<?xml version='1.0' encoding='utf-8'?>
<!DOCTYPE rfc [
  <!ENTITY nbsp    "&#160;">
  <!ENTITY zwsp   "&#8203;">
  <!ENTITY nbhy   "&#8209;">
  <!ENTITY wj     "&#8288;">
]>
<?xml-stylesheet type="text/xsl" href="rfc2629.xslt" ?>
<!-- generated by https://github.com/cabo/kramdown-rfc version 1.6.24 (Ruby 3.1.3) -->
<rfc xmlns:xi="http://www.w3.org/2001/XInclude" ipr="trust200902" docName="draft-tigress-requirements-08" category="info" submissionType="IETF" tocInclude="true" sortRefs="true" symRefs="true" version="3">
  <!-- xml2rfc v2v3 conversion 3.16.0 -->
  <front>
    <title abbrev="tigress-requirements">Transfer Digital Credentials Securely - Requirements</title>
    <seriesInfo name="Internet-Draft" value="draft-tigress-requirements-08"/>
    <author initials="D." surname="Vinokurov" fullname="Dmitry Vinokurov">
      <organization>Apple Inc</organization>
      <address>
        <email>dvinokurov@apple.com</email>
      </address>
    </author>
    <author initials="C." surname="Astiz" fullname="Casey Astiz">
      <organization>Apple Inc</organization>
      <address>
        <email>castiz@apple.com</email>
      </address>
    </author>
    <author initials="A." surname="Pelletier" fullname="Alex Pelletier">
      <organization>Apple Inc</organization>
      <address>
        <email>a_pelletier@apple.com</email>
      </address>
    </author>
    <author initials="B." surname="Lassey" fullname="Brad Lassey">
      <organization>Alphabet Inc</organization>
      <address>
        <email>lassey@google.com</email>
      </address>
    </author>
    <date year="2023" month="February" day="23"/>
    <area>Applications and Real-Time</area>
    <workgroup>Transfer dIGital cREdentialS Securely</workgroup>
    <keyword>tigress</keyword>
    <keyword>requirements</keyword>
    <abstract>
      <t>This document describes the use cases necessitating the secure transfer of digital credentials, residing in a digital wallet, between two devices and defines general assumptions, requirements and the scope for possible solutions to this problem.</t>
    </abstract>
    <note removeInRFC="true">
      <name>About This Document</name>
      <t>
        The latest revision of this draft can be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
        Status information for this document may be found at <eref target="https://datatracker.ietf.org/doc/draft-tigress-requirements/"/>.
      </t>
      <t>
        Discussion of this document takes place on the
        Transfer dIGital cREdentialS Securely Working Group mailing list (<eref target="mailto:tigress@ietf.org"/>),
        which is archived at <eref target="https://mailarchive.ietf.org/arch/browse/tigress/"/>.
        Subscribe at <eref target="https://www.ietf.org/mailman/listinfo/tigress/"/>.
      </t>
      <t>Source for this draft and an issue tracker can be found at
        <eref target="https://github.com/dimmyvi/tigress-requirements"/>.</t>
    </note>
  </front>
  <middle>
    <section anchor="introduction">
      <name>Introduction</name>
      <t>In this document we are identifying a problem of transferring digital credentials (e.g. a digital car key, a digital key to a hotel room or a digital key to a private house) from a wallet on one device (smartphone) to another, particularly, if these devices belong to two different platforms (e.g. one is iOS, another - Android).
Today, there is no widely accepted way of transferring digital credentials securely between two digital wallets independent of hardware and software manufacturer. This document describes the problem space and the requirements for the solution the working group creates.</t>
      <t>A Working Group, called Tigress has been established to find a solution to the problem described above.
Within the WG an initial solution was presented (https://datatracker.ietf.org/doc/draft-art-tigress). The community decided to generalize the requirements to the solution and consider alternative solutions within the WG.</t>
      <t>This document presents the general requirements to possible solutions and  specifies certain privacy requirements in order to maintain a high level of user privacy.</t>
    </section>
    <section anchor="general-setting">
      <name>General Setting</name>
      <t>When sharing digital secure credentials, there are several actors involved. This document will focus on sharing information between two digital wallets, directly or through an intermediary server.</t>
      <t>Digital credentials provide access to property owned and / or operated by 3-rd party entities, such as hotel or residential building owners. The entity that is providing the digital credential for consumption by a digital wallet is referred to as the Provisioning Entity.
