3 Example scenarios of how SSI works

 

by Drummond Reed and Daniel Hardman

In chapter 2 we examined the core building blocks of SSI. In this chapter we’ll show you how these building blocks are put together to implement SSI in seven example scenarios that progress from the very simple to the reasonably complex:

  1. Alice and Bob form a connection after meeting in person at a conference.
  2. Alice and Bob form a connection via Alice’s blog.
  3. Bob logs into Alice’s blog to leave a comment.
  4. Alice and Bob form a connection by meeting through an online dating site.
  5. Alice applies for a bank account.
  6. Alice buys a car.
  7. Alice sells the car to Bob.

Each scenario illustrates basic patterns of SSI usage that you will see repeated in the many industry--specific SSI scenarios we will be exploring in Part Two.

3.1       A simple notation for SSI scenario diagrams

First, we want to introduce a simple notation for the diagrams in this chapter—a notation that illustrates how conceptually easy it is to apply SSI technology to standard business problems (even though there is real rocket science in the underlying cryptography and protocols). Our notation is inspired by the simple connector-style toys that can be found in almost any child’s playroom.

Figure 3.1: SSI diagramming notation is inspired by simple connector-style toys.
Image result for tinker toys

3.2       Scenario #1: Bob meets Alice at a conference

3.3       Scenario #2: Bob meets Alice through her online blog

3.4       Scenario #3: Bob logs into Alice’s blog to leave a comment

3.5       Scenario #4: Bob meets Alice through an online dating site

3.6       Scenario #5: Alice applies for a new bank account

3.7       Scenario #6: Alice buys a car

3.8       Scenario #7: Alice sells the car to Bob

3.9       Summary

sitemap