Skip to content

Commit f034f5d

Browse files
committed
chore: editorials fix
1 parent 75431d2 commit f034f5d

21 files changed

+203
-203
lines changed

docs/common/standards-lostnfound.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -219,7 +219,7 @@ Digital Credential Issuance Proposals for Future Milestones
219219
* - ISO/IEC 23220-3
220220
- Cards and security devices for personal identification - Building blocks for identity management via mobile devices - Part 3: Protocols and services for installation and issuing phase
221221
* - DTS/ESI-0019472-2
222-
- Electronic Signatures and Trust Infrastructures (ESI); Profiles for Electronic Attestations of Attributes Part 2: Profiles for Relying party interface to EUDI Wallet
222+
- Electronic Signatures and Trust Infrastructures (ESI); Profiles for Electronic Attestations of Attributes Part 2: Profiles for Relying Party interface to EUDI Wallet
223223
* - DTS/ESI-0019472-1
224224
- Electronic Signatures and Trust Infrastructures (ESI); Profiles for Electronic Attestations of Attributes; Part 1: General requirements Profiles for EAA - General requirements
225225

docs/en/backup-restore.rst

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -12,7 +12,7 @@ The **Backup and Restore** functionality becomes relevant when the User wants to
1212
- The User performs a factory reset on the current phone and needs to set up the Wallet Solution again.
1313

1414
.. note::
15-
For Wallet Solutions based on the IT Wallet technical specifications, the migration to a different Wallet Solution (known as data portability) can be supported following the backup and restore functionality described in this section.
15+
For Wallet Solutions based on the IT Wallet Technical Specifications, the migration to a different Wallet Solution (known as data portability) can be supported following the backup and restore functionality described in this section.
1616

1717

1818
Backup Flow
@@ -139,7 +139,7 @@ To check the authenticity of the file, the Wallet Instance MUST verify the backu
139139
**Steps 7-8**: The Wallet Instance for each HW binding credentials entry in the payload of the backup JWT performs the following steps:
140140

141141
- It extracts the Credential Issuer identifier and the ``credential_configuration_id`` from the entry. The former is used to identify the Issuer and obtains its metadata, while the latter will be used to signal the Credential type to the Credential Issuer.
142-
- Using the Issuer identifier the Wallet Instance obtains the metadata of the Credential Issuer and makes a re-issuance request to the Credential Issuer by providing the new cryptographic binding with the Credential.
142+
- Using the Issuer identifier the Wallet Instance obtains the metadata of the Credential Issuer and makes a re-issuance request to the Credential Issuer by providing the new Cryptographic Binding with the Credential.
143143

144144
.. note::
145145
The Wallet Instance MUST not check the expiration of the Wallet Attestation as its main purpose is to enable the Wallet Instance to verify the authenticity of the backup file by ensuring it has been created and signed by a Wallet Instance of a specific Wallet Provider.

docs/en/brand-identity.rst

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -65,7 +65,7 @@ The following requirements apply to its use in both physical and digital context
6565

6666
- The Trust Mark MUST be used exclusively to certify the participation in the IT-Wallet System and MUST NOT be used for any other purpose;
6767

68-
- The Trust Mark MUST only be displayed by Technical Solutions that have successfully completed the certification process;
68+
- The Trust Mark MUST only be displayed by Technical Solutions that have successfully completed the Certification Process;
6969

7070
- The Trust Mark MUST be used exactly as provided in the Official Resources and MUST comply with the usage specifications outlined in the Official Resources to ensure proper visibility throughout all the stages of the User Experience;
7171

docs/en/credential-data-model.rst

Lines changed: 8 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@ PID/(Q)EAA Data Model
88
The Digital Credential Data Model structures Digital Credentials for secure, interoperable use. Key elements include:
99