For some kind of credentials, the Provisioning Entity may need to have control over digital credential issuance and life time management - for example, hotel is the owner of the rooms and allow guests to access them for the time of thier stay only.</t>
      <t>A digital wallet is a combination of software and hardware in a smartphone device, there are two devices involved in credential transfer process - Sender and Receiver. They are defined in terms of which one is a transfer initiator (Sender) and which device is eventually consuming transferred credentials (Receiver). Device roles can change based on the transfer direction - in some transfers a device can act as a Sender, in other - as a Receiver.</t>
      <t>The interface between the device and the Provisioning Entity can be proprietary or a part of published specifications. The sender wallet obtains provisioning information from the Provisioning Entity, then shares it to the recipient using a solution defined in Tigress WG. The recipient then takes that provisioning information and sends it to the Provisioning Entity to redeem for credential for consumption in a digital wallet.</t>
      <t>For some credential types the Provisioning Entity who issues new credentials is actually the sender wallet. In that scenario the receiver will generate new key material at the request of the sender, and then communicate with the sender over Tigress to have its key material signed by the sender. The new credential, with the key material generated by receiver device and signed by sender device, will finally be added (provisioned) into a digital wallet on sender device.</t>
      <section anchor="credential-transfer-without-provisioning-entity-ccc-digital-key-30">
        <name>Credential transfer without Provisioning Entity <xref target="CCC-Digital-Key-30"/></name>
        <artset>
          <artwork type="svg"><svg xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg" height="271px" preserveAspectRatio="none" version="1.1" viewBox="0 0 704 271" width="704px">
              <defs/>
              <g>
                <line x1="37" x2="37" y1="37.0146" y2="235.8105" stroke="black" stroke-width="0.5"/>
                <line x1="331.5" x2="331.5" y1="37.0146" y2="235.8105" stroke="black" stroke-width="0.5"/>
                <line x1="662" x2="662" y1="37.0146" y2="235.8105" stroke="black" stroke-width="0.5"/>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="64" x="5" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="12" y="26.0752">Sender</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="64" x="5" y="234.8105" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="12" y="255.8857">Sender</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="103" x="280.5" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="287.5" y="26.0752">Intermediary</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="103" x="280.5" y="234.8105" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="287.5" y="255.8857">Intermediary</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="72" x="626" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="633" y="26.0752">Receiver</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="72" x="626" y="234.8105" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="633" y="255.8857">Receiver</text>
                <polygon fill="black" points="320,64.814,330,68.814,320,72.814,324,68.814" stroke="black" stroke-width="1.0"/>
                <line x1="37" x2="326" y1="68.814" y2="68.814" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="44" y="64.0845">upload Sharing Invitation</text>
                <polygon fill="black" points="650,94.6133,660,98.6133,650,102.6133,654,98.6133" stroke="black" stroke-width="1.0"/>
                <line x1="37" x2="656" y1="98.6133" y2="98.6133" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="44" y="93.8838">send invite</text>
                <polygon fill="black" points="343,124.4126,333,128.4126,343,132.4126,339,128.4126" stroke="black" stroke-width="1.0"/>
                <line x1="337" x2="661" y1="128.4126" y2="128.4126" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="349" y="123.6831">upload Key Signing Request</text>
                <polygon fill="black" points="320,154.2119,330,158.2119,320,162.2119,324,158.2119" stroke="black" stroke-width="1.0"/>
                <line x1="37" x2="326" y1="158.2119" y2="158.2119" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="44" y="153.4824">read Key Signing Request</text>
                <polygon fill="black" points="320,184.0112,330,188.0112,320,192.0112,324,188.0112" stroke="black" stroke-width="1.0"/>
                <line x1="37" x2="326" y1="188.0112" y2="188.0112" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="44" y="183.2817">generate and upload Key Import Request</text>
                <polygon fill="black" points="343,213.8105,333,217.8105,343,221.8105,339,217.8105" stroke="black" stroke-width="1.0"/>
                <line x1="337" x2="661" y1="217.8105" y2="217.8105" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="349" y="213.0811">read Key Import Request and Import Key Data</text>
                <!--MD5=[24d3e4661427aeb089736a6334fa18b1]
@startuml

participant Sender as S
participant Intermediary as I
participant Receiver as R

S -> I: upload Sharing Invitation
S -> R: send invite
R -> I: upload Key Signing Request
S -> I: read Key Signing Request
S -> I: generate and upload Key Import Request
R -> I: read Key Import Request and Import Key Data

@enduml

