...
https://irma.app/docs/overview/
Overview
...
use cases
Sourcing of claims
Gliffy Diagram | ||||||||
---|---|---|---|---|---|---|---|---|
|
Evolution towards individuals' control and distributed infrastructure
Gliffy Diagram | ||||||||
---|---|---|---|---|---|---|---|---|
|
Use of proxies
COms, SRAMs?
Add Social to 4.2?
Verifier: consume credentials from holder
Any entity that normally relies on an authentication flow that also aggregates attributes may use IRMA or other another service for login. In this process, the user is challenged with a QR Code to brandish attributes with the help of the wallet app. The wallet app reads the QR code and engages in user interaction: it shows what is requested by the service and which "cards" - previously-stored attributes accommodate the request , if any. Alternatively, in this flow, the user may acquire new cards to fulfill fulfil the request. The wallet then sends the attributes to the service, which can verify them with an a background call.
Gliffy Diagram | ||||||||
---|---|---|---|---|---|---|---|---|
|
...