W3C
Editor's
Draft
30
May
2024
Copyright
©
2024
2025
World
Wide
Web
Consortium
.
W3C
®
liability
,
trademark
and
permissive
document
license
rules
apply.
A verifiable claim is a qualification, achievement, quality, or piece of information about an entity's background such as a name, government ID, payment provider, home address, or university degree. Such a claim describes a quality or qualities, property or properties of an entity which establish its existence and uniqueness. The use cases outlined here are provided in order to make progress toward possible future standardization and interoperability of both low- and high-stakes claims with the goals of storing, transmitting, and receiving digitally verifiable proof of attributes such as qualifications and achievements. The use cases in this document focus on concrete scenarios that the technology defined by the group should address.
This section describes the status of this document at the time of its publication. A list of current W3C publications and the latest revision of this technical report can be found in the W3C technical reports index at https://www.w3.org/TR/.
This document represents a concise but limited collection of use cases readers should review alongside the Verifiable Credentials Data Model .
The work on this document was carried out under tight time constraints due to limitations of the W3C process and publishing deadlines. Under such conditions, errors are unavoidable and some of the ideas presented here are incomplete. The Working Group hopes that in the future, W3C process can be revised to better support the dynamic nature of standards work in a more consistent way across different groups.
Comments regarding this document are welcome. Please file directly on GitHub , or send them to public-vc-comments@w3.org ( subscribe , archives ).
This document was published by the Verifiable Credentials Working Group as an Editor's Draft.
Publication as an Editor's Draft does not imply endorsement by W3C and its Members.
This is a draft document and may be updated, replaced or obsoleted by other documents at any time. It is inappropriate to cite this document as other than work in progress.
This document was produced by a group operating under the W3C Patent Policy . W3C maintains a public list of any patent disclosures made in connection with the deliverables of the group; that page also includes instructions for disclosing a patent. An individual who has actual knowledge of a patent which the individual believes contains Essential Claim(s) must disclose the information in accordance with section 6 of the W3C Patent Policy .
This document is governed by the 03 November 2023 W3C Process Document .
The Verifiable Claims Working Group at the W3C is developing standards for expressing and exchanging " claims " that have been verified by a third party and to make them easier and more secure on the Web.
Entities (people, organizations, devices) need to make many kinds of claims as part of their everyday activities. As more and more of these important activities move to the Internet, entities need to be able to transmit instantly verifiable claims (e.g., about their location, accomplishments, value, what-have-you). From educational records to payment account access, the next generation of web applications will authorize entities to perform actions based on rich sets of credentials issued by trusted parties. Human- and machine-mediated decisions about job applications, account access, collaboration, and professional development will depend on filtering and analyzing growing amounts of data. It is essential that data be verifiable.
Standardization of digital claim technologies makes it possible for many stakeholders to issue, earn, and trust these essential records about their counterparties, without being locked into proprietary platforms.
This document presents an aggregate use case model, composed of Needs, Roles, Tasks, and Sequences. Taken together, these models define the use cases that the Verifiable Claims Working Group has addressed.
User needs define the problem space addressed by verifiable credentials . User Roles specify the roles different entities play when interacting with verifiable credentials . Tasks define the functions users can accomplish, and sequences demonstrate how tasks might be realized, by interactions between entities over time.
As with all models, this use case model is neither exhaustive nor complete. The listed uses cannot capture all possible use cases. Similarly, the models do not completely characterize the use cases represented. However, the combined model is intended to provide specific, coherent guidance for the work ahead.
As well as sections marked as non-normative, all authoring guidelines, diagrams, examples, and notes in this specification are non-normative. Everything else in this specification is normative.
The key word MUST in this document is to be interpreted as described in BCP 14 [ RFC2119 ] [ RFC8174 ] when, and only when, they appear in all capitals, as shown here.
There are four roles supported by verifiable credentials : Issuer , Verifier , Subject , and Holder .
Verifiable credentials address user needs in a number of key domains:
The education domain includes all levels of the educational experience; from primary through professional continuing education.
