Powered by OpenAIRE graph
Found an issue? Give us feedback
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/ ZENODOarrow_drop_down
image/svg+xml art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos Open Access logo, converted into svg, designed by PLoS. This version with transparent background. http://commons.wikimedia.org/wiki/File:Open_Access_logo_PLoS_white.svg art designer at PLoS, modified by Wikipedia users Nina, Beao, JakobVoss, and AnonMoos http://www.plos.org/
ZENODO
Research
Data sources: ZENODO
addClaim

This Research product is the result of merged Research products in OpenAIRE.

You have already added 0 works in your ORCID record related to the merged Research product.

ZEKNOP Data Interoperability Standard: Asset Portability and Privacy-by-Design Identity Framework

Authors: Urbánek, Vladislav;

ZEKNOP Data Interoperability Standard: Asset Portability and Privacy-by-Design Identity Framework

Abstract

ZEKNOP Data Interoperability Standard - Defensive Publication v1.1 This whitepaper establishes prior art for open data portability standards enabling privacy-preserving identity management and financial datainteroperability. What's New in v1.1: • Flagship Use Case: Privacy-Preserving Age Verification - New dedicated section demonstrating how platforms can verify users are "over 16"(Australia) or "over 15" (France) without accessing birth dates or identity documents • Multi-Jurisdictional Regulatory Alignment - Added support for Australian Online Safety Act (16+ age verification) and French Social MediaRegulation Act (15+ age verification with parental consent) • Australian Privacy Act Compliance - New mapping of Australian Privacy Principles (APPs) to ZEKNOP implementation • Enhanced Security Model - Expanded phishing/impersonation mitigation with consumer registration, pre-configured scope limits, and institution verification • Restructured Executive Summary - Now addresses both privacy risks and systemic data fragmentation inefficiencies Core Protocol (unchanged from v1.0): 14+ asset types, 11+ liability types, 12+ insurance policy types 9 granular identity blocks with derived claims OAuth 2.0 consent flows with minimal disclosure Privacy-by-design patterns (zero-knowledge data flows) This publication contributes data model structures, API patterns, and privacy principles to the public domain to enable ecosystem-wideinteroperability and prevent vendor lock-in. License: CC BY 4.0

Powered by OpenAIRE graph
Found an issue? Give us feedback