Example 1: Registration - offline authentication, identification
This process allows beneficiaries to present verifiable credentials issued by trusted authorities (e.g., civil registry, social registry, or health authority) to enroll in a social protection system (SP-System).
Process Flow
This process allows beneficiaries using their Verifiable credentials to enroll in a social protection system.
Process Flow: Registration to SP-system
Actors and Entities
SP system, beneficiary, digital wallet
Assumptions
Issuers are onboarded and authorized to issue cryptographically signed verifiable credentials.
Beneficiaries have access to a digital device (e.g., smartphone) or assisted registration services.
The SP-System supports automated verification of VCs.
Prerequisites
Issuing authorities have issued verifiable credentials to eligible individuals.
Beneficiary has installed and activated a digital wallet and stored the required VCs.
The SP-System is integrated with the trust framework and verification infrastructure (e.g., DID resolver, revocation registry).
Consent and data-sharing policies are in place, aligned with data protection laws.
Process Inputs
SP system collect verifiable credentials held by the beneficiary
Process Flow Steps
Step 1: The beneficiary select to register to the SP-System using verifiable credentials.
Step 2: The beneficiary authenticate using their digital wallet.
Step 3: The wallet presents selected VCs to the SP-System via secure protocols.
Step 4: Credentials Verification, the SP-System validates the digital signature, confirms issuer trust status, checks revocation status, confirms schema and data completeness
Step 5: SP-System processes the verified claims to determine program eligibility and benefit type.
Step 6: SP-System displays what data is being used and collects explicit beneficiary consent.
Step 7: SP-System confirms enrollment and optionally issues a verifiable enrollment credential back to the beneficiary.
Outputs
Register beneficiary in the SP-System. Optionally: Issuance of a Social Protection Credential
Control Points
Credential Validation: Ensure credentials are from trusted issuers and not revoked.
Data Privacy & Consent: Beneficiary consent must be logged and linked to specific data use.
Issuer Trust Registry: The system must reference an up-to-date list of authorized issuers.
Revocation Check: Real-time revocation status must be confirmed at the point of verification.
Exception Handling
Refer to Exception Handling for alternate flows.
Diagram 1 - Enrollment in SP-System programme
Last updated
Was this helpful?