PlantUML version 1.2022.8(Sun Sep 25 09:00:33 GMT 2022)
(GPL source distribution)
Java Runtime: OpenJDK Runtime Environment
JVM: OpenJDK 64-Bit Server VM
Default Encoding: UTF-8
Language: en
Country: US
-->
  </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[     ┌──────┐                             ┌────────────┐                                 ┌────────┐
     │Sender│                             │Intermediary│                                 │Receiver│
     └──┬───┘                             └─────┬──────┘                                 └───┬────┘
        │       upload Sharing Invitation       │                                            │     
        │ ──────────────────────────────────────>                                            │     
        │                                       │                                            │     
        │                                     send invite                                    │     
        │ ───────────────────────────────────────────────────────────────────────────────────>     
        │                                       │                                            │     
        │                                       │         upload Key Signing Request         │     
        │                                       │ <───────────────────────────────────────────     
        │                                       │                                            │     
        │        read Key Signing Request       │                                            │     
        │ ──────────────────────────────────────>                                            │     
        │                                       │                                            │     
        │ generate and upload Key Import Request│                                            │     
        │ ──────────────────────────────────────>                                            │     
        │                                       │                                            │     
        │                                       │ read Key Import Request and Import Key Data│     
        │                                       │ <───────────────────────────────────────────     
     ┌──┴───┐                             ┌─────┴──────┐                                 ┌───┴────┐
     │Sender│                             │Intermediary│                                 │Receiver│
     └──────┘                             └────────────┘                                 └────────┘
]]></artwork>
        </artset>
      </section>
    </section>
    <section anchor="conventions-and-definitions">
      <name>Conventions and Definitions</name>
      <t>The key words "<bcp14>MUST</bcp14>", "<bcp14>MUST NOT</bcp14>", "<bcp14>REQUIRED</bcp14>", "<bcp14>SHALL</bcp14>", "<bcp14>SHALL
NOT</bcp14>", "<bcp14>SHOULD</bcp14>", "<bcp14>SHOULD NOT</bcp14>", "<bcp14>RECOMMENDED</bcp14>", "<bcp14>NOT RECOMMENDED</bcp14>",
"<bcp14>MAY</bcp14>", and "<bcp14>OPTIONAL</bcp14>" in this document are to be interpreted as
described in BCP 14 <xref target="RFC2119"/> <xref target="RFC8174"/> when, and only when, they
appear in all capitals, as shown here.</t>
      <t>General terms:</t>
      <ul spacing="normal">
        <li>Credential information - data used to authenticate the user with an access point.</li>
        <li>Provisioning information - data transferred from Sender to Receiver device that is both necessary and sufficient for the Receiver to request a new credential from Provisioning Entity to provision it to the Receiver device.</li>
        <li>Provisioning - A process of adding a new credential to the device.</li>
        <li>Provisioning Entity - an entity which facilitates Credential Information lifecycle on a device - for some types of access credentials (e.g. hotels, corporate access). Lifecycle may include provisioning of credential, credential termination, credential update.</li>
        <li>Sender (device) - a device initiating a transfer of Provisioning Information to a Receiver that can provision this credential.</li>
        <li>Receiver (device) - a device that receives Provisioning Information and uses it to provision a new credential.</li>
        <li>Intermediary (server) - an optional intermediary server that provides a standardized and platform-independent way of transferring provisioning information between Sender and Receiver devices, acting as a temporary store and forward service between Sender and Receiver.</li>
        <li>Digital Wallet - A device, service, and/or software that faciliates transactions either online or in-person via a technology like NFC. Digital Wallet's typically support payments, drivers licenses, loyalty cards, access credentials and more.</li>
      </ul>
    </section>
    <section anchor="use-cases">
      <name>Use Cases</name>
      <ul spacing="normal">
        <li>Let's say Ben owns a vehicle that supports digital car keys. Ben would like to let Ryan borrow the car for the weekend. Ryan and Ben are using two different devices (smartphones) with different operating systems. In order for Ben to share his digital car key to Ryan for a weekend, he must transfer some data to the receiver device. Receiver device generates new key material and return it to the sender to sign and return back to the receiver. At this point, the receiver now has a token that will allow them to provision their new key with the car.</li>
