-
Notifications
You must be signed in to change notification settings - Fork 2
added IDCC impact proof focal use case #12
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Open
jandrieu
wants to merge
1
commit into
EarthProgram:main
Choose a base branch
from
LegReq:andrieu-idcc
base: main
Could not load branches
Branch not found: {{ refName }}
Loading
Could not load tags
Nothing to show
Loading
Are you sure you want to change the base?
Some commits from the old base branch may be removed from the timeline,
and old review comments may become outdated.
Open
Changes from all commits
Commits
File filter
Filter by extension
Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
There are no files selected for viewing
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
| Original file line number | Diff line number | Diff line change |
|---|---|---|
|
|
@@ -72,3 +72,84 @@ Once operational, Helen finds a verification agent, Lynn, who was able to inspec | |
| ## UC15 Verified Impact | ||
|
|
||
| Lynn is a verification agent for REC2022. She is called by HydroElec to audit their new production facility. After reviewing the certified proposal, she visits the HydroElec site to inspect and verify both the capacity of the system under operating conditions and the security of the automated smart meters. She uses a standard set of criteria established by the UN to record her observations and make a determination about the project’s compliance with both its certified proposal and UN requirements. After finding everything in order, Lynn issues a verification credential with a six month expiry and a maximum capacity of 20 billion kWh, which she gives to HydroElec. The credential references both the original proposal and its certification using machine-verifiable identifiers to ensure the authenticity of the verification. | ||
|
|
||
| # Focal Use Cases | ||
|
|
||
| # Shang-chi Proves Impact | ||
| ## Background | ||
| Shang-Chi is the Manager of a Hong Kong social enterprise - EldHealth focusing on elderly physical health. Over the past years, EldHealth has expanded rapidly in its operation and has many beneficiaries enrolled in its signature program, iHealth. In order to get more funding, Shang-Chi needs to prove that beneficiaries have become healthier as a result of enrolling in iHealth. | ||
|
|
||
| However, the authenticity of the data report Shang-Chi has produced has received a lot of doubt from his new funders as there has not been a good working relationship and trust established between the two yet. | ||
|
|
||
| The new funders have shown low confidence in the authenticity of the data, which shows that 99.9% of the beneficiaries improved in health in only 6 months since enrolling in iHealth. Shang-Chi thus needs to ensure the organization’s impact accountability to its funders. The data (reported by the beneficiaries) against the intended outcomes need to be validated. | ||
|
|
||
| To do so, the manager uses a platform to allow him to ensure the authenticity of the data submitter (beneficiary) and know the time and date of the data submission. The manager also has the ability to validate the credibility of the outcome data based on external evidence (e.g. photos, documents - offchain data). | ||
|
|
||
| ## Scenario | ||
|
|
||
| Shang-Chi collects data about the health of beneficiaries who joined iHealth. He sends standard survey forms through the platform to target beneficiaries weekly, which data are then submitted back to Shang-Chi with evidence attached (e.g. photos of blood pressure records and weight measurement). Having all this information associated with the data, Shang-Chi then evaluates the data submitted and approves each submission record by signing on it (digitally). These validated data are incorporated into the reports to funder, which will be auditable, accountable, and traceable. | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. "...platform to target beneficiaries weekly, which data are" Should it be ", whose data" |
||
|
|
||
| ## Distinction | ||
|
|
||
| This use case is difficult because: | ||
| - Manager wants to ensure the authenticity without violating the data privacy of the beneficiaries | ||
| - The procedure of submitting health documents are complicated | ||
| - Beneficiaries have low incentive to provide personal health data | ||
|
|
||
|
|
||
| ## Artifacts | ||
| ### Verifiable Credentials | ||
|
|
||
| * **Health surveys** - created by beneficiaries and verified by Shang-chi upon assessing attached supporting documents along health surveys. | ||
|
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Shang-Chi thoughout. Shang-chi in some places |
||
|
|
||
| ### DIDs | ||
|
|
||
| * **Beneficiaries** - to ensure beneficiaries who submit claims are enrolled in iHealth; used when submitting health surveys weekly | ||
| * **Shang-chi** - to evaluate the claims submitted by beneficiaries; used when evaluating the health surveys | ||
|
|
||
| ### IIDs | ||
|
|
||
| NFTs (as digital certificate in health program eg. vaccination records, pay for health outcomes) to provide incentive for beneficiary to provide data NFT (future development) | ||
|
|
||
| ## Trust Hierarchy | ||
| * Beneficiaries are liable for tracking their health and for submitting data on time | ||
| * Beneficiaries are liable for providing honest and real health data | ||
| * Beneficiaries must stay enrolled in iHealth over the course of the monitoring | ||
| * Shang-Chi is liable for keeping the health data confidential | ||
| * Shang-Chi is liable for producing accurate and timely reports to funders based on gathered data | ||
| * Shang-Chi is liable for verifying the evidence submitted by the beneficiaries | ||
| * Shang-Chi is liable for retaining evidence for potential audits, in a privacy preserving manner | ||
|
|
||
| ## Threat Model | ||
| * **Threat**: Beneficiaries may not know how to submit data digitally | ||
| * **Response**: provide training to beneficiaries | ||
| * **Response**: ask beneficiaries’ caretaker to submit for them | ||
| * **Response**: send EldHealth’s staff to beneficiaries’ home to collect data in person | ||
|
|
||
| * **Threat**: Beneficiaries may worry about data privacy and do not want to provide personal health data | ||
| * **Response**: data are anonymous; there will only be basic info (not identifiable) of the beneficiaries | ||
| * **Response**: The report produced contains only aggregated data | ||
|
|
||
| **Threat**: Beneficiaries may produce fake data | ||
| * **Response**: random assessment to ensure data authenticity | ||
| * **Response**: bring in third party evaluator, e.g. doctor, caretaker to validate data | ||
|
|
||
| ## Sustainability | ||
| GOAL 3: Good Health and Well-being - with more funding from funders given the proven success of iHealth, the program can continue to expand to serve more beneficiaries in Hong Kong | ||
|
|
||
| ## Diversity & Inclusion | ||
|
|
||
| The program will improve social inclusiveness as it will help improve health of elderly, especially among the disadvantaged groups, e.g. ethic minorities, single elderly persons, low income individuals. | ||
|
|
||
| Elderly under the program will also less likely be stigmatized as individual health data are secured. | ||
|
|
||
| ## Requirements | ||
|
|
||
| 1. A mobile device for beneficiaries to use to submit data | ||
| 2. Cryptographically verifiable authorship of submitted evidence. | ||
| 3. Verifiable 3rd party evaluation of submissions. | ||
| 4. Retention for auditability, presumably checked by the government every 4 years. | ||
| 5. Cryptographically secured timestamping | ||
| 6. On-chain proof-of-existence (record a hash on chain) MUST. Demonstrates content exists BEFORE the point in time demarcated by that blockheight. | ||
| 7. Embedded proof-of-time (recording a state of chain in a signed artifact). MAY. Demonstrates that the signed artifact was signed AFTER the point in time represented by that chain state. | ||
| 8. The approach MUST be able to scale to serve the populations of Hong Kong, Taiwan, and South East Asia. The initial MVP must be able to support 5000 organizations, and each organization may engaged 2,000-5,000 people, for a soft estimate of 25,000,000 people. | ||
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
the manager == Shang-Chi?
Suggest use Shang-Chi throughout
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I also have some difficulty with "ensure the authenticity", but that might just be me.
Could "provide assurance over the authenticity." or "guarantee the authenticity" be better?