Cleaned up titles and removed [???]
author"arangana <arun@mozilla.com>"
Mon, 10 Dec 2012 09:57:19 -0500
changeset 10 536a63a3f94c
parent 9 55366feb64c4
child 11 3928f44f808f
Cleaned up titles and removed [???]
Overview-UseCases.xml
Overview.html
--- a/Overview-UseCases.xml	Mon Dec 10 09:52:15 2012 -0500
+++ b/Overview-UseCases.xml	Mon Dec 10 09:57:19 2012 -0500
@@ -227,12 +227,12 @@
       <p>If GB wishes to "cache" aspects of reusuable authentication code, but cannot avail of a code signing system, GB can employ a similar data integrity mechanism that the <a href="#data-integrity">social networking site uses</a>.  Moreover, Jae-sang or GB may at any time reinitiate a key generation for subsequent transactions.</p>
     </div>
     <div id='video-service' class='section'>    
-      <h3>Dr. What: Video Service</h3>
+      <h3>Video Services</h3>
       <p>Virginie connects to her favorite video service to watch an episode of a show she is interested in using her entertainment device, which connects to the biggest screen in her living room.  The video service collects a monthly subscription fee and allows the watching of five streaming movies a month at that fee, and streams high definition content over an Internet connection.  Virginie does the following:</p>
       <ol>
         <li><p>She sets her device up to interact with the service.  Her device runs a user agent that meets the conformance criteria for the Web Cryptography API specification.  During the set up process, the entertainment device generates the keys it will use and exchanges them safely with the video service [<a href="#derive">DERIVE</a> | <a href="#derive-pki">DERIVE-PKI</a> | <a href="#keys-dh">KEYEX-DH</a>].</p></li>
         <li><p>Subsequent access to the video service from her device is seamless, and it identifies her as Virginie, loading her preferences and her watch queue. [<a href="#keycall">KEYCALL</a> | <a href="#decrypt-pki">DECRYPT-PKI</a> | <a href="#sign">??SIGN</a>].  She can access the service and browse videos to watch.</p></li> 
-        <li><p>She selects her favorite show -- Dr. What -- and picks an episode that she has not yet seen.  The service then determines that she is authorized to watch that video, and streams that video. [???] </p></li>
+        <li><p>She selects her favorite show and picks an episode that she has not yet seen.  The service then determines that she is authorized to watch that video, and streams that video. [VERIFY | SIGN]</p></li>
         <li><p>Virginie rates the video so that the service understands her preferences.  Along with personalized data about Virginie, the device sends usage statistics and metrics back to the service [<a href="#mac">MAC</a> | <a href="#encrypt-sym">ENCRYPT-SYM</a> | <a href="#encrypt-pki">ENCRYPT-PKI</a>].</p></li>
       </ol>
     </div>
@@ -338,7 +338,7 @@
     <ul>
       <li><p>Be assured that they are who they claim they are. [<a href="#sign">SIGN</a> | <a href="#verify">VERIFY</a> | <a href="#decrypt">DECRYPT</a> | <a href="#decrypt-pki">DECRYPT-PKI</a> | <a href="#encrypt">ENCRYPT</a> | <a href="#encrypt-pki">ENCRYPT-PKI</a>] </p></li>
       <li><p>Be assured that during a conversation, messages sent back and forth are unmodified. [<a href="#encrypt">ENCRYPT</a> | <a href="#decrypt">DECRYPT</a>] </p></li>
-      <li><p>Be assured that after the conversation, the contents of the conversation cannot be determined. [???] </p></li>
+      <li><p>Be assured that after the conversation, the contents of the conversation cannot be determined. [ENCRYPT-PKI][DECRYPT-PKI] </p></li>
     </ul>
 
   </div>
--- a/Overview.html	Mon Dec 10 09:52:15 2012 -0500
+++ b/Overview.html	Mon Dec 10 09:57:19 2012 -0500
@@ -113,7 +113,7 @@
 
