<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="en">
	<id>https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=User_Intent_Pattern</id>
	<title>User Intent Pattern - Revision history</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.idesg.org/index.php?action=history&amp;feed=atom&amp;title=User_Intent_Pattern"/>
	<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=User_Intent_Pattern&amp;action=history"/>
	<updated>2026-05-01T05:39:58Z</updated>
	<subtitle>Revision history for this page on the wiki</subtitle>
	<generator>MediaWiki 1.38.4</generator>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=User_Intent_Pattern&amp;diff=12371&amp;oldid=prev</id>
		<title>Tomjones at 20:46, 9 September 2018</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=User_Intent_Pattern&amp;diff=12371&amp;oldid=prev"/>
		<updated>2018-09-09T20:46:01Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table style=&quot;background-color: #fff; color: #202122;&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;en&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← Older revision&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;Revision as of 20:46, 9 September 2018&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l26&quot;&gt;Line 26:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;Line 26:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;= Design Pattern Content =&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;= Design Pattern Content =&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Problem Description (meme)==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==Problem Description (meme)==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;[[Do Not Track]]. For any case where the user wishes the communications partner (either RP or provider) to honor the user&amp;#039;s desire to avoid linking their actions on the partner site to another site, this intention needs to be known by the site.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;#039;&amp;#039;&lt;/ins&gt;[[Do Not Track]]&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;#039;&amp;#039;&lt;/ins&gt;. For any case where the user wishes the communications partner (either RP or provider) to honor the user&amp;#039;s desire to avoid linking their actions on the partner site to another site, this intention needs to be known by the site.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;br/&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==When to use this Pattern (Context)==&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==When to use this Pattern (Context)==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Any time user information is collected by a site on the internet. That would include behavior patterns like search terms.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* Any time user information is collected by a site on the internet. That would include behavior patterns like search terms.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The user device will have sufficient display area and input capability to allow the user to chose to set their own tracking option, or to explain why they are not provided an option by the RP.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The user device will have sufficient display area and input capability to allow the user to chose to set their own tracking option, or to explain why they are not provided an option by the RP.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* When the web site advertises a &amp;#039;&amp;#039;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;#039;DO NOT TRACK&amp;#039;&lt;/del&gt;&amp;#039;&amp;#039; policy, it is required that the user &amp;quot;opt into&amp;quot; any tracking of their attributes or behaviors.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* When the web site advertises a &amp;#039;&amp;#039;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Do Not Track]]&lt;/ins&gt;&amp;#039;&amp;#039; policy, it is required that the user &amp;quot;opt into&amp;quot; any tracking of their attributes or behaviors.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* When the web site has a privacy policy that explicitly permits &amp;quot;opt out&amp;quot; behavior, then the user will be provided with other means to do so in the normal course of any transaction with the site.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* When the web site has a privacy policy that explicitly permits &amp;quot;opt out&amp;quot; behavior, then the user will be provided with other means to do so in the normal course of any transaction with the site.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;−&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The IDESG will create an identity ecosystem consisting of multiple trust frameworks that satisfy the needs of specific affinity groups. Since users need to communicate with different affinity groups from time to time, they will typically need to accommodate different trust frameworks during the normal course of daily computer use. Each affinity group can specify a &amp;#039;&amp;#039;&lt;del style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&amp;#039;DO NOT TRACK&amp;#039;&lt;/del&gt;&amp;#039;&amp;#039; default policy if it chooses.