From cbcfce40fcc8764f01851bd740efcb0d2db20193 Mon Sep 17 00:00:00 2001 From: fmerg Date: Tue, 9 Jun 2020 13:18:23 +0300 Subject: [PATCH] Fix typo --- docs/essif-lab-functional-architecture.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/docs/essif-lab-functional-architecture.md b/docs/essif-lab-functional-architecture.md index eeb14b8..00c1f92 100644 --- a/docs/essif-lab-functional-architecture.md +++ b/docs/essif-lab-functional-architecture.md @@ -318,7 +318,7 @@ Please note that while transactions are symmetrical in nature (i.e. both request This phase starts by the requester sending a transaction request to the provider, and ends whenever either one of the parties quits, or both parties commit. -eSSIF-Lab - high level trx negotiationThe adjacent figure shows the high-level interactions during this phase. It starts by the requester sending a request for a product or service to the provider. Typically, this would lead to the provider presenting a (web) form the requester must fill in. In the eSSIF-Lab context, the form will also provide a means for setting up a SSI communications channel, i.e. a secure communications channel through which provider and requester can both request and obtain (presentations of) credentials, the contents of which they can use to fill in the form. Then, after the form is ‘clean’, i.e. contains sufficient information for deciding whether or not to commit to the transaction, this phase ends. +eSSIF-Lab - high level trx negotiationThe adjacent figure shows the high-level interactions during this phase. It starts by the requester sending a request for a product or service to the provider. Typically, this would lead to the provider presenting a (web) form the requester must fill in. In the eSSIF-Lab context, the form will also provide a means for setting up a SSI communications channel, i.e. a secure communications channel through which provider and requester can both request and obtain (presentations of) credentials, the contents of which they can use to fill in the form. Then, after the form is ‘clean’, i.e. contains sufficient information for deciding whether or not to commit to the transaction, this phase ends. Note that forms may contain fields that are required only in specific circumstances. It may only be possible to assess whether or not such circumstances apply after some (other) fields have been filled in. This means that the phase for requesting credential presentations and responding to such requests may very well consist of multiple requests and associated responses. -- GitLab