Skip to end of metadata
Go to start of metadata

You are viewing an old version of this page. View the current version.

Compare with Current View Page History

« Previous Version 15 Next »

Key Digital Functionalities describe the core (required) functions that this Building Block must be able to perform.

1. Credential LifeCycle in Wallet

Credential holders should be able to retrieve, securely store and manage various types of digital credentials, including educational, professional, and other verifiable credentials in the Wallet.

1.1. Importing Credentials into Wallet

The wallet must seamlessly integrate with a variety of credential issuers, ensuring a streamlined process for credential issuance and updates into the wallet.

A user-friendly and customisable mechanism should be in place to facilitate integration with credential issuers. This ensures a simplified and efficient addition of new credentials to the wallet.

Use Case

Robert applies for health insurance with XYZ Insurance. Upon verifying his details, XYZ Insurance issues the policy and sends it to Robert via email. The email contains a QR code. When Robert scans the QR code with his mobile phone, the wallet app prompts him to enter the policy ID and date of birth for security. Upon entering the details, Robert receives the Policy Credential in the wallet.

1.2. Secure Storage of Credentials in Wallet

The wallet must provide a secure environment for storing sensitive credential information, implementing encryption techniques to protect stored credentials and ensuring that only authorised users can access and decrypt the information.

1.3. Organise and Manage Credentials in Wallet

The wallet must provide mechanisms to organise the credentials and should support features such as,

  1. Ordering of credentials in the wallet

  2. Ability to categorise the credentials based on type

  3. Ability to give a name to the credential

1.4. Remove a Credential from Wallet

The wallet must allow the holder the ability to remove credentials from the wallet.

Use Case

Moris plans a trip to the Caribbean, purchases flight tickets, and adds the ticket credentials to his wallet. However, due to unforeseen circumstances, he has to cancel the trip. To tidy up his wallet, he decides to remove the ticket credentials:

  • Moris navigates to the wallet section where his flight ticket credentials are stored.

  • He locates the option to remove the credential and clicks on it.

  • A confirmation pop-up appears, prompting Moris to confirm the removal.

  • Moris confirms the removal, and the flight ticket credential is successfully removed from his wallet.

1.5. Transfer of Credentials from One Device to Another

The credentials can be transfered from one device to another (when credentials are locally stored in a device) by the holder. The transfer can happen subject to the binding of credentials to the new device has to happen once again.

Use Case

Amanda, in the process of upgrading her phone, needs to transfer all her data, including credentials and documents, to her new device. With no automatic cloud wallet integration available, she follows these steps:

  1. Settings Options:
    Accessing the wallet settings on her old phone, Amanda finds "Transfer to new device" and "Transfer from another device" options.

  2. Initiate Transfer from Old Phone:
    On her old phone, Amanda selects "Transfer from another device," generating a QR code with connection details.

  3. Initiate Transfer on New Phone:
    Installing the wallet on her new phone, Amanda selects "Transfer to new device" and uses the QR code scanner to establish a connection with the old phone.

  4. Credential Selection:
    On her old phone, Amanda sees a pre-selected list of credentials.

  5. Authenticate and Transfer:
    Clicking on "Authenticate & Share" (or "Share" based on security levels), Amanda authenticates herself securely.

  6. Completion:
    All credentials and documents successfully transfer to her new phone. However, credentials explicitly bound to the key on the previous phone are no longer bound.

  7. Re-binding:
    Amanda needs to bind these specific credentials once again due to the change in device.

2. Presentation and Sharing of Credentials

The wallet must empower credential holders with control over their digital credentials, allowing them to decide when and how to share specific information.

2.1. Presenting Credentials in Standardised Formats

The holder should be able to digitally present the credentials to relying parties or verifiers through a secure and standardised format, making it interoperable and convenient for various verification scenarios.

2.2. Selective Disclosure

To enhance privacy, the holder should be able to choose and share specific attributes of a credential without revealing unnecessary details, giving them control over the information disclosed.

2.3. Mode of Sharing

The wallet should provide a mechanism for the holder to share the credentials in a secure and standardised manner using standard protocols.

Here, are a few methods for sharing credentials with Verifiers,

  • QR Code Sharing

    • Method: Generate a QR code representation of the verifiable credentials.

    • Usage: Users can display the QR code on their device, and verifiers can scan it to receive the credential information. This method is efficient and can be used in offline scenarios.

