Page Status:
Priority:
This is one of the broad list of abstract user stories focused on Privacy Enhanced Mobile Credentials (PEMC) on a mobile device platform.
This is a generic use journey that involves the verifier submitting a request for user information and the user responding with the data that they are willing to share. Comparisons with other recommendations include FI = https://www.future-identity.org/recommendations
Since this is a generic use case it only talks at a high level about the user acquiring a phone, wallet and appropriate credentials and then using them to access a desired resource.
Term | Definition |
---|---|
Holder | The human user of the mobile credentials. The first person (I, we) of this story. |
Device | A smartphone or other mobile computing device including the operating system (OS) software. |
Wallet | An application running on the OS that has access to protected storage on the device. Often called a native app. |
Issuer | of a mobile credential. |
Verifier | of one or more mobile credentials. |
Credential | A protected structure given by the issue to the holder's wallet. For example the mdoc from ISO 18013-5 |
Presentation | A protected message given by the holder's wallet to the verifier. It will contain only that user data that is needed for the purpose of the transaction. |
Purpose | A structured list of attributes and the retention permissions from some trusted authority. For example the US TSA list of attributes needed to enter an airport. FI 2.8.12 call this a "type of data use". It is similar to the "Identity Bundle" in the FI 5.2.4 except that a broader coalition of issuers and relying parties need to establish the purpose and the data to be contained in the purpose. It is possible, but ugly, for each purpose to be a single datum. It is more likely that a purpose would be to "create a reward account" or similar. It must be clear whether the purpose is required or optional as per the CA privacy regulations. |
PDP | Policy Definition Point (aka policy issuer) This could be a government or the business that owns the Verifier. |
PEP | Policy Enforcement Point (aka policy verifier) |
consent receipt | seems like a good idea to let the user know what data was collected and where it was retained by the verifier or other parties. |
payment provider | This is optional and not further covered in this use case - perhaps another use case for payment would be helpful. |
Element | Detail | Notes |
---|---|---|
As a, | User of a web site | |
I want | to acquire access to some resource | |
so that | So that I can download content or physically access some venue | |
Acceptance Criteria - what the user should know | ||
Verifier or Brand | and who else sees the data (that may be in the TOU) | |
Purposes that they can understand | and whether they are required or optional | |
Retention Time | if longer that the life of the transaction |
The user gets some sort of receipt as to what data was provide and what was retained.
Biometric template data should be assumed to be discarded after use unless some specific account to allow future use is created.
# | Step | Description | Issues |
---|---|---|---|
1 | acquire device | typically a smartphone from a telco | |
2 | acquire wallet | can be resident on the phone or acquired from a app store. | |
3 | acquire creds | from issuers like state DMV's or healthcare providers | |
4 | determine a goal | typically travel to another country, go to a ball game or get access to a video | |
5 | go to a web site for access ticket | only needed if access requires check-in or if the user wants assured access | |
6 | go to location of resource | either physical site or digital site | |
5 | select type of access | optional depending on resource, the purpose for the visit may be established here | |
6 | verifier sends request for data | at this point the purpose of the visit and the policy of the rules engines are queried | This is a bundled request which violates FI 2.8.12 |
7 | user wallet presents to user | the wallet converts the requestor name and purposes into a UI for the user to see | |
8 | user chooses | if some purposes have been added at the option of the verifier, the user can remove them | |
9 | presentation of user data | the wallet sends the presentation to the verifier based on the user request | |
10 | acceptance by verifier | this is the PEP = policy enforcement point, the user is granted access or not | |
11 | remediation | if the user is not granted access they should know why and how this can be rectified, usually by directing the user to acquire additional credentials. |
This can be performed by any relying party at any time but must be prior to the request sent to the user.
# | Step | Description |
---|---|---|
1 | state policies | what is the verifier required to do by regulation |
2 | biz policies | what optional information is the verifier requesting |
3 | ||
4 |
Describe what measures or signifies the end of the case
Tom Jones
The following is taken from the Future Identity document (see above) and seems relevant to this use case.