Extrimian – Incucai | Demo
4. Detailed Implementation Flow
a. Issuance of a Verifiable Credential (VC)
Credential Generation:
The INCUCAI system generates a credential for a new donor or recipient.
Example Credential (JSON):{ "@context": ["https://www.w3.org/2018/credentials/v1"], "id": "http://example.edu/credentials/58473", "type": ["VerifiableCredential", "HealthCredential"], "issuer": "did:quarkid:zksync:EiAk4oH7kW_zdptvfljmROrQXfAND_-xcDXr-edThPNsCw", "issuanceDate": "2024-07-11", "credentialSubject": { "id": "did:quarkid:zksync:EiBHFro5XFyUOsJYfr8LmYCiGlITiFhBpICA0aqxpxvfGg", "name": "John Doe", "healthStatus": "elegible" } }
Signing and Verification:
- The credential is signed using the issuer’s private key.
- The signature is verified to ensure that the credential has not been altered.
b. Presentation and Verification of a Credential (VC)
Presentation Request:
- Bob (verifier) requests Alice (holder) to present her health credential to verify her eligibility.
- This request is sent as an encrypted message via DIDComm.
Credential Presentation:
- Alice presents her credential to Bob through her digital wallet.
- The credential is sent and automatically verified to confirm its validity.
c. Interaction through DWN and WACI-DIDComm
DID Resolution:
- Alice resolves Bob’s DID to obtain the URL of his DWN.
- She uses a DID Resolver such as Extrimian’s Modena component.
Secure Message Exchange:
- Messages between Alice and Bob are encrypted using DIDComm to ensure privacy.
- The DWN acts as a secure mailbox to store and retransmit messages.