3 Example scenarios of how SSI works
by Drummond Reed, Alex Preukschat and Daniel Hardman
In chapter 2 we examined the core building blocks of self-sovereign identity (SSI). In this chapter we’ll show you how these building blocks are put together to implement SSI in seven example scenarios that progress from simple to the reasonably complex. The objective is to show you how the SSI digital identity model works differently than the centralized or federated digital identity models.
The scenarios we have chosen are:
- Alice and Bob form a connection after meeting in person at a conference.
- Alice and Bob form a connection via Alice’s blog.
- Bob logs into Alice’s blog to leave a comment.
- Alice and Bob form a connection by meeting through an online dating site.
- Alice applies for a bank account.
- Alice buys a car.
- Alice sells the car to Bob.
Our example scenarios use the Alice and Bob characters that have become so iconic in cryptography and cybersecurity that there is an entire Wikipedia article about them.[69] Each scenario illustrates a basic pattern of SSI usage that you will see repeated in the industry-specific SSI scenarios we explore in Part Four.