<?xml version="1.0" encoding="utf-8"?>
<!-- name="GENERATOR" content="github.com/mmarkdown/mmark Mmark Markdown Processor - mmark.miek.nl" -->
<rfc version="3" ipr="trust200902" docName="draft-prorock-spice-use-cases-01" submissionType="IETF" category="info" xml:lang="en" xmlns:xi="http://www.w3.org/2001/XInclude" indexInclude="true">

<front>
<title abbrev="sd-cwt">Use Cases for SPICE</title><seriesInfo value="draft-prorock-spice-use-cases-01" stream="IETF" status="informational" name="Internet-Draft"></seriesInfo>
<author initials="M." surname="Prorock" fullname="Michael Prorock"><organization>mesur.io</organization><address><postal><street></street>
</postal><email>mprorock@mesur.io</email>
</address></author><author initials="B." surname="Zundel" fullname="Brent Zundel"><organization>Gen Digital</organization><address><postal><street></street>
</postal><email>Brent.Zundel@gendigital.com</email>
</address></author><date/>
<area>Internet</area>
<workgroup>None</workgroup>
<keyword>SPICE</keyword>

<abstract>
<t>This document describes various use cases related to credential exchange
in a three party model (issuer, holder, verifier). These use cases aid
in the identification of which Secure Patterns for Internet CrEdentials
(SPICE) are most in need of specification or detailed documentation.</t>
</abstract>

</front>

<middle>

<section anchor="notational-conventions"><name>Notational Conventions</name>
<t>The key words &quot;<bcp14>MUST</bcp14>&quot;, &quot;<bcp14>MUST NOT</bcp14>&quot;, &quot;<bcp14>REQUIRED</bcp14>&quot;, &quot;<bcp14>SHALL</bcp14>&quot;, &quot;<bcp14>SHALL NOT</bcp14>&quot;, &quot;<bcp14>SHOULD</bcp14>&quot;,
&quot;<bcp14>SHOULD NOT</bcp14>&quot;, &quot;<bcp14>RECOMMENDED</bcp14>&quot;, &quot;<bcp14>MAY</bcp14>&quot;, and &quot;<bcp14>OPTIONAL</bcp14>&quot; in this
document are to be interpreted as described in <xref target="RFC2119"></xref>.</t>
</section>

<section anchor="introduction"><name>Introduction</name>
<t>There is a need to more clearly document verifiable credentials - that
is credentials that utilize the issuer, holder, and verifier (three
party) model across various work IETF, ISO, W3C, and other SDOs.  This
need particularly arises in use cases for verifiable credentials that do
not involve human-in-the-loop interactions, need strong identifiers for
business entities, and for those that require CBOR encoding, and those
that leverage the cryptographic agility properties of COSE. This
document which covers multiple use cases for verifiable credentials will
help inform both the required architecture and components, as well as to
help frame needs for any clearly defined message formats and/or
supporting mechanisms.</t>
</section>

<section anchor="spice-common-patterns"><name>SPICE Common Patterns</name>
<t>Within SPICE there are a few common patterns that continually arise:</t>

<ul spacing="compact">
<li>A need for selective disclosure with CBOR based verifiable credentials</li>
<li>Cryptographic agility support via COSE, including support for PQC, and
to permit use of the same signature algorithms with both selective
disclosure as well as fully disclosed credentials</li>
<li>Required strong and long lived identities that are correlated with
public key material for verifiacation and permit binding to DNS,
existing x509 certificates, as well as providing ready access to
public keys for verification utilizing HTTP</li>
</ul>
</section>

<section anchor="spice-use-cases"><name>SPICE Use Cases</name>
<t>There are several expanding use cases and common patterns that motivate
the working group and broader community, including:</t>

<ul spacing="compact">
<li>Use of microcredentials, particularly in education</li>
<li><t>Digitization of physical supply chain credentials in multiple
jurisdictions</t>

