<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.29 (Ruby 3.4.4) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-spice-use-cases-03" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.31.0 -->
  <front>
    <title>Use Cases for SPICE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-spice-use-cases-03"/>
    <author fullname="Brent Zundel">
      <organization/>
      <address>
        <email>brent.zundel@gmail.com</email>
      </address>
    </author>
    <author fullname="Michael Prorock">
      <organization>Tradeverifyd</organization>
      <address>
        <email>mprorock@tradeverifyd.com</email>
      </address>
    </author>
    <author initials="M. B." surname="Jones" fullname="Michael B. Jones">
      <organization>Self-Issued Consulting</organization>
      <address>
        <postal>
          <country>United States</country>
        </postal>
        <email>michael_b_jones@hotmail.com</email>
        <uri>https://self-issued.info/</uri>
      </address>
    </author>
    <date year="2025" month="October" day="20"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>SPICE</keyword>
    <abstract>
      <?line 65?>

<t>This document describes various use cases related to credential exchange in a
three party model (issuer, holder, verifier). These use cases aid in the
identification of which Secure Patterns for Internet CrEdentials (SPICE) are
most in need of specification or detailed documentation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://ietf-wg-spice.github.io/draft-ietf-spice-use-cases/draft-ietf-spice-use-cases.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-spice-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/ietf-wg-spice/draft-ietf-spice-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 73?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>There is a need to more clearly document digital credentials that utilize the
issuer-holder-verifier model across various work at IETF, ISO, W3C, and other
SDOs. This need particularly arises in use cases for verifiable credentials that
do not involve human-in-the-loop interactions, require strong identifiers for
business entities, call for the benefits of CBOR encoding, or leverage the
cryptographic agility properties of JOSE or COSE. This document covers multiple
use cases for verifiable credentials that help inform both the required
architecture and components, as well as to frame needs for clearly defined
message formats or supporting mechanisms.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="spice-common-patterns">
      <name>SPICE Common Patterns</name>
      <t>Within SPICE there are a few common patterns that continually arise:</t>
      <ul spacing="normal">
        <li>
          <t>Selective disclosure with verifiable credentials</t>
        </li>
        <li>
          <t>Cryptographic agility support via JOSE or COSE, including support for PQC, and
to permit use of the same signature algorithms with both selective
disclosure as well as fully disclosed credentials</t>
        </li>
        <li>
          <t>Strong and long-lived identities that may be correlated with public key
material for verification and permit binding to DNS or existing x509
certificates, as well as providing ready access to public keys for
verification.</t>
        </li>
      </ul>
    </section>
    <section anchor="spice-use-cases">
      <name>SPICE Use Cases</name>
      <t>There are several expanding use cases and common patterns that motivate
the working group and broader community, including:</t>
      <ul spacing="normal">
        <li>
          <t>Microcredentials in education</t>
        </li>
        <li>
          <t>Physical supply chain credentials</t>
        </li>
        <li>
          <t>IoT, control systems, and critical infrastructure</t>
        </li>
        <li>
          <t>Credentials related to authenticity and provenance</t>
        </li>
        <li>
          <t>Offline exchange of credentials</t>
        </li>
        <li>
          <t>Attribute sharing for trusted telephone interactions</t>
        </li>
        <li>
          <t>Mobile driving licenses</t>
        </li>
        <li>
          <t>Embedding credentials in other data formats</t>
        </li>
        <li>
          <t>Digital Wallet Initiatives</t>
        </li>
      </ul>
    </section>
    <section anchor="use-case-discussion">
      <name>Use Case Discussion</name>
      <section anchor="roles">
        <name>Roles</name>
        <t>An "issuer", an entity (person, device, organization, or software agent) that constructs, secures, and shares digital credentials.</t>
