-
Notifications
You must be signed in to change notification settings - Fork 19
Description
Summary
The Trust Registry Query Protocol (TRQP) provides a clear, well-structured foundation for lightweight, machine-readable verification of authoritative information. As multiple ecosystems evaluate adopting TRQP for production-grade deployments, several areas have emerged where the specification would benefit from additional clarification, optional profiles, or architectural extensions.
This issue proposes a set of constructive enhancements aimed at strengthening the protocol’s operational reliability, interoperability, and scalability while preserving its core design philosophy.
1. Lifecycle & Revocation Semantics
The current TRQP design assumes the trust registry as a static system of record and intentionally excludes update operations.
Suggested enhancement:
Introduce an optional “State Change / Lifecycle Profile” that describes how revocations, expiries, suspensions, and state transitions should be represented, queried, and timestamped.
Rationale:
Production ecosystems require deterministic temporal semantics (“valid at time T”, “revoked as of X”). Without a reference model, implementations may diverge.
2. Discovery Mechanism (“Registry-of-Registries”)
Discovery of a trust registry endpoint is left to the governance framework or authority_id.
Suggested enhancement:
Provide a simple discovery convention—JSON metadata document, DID service descriptor, or HTTP well-known pattern—so verifiers can reliably locate registry endpoints and retrieve governance metadata.
Rationale:
Cross-ecosystem interoperability and dynamic onboarding depend on a predictable discovery layer.
3. Transport Extensibility Roadmap
The HTTPS binding is well-specified, but many machine-to-machine environments require alternative transports (WebSockets, MQTT, gRPC, event streams).
Suggested enhancement:
Add a section outlining how alternative transports may be introduced via future “Transport Profiles” without changing core semantics.
Rationale:
A clear pathway prevents fragmentation and allows implementers to plan for high-throughput or low-latency environments.
4. Interoperability with Credential Ecosystems
TRQP is intentionally independent of specific credential technologies, but many ecosystems will rely on verifiable credentials, schema registries, or ledger anchors.
Suggested enhancement:
Provide an optional mapping profile showing how TRQP responses may reference credential status lists, VC metadata, or ledger-based proofs.
Rationale:
This reduces integration ambiguity and aligns TRQP with existing ToIP and DIF ecosystem patterns.
5. Non-Functional & Operational Guidance
The Security and Privacy sections are strong, but production deployments also require guidance on operational considerations.
Suggested enhancement:
Add a non-normative appendix covering recommended practices for rate limiting, caching/TTL, SLAs, geo-replication, availability, monitoring, and audit logging.
Rationale:
Shared operational guidance reduces reinvention and strengthens ecosystem reliability.
6. Governance Metadata Profiles
Governance references are “RECOMMENDED,” but many regulated ecosystems may require these to be normative.
Suggested enhancement:
Define two optional profiles:
• Baseline TRQP — minimal governance metadata
• High-Assurance TRQP Profile — mandatory governance, jurisdiction, dispute, and audit metadata
Rationale:
This gives high-trust sectors (financial, mobility, healthcare) a clear compliance pathway without increasing baseline protocol weight.
7. Recognition Semantics Across Ecosystems
The specification defines the Recognition query type but does not describe how recognition relationships should be modelled, published, or validated.
Suggested enhancement:
Add guidance or an informative section defining recommended patterns for recognition publishing, expiration, change propagation, and supporting proofs.
Rationale:
Recognition is key to multi-ecosystem interoperability, and consistent patterns will avoid divergent implementations.
8. Security Profiles
Security guidelines are comprehensive but generic.
Suggested enhancement:
Introduce optional “Security Profiles” (Minimal, Standard, High-Assurance) specifying expectations for authentication, MTLS, replay resistance, key rotation, timestamping, and auditability.
Rationale:
Profiles give ecosystem designers clearly differentiated implementation options aligned with their risk posture.
Closing
TRQP is strategically well-positioned to become the canonical verification rail for inter-ecosystem trust frameworks. These enhancements aim to support the transition from early pilots to production-scale deployments while preserving the protocol’s minimalistic and interoperable design.