<ul spacing="compact">
<li>CBOR credentials</li>
<li>High volume with system to system exchange of credentions</li>
<li>both regulatory data as well as business driven information</li>
</ul></li>
<li>IoT, Control Systems, and Critical Infrastructure related Credentials</li>
<li>Credentials related to authenticity and provenance, especially of
digital media</li>
<li>Offline exchange (in person) of credentials that may have been
internet issued</li>
<li>Embedding of credentials in other data formats</li>
<li>Digital Wallet Initiatives</li>
</ul>
</section>

<section anchor="use-case-discussion"><name>Use Case Discussion</name>

<section anchor="roles"><name>Roles</name>
<t>An &quot;issuer&quot;, an entity (person, device, organization, or software agent) that constructs and secures digital credentials.</t>
<t>A &quot;holder&quot;, an entity (person, device, organization, or software agent) that controls the disclosure of credentials.</t>
<t>A &quot;verifier&quot;, an entity (person, device, organization, or software agent) that verifies and validates secured digital credentials.</t>
</section>

<section anchor="physical-supply-chain-credentials"><name>Physical Supply Chain Credentials</name>
<t>Physical supply chain credentials create several unique scenarios and
requirements for technical implementers. There is a strong movement
towards digitiztion of physical supply chain data which is often
exchanged in paper or scanned pdf form today using legacy approaches.
Some steps have been taken towards digitatization of supply chain data
in XML, however the steps have proved problematic over native binary
formats due to the complexity, size, and volumes of transmission often
involved.</t>
<t>Common use cases for physical supply chains include:</t>

<ul spacing="compact">
<li>Regulatory data capture and exchange with governmental bodies</li>
<li><t>Requirements around capturing specific types of data including:</t>

<ul spacing="compact">
<li>Inspection information</li>
<li>Permits</li>
<li>Compliance certification (both regulatory and private)</li>
<li>Traceability information, including change of control and geospatial
coordinates</li>
</ul></li>
<li>Providing the ability for 3rd parties to &quot;certify&quot; information about
another actor in the supply chain. e.g. Vendor A is an approved
supplier for Company X</li>
<li>Passing of data between multiple intermediaries, before being sent
along to customs agencies or consignees.</li>
<li>Moving large amounts of signed data asyncronously, and bi-directionally
over a network channel</li>
<li>Identifying actors in a supply chain and linking them with legal
entity information</li>
</ul>
</section>

<section anchor="credentials-related-to-authenticity-and-provenance"><name>Credentials related to Authenticity and Provenance</name>
<t>Due to a proliferation of AI generated or modified content, there has
been an increased need to provide the ability to establish the
provenance of digital material.  Questions of authenticity and the means
of creation (human created, machine assited, machine created) also
abound, and in cases where AI generated content, providing the model
information related to the generation of that content is becoming
increasingly important.</t>
<t>Common use cases include:</t>

<ul spacing="compact">
<li>Understanding if a received piece of media is human created, and that
the content is authorized for certain uses.</li>
<li>Providing the ability to trace training materials for LLMs and similar
models to output</li>
<li>Understanding if media was created by an authoritative or trustworthy
source</li>
</ul>
</section>

<section anchor="others"><name>Others</name>
<t>TBD</t>
</section>
</section>

<section anchor="security-considerations"><name>Security Considerations</name>
<t>TBD</t>
</section>

<section anchor="iana-considerations"><name>IANA Considerations</name>
<t>NONE</t>
</section>

<section anchor="acknowledgements"><name>Acknowledgements</name>
<t>The authors would like to thank those that have worked on similar items
and/or whom have provided input into this document, especially: Hannes
Tschofenig, Henk Birkholz, Heather Flanagan, Kaliya Young, Orie Steele,
Leif Johansson, Pamela Dingle, Tobias Looker, Kristina Yasuda, Daniel
Fett, Oliver Terbu, and Michael Jones.</t>
</section>

</middle>

<back>
<references><name>Normative References</name>
<xi:include href="https://bib.ietf.org/public/rfc/bibxml/reference.RFC.2119.xml"/>
</references>

</back>

</rfc>
