Table of Contents - Y.3087 (04/2025) - Self-controlled identity based on blockchain – Functional requirements and architecture

1	Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview
7 Functional requirements
7.1 General requirements
7.2 Application layer
7.3 Identity layer
7.4 Infrastructure layer
8 Functional architecture
8.1 SCid subject function
8.2 Identity verification function
8.3 Identity endorsement function
8.4 Identity registry function
8.5 Identity data access management function
8.6 Identity discovery and resolution function
9 Reference points
9.1 Reference point RP-aa
9.2 Reference point RP-asa
9.3 Reference point RP-asv
9.4 Reference point RP-cs
9.5 Reference point RP-cr
9.6 Reference point RP-ar
9.7 Reference point RP-sar
9.8 Reference point RP-svr
9.9 Reference point RP-sri
9.10 Reference point RP-rer
9.11 Reference point RP-rr
10 Basic operational procedures
10.1 Procedure for SCid creation
10.2 Procedure for SCid resolution
10.3 Procedure for SCid verification
10.4 Procedure for verifiable credential application
Page
10.5 Procedure for verifiable credential verification
10.6 Procedure for credential data model scheme registration
11 Security considerations
Bibliography