        <t>A "holder", an entity (person, device, organization, or software agent) that
stores issued credentials and controls their disclosure.</t>
        <t>A "verifier", an entity (person, device, organization, or software agent) that
receives, verifies, and validates disclosed digital credentials.</t>
      </section>
      <section anchor="microcredentials-in-education">
        <name>Microcredentials in Education</name>
        <t>Microcredentials provide a flexible and verifiable way to recognize skills,
achievements, and competencies in education. Unlike traditional degrees or
certifications, microcredentials offer a modular and portable format that can be
tailored to specific learning outcomes. They enable lifelong learning, career
advancement, and industry-aligned skill validation while allowing learners to
demonstrate their achievements in a verifiable and interoperable manner.</t>
        <t>Common use cases:</t>
        <ul spacing="normal">
          <li>
            <t>Microcredentials for industry-specific skills such as cloud computing,
cybersecurity, or data analytics, enabling verifiable skills on job
applications, LinkedIn profiles, or digital resumes.</t>
          </li>
          <li>
            <t>Recognizing individual competencies as learners progress through a program,
which allows institutions and employers to verify achievements more granularly.</t>
          </li>
          <li>
            <t>Stackable microcredentials that allow learners to accumulate and combine
microcredentials into a larger qualification.</t>
          </li>
          <li>
            <t>Work-integrated learning and apprenticeships: skills and competencies gained
through internships, apprenticeships, or on-the-job training, enabling
employers to issue digital credentials for workplace learning experiences.</t>
          </li>
          <li>
            <t>Recognition of informal learning, community-based education, or non-degree
programs to support individuals without access to traditional higher education.</t>
          </li>
        </ul>
      </section>
      <section anchor="physical-supply-chain-credentials">
        <name>Physical Supply Chain Credentials</name>
        <t>Physical supply chains provide several unique scenarios and requirements for
implementers of digital credentials. There is a strong movement toward
digitization of physical supply chain documents which are typically exchanged on
paper or scanned pdf form today using legacy approaches.
Some steps have been taken towards digitatization of supply chain documents
using XML, however this has proved problematic over native binary formats due to
the complexity, size, and volumes of transmission often involved.</t>
        <t>Common use cases for physical supply chains include:</t>
        <ul spacing="normal">
          <li>
            <t>Regulatory data capture and exchange with governmental bodies</t>
          </li>
          <li>
            <t>Requirements around capturing specific types of data including:
            </t>
            <ul spacing="normal">
              <li>
                <t>Inspection information</t>
              </li>
              <li>
                <t>Permits</t>
              </li>
              <li>
                <t>Compliance certification (both regulatory and private)</t>
              </li>
              <li>
                <t>Traceability information, including change of control and geospatial
coordinates</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Providing the ability for 3rd parties to "certify" information about
another actor in the supply chain. e.g., Vendor A is an approved
supplier for Company X</t>
          </li>
          <li>
            <t>Passing of data between multiple intermediaries, before being sent
along to customs agencies or consignees.</t>
          </li>
          <li>
            <t>Moving large amounts of signed data asyncronously, and bi-directionally
over a network channel</t>
          </li>
          <li>
            <t>Identifying actors in a supply chain and linking them with legal
entity information</t>
          </li>
        </ul>
      </section>
      <section anchor="iot-control-systems-and-critical-infrastructure-credentials">
        <name>IoT, Control Systems, and Critical Infrastructure Credentials</name>
        <t>The deployment of digital credentials in constrained systems such as IoT,
control systems, and critical infrastructure environments introduces challenges.
