Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

A user-friendly and customisable mechanism should be in place to facilitate integration with credential issuers. This ensures a simplified and efficient addition of new credentials to the wallet.

Tip

Use Case

Robert is applying applies for a health insurance at with XYZ Insurance. The administrators at Upon verifying his details, XYZ Insurance , after verifying the details shared by Robert and issue a policy over email. In the email, the issuer, XYZ Insurance, shares issues the policy and sends it to Robert via email. The email contains a QR code. When Robert scans the QR code using with his mobile phone, which opens up the wallet (if the wallet is available on the phone) and asks Robert the wallet app prompts him to enter the policy ID and date of birth for security reasons. Robert after Upon entering the details, Robert receives the Policy Credential on in the wallet.

1.2. Secure Storage of Credentials in Wallet

...

The wallet must allow the holder the ability to remove credentials from the wallet.

Tip

Use Case

Moris plans a trip to the Caribbean, purchases flight tickets, and adds the ticket credentials to his wallet. However, due to unforeseen circumstances, he has to cancel the trip. To tidy up his wallet, he decides to remove the ticket credentials:

  • Moris navigates to the wallet section where his flight ticket credentials are stored.

  • He locates the option to remove the credential and clicks on it.

  • A confirmation pop-up appears, prompting Moris to confirm the removal.

  • Moris confirms the removal, and the flight ticket credential is successfully removed from his wallet.

1.5. Transfer of Credentials from One Device to Another

The credentials can be transfered from one device to another (when credentials are locally stored in a device) by the holder. The transfer can happen subject to the binding of credentials to the new device has to happen once again.

Tip

Use Case

Amanda is , in the process of upgrading her phone. She wants , needs to transfer all her data from the old phone to the new phone. She also wanted to transfer all her credentials documents to her new phone (assuming there is no cloud wallet which could do this automatically). She sees an options in settings screen of the wallet stating “Transfer to new device” and “Transfer from another device”.She installs the wallet in her new phone and clicks on the on the option “Transfer from another device”, a QR code opens which has the connection details. The she clicks on the option “Transfer to new device”, a QR code scanner opens and she uses it to scan the QR code on her new phone. A connection is established between both the phones and in her old phone, Amanda, sees her list of credentials pre-selected and has a button called “Authenticate & Share” and/or “Share“ (based on the security level added by the issuer). She clicks on the button and authenticates her self and all her credentials are transfered to the new phone, including credentials and documents, to her new device. With no automatic cloud wallet integration available, she follows these steps:

  1. Settings Options:
    Accessing the wallet settings on her old phone, Amanda finds "Transfer to new device" and "Transfer from another device" options.

  2. Initiate Transfer from Old Phone:
    On her old phone, Amanda selects "Transfer from another device," generating a QR code with connection details.

  3. Initiate Transfer on New Phone:
    Installing the wallet on her new phone, Amanda selects "Transfer to new device" and uses the QR code scanner to establish a connection with the old phone.

  4. Credential Selection:
    On her old phone, Amanda sees a pre-selected list of credentials.

  5. Authenticate and Transfer:
    Clicking on "Authenticate & Share" (or "Share" based on security levels), Amanda authenticates herself securely.

  6. Completion:
    All credentials and documents successfully transfer to her new phone. However, credentials explicitly bound to the key on the previous phone are no longer bound.

  7. Re-binding:
    Amanda needs to bind these specific credentials once again due to the change in device.

2. Presentation and Sharing of Credentials

...

To enhance privacy, the holder should be able to choose and share specific attributes of a credential without revealing unnecessary details, giving them control over the information disclosed.

Tip

2.3. Mode of Sharing

The wallet should provide a mechanism for the holder to share the credentials in a secure and standardised manner using standard protocols.

...