|||
Table of Contents
Appendix Table of Contents 15.1. Mobile Application Instance 15.1.1. Mobile Application Instance Initialization 15.1.1.1. Mobile Application Nonce Request 15.1.1.2. Mobile Application Nonce Response 15.1.1.3. Mobile Application Instance Initialization Request 15.1.1.4. Mobile Application Instance Initialization Response 15.1.2. Mobile Application Key Binding 15.1.2.1. Mobile Application Key Binding Request 15.1.2.2. Mobile Application Key Binding Response 15.2. e-Service PDND 15.2.1. Requirements and Security Patterns 15.2.2. PDND Voucher Issuance 15.2.2.1. PDND Voucher for e-Service 15.2.2.2. PDND Voucher for Interoperability API 15.2.2.3. PDND Authorization Server Endpoint 15.2.3. Key Retrieval 15.2.3.1. PDND Authorization Server Keys 15.2.3.2. PDND Authorization Server .well-known Endpoint 15.2.3.3. Participants' Keys 15.2.3.4. PDND Interoperability API Endpoint 15.2.4. e-Service Usage 15.2.4.1. e-Service Usage Prerequisites 15.2.4.2. e-Service Usage Flow 15.2.4.3. e-Service Endpoint 15.3. Test Plans 15.3.1. Structure of the Test Matrix 15.3.2. Signed Statements Evaluation Test Matrix 15.3.3. Trust Evaluation Test Matrix 15.3.4. Wallet Solution Test Matrix 15.3.5. Credential Issuance Test Matrix 15.3.6. Credential Presentation Test Matrix 15.3.6.1. Remote Credential Presentation Test Matrix 15.3.6.2. Proximity Credential Presentation Test Matrix
Appendix Table of Contents