Conceptual workflow

How it works

A public-safe overview of the workflow. Detailed implementation is handled in partner meetings.

1) Issue

A Nation issues a credential through defined policies and authorized roles.

2) Hold

Holders maintain their credential for approved uses and verification needs.

3) Verify

Verifiers confirm validity based on the required proof and agreed rules.

4) Audit

Systems support logging and accountability aligned with governance needs.

5) Manage

Policies can support lifecycle handling (updates/revocation concepts) based on governance requirements.

Key principle: Privacy-first

Sensitive personal information is stored in controlled systems with clear access rules. Implementation is defined with partner Nations.

Want the full walkthrough? We can present the prototype approach and pilot fit.