F
Challenge Project

The Networked Postal Identity

Secure AI-driven Digital Identities

⛶  Fullscreen ↓  Download

The Networked Postal Identity: Secure AI-driven Digital Identities Utilizing DNS-based Addressing, Open Data and UPU Standardized Address Data to enable secure document exchange for e-government

Initiation:

  • Jane requests a police record from the Ghana Post Office.

Verification at Ghana Post Office

  • The Ghana Post Office checks Jane's ID.

Request to Ethiopian Post Office:

  • Ghana Post Office requests Jane's police record from the Ethiopian Post Office, providing:
    • Jane's certificate.
    • Ghana Post Office certificate.

Liaison and Verification at Ethiopian Post Office:

  • Ethiopian Post Office liaises with local authorities to obtain the police record content.
  • The content is hashed.
  • The hash is linked together with:
    • Jane's certificate (indicating the document belongs to Jane).
    • Ethiopian Post Office certificate (indicating the document's origin)

- Ethiopia Post will encrypt the doc with private KSK

Business Case: Enhancing Cross-Border Document Verification in the Global Postal Sector

Scenario Overview

Jane, a citizen of Ghana, needs her police record for a specific purpose. She initiates the process by requesting the record from the Ghana Post Office. The subsequent steps involve verification, cross-border communication, and collaboration with the Ethiopian Post Office.

Key Steps:

Initiation: Jane’s Request

  1. Jane approaches the Ghana Post Office to obtain her police record.
  2. The Ghana Post Office receives her request and begins the verification process.

Verification at Ghana Post Office

  1. The Ghana Post Office verifies Jane’s identity using her official ID.
  2. This step ensures that the request is legitimate and that the document will be issued to the correct individual.

Request to Ethiopian Post Office

  1. The Ghana Post Office initiates communication with the Ethiopian Post Office.
  2. They request Jane’s police record, providing the necessary context:
    1. Jane’s certificate (proof of identity).
    2. Ghana Post Office certificate (indicating their role as the requesting entity).

Liaison and Verification at Ethiopian Post Office

  1. The Ethiopian Post Office collaborates with local authorities in Ethiopia.
  2. They obtain the content of Jane’s police record.
  3. To ensure data integrity and security, the content is hashed.
  4. The hash value is concatenated with:
    1. Jane’s certificate (to establish ownership).
    2. Ethiopian Post Office certificate (to verify the document’s origin).

Industry Impact:

Efficient Cross-Border Processes:

  1. By leveraging the existing postal network, cross-border document requests become more streamlined.
  2. Collaboration between postal operators facilitates efficient data exchange.

Trust and Security:

  1. The verification process ensures that the police record is genuine and belongs to Jane.
  2. Hashing and concatenation enhance data security, preventing tampering or unauthorized access.

Global Standardization:

  1. Implementing similar processes across different postal administrations promotes consistency.
  2. Standardized procedures improve overall industry performance.

E-Commerce and Digital Services:

  1. As posts move into e-commerce and online marketplaces, secure document handling becomes crucial.
  2. The ability to verify and share documents seamlessly contributes to the industry’s digital transformation.

Industry Trends:

E-Commerce Growth:

  1. Posts are increasingly involved in e-commerce logistics and last-mile delivery.
  2. Efficient document handling supports this trend.

Urban Logistics Challenges:

  1. Urbanization poses challenges for last-mile delivery.
  2. Streamlined processes like cross-border document verification help address these challenges.

Conclusion:

The collaboration between the Ghana Post Office and the Ethiopian Post Office exemplifies how the global postal sector can enhance its services through efficient cross-border communication, trust-building, and adherence to industry standards. By ensuring the integrity of documents and embracing digital solutions, postal operators contribute to a more connected and secure world.

Resources

Link to slide deck for Challenge F

Slide deck for Challenge E GovStack Secure Document Exchange challenge.gif

Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries

How Trust Registries Prevent Fraud, Scams, and Abuse

Cloudflare: How DNSSEC Works

GovStack Gitbook - Digital Registries

GovStack Gitbook - Messaging

MOSIP links provided by Rounak Nayak during our call

https://docs.mosip.io/inji

https://www.w3.org/TR/vc-data-model-2.0/#:~:text=A%20verifiable%20credential%20is%20a,certificates%2C%20and%20digital%20educational%20certificates.

https://www.digilocker.gov.in/

  Pitch Rehearsal

02.06.2024 17:35 ~ tracyhackshaw

Launch

Event finished

  The Pitch

31.05.2024 15:02 ~ tracyhackshaw

Edited (version 37)

31.05.2024 13:40 ~ Shatrah

Sketching

Edited (version 36)

31.05.2024 13:40 ~ Shatrah

Edited (version 34)

31.05.2024 11:02 ~ tracyhackshaw

  Consulting with GovStack Expert as part of completing the output and next steps analysis.