     <div id="toc">
       <h2>Table of Contents</h2>
-      <div class="toc"><ul><li><a href="#introduction">1. Introduction</a></li><li><a href="#requirements">2. Requirements</a></li><li><a href="#scenarios">3. Use Case Scenarios</a><ul><li><a href="#banking-korea">3.1. Banking Transactions</a></li><li><a href="#video-service">3.2. Dr. What: Video Service</a></li><li><a href="#data-integrity">3.3. Code Sanctity and Bandwidth Saver</a></li><li><a href="#encrypt">3.4. Fostering Encrypted Communications</a></li><li><a href="#realtime-messaging">3.5. Off The Record Real Time Messaging</a></li><li><a href="#savemystuff">3.6. Documents In the Cloud</a></li></ul></li></ul></div>
+      <div class="toc"><ul><li><a href="#introduction">1. Introduction</a></li><li><a href="#requirements">2. Requirements</a></li><li><a href="#scenarios">3. Use Case Scenarios</a><ul><li><a href="#banking-korea">3.1. Banking Transactions</a></li><li><a href="#video-service">3.2. Video Services</a></li><li><a href="#data-integrity">3.3. Code Sanctity and Bandwidth Saver</a></li><li><a href="#encrypt">3.4. Fostering Encrypted Communications</a></li><li><a href="#realtime-messaging">3.5. Off The Record Real Time Messaging</a></li><li><a href="#savemystuff">3.6. Documents In the Cloud</a></li></ul></li></ul></div>
     </div>
 
     <div id="sections">
@@ -243,12 +243,12 @@
       <p>If GB wishes to "cache" aspects of reusuable authentication code, but cannot avail of a code signing system, GB can employ a similar data integrity mechanism that the <a href="#data-integrity">social networking site uses</a>.  Moreover, Jae-sang or GB may at any time reinitiate a key generation for subsequent transactions.</p>
     </div>
     <div id="video-service" class="section">    
-      <h3>3.2. Dr. What: Video Service</h3>
+      <h3>3.2. Video Services</h3>
       <p>Virginie connects to her favorite video service to watch an episode of a show she is interested in using her entertainment device, which connects to the biggest screen in her living room.  The video service collects a monthly subscription fee and allows the watching of five streaming movies a month at that fee, and streams high definition content over an Internet connection.  Virginie does the following:</p>
       <ol>
         <li><p>She sets her device up to interact with the service.  Her device runs a user agent that meets the conformance criteria for the Web Cryptography API specification.  During the set up process, the entertainment device generates the keys it will use and exchanges them safely with the video service [<a href="#derive">DERIVE</a> | <a href="#derive-pki">DERIVE-PKI</a> | <a href="#keys-dh">KEYEX-DH</a>].</p></li>
         <li><p>Subsequent access to the video service from her device is seamless, and it identifies her as Virginie, loading her preferences and her watch queue. [<a href="#keycall">KEYCALL</a> | <a href="#decrypt-pki">DECRYPT-PKI</a> | <a href="#sign">??SIGN</a>].  She can access the service and browse videos to watch.</p></li> 
-        <li><p>She selects her favorite show -- Dr. What -- and picks an episode that she has not yet seen.  The service then determines that she is authorized to watch that video, and streams that video. [???] </p></li>
+        <li><p>She selects her favorite show and picks an episode that she has not yet seen.  The service then determines that she is authorized to watch that video, and streams that video. [VERIFY | SIGN]</p></li>
         <li><p>Virginie rates the video so that the service understands her preferences.  Along with personalized data about Virginie, the device sends usage statistics and metrics back to the service [<a href="#mac">MAC</a> | <a href="#encrypt-sym">ENCRYPT-SYM</a> | <a href="#encrypt-pki">ENCRYPT-PKI</a>].</p></li>
       </ol>
     </div>
@@ -354,7 +354,7 @@
     <ul>
       <li><p>Be assured that they are who they claim they are. [<a href="#sign">SIGN</a> | <a href="#verify">VERIFY</a> | <a href="#decrypt">DECRYPT</a> | <a href="#decrypt-pki">DECRYPT-PKI</a> | <a href="#encrypt">ENCRYPT</a> | <a href="#encrypt-pki">ENCRYPT-PKI</a>] </p></li>
       <li><p>Be assured that during a conversation, messages sent back and forth are unmodified. [<a href="#encrypt">ENCRYPT</a> | <a href="#decrypt">DECRYPT</a>] </p></li>
-      <li><p>Be assured that after the conversation, the contents of the conversation cannot be determined. [???] </p></li>
+      <li><p>Be assured that after the conversation, the contents of the conversation cannot be determined. [ENCRYPT-PKI][DECRYPT-PKI] </p></li>
     </ul>
 
   </div>