Notification Payload Specs
Each notification sent to the protocol is essentially a JSON payload, bytes data or hash / pointer of the JSON payload. The protocol distinguishes payloads content and the storage medium it is on by assigning payload types to each notification.
The JSON Payload can differ with payload types ensuring flexibility of the content, data, storage interpretation and delivery.

Notification JSON Payload

Parameter
Description
notification
[Required] Represents the notification typically delivered on the home screen of the platform (mobile, tablet, web, etc.), the icon of the channel is automatically added to outline where the notification is coming from.
title
[Required] The title of the message displayed on the screen, this differs from the data json because the title while transforming the payload can be different than the title presented. For example, a secret notification title is always transformed to say Channel has sent you a secret notification.
body
[Required] The body of the message displayed on the screen, this differs from the data json because the title while transforming the payload can be different than the title presented. For example, a secret notification body is always transformed to say Please open the dApp / app to view your notification.
data
[Optional] The data field present here forms the visual feedBox for the user. It indicates the data field the payload will carry. This allows the notification to transform according to the payload type and the content defined on the platform frontend (i.e. app, dApp, wallet, etc).
type
[Required] Each payload has a type which tells how the data should be interpreted, this type is mirrored on the protocol function call as well.
secret
[Optional] is required for certain payload types to decrypt the data.
asub
[Optional] is the subject shown in the feed item.
amsg
[Optional] is the message shown in the feed item, has rich text formatting.
acta
[Optional] is the call to action of that feed item.
aimg
[Optional] is the image shown in the feed item, this field is also capable of carrying other media links.
atime
[Optional] time in epoch when the notification should be displayed, if present, the frontend should respect this field and delay the notification till the schedule is reached. If the time is before the current time, the notification is treated as to be dispatched and displayed immediately.
recipients
[Optional] When presented with appropriate payload type allows notification to be delivered to many subscribers (but not all subscriber) of that channel.
If no data is carried in the payload (or only atime is carried), it is assumed that the notification is not important and hence persist (or appearance) in the frontend feedBox of the user.

Payload Types

The following are few payload types that are already defined, though they can change as we move forward. Notification payload type for EPNS is infinitely extensible and opens a huge range of possibilities including multi-factor authentication, payments, blacklisting address (Multi-sig contract as a channel with exchanges as their subscribers), etc. The data defined in the JSON payload they carry is used to interpret and extend that functionality.

Direct Protocol Payload (Type 0)

Direct payloads are special payloads meant for sending directly to the protocol, the delimiter + divides the subject and message which are the only two fields it carries.
1
type+title+body
Copied!
It's always recommended to use other payloads for dApp or server interaction. This payload should be used sparingly when it's absolutely necessary. The 'type' here is a special field which is different from the type in identity.
Always recommended to interface with EPNS JS Library for abstracting these details out.

Broadcast Payload (Type 1)

Broadcast notification goes to all subscriber of a channel, the notification payload in this case is not encrypted.
1
{
2
"notification": {
3
"title": "The title of your message displayed on screen (50 Chars)",
4
"body": "The intended message displayed on screen (180 Chars)"
5
},
6
"data": {
7
"type": "1",
8
"secret": "",
9
"asub": "[Optional] The subject of the message displayed inside app (80 Chars)",
10
"amsg": "[Optional] The intended message displayed inside app (500 Chars)",
11
"acta": "[Optional] The cta link parsed inside the app",
12
"aimg": "[Optional] The image url or youtube url which is shown inside the app",
13
"atime": "[Optional] Epoch time for the notification to be shown or dispatch"
14
}
15
}
Copied!

Secret Payload (Type 2)

Secret notifications are intended to be delivered to one subscriber of the channel, these are encrypted using ECC(Elliptic Curve Cryptography) [4] and AES(Advanced Encryption Standard) [5]. The secret which is generated by the channel using whatever means they prefer should be kept to 15 characters or less, this secret (plain version) uses AES to encrypt the fields: asub, amsg, acta, aimg.
The rationale behind using ECC with AES is to ensure that the payload is not over bloated.
1
{
2
"notification": {
3
"title": "The title of your message displayed on screen (50 Chars)",
4
"body": "The intended message displayed on screen (180 Chars)"
5
},
6
"data": {
7
"type": "2",
8
"secret": "No more than 15 characters, encrypted using public key of the intended recipient",
9
"asub": "encrypted by secret using AES | [Optional] The subject of the message displayed inside app (80 Chars)",
10
"amsg": "encrypted by secret using AES | [Optional] The intended message displayed inside app (500 Chars)",
11
"acta": "encrypted by secret using AES | [Optional] The cta link parsed inside the app",
12
"aimg": "encrypted by secret using AES | [Optional] The image url which is shown inside the app",
13
"atime": "[Optional] Epoch time for the notification"
14
}
15
}
Copied!
Why not just use ECC? ECC increases the length of the cipher text and hence the payload which will be delivered. Using ECC with AES ensure the payload length is kept at a manageable level and allows channels to send more information in the notification while still keeping the best encryption practices.
The discussion on using a public key - private key encryption or a derivation of it is still under discussion. Even if we decide to go with the above encryption for secret messages, we can in the future create a payload type that can offer encryption / decryption in a different way.

