Feature Whiteboard

1. Import and storing of Credentials into the Wallet
1.1. Import using an import Protocol
Retrieve and store digital credentials using a protocol like OpenID4VCI.
1.3. Consent Collection During Import
Consent should be captured when consent is not captured in the presentation layer.
1.4. Utilization of Hardware KeyStore to store wallet private keys
Safeguard wallet private keys using a secure hardware key store.
1.5. Cryptographic Protection of Credentials
Encrypt and hash Personally Identifiable Information (PII) for enhanced security.
1.2. Import by Scanning a QR code containing VC
Capture and save credentials by scanning a QR code containing verifiable information.
2. Presentation and Sharing of Credentials
2.1. Ability to present credentials
2.1.1. Present credentials electronically as Verifiable Presentation
2.1.2. Present VC or VP as a QR code
2.2. Ability to share a verifiable presentation
2.2.1. Share via BLE
2.2.2. Share as a Deep Link
3. Verification of Credentials
Validation of a received or downloaded VC or VP.
4. Wallet as Authenticator
4.1. Binding Credentials with Wallet
Associate credentials with the digital wallet for authentication.
4.2. Performing Authentication on Wallet
5. Indigenous Design for supporting multiple types of VCs
Design the system to support ability to receive, store and preview of various types of Verifiable Credentials such as W3C VCs, SD JWT VC, ISO mDL or ICAO.
6. Wallet Login/Logout
10. Remove a Credentials from Wallet
11. Telemetry
Collect and transmit data related to the digital wallet's usage and performance for analysis.
12. UI Level Features
13. View Transaction History
Access a log of transactions associated with the digital wallet - Credential Download and/or Verification History.
14. Generating a Verifiable Presentation (VP) from one or multiple VCs
Create a secure digital presentation that consolidates one or more Verifiable Credentials for sharing or verification purposes.
15. Maintaining User Specific Profiles
15. Administrator

 

Interoperable Profile

  • Credential Format

  • Signing Algorithm

  • Status Algorithm

  • Key Management Method

    • Issuer Side

    • Holder Side

  • Communication Protocols

    • Issuance Protocol

    • Presentation Protocol

  • Trust Management Method

 

communication protocol, credential format(s), signature algorithms, key management method, trust management method