        <li>Bob booked a room at a hotel for the weekend, but will be arriving late at night. Alice, his partner, comes to the hotel first, so Bob wants to share his digital room key with Alice. Bob and Alice are using two different mobile phones with different operating systems. In order for Bob to share his digital room key to Alice for a weekend, he must transfer some data to her device. The data structure shared between the two participants is proprietary to the given hotel chain (or Provisioning Entity). This data transfer is a one-time, unidirectional transfer from Bob's device to Alice's. Once Alice receives this data, she can provision a new key to her digital wallet, making a call to Provisioning Entity to receive new credential information.</li>
      </ul>
    </section>
    <section anchor="relationships">
      <name>Relationships</name>
      <section anchor="credential-transfer-with-intermediary-server">
        <name>Credential transfer with intermediary server</name>
        <artset>
          <artwork type="svg"><svg xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg" height="244px" preserveAspectRatio="none" version="1.1" viewBox="0 0 618 244" width="618px">
              <defs/>
              <g>
                <rect fill="none" height="77.3979" width="409.5" x="202.5" y="113.6133" stroke="#000000" stroke-width="1.5"/>
                <line x1="37" x2="37" y1="37.0146" y2="208.0112" stroke="black" stroke-width="0.5"/>
                <line x1="263.5" x2="263.5" y1="37.0146" y2="208.0112" stroke="black" stroke-width="0.5"/>
                <line x1="566" x2="566" y1="37.0146" y2="208.0112" stroke="black" stroke-width="0.5"/>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="64" x="5" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="12" y="26.0752">Sender</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="64" x="5" y="207.0112" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="12" y="228.0864">Sender</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="103" x="212.5" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="219.5" y="26.0752">Intermediary</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="103" x="212.5" y="207.0112" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="219.5" y="228.0864">Intermediary</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="72" x="530" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="537" y="26.0752">Receiver</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="72" x="530" y="207.0112" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="537" y="228.0864">Receiver</text>
                <polygon fill="black" points="252,64.814,262,68.814,252,72.814,256,68.814" stroke="black" stroke-width="1.0"/>
                <line x1="37" x2="258" y1="68.814" y2="68.814" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="44" y="64.0845">upload provisioning information</text>
                <polygon fill="black" points="554,94.6133,564,98.6133,554,102.6133,558,98.6133" stroke="black" stroke-width="1.0"/>
                <line x1="37" x2="560" y1="98.6133" y2="98.6133" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="44" y="93.8838">send invite</text>
                <path d="M202.5,113.6133 L278.5,113.6133 L278.5,121.4126 L268.5,131.4126 L202.5,131.4126 L202.5,113.6133 " fill="white" stroke="#000000" stroke-width="1.5"/>
                <rect fill="none" height="77.3979" width="409.5" x="202.5" y="113.6133" stroke="#000000" stroke-width="1.5"/>
                <text fill="black" font-family="sans-serif" font-size="13" font-weight="bold" x="217.5" y="127.6831">loop</text>
                <text fill="black" font-family="sans-serif" font-size="11" font-weight="bold" x="293.5" y="126.6724">[Provision credential]</text>
                <polygon fill="black" points="275,149.2119,265,153.2119,275,157.2119,271,153.2119" stroke="black" stroke-width="1.0"/>
                <line x1="269" x2="565" y1="153.2119" y2="153.2119" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="281" y="148.4824">request additional provisioning information</text>
                <polygon fill="black" points="554,179.0112,564,183.0112,554,187.0112,558,183.0112" stroke="black" stroke-width="1.0"/>
                <line x1="264" x2="560" y1="183.0112" y2="183.0112" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="271" y="178.2817">deliver additional provisioning information</text>
                <!--MD5=[b960757a737e0f61bf37581d0aad824c]
@startuml

participant Sender as S
participant Intermediary as I
participant Receiver as R

S -> I: upload provisioning information
S -> R: send invite
loop Provision credential
  R -> I: request additional provisioning information
  I -> R: deliver additional provisioning information
end

@enduml

PlantUML version 1.2022.8(Sun Sep 25 09:00:33 GMT 2022)
(GPL source distribution)
Java Runtime: OpenJDK Runtime Environment
JVM: OpenJDK 64-Bit Server VM
Default Encoding: UTF-8
Language: en
Country: US
-->
  </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[     ┌──────┐                      ┌────────────┐                                 ┌────────┐          
     │Sender│                      │Intermediary│                                 │Receiver│          
     └──┬───┘                      └─────┬──────┘                                 └───┬────┘          
        │ upload provisioning information│                                            │               
        │ ───────────────────────────────>                                            │               
        │                                │                                            │               
