhttps%253A%252F%252Fwww.transmute.industries%252F%26data%3D05%257C01%257CSteve.Lasker%2540microsoft.com%257C79cb3d326bec41bf51ac08da726fb0f1%257C72f988bf86f141af91ab2d7cd011db47%257C1%257C0%257C637948121310174010%257CUnknown%257CTWFpbGZsb3d8eyJWIjoiMC4wLjAwMDAiLCJQIjoiV2luMzIiLCJBTiI6Ik1haWwiLCJXVCI6Mn0%253D%257C3000%257C%257C%257C%26sdata%3DRgoG8nYGEEYJJBk1amvfg9rTTO71hz9Z8SXKK1Ot7FE%253D%26reserved%3D0>