Cannot
GET
/uploads/HPpIoM/short/e1_digital_transcript.html
/uploads/kX2T4k/short/e1_digital_transcript.html
Cannot
GET
/uploads/HPpIoM/short/e2_taking_a_test.html
/uploads/kX2T4k/short/e2_taking_a_test.html
Cannot
GET
/uploads/HPpIoM/short/e3_transferring_schools.html
/uploads/kX2T4k/short/e3_transferring_schools.html
Cannot
GET
/uploads/HPpIoM/short/e4_online_classes.html
/uploads/kX2T4k/short/e4_online_classes.html
The retail domain encompasses all things where there is an exchange of value on an individual level. This includes brick-and-mortar store fronts, web-only venues, and even person-to-person sales.
Cannot
GET
/uploads/HPpIoM/short/r1_address-verification.html
/uploads/kX2T4k/short/r1_address-verification.html
Cannot
GET
/uploads/HPpIoM/short/r2_adult_beverages.html
/uploads/kX2T4k/short/r2_adult_beverages.html
Cannot
GET
/uploads/HPpIoM/short/r3_fraud_detection.html
/uploads/kX2T4k/short/r3_fraud_detection.html
Cannot
GET
/uploads/HPpIoM/short/r4_bona_fide_shopper.html
/uploads/kX2T4k/short/r4_bona_fide_shopper.html
The Finance domain includes banking, brokerage, insurance, and other industries where there is a high value placed on knowing exactly with whom you are dealing.
Cannot
GET
/uploads/HPpIoM/short/f1_reuse_know_your_customer.html
/uploads/kX2T4k/short/f1_reuse_know_your_customer.html
Cannot
GET
/uploads/HPpIoM/short/f2_money_transfer.html
/uploads/kX2T4k/short/f2_money_transfer.html
Cannot
GET
/uploads/HPpIoM/short/f3_closing_account.html
/uploads/kX2T4k/short/f3_closing_account.html
Cannot
GET
/uploads/HPpIoM/short/f4_trying_out_a_new_service.html
/uploads/kX2T4k/short/f4_trying_out_a_new_service.html
Cannot
GET
/uploads/HPpIoM/short/f5_new_bank_account_from_home.html
/uploads/kX2T4k/short/f5_new_bank_account_from_home.html
Cannot
GET
/uploads/kX2T4k/short/f6_proof_of_creditworthiness.html
Privacy is critically important in the healthcare industry. This domain looks at everything from physical interaction to connecting patients and providers with service organizations.
Cannot
GET
/uploads/HPpIoM/short/h1_prescribing.html
/uploads/kX2T4k/short/h1_prescribing.html
Cannot
GET
/uploads/HPpIoM/short/h2_online_pharmacy.html
/uploads/kX2T4k/short/h2_online_pharmacy.html
Cannot
GET
/uploads/HPpIoM/short/h3_insurance_claim.html
/uploads/kX2T4k/short/h3_insurance_claim.html
Cannot
GET
/uploads/HPpIoM/short/h4_traveling_illness.html
/uploads/kX2T4k/short/h4_traveling_illness.html
Cannot
GET
/uploads/HPpIoM/short/h5_proving_legal_disability_status.html
/uploads/kX2T4k/short/h5_proving_legal_disability_status.html
In many aspects of life it is important to know that entities are who they say they are, and that they can do what they say. Professional accreditation is one way of learning about the abilities of an entity . Being able to verify these credentials is essential to their value.
Cannot
GET
/uploads/HPpIoM/short/c1_find_a_doctor.html
/uploads/kX2T4k/short/c1_find_a_doctor.html
Cannot
GET
/uploads/HPpIoM/short/c2_busy_doctor.html
/uploads/kX2T4k/short/c2_busy_doctor.html
Cannot
GET
/uploads/HPpIoM/short/c3_bad_university.html
/uploads/kX2T4k/short/c3_bad_university.html
Cannot
GET
/uploads/HPpIoM/short/c4_new_employer.html
/uploads/kX2T4k/short/c4_new_employer.html
Cannot
GET
/uploads/HPpIoM/short/c5_social_authority.html
/uploads/kX2T4k/short/c5_social_authority.html
Cannot
GET
/uploads/HPpIoM/short/c6_job_applicant.html
/uploads/kX2T4k/short/c6_job_applicant.html
For many transactions, an entity must be able to prove some aspect of their identity in a way that can be quickly verified. Governments and other widely recognized entities are well positioned to provide such identification in a verifiable digital form.
