Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

This is a generical use journey that involves the verifier submitting a request for user information and the user responding with the data that they are willing to share. Comparisons with other recommendations include FI = https://www.future-identity.org/recommendations

Narrative

What happens during the use case.

...

Term

Definition

HolderThe human user of the mobile credentials. The first person (I, we) of this story. 
DeviceA smartphone or other mobile computing device including the operating system (OS) software.
Wallet

An application running on the OS that has access to protected storage on the device. Often called a native app.

Issuerof a mobile credential.
Verifier of one or more mobile credentials.
CredentialA protected structure given by the issue to the holder's wallet. For example the mdoc from ISO 18013-5
PresentationA protected message given by the holder's wallet to the verifier. It will contain only that user data that is needed for the purpose of the transaction.
PurposeA structured list of attributes and the retention permissions from some trusted authority. For example the US TSA list of attributes needed to enter an airport. FI 2.8.12 call this a "type of data use"
PDPPolicy Definition Point (aka policy issuer) This could be a government or the business that owns the Verifier)
PEPPolicy Enforcement Point (aka policy verifier)

...

Data Retained


Diagram


Steps

Primary

...

User Journey

#StepDescriptionIssues
1acquire devicetypically a smartphone from a telco
2acquire walletcan be resident on the phone or acquired from a app store.
3acquire credsfrom issuers like state DMV's or healthcare providers
4

Secondary Use Case(s)

...

determine a goaltypically travel to another country, go to a ball game or get access to a video
5go to a web site for access ticketonly needed if access requires check-in or if the user wants assured access
6go to location of resourceeither physical site or digital site
5select type of accessoptional depending on resource, the purpose for the visit may be established here
6verifier sends request for dataat this point the purpose of the visit and the policy of the rules engines are queriedThis is a bundled request which violate FI 2.8.12
7user wallet presents to userthe wallet converts the requestor name and purposes into a UI for the user to see
8user choosesif some purposes have been added at the option of the verifier, the user can remove them
9presentation of user datathe wallet sends the presentation to the verifier based on the user request
10acceptance by verifierthis is the PEP = policy enforcement point, the user is granted access or not


Verifier User Journey - establishing the policies to present to the user by the verifier

This can be performed by any relying party at any time but must be prior to the request sent to the user.

#StepDescription
1

2

3

4


Sequence Diagram

...