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot; data-marker=&quot;+&quot;&gt;&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The IDESG will create an identity ecosystem consisting of multiple trust frameworks that satisfy the needs of specific affinity groups. Since users need to communicate with different affinity groups from time to time, they will typically need to accommodate different trust frameworks during the normal course of daily computer use. Each affinity group can specify a &amp;#039;&amp;#039;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;[[Do Not Track]]&lt;/ins&gt;&amp;#039;&amp;#039; default policy if it chooses.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The RP has a relatively clear set of privacy compliance regulations to follow that can be satisfied by one or more IDESG trust frameworks.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The RP has a relatively clear set of privacy compliance regulations to follow that can be satisfied by one or more IDESG trust frameworks.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The RP will support one or more IDESG trust frameworks or providers known to follow IDESG principles for the user to chose from.&lt;/div&gt;&lt;/td&gt;&lt;td class=&quot;diff-marker&quot;&gt;&lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* The RP will support one or more IDESG trust frameworks or providers known to follow IDESG principles for the user to chose from.&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Tomjones</name></author>
	</entry>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=User_Intent_Pattern&amp;diff=12370&amp;oldid=prev</id>
		<title>Tomjones: /* Problem Description (meme) */</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=User_Intent_Pattern&amp;diff=12370&amp;oldid=prev"/>
		<updated>2018-09-09T20:45:06Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Problem Description (meme)&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Design Pattern Metadata =&lt;br /&gt;
==Title== &lt;br /&gt;
User Intent Design Pattern is meant as a composable object that can be included in any entity.&lt;br /&gt;
In some ways this is similar to existing use case that discuss privacy enhancing technology, but the purpose is quite different.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Status==&lt;br /&gt;
===Design Pattern Lifecycle Status===&lt;br /&gt;
{|  border=&amp;quot;1&amp;quot; padding=&amp;quot;2&amp;quot; width=&amp;quot;600px&amp;quot;&lt;br /&gt;
|Contributed ||bgcolor=&amp;quot;SteelBlue&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Working Draft&amp;#039;&amp;#039;&amp;#039;|| Committee Review || Compilation || Approval || Publication &lt;br /&gt;
|-&lt;br /&gt;
|colspan=6|This Design Pattern is available for review by the User Experice Committee (UXC) with the goal of refining and completing the Design Pattern, see [[Identity Design Patterns]] for the current list of design patterns and their status.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Design Pattern Review Status===&lt;br /&gt;
Initial posting.&lt;br /&gt;
&lt;br /&gt;
The UX committee intends to increase the type of information the user could select.&lt;br /&gt;
&lt;br /&gt;
==Design Pattern Category== &lt;br /&gt;
Privacy, Trust/Assurance, Interoperability&lt;br /&gt;
&lt;br /&gt;
==Contributor== &lt;br /&gt;
Tom Jones&lt;br /&gt;
&lt;br /&gt;
= Design Pattern Content =&lt;br /&gt;
==Problem Description (meme)==&lt;br /&gt;
[[Do Not Track]]. For any case where the user wishes the communications partner (either RP or provider) to honor the user&amp;#039;s desire to avoid linking their actions on the partner site to another site, this intention needs to be known by the site.&lt;br /&gt;
&lt;br /&gt;
==When to use this Pattern (Context)==&lt;br /&gt;
* Any time user information is collected by a site on the internet. That would include behavior patterns like search terms.&lt;br /&gt;
* The user device will have sufficient display area and input capability to allow the user to chose to set their own tracking option, or to explain why they are not provided an option by the RP.&lt;br /&gt;
* When the web site advertises a &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; policy, it is required that the user &amp;quot;opt into&amp;quot; any tracking of their attributes or behaviors.&lt;br /&gt;
* When the web site has a privacy policy that explicitly permits &amp;quot;opt out&amp;quot; behavior, then the user will be provided with other means to do so in the normal course of any transaction with the site.&lt;br /&gt;
* The IDESG will create an identity ecosystem consisting of multiple trust frameworks that satisfy the needs of specific affinity groups. Since users need to communicate with different affinity groups from time to time, they will typically need to accommodate different trust frameworks during the normal course of daily computer use. Each affinity group can specify a &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; default policy if it chooses.&lt;br /&gt;
