Agents, Identity Hubs, and Secure Data Hubs
A naive, likely flawed, but hopefully neutral introduction
1
About this presentation
2
About this presentation, continued
3
Flow of this presentation
4
High level context
Alignment work done so far, problems they are solving
5
Agents and Identity Hubs: current alignment efforts
6
Aries Agents and Identity Hubs
7
Later Discussion:
-“storage”
-“protocols”
-”wallets”
Aries Agents, Identity Hubs, and Secure Data Hubs
8
Aries Agents
wallets,
key mgmt,
protocols
Secure Data Hubs
streaming access
encrypted search indexes
Identity Hubs
storage,
replication,
collections
permissioned access
actions,
persisted protocol state
actions
search
storage
IPFS: key mgmt, protocols, storage
Solid: key mgmt, protocols, storage (pods and profiles)
Brief introduction to each
9
DIF Identity Hubs: Quick Overview
10
Secure Data Hubs: Quick Overview
11
Agents: Quick Introduction
12
Q&A and Discussion
13
Discussion points
14
Agents
Identity Hubs
Secure Data Hubs
api1
api2
Agents
Identity Hubs
Secure Data Hubs
strawman 1
strawman 2
References and Further Reading below
15
Backup Slides
16
Solid
17