Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

  1. Ordering of credentials in the wallet

  2. Ability to categorizing categorise the credentials based on type

  3. Ability to give a name to the credential

...

The wallet must allow the holder the ability to remove a credentials from the wallet.

...

The wallet must empower credential holders with control over their digital credentials, allowing them to decide when and how to share specific information.

2.1. Presenting Credentials in

...

Standardized Formats
Status
colourGreen
titlePhase 1

The holder should be able to digitally present the credentials to relying parties or verifiers through a secure and standardized format, making it interoperable and convenient for various verification scenarios.

...

The wallet should provide a mechanism for the holder to share the credentials in a secure and standardized manner using standard protocols.

...

The digital wallet should offer a provision for credential holders to authenticate themselves, preferably utilizing biometrics, before sharing credentials, thereby adding an additional a layer of security. This process also ensures that the credential holder was physically present during the credential sharing, and implicit consent was captured.

...

Verifiers must be able to independently verify the authenticity of the credentials shared by the credential holders.

3.1. Standardized Verification Process

The verifiers should have a standardized and reliable process to identify the type of credentials and independently verify the authenticity of presented credentials to ensure that the credential has not been tampered with and is issued by a trusted issuer.

3.2. Decentralized

...

Implement a decentralized approach using technologies like blockchain to enhance the security, trust, and interoperability of the digital credential wallet.

...

Verification

The verification process should not rely solely on a centralized authority; verification can happen in a decentralized manner.

3.3. Cryptographic Verification Mechanisms

Cryptographic techniques should be employed to verify the authenticity of credentials, such as digital signatures, ensuring that the credentials presented are genuine and have not been manipulated.

3.4. Interoperability with Verifiers

The wallet should be designed for seamless interoperability with diverse verifiers across different systems. The implementation of standardized formats and protocols guarantees that the wallet can effectively undergo verification processes with a broad spectrum of entities, fostering enhanced interoperability.

4. Revocation and Expiry Management

Support the The wallet must proficiently manage situations in which credentials are vulnerable to revocation and expiration of digital credentials to ensure users present the most up-to-date and valid information.

...

.

4.1. Periodic re-issuance of Credentials

The wallet should regularly renew particular credentials, based on the credential type, to assess their current validity. This functionality may be necessary for credentials susceptible to revocation by the issuing entity.

4.2. Credential Expiry Handling

The wallet must automatically identify credential based on the expirations and marking expired credentials as invalid.

5. Multi-Purpose Use

Extend functionality to support various verifiable information beyond educational and professional credentials, such as health records, access permissions, or skill certifications.