1010
- Credential Subject: The individual or entity receiving the Credential.
11-
- Issuer: The PID/(Q)EAA Provider issuing and signing the Credential.
11+
- Issuer: The Credential Issuer issuing and signing the Credential.
1212
- Metadata: Details about the Credential, like type and validity.
1313
- Claims: Information about the subject, such as identity or qualifications.
1414
- Proof: Cryptographic verification of authenticity and legitimate ownership.
@@ -107,7 +107,7 @@ The JWT payload contains the following claims. Some of these claims can be discl
107107
- **Description**
108108
- **Reference**
109109
* - **iss**
110-
- [NSD]. REQUIRED. URL string representing the PID/(Q)EAA Issuer unique identifier.
110+
- [NSD]. REQUIRED. URL string representing the Credential Issuer unique identifier.
111111
- `[RFC7519, Section 4.1.1] <https://www.iana.org/go/rfc7519>`_.
112112
* - **sub**
113113
- [NSD]. REQUIRED. The identifier of the subject of the Digital Credential, the User, MUST be opaque and MUST NOT correspond to any anagraphic data or be derived from the User's anagraphic data via pseudonymization. Additionally, it is required that two different Credentials issued MUST NOT use the same ``sub`` value.
@@ -125,7 +125,7 @@ The JWT payload contains the following claims. Some of these claims can be discl
125125
- [NSD]. REQUIRED. Name of the administrative authority that has issued the PID/(Q)EAA.
126126
- Commission Implementing Regulation `EU_2024/2977`_.
127127
* - **issuing_country**
128-
- [NSD]. REQUIRED. Alpha-2 country code, as specified in ISO 3166-1, of the country or territory of the PID/(Q)EAA Issuer.
128+
- [NSD]. REQUIRED. Alpha-2 country code, as specified in ISO 3166-1, of the country or territory of the Credential Issuer.
129129
- Commission Implementing Regulation `EU_2024/2977`_.
130130
* - **status**
131131
- [NSD]. REQUIRED only if the Digital Credential is long-lived. JSON object containing the information on how to read the status of the Verifiable Credential. It MUST contain either the JSON member *status_assertion* or *status_list*.
@@ -134,7 +134,7 @@ The JWT payload contains the following claims. Some of these claims can be discl
134134
- [NSD]. REQUIRED. JSON object containing the proof-of-possession key materials. By including a **cnf** (confirmation) claim in a JWT, the Issuer of the JWT declares that the Holder is in control of the private key related to the public one defined in the **cnf** parameter. The recipient MUST cryptographically verify that the Holder is in control of that key.
135135
- `[RFC7800, Section 3.1] <https://www.iana.org/go/rfc7800>`_ and Section 3.2.2.2 `SD-JWT-VC`_.
136136
* - **vct**
137-
- [NSD]. REQUIRED. Credential type value MUST be an HTTPS URL String and it MUST be set using one of the values obtained from the PID/(Q)EAA Issuer metadata. It is the identifier of the SD-JWT VC type and it MUST be set with a collision-resistant value as defined in Section 2 of :rfc:`7515`. It MUST contain also the number of version of the Credential type (for instance: ``https://trust-registry.eid-wallet.example.it/credentials/v1.0/personidentificationdata``).
137+
- [NSD]. REQUIRED. Credential type value MUST be an HTTPS URL String and it MUST be set using one of the values obtained from the Credential Issuer metadata. It is the identifier of the SD-JWT VC type and it MUST be set with a collision-resistant value as defined in Section 2 of :rfc:`7515`. It MUST contain also the number of version of the Credential type (for instance: ``https://trust-registry.eid-wallet.example.it/credentials/v1.0/personidentificationdata``).
138138
- Section 3.2.2.2 `SD-JWT-VC`_.
139139
* - **vct#integrity**
140140
- [NSD]. REQUIRED. The value MUST be an "integrity metadata" string as defined in Section 3 of [`W3C-SRI`_]. *SHA-256*, *SHA-384* and *SHA-512* MUST be supported as cryptographic hash functions. *MD5* and *SHA-1* MUST NOT be used. This claim MUST be verified according to Section 3.3.5 of [`W3C-SRI`_].
@@ -823,7 +823,7 @@ Cross-Format Credential Parameters Mapping
823823

824824
The following table provides a comparative mapping between the data structures of SD-JWT-VC and mdoc-CBOR Digital Credentials.
825825
It outlines the key data elements and parameters used in each format, highlighting both commonalities and differences.
826-
In particular, it shows how core concepts - such as Credential Issuer information, validity, cryptographic binding, and disclosures - are represented in these Credential formats.
826+
In particular, it shows how core concepts - such as Credential Issuer information, validity, Cryptographic Binding, and disclosures - are represented in these Credential formats.
827827

828828
For SD-JWT-VC, parameters are marked with `(hdr)` if they are located in the JOSE header, and `(pld)` if they appear in the payload of the JWT. In mdoc-CBOR, these parameters are identified within the issuerAuth or nameSpaces structures.
829829

@@ -888,10 +888,10 @@ For SD-JWT-VC, parameters are marked with `(hdr)` if they are located in the JOS
888888
| x5c (hdr)
889889
- | -
890890
| issuerAuth.33 (x5chain)
891-
* - Cryptographic binding
891+
* - Cryptographic Binding
892892
- cnf.jwk (pld)
893893
- issuerAuth.deviceKeyInfo.deviceKey
894-
* - Selective disclosure
894+
* - Selective Disclosure
895895
- | _sd_alg (pld)
896896
| _sd (pld)
897897
- | issuerAuth.digestAlgorithm
@@ -919,7 +919,7 @@ For SD-JWT-VC, parameters are marked with `(hdr)` if they are located in the JOS
919919
920920
.. note::
921921
- In the mdoc-CBOR format, the version of the Digital Credential is not explicitly defined; it is only available for the IssuerAuth. In contrast, the SD-JWT format includes version information via the `vct` URL.
922-
- `Disclosures`, `_sd`, and `_sd_alg` enable selective disclosure of SD-JWT claims. The `_sd` and `_sd_alg` parameters are part of the SD-JWT payload, while `Disclosures` are sent separately in a Combined Format along with the SD-JWT.
922+
- `Disclosures`, `_sd`, and `_sd_alg` enable Selective Disclosure of SD-JWT claims. The `_sd` and `_sd_alg` parameters are part of the SD-JWT payload, while `Disclosures` are sent separately in a Combined Format along with the SD-JWT.
923923
- The `vctm.claims` parameter in SD-JWT and the `nameSpaces` structure in mdoc-CBOR are functionally equivalent, as both define the claim names and their structure. SD-JWT `Disclosures` for disclosed attributes directly correspond to `nameSpaces`, including attribute names, values, and salt values.
924924
- A domestic namespace accommodates attributes such as `verification` and `sub`, which are not defined in the standard ISO elementIdentifiers for mdoc-CBOR Digital Credentials.
925925

0 commit comments

Comments
 (0)