From 82fba2bd69980351e402e30728e58c78a7a7231f Mon Sep 17 00:00:00 2001 From: christburtID <56419388+christburtID@users.noreply.github.com> Date: Sat, 12 Oct 2019 16:04:35 -0400 Subject: [PATCH] Appendix A way to provide some links with a little context. --- draft-documents/Biometrics.md | 24 +++++++++++++++++++++++- 1 file changed, 23 insertions(+), 1 deletion(-) diff --git a/draft-documents/Biometrics.md b/draft-documents/Biometrics.md index abea51d..c58f94e 100644 --- a/draft-documents/Biometrics.md +++ b/draft-documents/Biometrics.md @@ -285,7 +285,9 @@ suffer from False Rejection Rate (FRR) and False Acceptance Rate (FAR): the right users may be rejected and the wrong users may be accepted. + Systematic approaches can be actively aware of these challenges and + compensate for them. ### Conclusions @@ -298,6 +300,26 @@ compensate for them. [//]: # (Biometrics include physical characteristics, embedded devices - can be ephemeral or permanent. We’ll use them, even though they’re ephemeral) [//]: # (It’s the third element of: What you have, what you know, and what you are) +### Appendix + +1. Potentially related initiatives + +There are a number of initiatives, working groups, and protocols that could be relevant to self-sovereign biometrics at present or in +the near future,  whether as complimentary principles for implementation, potential workflows or mechanisms for implementation, or +sources of further guidance. + +These may include efforts such as: + +DID Auth[https://github.com/WebOfTrustInfo/rwot6-santabarbara/blob/master/final-documents/did-auth.md] +Known Traveller Digital Identity[https://www.weforum.org/reports/the-known-traveller-unlocking-the-potential-of-digital-identity-for-secure-and-seamless-travel] +NIST SOFA[https://pages.nist.gov/SOFA/SOFA.html] +FIDO Alliance protocols + +Specific additional principles or best practices may be necessary to effectively preserve self sovereignty of biometrics in +implementations involving the systems above.Proposals such as the bridging of OpenID Connect and SSI protocols could also create new +paths for self-sovereign implementations of biometrics, and enable the use of new forms of strong authentication within privacy- +preserving architectures. + [//]: # (REFERENCES) [^1]: http://www.lifewithalacrity.com/2016/04/the-path-to-self-soverereign-identity.html @@ -339,4 +361,4 @@ compensate for them. [^19]: https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2018/blob/master/topics-and-advance-readings/DID%20Auth:%20Scope%2C%20Formats%2C%20and%20Protocols.md#example-flow-1 -[^20]: https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2018/blob/master/topics-and-advance-readings/HorcruxProtocol.pdf \ No newline at end of file +[^20]: https://github.com/WebOfTrustInfo/rebooting-the-web-of-trust-spring2018/blob/master/topics-and-advance-readings/HorcruxProtocol.pdf