Verifiable Credentials
Wallet-first, privacy-preserving credentials compliant with W3C VC v2.0 and anchored to SafePulse DIDs.
Overview
SafePulse’s Verifiable Credentials (VCs) provide a secure, decentralized way to issue, verify, and present proofs of:
- Skills & achievements
- Education & training
- Compliance & licenses
- Membership & identity attributes
- Business records or attestations
VCs are:
- Tamper-proof (cryptographically verifiable)
- Self-sovereign (stored in the user’s wallet)
- Portable across networks and platforms
- Privacy-preserving via selective disclosure & verifiable presentations
- Built on W3C Verifiable Credential v2.0
A VC is signed by the issuer’s DID, held by the subject’s wallet, and verifiable by any third party.
Context & Problem
The Problem
Traditional credentials (certificates, licenses, IDs) have challenges:
- Easy to forge or manipulate
- Hard to verify internationally
- Require centralized authorities
- Reveal too much personal data
- Slow manual verification processes
- Not portable across platforms
Users and organizations need trusted, private, standardized digital credentials that work anywhere.
The Solution
SafePulse VCs:
- Are verified via blockchain + DID signatures
- Require no central authority
- Support selective disclosure (only reveal what’s necessary)
- Allow flexible proof presentations
- Can represent any type of claim — academic, corporate, legal, or personal
VCs integrate deeply with SafePulse’s identity and document ecosystem, powering secure B2B and P2P verification workflows.
Use Cases
1. Education & Certification
- Schools issue degrees or certificates as VCs
- Training centers issue completion badges
- Students share credentials without revealing full identity
2. Enterprise Compliance
- Employees receive compliance certifications (e.g., AML/KYC training)
- Contractors prove qualifications before engagement
- Auditors verify digital proof instantly
3. Talent & Freelancing
- Freelancers present verified work history or skill credentials
- Clients validate identity attributes without exposing personal details
4. Legal & Regulatory
- Businesses issue licenses or compliance documents
- Individuals prove age or residency using selective disclosure
- Lawyers validate document issuance via VCs
5. Web3 & Onchain Reputation
- Proof-of-contribution credentials
- DAO participation records
- Reputation scoring anchored to DID
Key Features
1. W3C VC v2.0 Compliant
Ensures global compatibility with web3 wallets, institutions, and verifiers.
2. Self-Sovereign Storage
Credentials stay in the payer’s device — no platform custody.
3. Selective Disclosure
Users reveal only the needed fields to a verifier.
4. DID-Based Signing
Both issuer and holder use their Decentralized Identity (DID).
5. Blockchain Anchoring
Credential hashes or metadata can be anchored onchain for immutability.
6. Revocation Support
Issuers can revoke credentials using their DID keys (if issued with revocation registry).
Credential Structure (Simplified Example)
{
"@context": ["https://www.w3.org/2018/credentials/v2"],
"type": ["VerifiableCredential", "EducationCertificate"],
"issuer": "did:ethr:0xABC...",
"credentialSubject": {
"id": "did:ethr:0x123...",
"name": "John Doe",
"course": "Blockchain Development"
},
"proof": {
"type": "EcdsaSecp256k1Signature",
"created": "2025-01-01T00:00:00Z",
"proofPurpose": "assertionMethod",
"verificationMethod": "did:ethr:0xABC#owner",
"signatureValue": "0x..."
}
}
Step-by-Step Tutorial
A. Receiving a Credential
-
Open the SafePulse Wallet
-
Navigate to Identity → Credentials
-
Tap Receive VC
-
Scan QR code / paste credential payload
-
Wallet verifies:
- Issuer DID
- Signature
- Expiration & revocation (if applicable)
-
Accept and store the VC locally
Your VC is now available for presentations or sharing.
B. Issuing a Credential
Prerequisites
- Your DID must be initialized
- You must have issuer permissions in your workflow
- (Optional) Verifiable Document to attach additional files
Steps
-
Navigate to Issue Credential
-
Fill in the credential fields:
- Type (certificate, membership, license…)
- Subject DID
- Data fields
-
(Optional) Attach Verifiable Document
-
Tap Issue
-
Wallet signs VC using issuer’s DID
-
Share VC with subject via:
- QR Code
- Direct import
- Encrypted message
C. Presenting a Credential (“Verifiable Presentation”)
A presentation allows the holder to share only the required parts of the credential.
-
Open the credential
-
Tap Present
-
Select fields to reveal
-
Wallet generates:
- A zero-knowledge / selective disclosure proof
- Holder’s DID authentication
-
Share the presentation with verifier
This preserves maximum privacy.
D. Revoking a Credential (Optional)
- Open Issued Credentials
- Select credential
- Tap Revoke
- Confirm DID-signed revocation
Verifiers will see the credential as revoked in future checks.
Real-World Examples
Example 1 — Digital Degree
A university issues VCs instead of PDFs. Employers verify authenticity instantly without contacting the school.
Example 2 — Driver License Check
User presents only “Over 18” instead of full identity details. Selective disclosure protects privacy.
Example 3 — Corporate Compliance
An employee presents a “Certified AML Officer” credential to a financial institution. The institution verifies:
- DID of employee
- DID of the issuing company
- Integrity of the credential
Example 4 — DAO Reputation
A DAO issues contribution-based VCs to members. Tools read VC reputation to grant roles or voting rights.
Benefits
- Trustless, verifiable credentials
- Self-sovereign, not platform-controlled
- Portable across apps, companies, and chains
- Supports privacy and selective disclosure
- Compatible with global W3C standards
- Works seamlessly with DID and Document Contracts
Drawbacks
- Users must safeguard wallet and credentials
- Revocation requires issuer DID control
- Some platforms still rely on centralized credential formats
Best Practices
For Issuers
- Use stable, persistent DIDs
- Anchor revocation lists onchain
- Avoid including unnecessary personal data
- Use credential types aligned with global schemas (e.g., W3C)
For Holders
- Make secure encrypted backups of credentials
- Use selective disclosure whenever possible
- Keep DID keys rotated and secure
For Verifiers
- Always check DID signature and timestamp
- Verify revocation status
- Use VC-compliant parsers for best interoperability