Verifiable Credentials

Statements by issuer. Tamper-evident. Privacy-respecting.

Verifiable Credentials

Verifiable Credentials are digital credentials that can represent the information typically found in physical credentials like a passport or license, as well as, increasingly, in new things that have no tangible equivalent, such as ownership of a bank account, membership, username and password or other personally identifiable information (PII).

How Verifiable
Credentials Work

Generally, verifiable credentials represent identity, access and/or qualification. Verifiable credentials have numerous advantages over physical credentials:

  • Most notably, since they are digitally signed, they are tamper-resistant and instantaneously verifiable.
  • They can be issued by anyone, about anything, and can be presented to and verified by everyone. With the caveat that all the parties are trusted.

The entity that generates the credential is called the Issuer. The credential is then given to the Holder who stores it for later use, likely in their digital wallet. The Holder can present a verifiable credential from their digital wallets to prove something about themselves by presenting their credentials to a Verifier.

These 3 parties work together in a secure environment to confirm credentials.  This relationship is referred to as The Trust Triangle.

The Trust Triangle

The individual or entity (Holder) holding a verifiable credential sits at the center of a triangle of trust, mediating between issuer and verifier.

  • The issuer trusts the holder
  • The holder trusts the verifier
  • The verifier trusts the issuer

Any role in the triangle can be played by a person, an institution, or any Internet enabled device.

Liquid Avatar Verifiable Credentials Ecosystem (LAVCE)

Liquid Avatar Technologies and the Liquid Avatar Verifiable Credentials Ecosystem (LAVCE) creates a decentralized self sovereign identity platform, where a user (Holder) controls the verifiable credentials that they hold in their Digital Wallet(s), and they alone provide consent to use those credentials.  This reduces the unintended sharing of a user’s personal data and any PII. This is in contrast to centralized identity systems where identity is provided by some outside entity.

Contact Us

We use cookies to make interactions with our websites and services easy and meaningful, to better understand how they are used and to tailor advertising. You can read more here. To mange your cookies, please click the toggle button to select the specific cookies.  By continuing to use this site you are giving us your consent to do this.

Cookie settings

Below you can choose which kind of cookies you allow on this website. Click on the "Save cookie settings" button to apply your choice.

FunctionalOur website uses functional cookies. These cookies are necessary to let our website work.

AnalyticalOur website uses analytical cookies to make it possible to analyze our website and optimize for the purpose of a.o. the usability.

Social mediaOur website places social media cookies to show you 3rd party content like YouTube and FaceBook. These cookies may track your personal data.

AdvertisingOur website places advertising cookies to show you 3rd party advertisements based on your interests. These cookies may track your personal data.

OtherOur website places 3rd party cookies from other 3rd party services which aren't Analytical, Social media or Advertising.