<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.7.19 (Ruby 3.3.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-ietf-spice-use-cases-00" category="info" consensus="true" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.23.0 -->
  <front>
    <title>Use Cases for SPICE</title>
    <seriesInfo name="Internet-Draft" value="draft-ietf-spice-use-cases-00"/>
    <author fullname="Michael Prorock">
      <organization>mesur.io</organization>
      <address>
        <email>mprorock@mesur.io</email>
      </address>
    </author>
    <author fullname="Brent Zundel">
      <organization>mesur.io</organization>
      <address>
        <email>brent.zundel@mesur.io</email>
      </address>
    </author>
    <date year="2024" month="September" day="10"/>
    <area>Security</area>
    <workgroup>Secure Patterns for Internet CrEdentials</workgroup>
    <keyword>SPICE</keyword>
    <abstract>
      <?line 39?>

<t>This document describes various use cases related to credential exchange in a
three party model (issuer, holder, verifier). These use cases aid in the
identification of which Secure Patterns for Internet CrEdentials (SPICE) are
most in need of specification or detailed documentation.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://brentzundel.github.io/draft-ietf-spice-use-cases/draft-ietf-spice-use-cases.html"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-ietf-spice-use-cases/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Secure Patterns for Internet CrEdentials Working Group mailing list (<eref target="mailto:spice@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/spice/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/spice/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/brentzundel/draft-ietf-spice-use-cases"/>.</t>
    </note>
  </front>
  <middle>
    <?line 47?>

<section anchor="introduction">
      <name>Introduction</name>
      <t>There is a need to more clearly document verifiable credentials - that is
credentials that utilize the issuer, holder, and verifier (three party) model
across various work IETF, ISO, W3C, and other SDOs. This need particularly
arises in use cases for verifiable credentials that do not involve
human-in-the-loop interactions, need strong identifiers for business entities,
and for those that require CBOR encoding, and those that leverage the
cryptographic agility properties of COSE. This document which covers multiple
use cases for verifiable credentials will help inform both the required
architecture and components, as well as to help frame needs for any clearly
defined message formats and/or supporting mechanisms.</t>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <?line -18?>