        │                                │send invite                                 │               
        │ ────────────────────────────────────────────────────────────────────────────>               
        │                                │                                            │               
        │                                │                                            │               
        │                ╔═══════╤═══════╪════════════════════════════════════════════╪══════════════╗
        │                ║ LOOP  │  Provision credential                              │              ║
        │                ╟───────┘       │                                            │              ║
        │                ║               │ request additional provisioning information│              ║
        │                ║               │ <───────────────────────────────────────────              ║
        │                ║               │                                            │              ║
        │                ║               │ deliver additional provisioning information│              ║
        │                ║               │ ───────────────────────────────────────────>              ║
        │                ╚═══════════════╪════════════════════════════════════════════╪══════════════╝
     ┌──┴───┐                      ┌─────┴──────┐                                 ┌───┴────┐          
     │Sender│                      │Intermediary│                                 │Receiver│          
     └──────┘                      └────────────┘                                 └────────┘          
]]></artwork>
        </artset>
      </section>
      <section anchor="credential-transfer-without-intermediary">
        <name>Credential transfer without intermediary</name>
        <artset>
          <artwork type="svg"><svg xmlns:xlink="http://www.w3.org/1999/xlink" xmlns="http://www.w3.org/2000/svg" height="214px" preserveAspectRatio="none" version="1.1" viewBox="0 0 406 214" width="406px">
              <defs/>
              <g>
                <rect fill="none" height="77.3979" width="390" x="10" y="83.814" stroke="#000000" stroke-width="1.5"/>
                <line x1="52" x2="52" y1="37.0146" y2="178.2119" stroke="black" stroke-width="0.5"/>
                <line x1="354" x2="354" y1="37.0146" y2="178.2119" stroke="black" stroke-width="0.5"/>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="64" x="20" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="27" y="26.0752">Sender</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="64" x="20" y="177.2119" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="27" y="198.2871">Sender</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="72" x="318" y="5" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="325" y="26.0752">Receiver</text>
                <rect fill="white" height="31.0146" rx="2.5" ry="2.5" width="72" x="318" y="177.2119" stroke="black" stroke-width="0.5"/>
                <text fill="black" font-family="sans-serif" font-size="14" x="325" y="198.2871">Receiver</text>
                <polygon fill="black" points="342,64.814,352,68.814,342,72.814,346,68.814" stroke="black" stroke-width="1.0"/>
                <line x1="52" x2="348" y1="68.814" y2="68.814" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="59" y="64.0845">transfer provisioning information E2E</text>
                <path d="M10,83.814 L86,83.814 L86,91.6133 L76,101.6133 L10,101.6133 L10,83.814 " fill="white" stroke="#000000" stroke-width="1.5"/>
                <rect fill="none" height="77.3979" width="390" x="10" y="83.814" stroke="#000000" stroke-width="1.5"/>
                <text fill="black" font-family="sans-serif" font-size="13" font-weight="bold" x="25" y="97.8838">loop</text>
                <text fill="black" font-family="sans-serif" font-size="11" font-weight="bold" x="101" y="96.873">[Provision credential]</text>
                <polygon fill="black" points="63,119.4126,53,123.4126,63,127.4126,59,123.4126" stroke="black" stroke-width="1.0"/>
                <line x1="57" x2="353" y1="123.4126" y2="123.4126" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="69" y="118.6831">request additional provisioning information</text>
                <polygon fill="black" points="342,149.2119,352,153.2119,342,157.2119,346,153.2119" stroke="black" stroke-width="1.0"/>
                <line x1="52" x2="348" y1="153.2119" y2="153.2119" stroke="black" stroke-width="1.0"/>
                <text fill="black" font-family="sans-serif" font-size="13" x="59" y="148.4824">deliver additional provisioning information</text>
                <!--MD5=[27abeba17da33258185edf6911b2457a]
@startuml

participant Sender as S
participant Receiver as R
S -> R: transfer provisioning information E2E
loop Provision credential
  R -> S: request additional provisioning information
  S -> R: deliver additional provisioning information
end

@enduml

PlantUML version 1.2022.8(Sun Sep 25 09:00:33 GMT 2022)
(GPL source distribution)
Java Runtime: OpenJDK Runtime Environment
JVM: OpenJDK 64-Bit Server VM
Default Encoding: UTF-8
Language: en
Country: US
-->
  </g>
            </svg>
          </artwork>
          <artwork type="ascii-art"><![CDATA[                    ┌──────┐                                    ┌────────┐          
                    │Sender│                                    │Receiver│          
                    └──┬───┘                                    └───┬────┘          