These systems often operate in environments with strict security, latency, and
interoperability requirements. Digital credentials play a role in ensuring
secure device identity, access control, and trusted data exchange between
interconnected systems.</t>
        <t>Common use cases include:</t>
        <ul spacing="normal">
          <li>
            <t>Device identity and authentication ensuring only authorized IoT devices can
connect to a network or control system.</t>
          </li>
          <li>
            <t>Restricting access to critical systems, such as industrial control systems,
SCADA networks, and energy grid controllers, to only authorized personnel and
devices.</t>
          </li>
          <li>
            <t>Role-based access control (RBAC) and attribute-based access control (ABAC)
policies using digital credentials.</t>
          </li>
          <li>
            <t>Encrypted and authenticated data exchange between industrial sensors,
actuators, and control systems.</t>
          </li>
          <li>
            <t>Verifying software updates and firmware integrity using signed credentials to
prevent unauthorized modifications.</t>
          </li>
          <li>
            <t>Tamper-resistant logging and auditing: digitally signed operational logs and
sensor data to enable post-incident forensic analysis.</t>
          </li>
          <li>
            <t>Temporary access credentials for emergency personnel and automated response
systems during critical incidents.</t>
          </li>
        </ul>
      </section>
      <section anchor="credentials-related-to-authenticity-and-provenance">
        <name>Credentials related to Authenticity and Provenance</name>
        <t>Due to a proliferation of AI-generated or modified content, there is an
increased need to provide the ability to establish the provenance of digital
materials.  Questions of authenticity and the means of creation (human created,
machine assited, machine created) also abound. In cases where an AI created the
content, providing the model information related to the generation of that
content is becoming increasingly important.</t>
        <t>Common use cases include:</t>
        <ul spacing="normal">
          <li>
            <t>Determining whether a received piece of media is human created, and that
the content is authorized for certain uses.</t>
          </li>
          <li>
            <t>Providing the ability to trace training materials for LLMs and similar
models to output</t>
          </li>
          <li>
            <t>Understanding if media was created by an authoritative or trustworthy
source</t>
          </li>
        </ul>
      </section>
      <section anchor="offline-exchange-of-credentials">
        <name>Offline exchange of credentials</name>
        <t>Many real-world scenarios require credentials to be disclosed, verified, and
validated without continuous or immediate access to online services. This can be
due to network limitations, privacy concerns, or operational constraints in
environments where connectivity is intermittent or unavailable. Some digital
credential frameworks assume online verification mechanisms, which may not be
suitable for offline-first environments where entities must verify credentials
using locally-available data and cryptographic techniques.</t>
        <t>Common use cases include:</t>
        <ul spacing="normal">
          <li>
            <t>Identity verification in disconnected environments, such as remote regions,
military operations, or disaster recovery efforts.</t>
          </li>
          <li>
            <t>Travel and border security, where credentials such as visas, vaccination
records, or national IDs must be verified in locations with limited or no
network connectivity.</t>
          </li>
          <li>
            <t>Access control in secure facilities, such as industrial sites, research labs,
or private events.</t>
          </li>
          <li>
            <t>Device authentication in air-gapped systems.</t>
          </li>
          <li>
            <t>Peer-to-peer credential sharing.</t>
          </li>
        </ul>
      </section>
      <section anchor="attribute-sharing-for-trusted-telephone-interactions">
        <name>Attribute Sharing for Trusted Telephone Interactions</name>
        <t>When a user subscribes to a telecom operator, a subscription identifier is
issued that enables the operator to identify the user. However, the subscription
information is limited. Operators or Over-the-Top (OTT) providers with the
capability to verify user VCs, which serve as reliable proofs of users'
attributes, enable a user to share those attributes over a telecom network.</t>
        <t>Common use cases include:</t>
        <ul spacing="normal">
          <li>
            <t>Bank employees taking calls from customers can receive digitally signed
account information, which enables a smoother experience for the customer and a
higher level of assurance for the bank.</t>
          </li>
          <li>
            <t>Identification of the user across network domains supports mobility in a
larger area (e.g., cross-border traveling, studying abroad) by endorsing
attributes (e.g. , “subscriber of a legal operator”).</t>
          </li>
          <li>