  • Secure URL or Links

    • Method: Create a secure URL link to the verifiable credentials.

    • Usage: Users can share the link with verifiers, who can then access the credential information through a secure online connection. This method is convenient for remote verification.

  • Bluetooth Sharing

    • Method: Leverage Bluetooth technology for secure data transmission.

    • Usage: Users can share their credentials with Bluetooth-enabled devices, providing a wireless and secure means of transferring information.

  • NFC (Near Field Communication) Sharing

    • Method: Transmit credential information between devices using NFC.

    • Usage: Users tap their device against an NFC-enabled verifier's device to securely share the credential.2. User Control and Consent.

  • Deep Linking

    • Method: Generate a deep link pointing to the specific credential within the Digital Credential Wallet.

    • Usage: Users share the deep link, and recipients can click or open it to access the credential directly within the app.

  • Credential Sharing via DLT (Distributed Ledger Technology):

    • Method: Leverage blockchain or other DLT for secure and tamper-evident credential sharing.

    • Usage: Credentials are stored on a decentralised ledger, and users can share proof of credentials without revealing the actual data.

  • Email or Messaging Integration:

    • Method: Send encrypted credential information via email or messaging.

    • Usage: Users send verifiable credentials directly to verifiers through secure communication channels.

2.4. Biometric Authorisation during Sharing

The digital wallet should offer a provision for credential holders to authenticate themselves, preferably utilising biometrics, before sharing credentials, thereby adding a layer of security. This process also ensures that the credential holder was physically present during the credential sharing, and implicit consent was captured.

3. Verification of Credentials

Verifiers must be able to independently verify the authenticity of the credentials shared by the credential holders.

3.1. Standardised Verification Process

The verifiers should have a standardised and reliable process to identify the type of credentials and independently verify the authenticity of presented credentials to ensure that the credential has not been tampered with and is issued by a trusted issuer.

3.2. Decentralised Verification

The verification process should not rely solely on a centralised authority; verification can happen in a decentralised manner. Hence, we are recommending the use of Verifiable Credentials for the digital credential wallet.

3.3. Cryptographic Verification Mechanisms

Cryptographic techniques should be employed to verify the authenticity of credentials, such as digital signatures, ensuring that the credentials presented are genuine and have not been manipulated.

4. Revocation and Expiry Management

The wallet must proficiently manage situations in which credentials are vulnerable to revocation and expiration.

4.1. Revocation Notifications

The holder should receive timely notifications when one of his/her credentials is revoked. The notifications may be sent through push notifications, email, or other designated communication channels. This would help the holder to keep the wallet upto date.

4.2. Periodic Re-issuance of Credentials

The wallet should regularly renew particular credentials, based on the credential type, to assess their current validity. This functionality may be necessary for credentials susceptible to revocation by the issuing entity.

4.3. Credential Expiry Handling

The wallet must automatically identify credential based on the expirations and marking expired credentials as invalid.

5. Administation

5.1. Governance

The importance of this

5.1.1. Creation of a Wallet Registry

5.1.2. Creation of a Sectorial Issuer Registry

5.1.3. Workflow Management for Registration

5.2. Issuer Side Administrator

5.1.1. Issuance of Credentials into Registry

  1. Should be able to register a credentials

  2. Should be able to

5.1.2. Revocation of Issued Credential

  1. Should be able to revoke a credential

  2. Should be able to reverse a revocation

5.1.3. Ledger Management

  1. Should be able to trace the changes made on a credential

5.1.4. Controls by Issuers

  1. The format of the credential to be Issued

  2. The type of the credential to be issued

  3. The authentication methods for issuing a credential

  4. The authentication methods to share a credential from a wallet

5. Using Wallet as an Authenticator

This feature allows credential holders to authenticate themselves using selected credentials stored in the wallet, leveraging diverse authentication mechanisms available within the wallet's functionality.

5.1. Authentication Methods

The wallet should be able to support multiple authentication methods, including but not limited to biometrics (fingerprint, facial recognition), PIN, and passphrase. This would enable the holder to have the flexibility to choose and configure their preferred authentication method.

5.2. Secure Authentication Protocols

The wallet should have robust and secure authentication protocols, ensuring the confidentiality and integrity of authentication processes. Industry-standard protocols such as OAuth or OpenID Connect should be used for secure interactions.

  • No labels