Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.
Info

Key Digital Functionalities describe the core (required) functions that this Building Block must be able to perform.

1. Credential

...

LifeCycle and Management

Credential holders should be able to retrieve, securely store and manage various types of digital credentials, including educational, professional, and other verifiable credentials in the Wallet.

1.1.

...

Importing Credentials

The wallet must seamlessly integrate with a variety of credential issuers, ensuring a streamlined process for credential issuance and updates into the wallet.

...

The wallet must allow the holder the ability to remove credentials from the wallet.

2. Presentation and Sharing of Credentials

The wallet must empower credential holders with control over their digital credentials, allowing them to decide when and how to share specific information.

...

To enhance privacy, the holder should be able to choose and share specific attributes of a credential without revealing unnecessary details, giving them control over the information disclosed.

2.3. Mode of Sharing

...

The wallet should provide a mechanism for the holder to share the credentials in a secure and standardized manner using standard protocols.

...

  • QR Code Sharing

    • Method: Generate a QR code representation of the verifiable credentials.

    • Usage: Users can display the QR code on their device, and verifiers can scan it to receive the credential information. This method is efficient and can be used in offline scenarios.

  • Secure URL or Links

    • Method: Create a secure URL link to the verifiable credentials.

    • Usage: Users can share the link with verifiers, who can then access the credential information through a secure online connection. This method is convenient for remote verification.

  • Bluetooth Sharing

    • Method: Leverage Bluetooth technology for secure data transmission.

    • Usage: Users can share their credentials with Bluetooth-enabled devices, providing a wireless and secure means of transferring information.

  • NFC (Near Field Communication) Sharing

    • Method: Transmit credential information between devices using NFC.

    • Usage: Users tap their device against an NFC-enabled verifier's device to securely share the credential.2. User Control and Consent.

  • Deep Linking

    • Method: Generate a deep link pointing to the specific credential within the Digital Credential Wallet.

    • Usage: Users share the deep link, and recipients can click or open it to access the credential directly within the app.

  • Credential Sharing via DLT (Distributed Ledger Technology):

    • Method: Leverage blockchain or other DLT for secure and tamper-evident credential sharing.

    • Usage: Credentials are stored on a decentralized ledger, and users can share proof of credentials without revealing the actual data.

  • Email or Messaging Integration:

    • Method: Send encrypted credential information via email or messaging.

    • Usage: Users send verifiable credentials directly to verifiers through secure communication channels.

2.4. Biometric Authorization

...

during Sharing

The digital wallet should offer a provision for credential holders to authenticate themselves, preferably utilizing biometrics, before sharing credentials, thereby adding a layer of security. This process also ensures that the credential holder was physically present during the credential sharing, and implicit consent was captured.

...

The verification process should not rely solely on a centralized authority; verification can happen in a decentralized manner. Hence, we are recommending the use of Verifiable Credentials for the digital credential wallet.

3.3. Cryptographic Verification Mechanisms

Cryptographic techniques should be employed to verify the authenticity of credentials, such as digital signatures, ensuring that the credentials presented are genuine and have not been manipulated.

...

4

...

.

...

4. Revocation and Expiry Management

...

The wallet should have robust and secure authentication protocols, ensuring the confidentiality and integrity of authentication processes. Industry-standard protocols such as OAuth or OpenID Connect should be used for secure interactions.

5.3. Multi-Factor Authentication (MFA):

The wallet can have the support for multi-factor authentication for enhanced security where a combination of two or more authentication factors are used, such as biometrics and a PIN, to strengthen user verification.