Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

ElementDetailNotes
As a,human user with a smartphone containing several mobile credentials
I wantto travel to a foreign country or enter a sports venue
so thatI can check that i have the privileges needs needed to access my destination
Acceptance Criteria
Given<how things begin>
When<action taken>
Then<outcome of taking action>

...

  • The access pre-check performed by the user at the computing device will have a lifetime of several days. The policy check made at that time till continue to be valid even if the policy changes.


Use Case Details

Privacy

There are (in effect) two distinct access credentials created as a result of this process. One inside the seller's (or government's) system that can be used for the real-time access check. A second that can be held by the user's smartphone.

Data Provided

The seller needs to acquire a REAL ID for the holder which must include biometric data. This is highly sensitive and must not be shared. The verification device can send a real-time biometric scan, but does not see the store biometric data.

Data Retained

The seller may maintain the holder's legal name for as long as a relationship exists with the holder. The holder may terminate the relationship at any time. The seller will delete all references to the holder as soon as legally permitted.

The retention of biometric source data (like the user's image) is a difficult decision, but the holder must understand what happens to biometric data.

Diagram


Steps

Primary Use Case

...