Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 6 Current »

Description (User Story)

This user storey shows the user proving that they are present at the the device that is making a presentation to the Verifier without releasing any user biometric information from the device.

Narrative

The user has performed some sort of biometric identification to the Device (such as a face or digit scan) that unlocks the devices ability to authenticate the user. The user taps the device on a verifier and is then asked if it is ok to release information the the Verifier as displayed on the Device's screen. The user makes some gesture that allows the requested data to be released to the Verifier. The user is admitted (or not) to the place that they are trying to enter.

Actors

ActorRole in the use case
UserThe subject of the information being released to the verifier. 
HolderThe person that holds the device that is unlocked.
DeviceAn internet connected mobile computing machine.
VerifierAn entity that can provide proof of their identity.
  • The User and Holder will typically be the same person and so the proof generated by the Device is typically just that the two are verified by the Device to be the same individual (i.e. that the person in possession of the Device (the User) is the known Holder of the Device.)
  • Proof of presence and notarization provide the same sort of abstraction, some sort of legally mandated evidence that the real world person made an intentional act. As technology advances and deep fakes of all sort abound, this is never more that a best-effort attempt to satisfy others of our intention to act. It will never be possible to be any more than evidence that must be judged by some entity which is here called the Verifier.

User Stories

ElementDetailNotes
As a,<description of user>
I want<functionality>
so that<benefit>
Acceptance Criteria
Given<how things begin>
When<action taken>
Then<outcome of taking action>


Prerequisites / Assumptions

  •  The Holder has a Device that can accept biometric input from the current User and faithfully present acceptable evidence that the data send from the device was intentionally released by a User that matches the biometric profile stored in the Device.
  • The Device is known and can make assertions on its own behalf that can be validated by the Verifier. This typically means that it has keying material held in a non-exportable location such as the secure enclave.

User Case Details:

Privacy


Data Provided


Data Retained


Diagram


Steps

Primary Use Case

The anticipated normal sequence

#StepDescription
1

2

3

4


Secondary Use Case(s)

Alternate or variant sequences

#StepDescription
1

2

3

4


Sequence Diagram


End State

The Verifier is convinced that the User(subject) is the Holder of the device and intends to make the presentation of data to the Verifier. If necessary the Verifier can later claim that they have sufficient proof that the user meets some sort of statutory requirement (for example that they are of an age to access legally controlled substances or material).


Success

Markers or metrics that indicate success

  •  


Failure

Markers or metrics that indicate failure

  •  


References

Champion / Stakeholder

List of the people that created the use case


Related Material

Resources and Links



  • No labels