* The RP has a relatively clear set of privacy compliance regulations to follow that can be satisfied by one or more IDESG trust frameworks.&lt;br /&gt;
* The RP will support one or more IDESG trust frameworks or providers known to follow IDESG principles for the user to chose from.&lt;br /&gt;
* It is expected that each trust framework will come with a set of rules and approved independent labs that can attest to the web site based on the trust frameworks that are supported by the site.&lt;br /&gt;
===Relationships with other Design Patterns===&lt;br /&gt;
This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Identity Ecosystem]] design pattern.&lt;br /&gt;
*[[User Choice Pattern]] is used to allow the user to select which attributes are released to a relying party.&lt;br /&gt;
&lt;br /&gt;
===Relationships with Use Cases===&lt;br /&gt;
The Device Integrity is defined in the &amp;quot;[[Device Integrity supporting User Authentication]] use case&amp;quot;&lt;br /&gt;
&lt;br /&gt;
===Actors===&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;User:&amp;#039;&amp;#039;&amp;#039; In this case a human being that wants to access services on a web site and still retain privacy by requesting that the site not link the user&amp;#039;s attributes to any other site or instance.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;User Agent:&amp;#039;&amp;#039;&amp;#039; in this case any piece of code that displays a user experience and obtains responses from the user in order to satisfy the privacy concerns of the user and the need for identity and attribute claims by the relying party.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Relying Party (RP):&amp;#039;&amp;#039;&amp;#039; A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes that are required by regulation to met legal responsibilities. It is beyond the scope of this Design Pattern to determine whether the RP actually has any justification in requesting any user attribute at all.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Identity or Attribute Provider (IAP):&amp;#039;&amp;#039;&amp;#039; contains identities and attributes of users that will be provided on demand in claims that the user can forward to a RP.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Identity Ecosystem:&amp;#039;&amp;#039;&amp;#039; a set of services that implement other trust services as required by the rules of that ecosystem. Note that all of the other actors are almost certainly required to function with multiple identity ecosystems; some, but not all, of these ecosystems are expected to be compliant with IDESG trust frameworks.&lt;br /&gt;
&lt;br /&gt;
==Solution==&lt;br /&gt;
===Description of the Solution===&lt;br /&gt;
# The user establishes an account with one or more IAPs. In this case there is no need to distinguish between identity providers and other attribute providers.&lt;br /&gt;
# The user accesses a web site which requires identity and attributes claims of some sort to continue to process the user request. That web site then becomes a relying party.&lt;br /&gt;
# The RP gives the user a choice on which system or provider to provide identity.&lt;br /&gt;
# This request for information is rendered by the user agent.&lt;br /&gt;
## Where appropriate the user will be given the choice to change their &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; policies.&lt;br /&gt;
## Where the RP needs the ability to track the user for regulatory or security reasons, those will be made clear to the user.&lt;br /&gt;
&lt;br /&gt;
===Error Conditions===&lt;br /&gt;
# User does not have credentials acceptable to the relying party.&lt;br /&gt;
## Mitigation: The ID ecosystem / trust framework redirects the user to one or more sources of appropriate credentials that do meet the criteria.&lt;br /&gt;
## Mitigation: The relying party redirects the user to one or more Identity Providers or trust frameworks that are acceptable.&lt;br /&gt;
# User is unwilling to permit &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; to be disabled&lt;br /&gt;
## Where possible the RP will provide the user with an option to continue to avoid tracking, perhaps with limited functionality.&lt;br /&gt;
## Where the RP cannot continue service without tracking the user, the user will be informed of the reason.&lt;br /&gt;
&lt;br /&gt;
===Usability Considerations===&lt;br /&gt;
One important part of any Design Pattern is the intelligibility of the use to the user. Here it is very important that the user be give only some decisions to address as can easily and comprehensibly be display on the device that used.&lt;br /&gt;
&lt;br /&gt;
A good review of the complexity that users can face when trying to control the release of data is shown in the following article: &amp;quot;On Facebook, Deciding Who Knows You’re a Dog&amp;quot; &lt;br /&gt;
