...
Element | Detail | Notes | ||||
---|---|---|---|---|---|---|
As a, | human user | Typically this is the holder of the credentials. | ||||
I want | access | to either a real-world or a digital resource | ||||
so that | I can complete whatever task that currently has my attention. | without cognitive dissonance. | ||||
Acceptance Criteria | ||||||
Given | The user has a modern smartphone that comes with, or has installed, a wallet application that holds modern mobile credentials. | Laptops also will work, but the smartphone limitations are more germane to this use case. | ||||
When | I start any task that requires identity credentials. | or when I start planning for future needs. | ||||
Then | I consider the credentials I might need to complete my task. This is typically on a website that tells me how access is granted. | The user should not need much special knowledge to complete this step. | ||||
As Needed | I migrate to an issuer web site using either the browser or the wallet, as appropriate to acquire new credentials. | The user can be guided to get any missing credentials with major frustration. | ||||
Fall back | I can scan some credentials from hard copy for entry into the secure store along with the fully digital credentials. See video for example. |
|
...
Sequence Diagram
End State
Describe what measures or signifies the end of the case
Success
Markers or metrics that indicate success
Failure
Markers or metrics that indicate failureIt is not expected that there will be any end to the user acceptance and appreciation of the results of using mobile credentials.
Success
- It is possible to measure the user satisfaction with the process.
- The user is satisficed with the results.
- Attacks against user information on the platform can be shown to be better than expected.
Failure
References
Champion / Stakeholder
List of the people that created the use caseTom Jones
Related Material
Resources and Links
...