Example Notification Payload (Plain)

1
{
2
"notification": {
3
"title": "The title of your message displayed on screen (50 Chars)",
4
"body": "The intended message displayed on screen (180 Chars)"
5
},
6
"data": {
7
"type": "2",
8
"secret": "vBGK71PFl7mzWob",
9
"asub": "The Great Renewal: Your ENS Domain has expired and someone is about to get them",
10
"amsg": "[d:ENS] domains from 2017 that have expired.\n\nGo check your [b:@ensdomains] right now and renew your accounts.",
11
"acta": "https://ens.domains/",
12
"aimg": "https://i.ibb.co/WKNVN9y/enssamplemsgimg.jpg",
13
"atime": "1595083821"
14
}
15
}
Copied!
Recommended to use the EPNS JS Library to handle the generation of encrypted payload easily, it can talk to our protocol to also fetch the public key required.

Example Notification Payload (Encrypted)

1
{
2
"notification": {
3
"title": "The title of your message displayed on screen (50 Chars)",
4
"body": "The intended message displayed on screen (180 Chars)"
5
},
6
"data": {
7
"type": "2",
8
"secret": "e291826a995ab03b0dd69c360f3deb3803e130dc7d3bd94f1016494bc1fad4f4b816524f8cbdd068f0caf94a1cec682ab75755327e4410267721e44f83d73a56e88b911051eb0a2f2ee1ffef5f2cf5419cbc81895cd7d290b70060ef80b727fd52",
9
"asub": "U2FsdGVkX181J09umWprAgmLOaDyZXojQjLPlJ31G0LDgXHBgnNsFEOKgjqhKJ2vWaPP5Xmt8sIQLmB3YYkjQO1LhrV7sr0FDlwqjLhSimxmI1EnjOdEHyiE1RO7LV0O",
10
"amsg": "U2FsdGVkX18J7Myet9yljBLtNMpqz86qWgmjrK/9WyP+LD9OVerohkl5jc791UOlU6cV4UFVhdwJHyQSMYNNDPOaJMhxlLF2tL7LIBDeGqPA2AlgWqe2qbF1JC+zjIgBR/+IUfbr0+gz4JUBydK3d1dJGPFYliQTqD7EOjv38No=",
11
"acta": "U2FsdGVkX188zXRR3URQR2xedjftDOHD5E3k+ggKe+8F6MxW86464rl6y1ZhX3jY",
12
"aimg": "U2FsdGVkX188AaU187LFzqaibpfoOXb+XkCNbsLpV29CrQOVjC9BfWpxwGXE9Er7OdJ63yblqFYCaqNoGAHCOg==",
13
"atime": "1595083821"
14
}
15
}
Copied!

Targeted Payload (Type 3)

Targeted notifications go to a single subscriber of a channel, the notification payload in this case is not encrypted.
1
{
2
"notification": {
3
"title": "The title of your message displayed on screen (50 Chars)",
4
"body": "The intended message displayed on screen (180 Chars)"
5
},
6
"data": {
7
"type": "3",
8
"secret": "",
9
"asub": "[Optional] The subject of the message displayed inside app (80 Chars)",
10
"amsg": "[Optional] The intended message displayed inside app (500 Chars)",
11
"acta": "[Optional] The cta link parsed inside the app",
12
"aimg": "[Optional] The image url or youtube url which is shown inside the app",
13
"atime": "[Optional] Epoch time for the notification to be shown or dispatch"
14
}
15
}
Copied!

Extending for Future Payload

The following payloads are in discussion and form an example of how the payload specs is ever expanding and can include more than just information as notification.

Multi-Targeted Payload (Type x)

Multi-Targeted notifications go to a more than one subscriber of a channel, the notification payload in this case is not encrypted. The total number of subscribers supported is TBA.
1
{
2
"notification": {
3
"title": "The title of your message displayed on screen (50 Chars)",
4
"body": "The intended message displayed on screen (180 Chars)"
5
},
6
"data": {
7
"type": "4",
8
"secret": "",
9
"asub": "[Optional] The subject of the message displayed inside app (80 Chars)",
10
"amsg": "[Optional] The intended message displayed inside app (500 Chars)",
11
"acta": "[Optional] The cta link parsed inside the app",
12
"aimg": "[Optional] The image url or youtube url which is shown inside the app",
13
"atime": "[Optional] Epoch time for the notification to be shown or dispatch"
14
},
15
"recipients": {
16
[0xAb...],
17
...
18
[0xEb...]
19
}
20
}
Copied!

Blacklist Payload (Type x)

Blacklist payload are a future forward payload meant to only demonstrate how the payload data and type defines what information the payload will carry.
1
{
2
"data": {
3
"type": "5",
4
"blacklist": {
5
address1,
6
address2,
7
....
8
address100
9
}
10
}
11
}
Copied!
The support for payload types is left to third party frontend / infrastructure services to implement. The accompanying EPNS products however will implement all payloads types which are accepted as official after community discussion.
Last modified 1yr ago