                       │    transfer provisioning information E2E   │               
                       │ ───────────────────────────────────────────>               
                       │                                            │               
                       │                                            │               
          ╔═══════╤════╪════════════════════════════════════════════╪══════════════╗
          ║ LOOP  │  Provision credential                           │              ║
          ╟───────┘    │                                            │              ║
          ║            │ request additional provisioning information│              ║
          ║            │ <───────────────────────────────────────────              ║
          ║            │                                            │              ║
          ║            │ deliver additional provisioning information│              ║
          ║            │ ───────────────────────────────────────────>              ║
          ╚════════════╪════════════════════════════════════════════╪══════════════╝
                    ┌──┴───┐                                    ┌───┴────┐          
                    │Sender│                                    │Receiver│          
                    └──────┘                                    └────────┘          
]]></artwork>
        </artset>
      </section>
    </section>
    <section anchor="assumptions">
      <name>Assumptions</name>
      <ul spacing="normal">
        <li>Depending on credential type, there are 3 possible scenarios for transferred credential cryptographic key material:
1) An existing cryptographic key is being copied and sent from Sender to receiver and provisioned to digital wallet as it is. In this case two credentails on both devices are indistinguashable. This scenario is currently used by a very limited number of entities.
2) Instead of the original cryptographic key, Sender device fetches a provisiong token from Provisiong entity approval and sends it to Receiver so that Receiver can acquire new credential information from Provisiong Entity presenting given provisiong token to it and receiving new cryptographic key material. In this case receiver device may have just a subset of the sender's device access rights or receiver's device credential may be revoked independently of the sender's device credential. As a result, Sender and Receiver devices have 2 different keys, potentially linked to the same logical "user account". Also, the Provisiong Entity may not allow the same cryptographic key to be added to different physical devices.
3) When Provisioning Entity does not exist in the transfer flow. For example, for a transfer of a digital car key both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign over the new cryptographic key for it to be trusted by the access point.</li>
        <li>Security: Communication between sender or receiver devices and Provisioning Entity should be trusted. Since new credential's key material is generated by Provisioning Entity, the channel between the device and Provisioning Entity shall be secure and trusted by both parties.</li>
        <li>In case of an intermediary server, used during the credential transfer from sender device to receiver device, the choice of intermediary shall be defined by the application initiating the credential transfer. Digital wallet or another application that manages credentials on sender device shall make the decision regarding the channel to be used to sent the Provisioning Information.</li>
        <li>Sender and Receiver shall both be able to manage the shared credential at any point in transfer or lifecycle: a) the process of credential transfer can be stopped at any time before the credential is provisioned to the receiver device by either sender or receiver device (e.g. making a call to intermediate server to delete a temporary mailbox); b) or after credential has been provisioned - by ether "manage credential" call issued from sender device to Provisiong Entity (or from Provisiong Entity initiating "manage credential" API).</li>
        <li>Any device OEM with a digital credential implementation adherent to Tigress solution shall be able to receive shared provisioning information, whether or not they can originate provisioning information themselves. We define the digital credential transfer as platform-independant; therefore, if the receiver device can recognize the data format of the received Provisioning Information, it should be able to provision the new credential to the Digital Wallet.</li>
        <li>Provisioning new credential on the receiver may require multiple round trips. In case the Provisioning Entity is not used for a certain type of credentials (e.g. for a transfer of a digital car key), both sender and receiver devices are used to generate new credential's cryptographic key matherial and sign on the new cryptographic key for it to be trusted by the access point.</li>
      </ul>
    </section>
    <section anchor="requirements">
      <name>Requirements</name>
      <ul spacing="normal">
        <li>(Req-XPlatform) Solution shall support transfer of digital credential across different platforms (e.g. from Android to iOS).</li>
        <li>(Req-P2P) If credential transfer solution supports group sharing, it shall also support limiting transfer to one device to another based on use case.</li>
        <li>(Req-CredentialType) The solution shall support transfer of various digital credential types, based on symmetric and asymmetric cryptography, public and proprietary standards.</li>
