Table of Contents

 1     Scope          
 2     References
 3     Definitions
        3.1     Terms defined elsewhere       
        3.2     Terms defined in this Recommendation           
 4     Abbreviations and acronyms             
 5     Conventions            
 6     Introduction             
        6.1     Background and motivations 
        6.2     Self-controlled identity overview        
 7     Roles and principle analysis of self-controlled identity           
        7.1     Roles and relationships of self-controlled identity        
        7.2     The principles of self-controlled identity based on blockchain 
        7.4     Analysis of identifiers considered in an SCid system    
 8     High-level framework of the self-controlled identity
        8.1     High-level framework of self-controlled identity           
        8.2     High-level requirements of self-controlled identity based on blockchain             
 9     Capability requirements of the framework of the self-controlled identity      
        9.1     Capability requirements of the identity registry             
        9.2     Capability requirements of the identity discovery and resolution           
        9.3     Capability requirements of the identity verification     
        9.4     Capability requirements of the identity endorsement
        9.5     Capability requirements of the identity data access management         
        9.6     Capability requirements of the blockchain       
10     Security considerations      
Appendix I – Use cases of self-controlled identity    
        I.1     SCid discovery and verification               
        I.2     Decentralized KYC based on SCid           
Appendix II – Self-controlled identity business models    
       II.1     Cross-SP digital ecosystem      
       II.2     Decentralized trustworthy marketplace            
       II.3     Self-bootstrapping and service provision of vertical industry devices     
Bibliography