Conceptual workflow
How it works
A public-safe overview of the workflow. Detailed implementation is handled in partner meetings.
1) Issue
A Nation issues a credential through defined policies and authorized roles.
2) Hold
Holders maintain their credential for approved uses and verification needs.
3) Verify
Verifiers confirm validity based on the required proof and agreed rules.
4) Audit
Systems support logging and accountability aligned with governance needs.
5) Manage
Policies can support lifecycle handling (updates/revocation concepts) based on governance requirements.
Key principle: Privacy-first
Sensitive personal information is stored in controlled systems with clear access rules. Implementation is defined with partner Nations.
Want the full walkthrough? We can present the prototype approach and pilot fit.