Table of Contents

 1     Scope            
 2     References  
 3     Definitions   
        3.1     Terms defined elsewhere              
        3.2     Terms defined in this Recommendation      
 4     Abbreviations and acronyms    
 5     Conventions
 6     Conceptual Models    
        6.1     Trust Elevation Core Model            
        6.2     Trust Elevation Concepts
        6.3     Use of Authorization Architectures and Models        
 7     Architecture & Design               
        7.1     Trust Elevation System Context     
        7.2     Assumptions for Trust Elevation Systems     
        7.3     Architecture & Design Factors      
        7.4     Trust Elevation Architecture Components  
        7.5     Other Architecture Components  
 8     Implementation Considerations               
        8.1     Orchestration   
        8.2     Enumeration of Authentication Methods    
        8.3     User Enrolment
 9     Trust Elevation Sequence, Metadata and Assertions and Conformance          
Appendix I – Trust Elevation Sequence (Example)    
        I.1                    Use Case: Online banking transactions           
Appendix II – Metadata and Assertions    
       II.1     Component-Component Communications    
       II.2     PDP to TE Method Determiner Request        
       II.3     TE Method Determiner to PDP Response     
Appendix III – Conformance    
Appendix IV – State Models for Assurance Level Evaluation    
       IV.1     Evaluation of Assurance Requirements at Transaction Time