</section>
    <section anchor="spice-common-patterns">
      <name>SPICE Common Patterns</name>
      <t>Within SPICE there are a few common patterns that continually arise:</t>
      <ul spacing="normal">
        <li>
          <t>A need for selective disclosure with CBOR based verifiable credentials</t>
        </li>
        <li>
          <t>Cryptographic agility support via COSE, including support for PQC, and
to permit use of the same signature algorithms with both selective
disclosure as well as fully disclosed credentials</t>
        </li>
        <li>
          <t>Required strong and long lived identities that are correlated with
public key material for verifiacation and permit binding to DNS,
existing x509 certificates, as well as providing ready access to
public keys for verification utilizing HTTP</t>
        </li>
      </ul>
    </section>
    <section anchor="spice-use-cases">
      <name>SPICE Use Cases</name>
      <t>There are several expanding use cases and common patterns that motivate
the working group and broader community, including:</t>
      <ul spacing="normal">
        <li>
          <t>Use of microcredentials, particularly in education</t>
        </li>
        <li>
          <t>Digitization of physical supply chain credentials in multiple
jurisdictions
          </t>
          <ul spacing="normal">
            <li>
              <t>CBOR credentials</t>
            </li>
            <li>
              <t>High volume with system to system exchange of credentions</t>
            </li>
            <li>
              <t>both regulatory data as well as business driven information</t>
            </li>
          </ul>
        </li>
        <li>
          <t>IoT, Control Systems, and Critical Infrastructure related Credentials</t>
        </li>
        <li>
          <t>Credentials related to authenticity and provenance, especially of
digital media</t>
        </li>
        <li>
          <t>Offline exchange (in person) of credentials that may have been
internet issued</t>
        </li>
        <li>
          <t>Embedding of credentials in other data formats</t>
        </li>
        <li>
          <t>Digital Wallet Initiatives</t>
        </li>
      </ul>
    </section>
    <section anchor="use-case-discussion">
      <name>Use Case Discussion</name>
      <section anchor="roles">
        <name>Roles</name>
        <t>An "issuer", an entity (person, device, organization, or software agent) that constructs and secures digital credentials.</t>
        <t>A "holder", an entity (person, device, organization, or software agent) that controls the disclosure of credentials.</t>
        <t>A "verifier", an entity (person, device, organization, or software agent) that verifies and validates secured digital credentials.</t>
      </section>
      <section anchor="physical-supply-chain-credentials">
        <name>Physical Supply Chain Credentials</name>
        <t>Physical supply chain credentials create several unique scenarios and
requirements for technical implementers. There is a strong movement
towards digitiztion of physical supply chain data which is often
exchanged in paper or scanned pdf form today using legacy approaches.
Some steps have been taken towards digitatization of supply chain data
in XML, however the steps have proved problematic over native binary
formats due to the complexity, size, and volumes of transmission often
involved.</t>
        <t>Common use cases for physical supply chains include:</t>
        <ul spacing="normal">
          <li>
            <t>Regulatory data capture and exchange with governmental bodies</t>
          </li>
          <li>
            <t>Requirements around capturing specific types of data including:
            </t>
            <ul spacing="normal">
              <li>
                <t>Inspection information</t>
              </li>
              <li>
                <t>Permits</t>
              </li>
              <li>
                <t>Compliance certification (both regulatory and private)</t>
              </li>
              <li>
                <t>Traceability information, including change of control and geospatial
coordinates</t>
              </li>
            </ul>
          </li>
          <li>
            <t>Providing the ability for 3rd parties to "certify" information about
another actor in the supply chain. e.g. Vendor A is an approved
supplier for Company X</t>
          </li>
          <li>
            <t>Passing of data between multiple intermediaries, before being sent
along to customs agencies or consignees.</t>
          </li>
          <li>
            <t>Moving large amounts of signed data asyncronously, and bi-directionally
over a network channel</t>
          </li>
          <li>
            <t>Identifying actors in a supply chain and linking them with legal
entity information</t>
          </li>
        </ul>
      </section>
      <section anchor="credentials-related-to-authenticity-and-provenance">
        <name>Credentials related to Authenticity and Provenance</name>
        <t>Due to a proliferation of AI generated or modified content, there has
been an increased need to provide the ability to establish the
provenance of digital material.  Questions of authenticity and the means
of creation (human created, machine assited, machine created) also
abound, and in cases where AI generated content, providing the model
information related to the generation of that content is becoming
increasingly important.</t>
        <t>Common use cases include:</t>
        <ul spacing="normal">
          <li>
            <t>Understanding if a received piece of media is human created, and that
the content is authorized for certain uses.</t>
          </li>
          <li>
            <t>Providing the ability to trace training materials for LLMs and similar
models to output</t>
          </li>
          <li>
            <t>Understanding if media was created by an authoritative or trustworthy
source</t>
          </li>
        </ul>
      </section>
      <section anchor="others">
        <name>Others</name>
        <t>TBD</t>
      </section>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references anchor="sec-normative-references">
      <name>Normative References</name>
      <reference anchor="RFC2119">
        <front>
          <title>Key words for use in RFCs to Indicate Requirement Levels</title>
          <author fullname="S. Bradner" initials="S." surname="Bradner"/>
          <date month="March" year="1997"/>
          <abstract>
            <t>In many standards track documents several words are used to signify the requirements in the specification. These words are often capitalized. This document defines these words as they should be interpreted in IETF documents. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="2119"/>
        <seriesInfo name="DOI" value="10.17487/RFC2119"/>
      </reference>
      <reference anchor="RFC8174">
        <front>
          <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
          <author fullname="B. Leiba" initials="B." surname="Leiba"/>
          <date month="May" year="2017"/>
          <abstract>
            <t>RFC 2119 specifies common key words that may be used in protocol specifications. This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the defined special meanings.</t>
          </abstract>
        </front>
        <seriesInfo name="BCP" value="14"/>
        <seriesInfo name="RFC" value="8174"/>
        <seriesInfo name="DOI" value="10.17487/RFC8174"/>
      </reference>
    </references>
    <?line 189?>

<section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
