Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 2 Next »

This section will highlight important requirements or describe any additional cross-cutting requirements that apply to this Building Block.

  1. Privacy Protection

    • Prioritize user privacy through the implementation of cryptographic techniques and adherence to privacy-preserving standards.

  2. Interoperability Standards

    • Adhere to widely accepted standards like Decentralized Identifiers (DIDs) and Verifiable Credentials data models to ensure compatibility and interoperability across different systems.

  3. Continuous Improvement Mechanism

    • Incorporate agility for continuous improvement, adapting to emerging technologies, standards, and user feedback to remain at the forefront of digital credentialing.

  4. Security

    • Implement robust security measures to protect sensitive user information and prevent unauthorized access or tampering with digital credentials.

  • No labels