ib-IAP

From WiredWiki
Jump to navigationJump to search
ib-IAP

Ib logo.png

  1. Persistent Transmission
  2. Transactional Transmission
  3. Polling Retrieval
  4. Polling Syndication
  5. Aggregation
  6. Ident–Auth

The internetworked binary Ident–Auth Protocol, or ib-IAP for short, is the sixth subprotocol of the internetworked binary master protocol. It provides the means to perform key discovery and authentication to further secure the encryption basis of communications on the other five ib subprotocols.

Model

  1. As seen with PGP, the key data must be treated as light data so that a conflict of interest is not fostered in the servers that hold and disseminate key data. It is fine that any such inferences or meaning-making from the relationships a key proves be relegated to being heavy data to be aggregated.
  2. ib-IAP servers can also host lists of associations between a key and other identity-like data, such as numbers, e-mail addresses, and so on.
    1. Therefore, it is possible in some cases to find a key by a more commonly known piece of data, within a limited context, although this cannot be expected to work in every context.
  3. Besides data associations, servers' other core function is the aggregation of credentials and the syndication of behalves in order to facilitate comprehensive yet anonymous authentication in a decentralised manner.
    1. Credentials are unique tokens associated with a key that have been authorised by the holder of a different key. What they authorise is not part of the record.
    2. Behalves are records that enable servers to report on keys that they do not have, by referencing a behalf that ultimately points to another server elsewhere.