Cryptographic Permits

Creating A6 Permits With JWT

Mi'kail Eli'yah
18 min readJun 4, 2024
“papers please …”

Token permits must define rights, roles, responsibilities, ownership vs `possessionship`, and domain aspects of a human profile for the asset. It defines the attributes and function interfaces to the real world. There has to be facilities that maintain and protect the evidence (and proofs) of the asset attribute, integrity and privacy of the assets.

For this magic to work, facilities to support the token permits have to be defined of how to be deployed from where (account) to where (network) with what (environment, gas mileage, etc) for what and why (contract, permit, conditions and constraints, etc). 
- Permissions can be cryptographically guarded.
- Rebinding OTP verification code vulnerability (also pertaining to usage session and context - include source, destination, (do not use wildcards) and order of session communication, prohibit redirection, etc)
- Add MFA (relate context and session)
The tool should identify the fields and create the field tag and field value for the interfaces (API discovery) for both {inputs, outputs}.
- API (A6 permission usage checking).
The tools should log all assets and activities (affect and effect). It should establish the committed contract/permit consensus signed by all the nodes of the network (whether it is decentralized or having a…

--

--

Mi'kail Eli'yah
Mi'kail Eli'yah

No responses yet