        <li>(Req-Security) Solution should provide security of the provisioning data transferred (confidentiality, integrity and availability of provisioning information in transit).</li>
        <li>(Req-NonCorelation) Transport protocol used to transfer provisioning information ( e.g. secure E2E transfer protocol or intermediary server) shall prevent from correlating users between exchanges or create a social graph of users involved into transfer.</li>
        <li>(Req-NonIdentity) Intermediary server shall not be an arbiter of identity.</li>
        <li>(Req-NonCollection) User identities shall not be collected, stored and used for purpose other then the credential transfer itself.</li>
        <li>(Req-Connectivity) Sender and Receiver shall be allowed to be online at different times. Sender and Receiver shall not need to be online at the same time. This requirement allows devices to connect to network to only exchange the portion of information required during the transfer, allowing them upload or download data in turns to network servers.</li>
        <li>(Req-RoundTrips) Solution shall allow for multiple data exchanges between sender and receiver devices in the process of credential transfer. This requirement shall align with (Req-Connectivity) above.</li>
        <li>(Req-Speed) When both Sender and Receiver are online at the same time they should be able to quickly and efficiently transfer data.</li>
        <li>(Req-Opaque) In the case when an intermediary server is used to facilitate the credential transfer, message content between sender and receiver must be opaque to an intermediary, intermediary server shall not be able to recognize the content of provisioning information or use it to provision digital credential on its own.</li>
        <li>(Req-SenderTrust) In the case when an intermediary server is used to facilitate the credential transfer, sender device should establish trusted relationship with the intermediary server. Intermediary server shall be able to verify that the sender device is in good standing and content generated by the sender device can be trusted by the intermediary. The trust mechanism could be proprietary or publicly verifiable ( e.g. WebAuthN). This is important because intermediary server shall have no visibility to the content of the provisiong information sent through it (Req-Opaque).</li>
        <li>(Req-ReceiverTrust) In the case when an intermediary server is used to facilitate the credential transfer, receiver device should be able to evaluate the trustworthiness of the intermediary based on agreed criteria.</li>
        <li>(Req-Invitation) The Receiver must be able to establish a connection with the Sender for the secure credential transfer using an invite that can be sent over any generic communication channel (e.g. sms, email, NFC).</li>
      </ul>
    </section>
    <section anchor="security-considerations">
      <name>Security Considerations</name>
      <t>TODO Security</t>
    </section>
    <section anchor="iana-considerations">
      <name>IANA Considerations</name>
      <t>This document has no IANA actions.</t>
    </section>
  </middle>
  <back>
    <references>
      <name>References</name>
      <references>
        <name>Normative References</name>
        <reference anchor="RFC2119">
          <front>
            <title>Key words for use in RFCs to Indicate Requirement Levels</title>
            <author fullname="S. Bradner" initials="S." surname="Bradner">
              <organization/>
            </author>
            <date month="March" year="1997"/>
            <abstract>
              <t>In many standards track documents several words are used to signify the requirements in the specification.  These words are often capitalized. This document defines these words as they should be interpreted in IETF documents.  This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="2119"/>
          <seriesInfo name="DOI" value="10.17487/RFC2119"/>
        </reference>
        <reference anchor="RFC8174">
          <front>
            <title>Ambiguity of Uppercase vs Lowercase in RFC 2119 Key Words</title>
            <author fullname="B. Leiba" initials="B." surname="Leiba">
              <organization/>
            </author>
            <date month="May" year="2017"/>
            <abstract>
              <t>RFC 2119 specifies common key words that may be used in protocol  specifications.  This document aims to reduce the ambiguity by clarifying that only UPPERCASE usage of the key words have the  defined special meanings.</t>
            </abstract>
          </front>
          <seriesInfo name="BCP" value="14"/>
          <seriesInfo name="RFC" value="8174"/>
          <seriesInfo name="DOI" value="10.17487/RFC8174"/>
        </reference>
      </references>
      <references>
        <name>Informative References</name>
        <reference anchor="CCC-Digital-Key-30" target="https://carconnectivity.org/download-digital-key-3-specification/">
          <front>
            <title>Digital Key Release 3</title>
            <author>
              <organization>Car Connectivity Consortium</organization>
            </author>
            <date year="2022" month="July"/>
          </front>
        </reference>
      </references>
    </references>
    <section numbered="false" anchor="acknowledgments">
      <name>Acknowledgments</name>
      <t>TODO acknowledge.</t>
    </section>
  </back>
  <!-- ##markdown-source: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-->

</rfc>
