Difference between revisions of "Wireless Credential Presentation"

From MgmtWiki
Jump to: navigation, search
(Created page with "==Meme== Also called mobile device in-person presentation. ==Context== Wireless Credential Presentation is an emerging capability that allows users to present digital crede...")
 
(Context)
Line 9: Line 9:
 
Here’s a snapshot of where things stand:
 
Here’s a snapshot of where things stand:
  
---
+
===Current Implementations===
 
 
### 📱 **Current Implementations**
 
 
- **ISO/IEC 18013-5**: Defines how mobile driver’s licenses can be presented wirelessly using BLE or NFC. Adopted by Apple and Google in their wallet ecosystems.
 
- **ISO/IEC 18013-5**: Defines how mobile driver’s licenses can be presented wirelessly using BLE or NFC. Adopted by Apple and Google in their wallet ecosystems.
 
- **Android Identity Credential API**: Supports secure wireless presentation of credentials using hardware-backed storage and reader authentication.
 
- **Android Identity Credential API**: Supports secure wireless presentation of credentials using hardware-backed storage and reader authentication.
 
- **Apple Wallet**: Supports mDLs and TSA checkpoints using NFC or BLE, with user consent and Face ID/Touch ID gating the release of data.
 
- **Apple Wallet**: Supports mDLs and TSA checkpoints using NFC or BLE, with user consent and Face ID/Touch ID gating the release of data.
  
---
+
===Security and Privacy Features===
 
 
### 🔐 **Security and Privacy Features**
 
 
- **User consent**: Presentation is gated by biometric or PIN confirmation.
 
- **User consent**: Presentation is gated by biometric or PIN confirmation.
 
- **Selective disclosure**: Only the requested attributes (e.g., age, name) are shared—not the full credential.
 
- **Selective disclosure**: Only the requested attributes (e.g., age, name) are shared—not the full credential.
Line 24: Line 20:
 
- **Session encryption**: Wireless channels are encrypted to prevent eavesdropping or replay attacks.
 
- **Session encryption**: Wireless channels are encrypted to prevent eavesdropping or replay attacks.
  
---
+
===Challenges and Open Questions===
 
 
### 🌐 **Challenges and Open Questions**
 
 
- **Interoperability**: Different platforms (e.g., Android vs. iOS) and jurisdictions may implement standards differently.
 
- **Interoperability**: Different platforms (e.g., Android vs. iOS) and jurisdictions may implement standards differently.
 
- **Trust frameworks**: Who certifies the verifier? How is revocation handled?
 
- **Trust frameworks**: Who certifies the verifier? How is revocation handled?
Line 32: Line 26:
 
- **User transparency**: Ensuring users understand what’s being shared and with whom.
 
- **User transparency**: Ensuring users understand what’s being shared and with whom.
  
---
+
=== Where It’s Headed===
 
 
### 🧭 Where It’s Headed
 
 
- **eIDAS 2.0** in the EU and **NSTIC-aligned** efforts in the U.S. are pushing for standardized, cross-border digital identity systems.
 
- **eIDAS 2.0** in the EU and **NSTIC-aligned** efforts in the U.S. are pushing for standardized, cross-border digital identity systems.
 
- **OpenID4VP** and **DIDComm** are being explored as protocols for secure, privacy-preserving credential exchange.
 
- **OpenID4VP** and **DIDComm** are being explored as protocols for secure, privacy-preserving credential exchange.
 
- **Wallet interoperability** and **cross-platform reader support** are active areas of development.
 
- **Wallet interoperability** and **cross-platform reader support** are active areas of development.
  
---
+
Let’s unpack the technical and experiential differences between **BLE (Bluetooth Low Energy)** and **NFC (Near Field Communication)** for wireless credential presentation—especially in terms of **privacy**, **user experience (UX)**, and **security**.
 
+
===Privacy & Security===
If you’d like, I can walk you through a sample wireless credential exchange flow or compare BLE vs. NFC in terms of privacy and UX. Want to go deeper into the tech stack or policy frameworks?
 
 
 
Great! Let’s unpack the technical and experiential differences between **BLE (Bluetooth Low Energy)** and **NFC (Near Field Communication)** for wireless credential presentation—especially in terms of **privacy**, **user experience (UX)**, and **security**.
 
 
 
---
 
 
 
### 🔐 Privacy & Security
 
  
| Feature                  | **BLE**                                                                | **NFC**                                                                |
+
{| line=1,space=2
|--------------------------|------------------------------------------------------------------------|------------------------------------------------------------------------|
+
| Feature                  | **BLE**                                                                | **NFC**                                                                 
| **Range**                | Up to 10 meters or more—**risk of unintended disclosure**              | ~4 cm—**very short range reduces eavesdropping risk**                  |
+
|-
| **User Awareness**      | May trigger without user noticing (passive scanning)                  | Requires deliberate tap—**user is always aware**                      |
+
| **Range**                | Up to 10 meters or more—**risk of unintended disclosure**              | ~4 cm—**very short range reduces eavesdropping risk**                  |=
| **Reader Authentication**| Often supported via session keys or certificates                      | Strong mutual authentication possible (e.g. ISO 18013-5)              |
+
| **User Awareness**      | May trigger without user noticing (passive scanning)                  | Requires deliberate tap—**user is always aware**                      |=
| **Data Minimization**    | Depends on implementation; risk of over-sharing                        | Easier to enforce **selective disclosure**                            |
+
| **Reader Authentication**| Often supported via session keys or certificates                      | Strong mutual authentication possible (e.g. ISO 18013-5)              |=
 +
| **Data Minimization**    | Depends on implementation; risk of over-sharing                        | Easier to enforce **selective disclosure**                            |}
  
 
NFC’s short range makes it inherently more privacy-preserving, while BLE’s convenience comes with a need for **stronger software safeguards**.
 