            <t>Disclosure of a user’s role or affiliation to other parties during a phone
call by presenting the attributes endorsed by the operator or OTT providers.</t>
          </li>
          <li>
            <t>Operator or OTT provider service provisioning by verifying user attributes
(e.g., subscription status)</t>
          </li>
        </ul>
      </section>
      <section anchor="mobile-driving-licenses">
        <name>Mobile Driving Licenses</name>
        <t>The primary purposes of a driving licence are to confirm identity and convey
driving privileges. In order to be trustworthy, issuers take duty to do identity
proofing seriously. The trusted identity attributes (e.g., photo, address, date
of birth/age, full name) confirmed by these issuers are of value to
establishments that need to verify a customer’s age, identity, current contact
information, or driving privileges.</t>
        <t>The primary use case envisioned is defined as follows:</t>
        <ul spacing="normal">
          <li>
            <t>Holders can transmit sets of data attributes to a verifier over any
communication channel supported by both parties. Data resides on the mobile
device and it arrives intact with proof that there was no tampering.</t>
          </li>
        </ul>
      </section>
      <section anchor="embedding-credentials-in-other-data-formats">
        <name>Embedding Credentials in Other Data Formats</name>
        <t>Embedding credentials within other data formats allows for the direct
integration of verifiable attestations into the content itself. This binds the
proof of provenance directly to the data object, allowing the the credential to
travel with the content. This makes the data self-authenticating. Common data
formats for embedding include PDFs, images, media files, and other structured
documents.</t>
        <t>Common use cases include:</t>
        <ul spacing="normal">
          <li>
            <t>A news organization embedding a credential within a PDF of a news article that
attests to its authenticity.</t>
          </li>
          <li>
            <t>A photographer's digital camera embedding a credential in each digital image
to show provenance.</t>
          </li>
          <li>
            <t>Scientific researchers embedding credentials in a research paper to attest to
the integrity of the data and the validity of the research findings.</t>
          </li>
          <li>
            <t>Manufacturing companies embedding credentials in digital twins or 3D models of
physical parts to prove their authenticity and supply chain provenance.</t>
          </li>
        </ul>
      </section>
      <section anchor="digital-wallets">
        <name>Digital Wallets</name>
        <t>TODO digital wallet use case</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>There are no security considerations for this document.</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 338?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>The authors would like to thank the following individuals for their
contributions to this specification:
Yurong Song, Lun Li, Donghui Wang, Fei Liu</t>
    </section>
    <section numbered="false" anchor="document-history">
      <name>Document History</name>
      <t>-03</t>
      <ul spacing="normal">
        <li>
          <t>Added Mobile Driving Licenses use case.</t>
        </li>
        <li>
          <t>Described Embedding Credentials in Other Data Formats.</t>
        </li>
        <li>
          <t>Added Michael B. Jones as an author.</t>
        </li>
      </ul>
      <t>-02</t>
      <ul spacing="normal">
        <li>
          <t>Added telecom use case</t>
        </li>
        <li>
          <t>added contributors</t>
        </li>
        <li>
          <t>added acknowledgements</t>
        </li>
        <li>
          <t>added security considerations</t>
        </li>
      </ul>
      <t>-01</t>
      <ul spacing="normal">
        <li>
          <t>Added offline use case</t>
        </li>
        <li>
          <t>Added IoT use case</t>
        </li>
        <li>
          <t>Added microcredentials use case</t>
        </li>
        <li>
          <t>Changed author affiliations</t>
        </li>
      </ul>
      <t>-00</t>
      <ul spacing="normal">
        <li>
          <t>Initial individual draft</t>
        </li>
      </ul>
    </section>
    <section anchor="contributors" numbered="false" toc="include" removeInRFC="false">
      <name>Contributors</name>
      <contact fullname="Yurong Song">
        <organization>Huawei</organization>
        <address>
          <email>songyurong1@huawei.com</email>
        </address>
      </contact>
      <contact fullname="Lun Li">
        <organization>Huawei</organization>
        <address>
          <email>lilun20@huawei.com</email>
        </address>
      </contact>
      <contact fullname="Donghui Wang">
        <organization>Huawei</organization>
        <address>
          <email>wangdonghui124@huawei.com</email>
        </address>
      </contact>
      <contact fullname="Fei Liu">
        <organization>Huawei</organization>
        <address>
          <email>liufei19@huawei.com</email>
        </address>
      </contact>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