http://www.nytimes.com/2014/01/30/technology/personaltech/on-facebook-deciding-who-knows-youre-a-dog.html?ref=technology&amp;amp;_r=0&lt;br /&gt;
&lt;br /&gt;
Read the report of the IDESG experience committee on use case usability at [[UXC Use Case Mapping]]&lt;br /&gt;
===Value Proposition===&lt;br /&gt;
The most difficult acceptance barrier for most new protocols is the web site of the relying party. If any part of the implementation hinders use of the web site, the feature will not be implemented. If there is no business value to the relying party, it is unlikely that broad adoption will happen. The only way to ensure that any IDESG feature is accepted if for the relying party to see a better user acceptance, or at least a better user experience after adopting the feature. The user intent pattern will give the RP proof of compliance with &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; regulations as well a presumed trust mark from the IDESG or its frameworks that provides some comfort to the site user that their privacy concerns are being addressed.&lt;br /&gt;
&lt;br /&gt;
==References and Citations==&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Do Not Track (DNT)&amp;#039;&amp;#039;&amp;#039; header is nicely described in the Wikipedia at the following link [[http://en.wikipedia.org/wiki/Do_Not_Track]].&lt;br /&gt;
&lt;br /&gt;
= NSTIC Guiding Principles Considerations =&lt;br /&gt;
==Privacy Considerations==&lt;br /&gt;
Privacy enhancement is the core of the purpose of this Design Pattern.&lt;br /&gt;
&lt;br /&gt;
It is known that search terms alone are sufficient in many cases to allow identification of the user. In any service that collects attributes or behaviors of the user over time, only policy enforcement will offer any hope of blocking discovery of the user&amp;#039;s identity.&lt;br /&gt;
&lt;br /&gt;
==Security Considerations==&lt;br /&gt;
In general security is not considered in this Design Pattern as security will be provided by the same type of credentials, token and claims as used in any secure implementation.&lt;br /&gt;
&lt;br /&gt;
==Interoperability Considerations==&lt;br /&gt;
This design pattern is oriented toward a composable object that presents a user experience that results in a set of claims adequate for the RP.&lt;br /&gt;
&lt;br /&gt;
= Framework Specific Considerations =&lt;br /&gt;
== Aerospace and Defense ==&lt;br /&gt;
* The specific example is employees, contractors and vendors which are under contract to one of the recognized employers in the A&amp;amp;D industry complying with DoD regulations for protection of secret information.&lt;br /&gt;
* Currently most employers assume that their employment contract allows then to provide employee attributes to any site that the employee voluntarily visits. The assumption is likely to need to be make more explicit in the years to come.&lt;br /&gt;
&lt;br /&gt;
== Health Care ==&lt;br /&gt;
* Two specific examples are of interest:&lt;br /&gt;
** Users of the healthcare sytem.&lt;br /&gt;
** Providers of health care.&lt;br /&gt;
&lt;br /&gt;
[[Category:User Experience]]&lt;br /&gt;
[[Category:Design Pattern]]&lt;br /&gt;
[[Category:Authentication Design Pattern]]&lt;/div&gt;</summary>
		<author><name>Tomjones</name></author>
	</entry>
	<entry>
		<id>https://wiki.idesg.org/index.php?title=User_Intent_Pattern&amp;diff=10265&amp;oldid=prev</id>
		<title>Mary Hodder: /* Relationships with other Design Patterns */ updated link to Common Pattern</title>
		<link rel="alternate" type="text/html" href="https://wiki.idesg.org/index.php?title=User_Intent_Pattern&amp;diff=10265&amp;oldid=prev"/>
		<updated>2016-01-19T16:49:19Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;Relationships with other Design Patterns: &lt;/span&gt; updated link to Common Pattern&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;New page&lt;/b&gt;&lt;/p&gt;&lt;div&gt;= Design Pattern Metadata =&lt;br /&gt;
==Title== &lt;br /&gt;
User Intent Design Pattern is meant as a composable object that can be included in any entity.&lt;br /&gt;
In some ways this is similar to existing use case that discuss privacy enhancing technology, but the purpose is quite different.&lt;br /&gt;
&amp;lt;br /&amp;gt;&lt;br /&gt;
&lt;br /&gt;
==Status==&lt;br /&gt;
===Design Pattern Lifecycle Status===&lt;br /&gt;
{|  border=&amp;quot;1&amp;quot; padding=&amp;quot;2&amp;quot; width=&amp;quot;600px&amp;quot;&lt;br /&gt;
|Contributed ||bgcolor=&amp;quot;SteelBlue&amp;quot;|&amp;#039;&amp;#039;&amp;#039;Working Draft&amp;#039;&amp;#039;&amp;#039;|| Committee Review || Compilation || Approval || Publication &lt;br /&gt;
|-&lt;br /&gt;
|colspan=6|This Design Pattern is available for review by the User Experice Committee (UXC) with the goal of refining and completing the Design Pattern, see [[Identity Design Patterns]] for the current list of design patterns and their status.&lt;br /&gt;
|}&lt;br /&gt;
&lt;br /&gt;
===Design Pattern Review Status===&lt;br /&gt;
Initial posting.&lt;br /&gt;
&lt;br /&gt;
The UX committee intends to increase the type of information the user could select.&lt;br /&gt;
&lt;br /&gt;
==Design Pattern Category== &lt;br /&gt;