NFC’s short range makes it inherently more privacy-preserving, while BLE’s convenience comes with a need for **stronger software safeguards**.
 
+
===User Experience (UX)===
---
 
 
 
### 📱 User Experience (UX)
 
  
 
| Feature                  | **BLE**                                                                | **NFC**                                                                |
 
| Feature                  | **BLE**                                                                | **NFC**                                                                |
Line 71: Line 54:
 
BLE is ideal for **continuous or ambient interactions** (e.g. walk-through gates), while NFC excels in **explicit, high-trust exchanges** (e.g. ID checks at TSA).
 
BLE is ideal for **continuous or ambient interactions** (e.g. walk-through gates), while NFC excels in **explicit, high-trust exchanges** (e.g. ID checks at TSA).
  
---
+
===Design Considerations===
 
 
### 🧠 Design Considerations
 
  
 
- **BLE** is better for **hands-free, high-throughput environments** like stadiums or transit.
 
- **BLE** is better for **hands-free, high-throughput environments** like stadiums or transit.
Line 79: Line 60:
 
- Both can support **ISO 18013-5** and **W3C Verifiable Credentials**, but NFC tends to align more naturally with **user consent and minimal disclosure**.
 
- Both can support **ISO 18013-5** and **W3C Verifiable Credentials**, but NFC tends to align more naturally with **user consent and minimal disclosure**.
  
---
 
 
Would you like to see a sample credential exchange flow using BLE or NFC? Or explore how these protocols integrate with OpenID4VP or Android’s Identity Credential architecture?
 
 
==References==
 
==References==
  
 
[[Category: Verifier]]
 
[[Category: Verifier]]

Revision as of 15:22, 17 July 2025

Meme

Also called mobile device in-person presentation.


Context

Wireless Credential Presentation is an emerging capability that allows users to present digital credentials—such as mobile driver’s licenses (mDLs), verifiable credentials, or digital IDs—**over proximity-based wireless channels** like Bluetooth Low Energy (BLE), Near Field Communication (NFC), or Wi-Fi Aware. It’s a key component of mobile identity systems and digital wallets, especially in contexts like airport security, age verification, or access control.

Here’s a snapshot of where things stand:

Current Implementations

- **ISO/IEC 18013-5**: Defines how mobile driver’s licenses can be presented wirelessly using BLE or NFC. Adopted by Apple and Google in their wallet ecosystems. - **Android Identity Credential API**: Supports secure wireless presentation of credentials using hardware-backed storage and reader authentication. - **Apple Wallet**: Supports mDLs and TSA checkpoints using NFC or BLE, with user consent and Face ID/Touch ID gating the release of data.

Security and Privacy Features

- **User consent**: Presentation is gated by biometric or PIN confirmation. - **Selective disclosure**: Only the requested attributes (e.g., age, name) are shared—not the full credential. - **Reader authentication**: The verifier must prove its identity before receiving data. - **Session encryption**: Wireless channels are encrypted to prevent eavesdropping or replay attacks.

Challenges and Open Questions

- **Interoperability**: Different platforms (e.g., Android vs. iOS) and jurisdictions may implement standards differently. - **Trust frameworks**: Who certifies the verifier? How is revocation handled? - **Offline support**: Wireless presentation must work without internet access, which complicates revocation and freshness checks. - **User transparency**: Ensuring users understand what’s being shared and with whom.

Where It’s Headed

- **eIDAS 2.0** in the EU and **NSTIC-aligned** efforts in the U.S. are pushing for standardized, cross-border digital identity systems. - **OpenID4VP** and **DIDComm** are being explored as protocols for secure, privacy-preserving credential exchange. - **Wallet interoperability** and **cross-platform reader support** are active areas of development.

Let’s unpack the technical and experiential differences between **BLE (Bluetooth Low Energy)** and **NFC (Near Field Communication)** for wireless credential presentation—especially in terms of **privacy**, **user experience (UX)**, and **security**.

Privacy & Security

**BLE** | **NFC**
Up to 10 meters or more—**risk of unintended disclosure** | ~4 cm—**very short range reduces eavesdropping risk** |= May trigger without user noticing (passive scanning) | Requires deliberate tap—**user is always aware** |= Often supported via session keys or certificates | Strong mutual authentication possible (e.g. ISO 18013-5) |= Depends on implementation; risk of over-sharing | Easier to enforce **selective disclosure** |}

NFC’s short range makes it inherently more privacy-preserving, while BLE’s convenience comes with a need for **stronger software safeguards**.

User Experience (UX)

**BLE** | **NFC** |
Hands-free, works in background—**great for walk-through experiences** | Requires tap—**more deliberate but less seamless** | Fast once paired, but may require setup | Instantaneous with tap—**no pairing needed** | Low energy, but still active scanning | Minimal—only active during tap | Broad, but varies by OS and app permissions | Increasingly supported (e.g. Apple Wallet, Android Identity Credential) |

BLE is ideal for **continuous or ambient interactions** (e.g. walk-through gates), while NFC excels in **explicit, high-trust exchanges** (e.g. ID checks at TSA).

Design Considerations

- **BLE** is better for **hands-free, high-throughput environments** like stadiums or transit. - **NFC** is better for **high-assurance, user-mediated interactions** like border control or age verification. - Both can support **ISO 18013-5** and **W3C Verifiable Credentials**, but NFC tends to align more naturally with **user consent and minimal disclosure**.

References