There are cases where data is transferred from system to system using verifiable credentials and verifiable presentations without learners involvement in the flow. What are examples of use cases of this? How does the learner provide authorization and how is that communicated?