...
The user on their smartphone travels in the real-world or the digital-world from place to place and easily access the locations or resources that they need in the day to day activities.
Secondary Use Case
...
The user caries back-up documents that can be used when the the digital ecosystem is non-functional.
Actors
Actor | Role in the use case |
---|---|
Holder | The human user of the mobile credentials. The first person (I, we) of this story. |
Device | A smart phone or other mobile computing device including the operating system (OS) software. |
Wallet | An application running on the OS that has access to protected storage on the device. Often called a native app. |
Issuer | of a mobile credential. |
Verifier | of one or more mobile credentials. |
...
Element | Detail | Notes | ||||
---|---|---|---|---|---|---|
As a, | human user | |||||
I want | access | |||||
so that | I can complete whatever task that currently has my attention. | |||||
Acceptance Criteria | ||||||
Given | The user has a modern smartphone that comes with, or has installed, a wallet application that holds modern mobile credentials. | |||||
When | I start any task that requires identity credentials. | |||||
Then | I consider the credentials I might need to complete my task. This is typically on a website that tells me how access is granted. | |||||
As Needed | I migrate to an issuer web site using either the browser or the wallet, as appropriate to acquire new credentials. | |||||
Fall back | I can scan some credentials from hard copy for entry into the secure store along with the fully digital credentials. See video for example. |
|
Prerequisites / Assumptions
...