diff --git a/README.md b/README.md index 2a632cf..4379195 100644 --- a/README.md +++ b/README.md @@ -18,23 +18,23 @@ Adoption of mobile wallets is accelerating with the “eIDAS 2.0” [European Di 4. The provider keeps a tamper-evident log with evidence of instructions. 5. Upon request, the provider proves that a particular operation was authorized. -```mermaid -flowchart LR -subgraph Provider - direction TB - system(Central system) - log[(Tamper-evident log)] - system -- 3. execution --> system - system -- 4. evidence --> log -end -subgraph Subscriber - direction TB - user((User)) - device[
Device

] - user -- 1. control --> device -end -Subscriber -- 2. instruction --> Provider -Provider -- 5. proof --> Subscriber +``` +┌────────────┐ ┌─────────────────────┐ +│Subscriber │ │Provider │ +│ │ │ │ +│┌──────┐ │ │┌───────┐ │ +││ User │ │ ││Central├──┐3. │ +│└┬─────┘ │ ││system │◄─┘execution│ +│ │1. control│2. instruction │└┬──────┘ │ +│ ▼ ├──────────────►│ ▼4. evidence │ +│┌──────┐ │ │┌───────┐ │ +││ │ │ │┌───────┐ │ +││ │ │ ││ │ │ +││Device│ │ ││Tamper-│ │ +││ │ │ ││evident│ │ +││ │ │ ││log │ │ +│└──────┘ │◄──────────────┤└───────┘ │ +└────────────┘ 5. proof└─────────────────────┘ ``` ## Verify transparent systems