Offline Contracts The Old Way Organizations traditionally reduced risk by establishing individual offline contracts for each transaction and relationship. While this approach provided security through direct agreements, it presented significant challenges for scaling operations.
Trust Frameworks Industries began developing comprehensive trust frameworks to establish trust at scale. These frameworks provide standardized rules and governance that allow participants to trust each other within a defined ecosystem. Standardized Rules Common policies and procedures Governance Oversight and compliance Ecosystem Trust Comprehensive trust within boundaries
Traditional model of Trust Framework / Open Identity Exchange (2010) Source: TheOpenIdentityTrustFramework(OITF)Model / Open Identity Exchange, 2010 • Policymakers(ex. Government): • Deciding the technical, operational, and legal requirements for exchanges of identity information that fall under their authority • Select Trust Framework Providers to implement these requirements • Trust Framework Provider(TFP): • Formulates a trust framework based on policies and acts as an intermediary in building trust relationships between IdPs and RPs • Assessors: • Certified by TFP that audits whether IdPs and RPs are operating in accordance with the trust framework • Identity Service Providers(IdPs): • Hold, manage, and provide user identities • Relying Parties(RPs, ex. Gov’s Web Sites): • Accepts the IdP authentication results and receives identity information
Challenge AI agents and IoT devices are creating transaction volumes that exceed the capacity of traditional trust frameworks AI Agents Autonomous systems making decisions and transactions IoT Devices Billions of connected devices exchanging data Scale Problem Massive volume of interactions requiring trust Non-Human Identities (NHI) are fundamentally changing the trust landscape, creating challenges that traditional frameworks weren't designed to handle.
Verify The key is balancing trust with verification. Not all interactions require the same level of assurance, but the ability to verify must always exist.
Approach to Digital Trust Inside Trust Frameworks Continue to Trust: For participants within established trust frameworks who meet baseline requirements, traditional trust mechanisms remain effective and efficient. Outside Trust Frameworks Require Verification: For devices, AI agents, and entities outside framework boundaries, verifiable credentials and proof become essential for secure interactions. This balanced approach maintains efficiency while ensuring security across all types of digital interactions.
Verifiable Trust Organizations like the OpenID Foundation are developing global standards to enable verifiable digital interactions at scale. 01 Digital Credentials Standardized formats for verifiable claims and identity attributes 02 Exchange Protocols Secure methods for sharing and verifying credentials between parties 03 Government Collaboration Partnership with national governments to implement standards in real-world systems 04 Social Implementation Deployment in production environments serving citizens and businesses
of Concept Transportation Pilot Program In collaboration with Japan's Digital Agency, pilot programs are underway in the transportation sector. Use Case: Students can present their university enrollment credentials along with national ID to receive discounted fares—all through verifiable digital credentials. These practical implementations demonstrate how standardized verification can work seamlessly in everyday transactions.
Trust for Agentic AI Agent Payments Protocol (AP2) is an open protocol for the emerging Agent Economy. It's designed to enable secure, reliable, and interoperable agent commerce for developers, merchants, and the payments industry. All of mandates are based on W3C Verifiable Credentials format and can be verified with digital signature. It outlines the resources already available for securing today’s agents and presents a strategic agenda to address the foundational authentication, authorization, and identity problems pivotal for tomorrow’s widespread autonomous systems.
challenges Comprehensive initiatives, including Trust Framework mapping, use-case studies such as cross-border education, opening bank accounts, etc. Global initiative supported by governments and SDOs. New initiative focuses on Asia Pacific region interoperability. Planning to consider a small number of use-cases such as education, travel, etc.
in Africa, we propose launching regional interoperability pilots between countries with advanced systems, such as Nigeria and Cameroon, and Benin and Ghana. Policy and technical standards alignment Governments must formulate domestic policies that respect national sovereignty while utilizing international standards, and investment in cryptographic infrastructure is also crucial to maintain the integrity, privacy, and authenticity of digital credentials. A public-private and societal approach Strong public-private cooperation is essential. The government should raise awareness through educational campaigns and promote digital IDs as valuable tools in citizens' daily lives. Call for actions 16
Vision for Secure Internet As countries develop their own trust and verification systems, the key to success lies in interoperability—ensuring these systems can work together across borders. National Implementation Cross-Border Interoperability Global Scale Trust Safer Internet The future promises a globally scaled, trustworthy, and secure internet—built on the foundation of interoperable standards and verifiable trust.