Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

The user on their smartphone travels in the real-world or the digital-world from place to place and easily access the locations or resources that they need in the day to day activities.

Secondary Use Case

...

The user caries back-up documents that can be used when the the digital ecosystem is non-functional.


Actors

ActorRole in the use case
HolderThe human user of the mobile credentials. The first person (I, we) of this story. 
DeviceA smart phone or other mobile computing device including the operating system (OS) software.
Wallet

An application running on the OS that has access to protected storage on the device. Often called a native app.

Issuerof a mobile credential.
Verifier of one or more mobile credentials.

...

ElementDetailNotes
As a,human user
I wantaccess
so thatI can complete whatever task that currently has my attention.
Acceptance Criteria
GivenThe user has a modern smartphone that comes with, or has installed, a wallet application that holds modern mobile credentials.
WhenI start any task that requires identity credentials.
ThenI consider the credentials I might need to complete my task. This is typically on a website that tells me how access is granted.
As NeededI migrate to an issuer web site using either the browser or the wallet, as appropriate to acquire new credentials.
Fall backI can scan some credentials from hard copy for entry into the secure store along with the fully digital credentials. See video for example.

Widget Connector
urlhttps://www.youtube.com/watch?v=Tq4hw7X5SW0


Prerequisites / Assumptions

...