Daniel Hardman, former chief architect and CISO at Evernym and now principal ecosystem engineer at SICPA, has been designing SSI infrastructure since before it was called SSI. He has seen firsthand in the market multiple instances of the basic SSI interaction patterns that we describe in this chapter.
In chapter 2, we examined the core building blocks of self-sovereign identity (SSI). In this chapter, we show you how these building blocks are put together to implement SSI using seven example scenarios that progress from the relatively simple to the reasonably complex. Our objective is to show you how the SSI digital identity model works differently than the centralized or federated digital identity models.
- Alice and Bob form a connection after meeting in person at a conference.
- Alice and Bob form a connection via Alice’s blog.
- Bob logs in to Alice’s blog to leave a comment.
- Alice and Bob form a connection by meeting through an online dating site.
- Alice applies for a bank account.
- Alice buys a car.
- Alice sells the car to Bob.