Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

https://irma.app/docs/overview/

Overview

...

use cases

Sourcing of claims

Gliffy Diagram
5
size1200850
displayNameSourcing
nameSourcing
pagePin7

Evolution towards individuals' control and distributed infrastructure

Gliffy Diagram
size850
displayNameEvolution
nameEvolution
pagePin2

Use of proxies

COms, SRAMs?

Add Social to 4.2?

Image Added

Verifier: consume credentials from holder

Any entity that normally relies on an authentication flow that also aggregates attributes may use IRMA or other another service for login. In this process, the user is challenged with a QR Code to brandish attributes with the help of the wallet app. The wallet app reads the QR code and engages in user interaction: it shows what is requested by the service and which "cards" - previously-stored attributes accommodate the request , if any. Alternatively, in this flow, the user may acquire new cards to fulfill fulfil the request. The wallet then sends the attributes to the service, which can verify them with an a background call.

Gliffy Diagram
macroIda2169e2a-99ff-4bc2-8bde-b3625d5a3715
displayNameVerifier
nameVerifier
pagePin2

...