Attribute Vector: Difference between revisions
Jump to navigation
Jump to search
Line 13: | Line 13: | ||
# To be fully compliant with the various [[Privacy]] legislation like the [[GDPR]] or the California legislation the [[Relying Party]] may first require that the user establish a channel back to the user for the performance of required [[Redress]] and [[Recovery]] operations. | # To be fully compliant with the various [[Privacy]] legislation like the [[GDPR]] or the California legislation the [[Relying Party]] may first require that the user establish a channel back to the user for the performance of required [[Redress]] and [[Recovery]] operations. | ||
# Only then should the [[Relying Party]] be in a position to request additional [[Attribute]]s from the [[User]]. | # Only then should the [[Relying Party]] be in a position to request additional [[Attribute]]s from the [[User]]. | ||
# Once the [[Relying Party]] has possession of the [[Attribute Vector]] it can apply its own risk profile to the vector to determine if the user meets the sites policy for granting trust to users on the site. | |||
==References== | ==References== |
Revision as of 21:40, 27 April 2019
Full Title or Meme
A list of Attributes about an individual that is presented to provider of goods or services to establish to ability of the user to successfully complete a transaction with the provider.
Preconditions
- The primary use case for the Attribute Vector is a user navigating to the web site where they need be able establish a level of trust by the Web Site to meet their need for assurance about the user's ability to be trusted with their goods or services while maintaining the user's expectations of privacy. As such it is expected that user stipulations will be included as well as User Private Information.
- Both the user and the Web Site have the capability to create and understand the vector and its release of Attributes to the Web Site.
Problems
- Today the user is prompted for User Information by the web site it whatever form that site wishes. There is no real understanding by the user of what all will be requested or what conditions the user may be able to place on the release of information to the site.
Solutions
- Users can Authenticate in a manner that gives a Relying Party a consistent Identifier that can be sued from session to session without the need for sharing any User Private Information.
- To be fully compliant with the various Privacy legislation like the GDPR or the California legislation the Relying Party may first require that the user establish a channel back to the user for the performance of required Redress and Recovery operations.
- Only then should the Relying Party be in a position to request additional Attributes from the User.
- Once the Relying Party has possession of the Attribute Vector it can apply its own risk profile to the vector to determine if the user meets the sites policy for granting trust to users on the site.