1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Introduction
6.1 Background and motivations
6.2 Self-controlled identity overview
7 Roles and principle analysis of self-controlled identity
7.1 Roles and relationships of self-controlled identity
7.2 The principles of self-controlled identity based on blockchain
7.4 Analysis of identifiers considered in an SCid system
8 High-level framework of
the self-controlled identity
8.1 High-level framework of self-controlled identity
8.2 High-level requirements of self-controlled identity based on
blockchain
9 Capability requirements of the framework of the self-controlled identity
9.1 Capability requirements of the identity registry
9.2 Capability requirements of the identity discovery and
resolution
9.3 Capability requirements of the identity verification
9.4 Capability requirements of the identity endorsement
9.5 Capability requirements of the identity data access management
9.6 Capability requirements of the blockchain
10 Security considerations
Appendix I – Use cases of self-controlled identity
I.1 SCid discovery and verification
I.2 Decentralized KYC based on SCid
Appendix II – Self-controlled identity business models
II.1 Cross-SP digital ecosystem
II.2 Decentralized trustworthy marketplace
II.3 Self-bootstrapping and service provision of vertical industry
devices
Bibliography