Table of Contents - Y.3087 (04/2025) - Self-controlled identity based on blockchain – Functional requirements and architecture
1 Scope 2 References 3 Definitions 3.1 Terms defined elsewhere 3.2 Terms defined in this Recommendation 4 Abbreviations and acronyms 5 Conventions 6 Overview 7 Functional requirements 7.1 General requirements 7.2 Application layer 7.3 Identity layer 7.4 Infrastructure layer 8 Functional architecture 8.1 SCid subject function 8.2 Identity verification function 8.3 Identity endorsement function 8.4 Identity registry function 8.5 Identity data access management function 8.6 Identity discovery and resolution function 9 Reference points 9.1 Reference point RP-aa 9.2 Reference point RP-asa 9.3 Reference point RP-asv 9.4 Reference point RP-cs 9.5 Reference point RP-cr 9.6 Reference point RP-ar 9.7 Reference point RP-sar 9.8 Reference point RP-svr 9.9 Reference point RP-sri 9.10 Reference point RP-rer 9.11 Reference point RP-rr 10 Basic operational procedures 10.1 Procedure for SCid creation 10.2 Procedure for SCid resolution 10.3 Procedure for SCid verification 10.4 Procedure for verifiable credential application Page 10.5 Procedure for verifiable credential verification 10.6 Procedure for credential data model scheme registration 11 Security considerations Bibliography
|