To make the most of network infrastructure, a carrier must be able to lease it to customers. But how do you sell that capacity in an environment with many barriers to entry and collaboration?
* Most potential customers cannot see your inventory
* Partner discovery and integration is slow and labor intensive
* When collaborations fall below customer expectation, it is often difficult to prove which party failed
Can we solve these issues with a centralized system? This question becomes, who is so well-trusted in the domain, that they could form the hub that supplies everyone with information about everyone else’s capabilities? In the telecom space, this question doesn’t have an obvious answer, so we turn to a decentralized architecture.
This causes us to ask questions like how to:
1. identify partners in a decentralized system,
2. guarantee the providence of partner data,
3. share this guaranteed data with selected partners securely and privately.
Fortunately, W3C have answered many of these questions through standards around decentralized identifiers (DID), DID documents (DIDDocs), and verifiable credentials (VCs).
The Integrated Trust Network (ITN) is a federated network for securing and managing the relationship of cryptographic control keys to DIDs and for resolving DIDs to their DIDDocs. It also publishes an SDK used to implement a Self Sovereign Digital Twin (SSDT) that interacts with the ITN and other SSDTs to facilitate the selective distribution of verifiable credentials (think of these as data payloads with proofs of providence) to other trusted SSDTs.
To advertise our identity, all we need to do is publish a DIDDoc to ITN that contains our public keys. We can prove ownership of the associated DID through a demonstration of possession of the corresponding private key. In addition, DIDDocs can contain “service” endpoints that any SSDT can interact with to get a list of available verifiable credential presentations, corresponding to, for example, a national company registration entry. Whether an SSDT provides a particular presentation to a requester can be made dependent on the DID of the requester.