Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 5 Next »

Key Digital Functionalities describe the core (required) functions that this Building Block must be able to perform.

1. Credential Storage and Management

Credential holders should be able to retrieve, securely store and manage various types of digital credentials, including educational, professional, and other verifiable credentials in the Wallet.

1.1. Integrate with Credential Issuers

The wallet must seamlessly integrate with numerous credential issuers to facilitate smooth issuance and updates.

A straightforward and customisable mechanism should exist for integrating with credential issuers, simplifying the addition of new credentials to the wallet.

1.2. Secure Storage of Credentials

The wallet must provide a secure environment for storing sensitive credential information, implementing encryption techniques to protect stored credentials and ensuring that only authorized users can access and decrypt the information.

1.3. Organise and Manage Credentials

The wallet must provide mechanisms to organise the credentials and should support features such as,

  1. Ordering of credentials in the wallet

  2. Ability to categorizing the credentials based on type

  3. Ability to give a name to the credential

1.4. Remove a Credential

The wallet must allow the holder the ability to remove a credentials from the wallet.

2. Presentation and Sharing

The wallet must empower credential holders with control over their digital credentials, allowing them to decide when and how to share specific information.

2.1. Presenting Credentials in Standarized Formats

The holder should be able to digitally present the credentials to relying parties or verifiers through a secure and standardized format, making it interoperable and convenient for various verification scenarios.

2.2. Selective Disclosure

To enhance privacy, the holder should be able to choose and share specific attributes of a credential without revealing unnecessary details, giving them control over the information disclosed.

2.3. Sharing of Credentials

The wallet should provide mechanism for the holder to share the credentials in a secure and standardized manner using standard protocols.

Here, are a few methods for sharing credentials with Verifiers,

  • QR Code Sharing

    • Method: Generate a QR code representation of the verifiable credentials.

    • Usage: Users can display the QR code on their device, and verifiers can scan it to receive the credential information. This method is efficient and can be used in offline scenarios.

  • Secure URL or Links

    • Method: Create a secure URL link to the verifiable credentials.

    • Usage: Users can share the link with verifiers, who can then access the credential information through a secure online connection. This method is convenient for remote verification.

  • Bluetooth Sharing

    • Method: Leverage Bluetooth technology for secure data transmission.

    • Usage: Users can share their credentials with Bluetooth-enabled devices, providing a wireless and secure means of transferring information.

  • NFC (Near Field Communication) Sharing

    • Method: Transmit credential information between devices using NFC.

    • Usage: Users tap their device against an NFC-enabled verifier's device to securely share the credential.2. User Control and Consent.

  • Deep Linking

    • Method: Generate a deep link pointing to the specific credential within the Digital Credential Wallet.

    • Usage: Users share the deep link, and recipients can click or open it to access the credential directly within the app.

2.4. Biometric Authorization for Sharing

The digital wallet should provide provision for credential holders to authenticate themselves preferably using biometrics before sharing credentials, adding an extra layer of security.

3. Verification of Credentials

Verifiers must be able to independently verify the authenticity of the credentials shared by the credential holders.

3. Decentralized Architecture

Implement a decentralized approach using technologies like blockchain to enhance the security, trust, and interoperability of the digital credential wallet.

5. Revocation and Expiry Management

Support the revocation and expiration of digital credentials to ensure users present the most up-to-date and valid information.

6. Multi-Purpose Use

Extend functionality to support various verifiable information beyond educational and professional credentials, such as health records, access permissions, or skill certifications.

  • No labels