A.2 ID Proofing and Verification Systems - Overall
- Andrew Hughes
Topic area lead: Andrew Hughes
The attached files are word versions of different levels of content.
I’m intending to create a progression to satisfy the needs of readers with an increasing amount of domain knowledge and technical knowledge.
The concept I’m shooting for is to first establish a core set of fundamental factual statements about this topic, written jargon-free if possible. The statements are not intended to be a narrative on their own - they will be designed to be woven into audience-targeted narratives which include relevant context for the specific audiences.
“Layer 0” is intended to the be fundamental factual statements about WHAT the topic area is, WHY it matters and lightweight HOW it works.
“Layer 1” (tentatively) is intended to describe mechanisms and techniques used to achieve Layer 0 activities
Layers beyond that are TBD.
** Status as of December 20 2023 **
Doing a careful study of the ENISA reports on Remote ID Proofing techniques, threats and vulnerabilities - to distill information for the next Layer
File | Modified | |
---|---|---|
Microsoft Word Document IDPV LAYER0 concepts - first cut DRAFT.docx |
Nov 02, 2023 by Andrew Hughes | |
Microsoft Word Document IDPV LAYER0 concepts - first cut DRAFT - meier.docx |
Nov 02, 2023 by Andrew Hughes | |
Microsoft Word Document IDPV LAYER1 concepts - first DRAFT.docx |
Feb 21, 2024 by Andrew Hughes | |
Microsoft Word Document IDPV LAYER0 concepts - Meier and Engle.docx |
Aug 02, 2024 by Andrew Hughes |