3 Example scenarios showing how SSI works

 

Drummond Reed, Alex Preukschat, and Daniel Hardman

    Daniel Hardman, former chief architect and CISO at Evernym and now principal ecosystem engineer at SICPA, has been designing SSI infrastructure since before it was called SSI. He has seen firsthand in the market multiple instances of the basic SSI interaction patterns that we describe in this chapter.

    In chapter 2, we examined the core building blocks of self-sovereign identity (SSI). In this chapter, we show you how these building blocks are put together to implement SSI using seven example scenarios that progress from the relatively simple to the reasonably complex. Our objective is to show you how the SSI digital identity model works differently than the centralized or federated digital identity models.

    The scenarios we have chosen are as follows:

    1. Alice and Bob form a connection after meeting in person at a conference.
    2. Alice and Bob form a connection via Alice’s blog.
    3. Bob logs in to Alice’s blog to leave a comment.
    4. Alice and Bob form a connection by meeting through an online dating site.
    5. Alice applies for a bank account.
    6. Alice buys a car.
    7. Alice sells the car to Bob.

    3.1 A simple notation for SSI scenario diagrams

    3.2 Scenario 1: Bob meets Alice at a conference

    3.3 Scenario 2: Bob meets Alice through her online blog

    3.4 Scenario 3: Bob logs in to Alice’s blog to leave a comment

    3.5 Scenario 4: Bob meets Alice through an online dating site

    3.6 Scenario 5: Alice applies for a new bank account

    3.7 Scenario 6: Alice buys a car

    3.8 Scenario 7: Alice sells the car to Bob

    sitemap