Archiv: Dakota Gruener


11.05.2020 - 22:01 [ Dakota Gruener / Harvard.edu ]

Immunity Certificates: If We Must Have Them, We Must Do It Right

(20.04.2020)

Credential Use:

1. When the individual attempts to gain access to, for instance, a place of work, the business will verify1.the validity of the credential, then make a determination to grant or deny access. This verification does not require contacting the issuer of the credential.

2. As part of the process of determining whether to grant or deny access, the verifier can compare the cryptographically verified photo against the individual through manual means or through automated facial recognition.