Privacy, Trust/Assurance, Interoperability&lt;br /&gt;
&lt;br /&gt;
==Contributor== &lt;br /&gt;
Tom Jones&lt;br /&gt;
&lt;br /&gt;
= Design Pattern Content =&lt;br /&gt;
==Problem Description (meme)==&lt;br /&gt;
&amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039;. For any case where the user wishes the communications partner (either RP or provider) to honor the user&amp;#039;s desire to avoid linking their actions on the partner site to another site, this intention needs to be known by the site.&lt;br /&gt;
&lt;br /&gt;
==When to use this Pattern (Context)==&lt;br /&gt;
* Any time user information is collected by a site on the internet. That would include behavior patterns like search terms.&lt;br /&gt;
* The user device will have sufficient display area and input capability to allow the user to chose to set their own tracking option, or to explain why they are not provided an option by the RP.&lt;br /&gt;
* When the web site advertises a &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; policy, it is required that the user &amp;quot;opt into&amp;quot; any tracking of their attributes or behaviors.&lt;br /&gt;
* When the web site has a privacy policy that explicitly permits &amp;quot;opt out&amp;quot; behavior, then the user will be provided with other means to do so in the normal course of any transaction with the site.&lt;br /&gt;
* The IDESG will create an identity ecosystem consisting of multiple trust frameworks that satisfy the needs of specific affinity groups. Since users need to communicate with different affinity groups from time to time, they will typically need to accommodate different trust frameworks during the normal course of daily computer use. Each affinity group can specify a &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; default policy if it chooses.&lt;br /&gt;
* The RP has a relatively clear set of privacy compliance regulations to follow that can be satisfied by one or more IDESG trust frameworks.&lt;br /&gt;
* The RP will support one or more IDESG trust frameworks or providers known to follow IDESG principles for the user to chose from.&lt;br /&gt;
* It is expected that each trust framework will come with a set of rules and approved independent labs that can attest to the web site based on the trust frameworks that are supported by the site.&lt;br /&gt;
===Relationships with other Design Patterns===&lt;br /&gt;
This design pattern assumes the use of a device connected to internet service providers as described in the [[Design Pattern: Common to any Internet Identity Ecosystem]] design pattern.&lt;br /&gt;
*[[User Choice Pattern]] is used to allow the user to select which attributes are released to a relying party.&lt;br /&gt;
&lt;br /&gt;
===Relationships with Use Cases===&lt;br /&gt;
The Device Integrity is defined in the &amp;quot;[[Device Integrity supporting User Authentication]] use case&amp;quot;&lt;br /&gt;
&lt;br /&gt;
===Actors===&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;User:&amp;#039;&amp;#039;&amp;#039; In this case a human being that wants to access services on a web site and still retain privacy by requesting that the site not link the user&amp;#039;s attributes to any other site or instance.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;User Agent:&amp;#039;&amp;#039;&amp;#039; in this case any piece of code that displays a user experience and obtains responses from the user in order to satisfy the privacy concerns of the user and the need for identity and attribute claims by the relying party.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Relying Party (RP):&amp;#039;&amp;#039;&amp;#039; A service provider that needs a collection of claims to provide that service. The claims may relate to financial responsibility or other user attributes that are required by regulation to met legal responsibilities. It is beyond the scope of this Design Pattern to determine whether the RP actually has any justification in requesting any user attribute at all.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Identity or Attribute Provider (IAP):&amp;#039;&amp;#039;&amp;#039; contains identities and attributes of users that will be provided on demand in claims that the user can forward to a RP.&lt;br /&gt;
# &amp;#039;&amp;#039;&amp;#039;Identity Ecosystem:&amp;#039;&amp;#039;&amp;#039; a set of services that implement other trust services as required by the rules of that ecosystem. Note that all of the other actors are almost certainly required to function with multiple identity ecosystems; some, but not all, of these ecosystems are expected to be compliant with IDESG trust frameworks.&lt;br /&gt;
&lt;br /&gt;
==Solution==&lt;br /&gt;
===Description of the Solution===&lt;br /&gt;
