3 Example scenarios of how SSI works

 

by Drummond Reed, Alex Preukschat and Daniel Hardman

In chapter 2 we examined the core building blocks of self-sovereign identity (SSI). In this chapter we’ll show you how these building blocks are put together to implement SSI in seven example scenarios that progress from simple to the reasonably complex. The objective is to show you how the SSI digital identity model works differently than the centralized or federated digital identity models.

The scenarios we have chosen are:

  1. Alice and Bob form a connection after meeting in person at a conference.
  2. Alice and Bob form a connection via Alice’s blog.
  3. Bob logs into Alice’s blog to leave a comment.
  4. Alice and Bob form a connection by meeting through an online dating site.
  5. Alice applies for a bank account.
  6. Alice buys a car.
  7. Alice sells the car to Bob.

Our example scenarios use the Alice and Bob characters that have become so iconic in cryptography and cybersecurity that there is an entire Wikipedia article about them.[69] Each scenario illustrates a basic pattern of SSI usage that you will see repeated in the industry-specific SSI scenarios we explore in Part Four.

3.1   A simple notation for SSI scenario diagrams

3.2   Scenario #1: Bob meets Alice at a conference

3.3   Scenario #2: Bob meets Alice through her online blog

3.4   Scenario #3: Bob logs into Alice’s blog to leave a comment

3.5   Scenario #4: Bob meets Alice through an online dating site

3.6   Scenario #5: Alice applies for a new bank account

3.7   Scenario #6: Alice buys a car

3.8   Scenario #7: Alice sells the car to Bob

3.9   Summary

sitemap