Privacy by Design

The principles of privacy by design were applied to discover and mutually validate the architecture’s privacy requirements and design elements.

The User Interface Design View specifies how identity agents and digital identities are controlled by the owner and protected; how identities are virtualized; and how disclosure is controlled.

The Interoperability Design View specifies how identity agents interoperate; how they interface with messaging apps; and how they exchange identities for their owners.  The Diffie-Hellman key agreement method has been adapted to securely exchange digital identities.

The Verification Design View specifies how identity agents verify that collaborating owners control their digital identities and have been acceptably proofed and attested.

The Delegated Consent Design View specifies how stakeholder commitments are affixed to consent tokens; how access to private data is controlled; and how critical events are logged and monitored.