# The user establishes an account with one or more IAPs. In this case there is no need to distinguish between identity providers and other attribute providers.&lt;br /&gt;
# The user accesses a web site which requires identity and attributes claims of some sort to continue to process the user request. That web site then becomes a relying party.&lt;br /&gt;
# The RP gives the user a choice on which system or provider to provide identity.&lt;br /&gt;
# This request for information is rendered by the user agent.&lt;br /&gt;
## Where appropriate the user will be given the choice to change their &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; policies.&lt;br /&gt;
## Where the RP needs the ability to track the user for regulatory or security reasons, those will be made clear to the user.&lt;br /&gt;
&lt;br /&gt;
===Error Conditions===&lt;br /&gt;
# User does not have credentials acceptable to the relying party.&lt;br /&gt;
## Mitigation: The ID ecosystem / trust framework redirects the user to one or more sources of appropriate credentials that do meet the criteria.&lt;br /&gt;
## Mitigation: The relying party redirects the user to one or more Identity Providers or trust frameworks that are acceptable.&lt;br /&gt;
# User is unwilling to permit &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; to be disabled&lt;br /&gt;
## Where possible the RP will provide the user with an option to continue to avoid tracking, perhaps with limited functionality.&lt;br /&gt;
## Where the RP cannot continue service without tracking the user, the user will be informed of the reason.&lt;br /&gt;
&lt;br /&gt;
===Usability Considerations===&lt;br /&gt;
One important part of any Design Pattern is the intelligibility of the use to the user. Here it is very important that the user be give only some decisions to address as can easily and comprehensibly be display on the device that used.&lt;br /&gt;
&lt;br /&gt;
A good review of the complexity that users can face when trying to control the release of data is shown in the following article: &amp;quot;On Facebook, Deciding Who Knows You’re a Dog&amp;quot; &lt;br /&gt;
http://www.nytimes.com/2014/01/30/technology/personaltech/on-facebook-deciding-who-knows-youre-a-dog.html?ref=technology&amp;amp;_r=0&lt;br /&gt;
&lt;br /&gt;
Read the report of the IDESG experience committee on use case usability at [[UXC Use Case Mapping]]&lt;br /&gt;
===Value Proposition===&lt;br /&gt;
The most difficult acceptance barrier for most new protocols is the web site of the relying party. If any part of the implementation hinders use of the web site, the feature will not be implemented. If there is no business value to the relying party, it is unlikely that broad adoption will happen. The only way to ensure that any IDESG feature is accepted if for the relying party to see a better user acceptance, or at least a better user experience after adopting the feature. The user intent pattern will give the RP proof of compliance with &amp;#039;&amp;#039;&amp;#039;DO NOT TRACK&amp;#039;&amp;#039;&amp;#039; regulations as well a presumed trust mark from the IDESG or its frameworks that provides some comfort to the site user that their privacy concerns are being addressed.&lt;br /&gt;
&lt;br /&gt;
==References and Citations==&lt;br /&gt;
The &amp;#039;&amp;#039;&amp;#039;Do Not Track (DNT)&amp;#039;&amp;#039;&amp;#039; header is nicely described in the Wikipedia at the following link [[http://en.wikipedia.org/wiki/Do_Not_Track]].&lt;br /&gt;
&lt;br /&gt;
= NSTIC Guiding Principles Considerations =&lt;br /&gt;
==Privacy Considerations==&lt;br /&gt;
Privacy enhancement is the core of the purpose of this Design Pattern.&lt;br /&gt;
&lt;br /&gt;
It is known that search terms alone are sufficient in many cases to allow identification of the user. In any service that collects attributes or behaviors of the user over time, only policy enforcement will offer any hope of blocking discovery of the user&amp;#039;s identity.&lt;br /&gt;
&lt;br /&gt;
==Security Considerations==&lt;br /&gt;
In general security is not considered in this Design Pattern as security will be provided by the same type of credentials, token and claims as used in any secure implementation.&lt;br /&gt;
&lt;br /&gt;
==Interoperability Considerations==&lt;br /&gt;
This design pattern is oriented toward a composable object that presents a user experience that results in a set of claims adequate for the RP.&lt;br /&gt;
&lt;br /&gt;
= Framework Specific Considerations =&lt;br /&gt;
== Aerospace and Defense ==&lt;br /&gt;
* The specific example is employees, contractors and vendors which are under contract to one of the recognized employers in the A&amp;amp;D industry complying with DoD regulations for protection of secret information.&lt;br /&gt;
* Currently most employers assume that their employment contract allows then to provide employee attributes to any site that the employee voluntarily visits. The assumption is likely to need to be make more explicit in the years to come.&lt;br /&gt;
&lt;br /&gt;
== Health Care ==&lt;br /&gt;
* Two specific examples are of interest:&lt;br /&gt;
** Users of the healthcare sytem.&lt;br /&gt;
** Providers of health care.&lt;br /&gt;
&lt;br /&gt;
[[Category:User Experience]]&lt;br /&gt;
[[Category:Design Pattern]]&lt;br /&gt;
[[Category:Authentication Design Pattern]]&lt;/div&gt;</summary>
		<author><name>Mary Hodder</name></author>
	</entry>
</feed>