31.05.2024 10:38 ~ tracyhackshaw

  Team working on final outputs and pitch

31.05.2024 10:12 ~ tracyhackshaw

Edited (version 31)

31.05.2024 09:17 ~ Pauld

Edited (version 30)

31.05.2024 08:28 ~ tracyhackshaw

Edited (version 29)

30.05.2024 16:56 ~ tracyhackshaw

Edited (version 28)

30.05.2024 16:52 ~ tracyhackshaw

Created a Resources section within the Pitch, added additional resources, and moved to end of the Pitch

30.05.2024 16:52 ~ tracyhackshaw

Status End of Day: Plan developed for prepping pitch deck and presentation tomorrow.

30.05.2024 15:57 ~ tracyhackshaw

Edited (version 24)

30.05.2024 14:59 ~ Pauld

Edited (version 23)

30.05.2024 14:47 ~ Pauld

30.05.2024 14:45 ~ Shatrah

Edited (version 21)

30.05.2024 14:29 ~ MayssamSabra

Great material Tracy! Here's an excellent reference presentation explaining the use of the DNS https://www.icann.org/en/system/files/files/presentation-challenge-dns-digital-credential-world-05sep23-en.pdf

30.05.2024 13:40 ~ Pauld

Edited (version 19)

30.05.2024 13:38 ~ MayssamSabra

Edited (version 18)

30.05.2024 13:36 ~ MayssamSabra

See also this Internet Draft submitted to the IETF relating to Leveraging DNS in Digital Trust: Credential Exchanges and Trust Registries (Authors: Jesse Carter , Jacques Latour , Mathieu Glaude) - https://datatracker.ietf.org/doc/draft-latour-dns-and-digital-trust/

30.05.2024 13:20 ~ tracyhackshaw

Investigate GOVSTACK Messaging building block as a reference model https://govstack.gitbook.io/bb-messaging/v/msg-23q4/2-description

30.05.2024 13:15 ~ Pauld

All project team members should be sensitized to how DNSSEC works e.g. - https://www.cloudflare.com/dns/dnssec/how-dnssec-works/

30.05.2024 13:12 ~ tracyhackshaw

@PaulD advised that an important framework to consider in moving this initiative forward would be the GovStack Digital Registries - https://github.com/GovStackWorkingGroup/bb-digital-registries

30.05.2024 13:06 ~ tracyhackshaw

Investigate GOVSTACK Digital Registries as a reference model https://govstack.gitbook.io/bb-digital-registries/2-description

30.05.2024 13:02 ~ Pauld

Joined the team

30.05.2024 12:53 ~ MayssamSabra

Merged Challenges E and F together due to the similarity of the use case - secure identities are an enabler of secure document exchange.

30.05.2024 12:41 ~ Pauld

UML model developed

30.05.2024 12:37 ~ calvin

Technical requirements defined

30.05.2024 12:35 ~ calvin

Brainstorming session completed.

30.05.2024 12:33 ~ calvin

Research

Joined the team

30.05.2024 12:32 ~ calvin

Project

Edited (version 7)

30.05.2024 12:28 ~ loleg

Edited (version 6)

30.05.2024 12:26 ~ loleg

Edited (version 3)

29.05.2024 16:32 ~ tracyhackshaw

Edited (version 2)

29.05.2024 16:29 ~ tracyhackshaw

Edited (version 1)

29.05.2024 16:29 ~ tracyhackshaw

Joined the team

29.05.2024 16:26 ~ tracyhackshaw

First post View challenge

29.05.2024 16:26 ~ tracyhackshaw

Challenge

Event started

 
All attendees, sponsors, partners, volunteers and staff at our hackathon are required to agree with the UN System Code of Conduct. Organisers will enforce this code throughout the event. We expect cooperation from all participants to ensure a safe environment for everybody.

The contents of this website, unless otherwise stated, are licensed under a Creative Commons Attribution 4.0 International License. The application that powers this site is available under the MIT license.