Cannot
GET
/uploads/HPpIoM/short/l1_digital_driving_license.html
/uploads/kX2T4k/short/l1_digital_driving_license.html
Cannot
GET
/uploads/HPpIoM/short/l2_seamless_immigration.html
/uploads/kX2T4k/short/l2_seamless_immigration.html
Cannot
GET
/uploads/HPpIoM/short/l3_speedy_air_travel.html
/uploads/kX2T4k/short/l3_speedy_air_travel.html
Cannot
GET
/uploads/HPpIoM/short/l4_refugee_crisis.html
/uploads/kX2T4k/short/l4_refugee_crisis.html
Intelligence devices are created and deployed so that they can interact with other entities (people, organizations, devices). Establishing trust and maintaining secure relationships with these devices is especially critical.
Cannot
GET
/uploads/HPpIoM/short/d1_devices_during_manufacturing.html
/uploads/kX2T4k/short/d1_devices_during_manufacturing.html
Cannot
GET
/uploads/HPpIoM/short/d2_devices_during_delivery.html
/uploads/kX2T4k/short/d2_devices_during_delivery.html
Cannot
GET
/uploads/HPpIoM/short/d3_devices_setup_for_operating_autonomously.html
/uploads/kX2T4k/short/d3_devices_setup_for_operating_autonomously.html
Use cases are often used as a driver for requirements. While the users of verifiable credentials have needs across many domains, the tasks associated with those needs span the domains. This section summarizes those tasks, as well as requirements related to the tasks, and maps the tasks and requirements back to the associated needs.
It is worth noting that the subject may or may not be the same entity as the holder . There are no tasks in these examples that require participation of the subject .
Focal Use Cases are meant to provide examples where a blend of features from verifiable credentials standard may be used together to solve complex or challenging marketplace needs.
Cannot
GET
/uploads/HPpIoM/focal/1_citizenship_by_parentage.html
/uploads/kX2T4k/focal/1_citizenship_by_parentage.html
Cannot
GET
/uploads/HPpIoM/focal/2_expert_dive_instructor.html
/uploads/kX2T4k/focal/2_expert_dive_instructor.html
Cannot
GET
/uploads/HPpIoM/focal/3_international_travel_with_minor_and_upgrade.html
/uploads/kX2T4k/focal/3_international_travel_with_minor_and_upgrade.html
Cannot
GET
/uploads/HPpIoM/focal/4_gs1_identification.html
/uploads/kX2T4k/focal/4_gs1_identification.html
Extant Use Cases are illustrative of market adoption, i.e., examples of the use of verifiable credentials in real-world applications.
The transaction examples in this section show basic ways in which verifiable credentials might be used. They are not meant to be architecturally constraining. Instead, they are meant to help illustrate the basic way it could be done in a typical commerce situation. Again — please remember that it is just an example, and should not be thought of as the canonical way such a claims environment must be implemented.
In this first example, a user will request a verifiable credential—a confirmation of their identity. Consider this illustration:
Expanding on these steps:
In this example, a holder of a claim needs to use that claim in a typical commerce situation:
Cannot
GET
/uploads/HPpIoM/terms.html
/uploads/kX2T4k/terms.html
Cannot
GET
/uploads/HPpIoM/focal/3_international_travel_with_minor_and_upgrade_examples.html
/uploads/kX2T4k/focal/3_international_travel_with_minor_and_upgrade_examples.html
Cannot
GET
/uploads/HPpIoM/focal/4_gs1_identification_examples.html
/uploads/kX2T4k/focal/4_gs1_identification_examples.html
This section is non-normative.
The editors are thankful to the contributions from the Web Payments Workshop, the Web Payments Community Group, the Web Payments Interest Group, the Credentials Community Group, the Verifiable Claims Task Force, and the Verifiable Claims Working Group.