Description

This page is a reflection of the different concepts and terminology used in regards to the digital identity wallet. A try to create a common sensemaking around the digital identity wallet ecosystem.

FIXME - Overview and Comparison of the different Terminologies

(see below, References)

Comparison table(?)

Start with ARF because it is the most differentiated model(?)  Better start with the specifications.

Split comparison in two parts: 'protocol' and trust framework

References


Introduction

The implementation of digital identity wallets, particularly within the EU framework, involves specific terminology tied to technical standards and regulatory approaches. The purpose of this document is to provide an overview of currently used terminologies and to establish semantic and technical references between the systems.

Overview


Matrix



Verifiable Credentials 2.0[1]

eIDAS 2.0 (according to itself)

eIDAS 2.0 (according to ARF[2])

Architecture and Reference Framework[3]

Implementing Regulations[4]

OpenID4VCI +
OpenID4VP

OpenID Federation Wallet Architectures 1.0[5]

Definition

1

Entity







Anything that can be referenced in statements as an abstract or concrete noun. Entities include but are not limited to people, organizations, physical things, documents, abstract concepts, fictional characters, and arbitrary text. Any entity might perform roles in the ecosystem, if it can do so. Note that some entities fundamentally cannot take actions, for example, the string "abc" cannot issue credentials

2




National Accreditation Bodies (NAB)




A body that performs accreditation with authority derived from a Member State under Regulation (EC) No 765/2008

3



Public Sector Body

Public Sector Body




A state, regional or local authority, a body governed by public law or an association formed by one or several such authorities or one or several such bodies governed by public law, or a private entity mandated by at least one of those authorities, bodies or associations to provide public services, when acting under such a mandate

4




Certificate Authority (CA)




An entity which is trusted by one or more parties in the EUDI Wallet ecosystem to create and seal certificates

5




Trust Anchor




An authoritative entity represented by a public key and associated data. Note: based on RFC 5914

6




Registrar (of wallet-relying parties)




The body responsible for establishing and maintaining the list of registered wallet-relying parties established in their territory who has been designated by a Member State

7




Wallet Provider




A natural or legal person who provides Wallet Solutions

8







Wallet Provider

An Organizational Entity responsible for the development, publication, and management of a Wallet Solution

9





Provider of wallet-relying party access certificates (Access Certificate Authority, Access CA)



A natural or legal person mandated by a Member State to issue Relying Party access certificates to (Wallet-) Relying Parties registered in that Member State

10







Organizational Entity

A Federation Entity represented by a legal entity, specifically referring to public or private organizations (excluding natural persons) recognized through a unique identifier. For the purposes of this specification, an Organizational Entity is also referred to as an Organization

11

Subject







A thing about which claims are made

12

Holder







A role an entity might perform by possessing one or more verifiable credentials and generating verifiable presentations from them. A holder is often, but not always, a subject of the verifiable credentials they are holding. Holders store their credentials in credential repositories

13

 


User

User




A natural or legal person, or a natural person representing another natural person or a legal person, that uses trust services or electronic identification means provided in accordance with the [European Digital Identity Regulation]

14

 






Personal Device

Any electronic device that is primarily used by an individual. This includes smartphones, tablets, laptops, personal computers, smart watches, and other wearable technologies. Personal Devices are owned and managed by End-Users as individuals, rather than by Organizations, or by End-Users on behalf of an Organization

15

 




(Wallet) User



A user who is in control of the Wallet Unit

16

 




Wallet Solution



A combination of software, hardware, services, settings, and configurations, including Wallet Instances, one or more Wallet Secure Cryptographic Applications and one or more Wallet Secure Cryptographic Devices

17

 






Wallet Solution

The Wallet Solution is a product offered by a Wallet Provider to enable End-Users to securely manage and use their Digital Credentials. It is delivered by the Wallet Provider in the form of mobile app or cloud service or another form of software application. It may also utilize services and web services for the exchange of data between its Wallet Provider and the Wallet Instances

18

 




Wallet Unit



A unique configuration of a Wallet Solution that includes Wallet instances, Wallet Secure Cryptographic Applications and Wallet Secure Cryptographic Devices provided by a Wallet Provider to an individual Wallet User

19

 




Wallet Instance



The application installed and configured on a Wallet User’s device or environment, which is part of a Wallet Unit, and that the Wallet User uses to interact with the Wallet Unit

20

 






Wallet Instance

Instance of a Wallet Solution belonging to and controlled by a person, be this natural or legal. It enables the request, storage, presentation, and management of Digital Credentials. It can be installed (instantiated) in a Personal Device or in a Remote Service.

21

 




Wallet Secure Cryptographic Application (WSCA)



An application that manages critical assets by being linked to and using the cryptographic and non-cryptographic functions provided by the Wallet Secure Cryptographic Device

22

 




Wallet Secure Cryptographic Device (WSCD)



A tamper-resistant device that provides an environment that is linked to and used by the Wallet Secure Cryptographic Application to protect critical assets and provide cryptographic functions for the secure execution of critical operations

23

 




Critical assets



Assets within or in relation to a Wallet Unit of such extraordinary importance that where their availability, confidentiality or integrity are compromised, this would have a very serious, debilitating effect on the ability to rely on the Wallet Unit

24

Issuer







A role an entity can perform by asserting claims about one or more subjects, creating a verifiable credential from these claims, and transmitting the verifiable credential to a holder

25





Provider of person identification data (PID Provider)



A natural or legal person responsible for issuing and revoking the person identification data and ensuring that the person identification data of a user is cryptographically bound to a Wallet Unit

26




Attestation Provider




When not further qualified, a collective term for QEAA Provider, PuB-EAA Provider, or (non-qualified) EAA Provider

27




Attestation Revocation List




A mechanism provided by a PID Provider or an Attestation Provider (or a trusted party acting on its behalf) for communicating the revocation status of PIDs and attestations, by publishing a list of identifiers of revoked PIDs or attestations

28




Attestation Status List




A mechanism provided by a PID Provider or an Attestation Provider (or a trusted party acting on its behalf) for communicating the revocation status of PIDs and attestations, by publishing status information (Valid or Invalid) for all relevant PIDs or attestations

29




Attestation Rulebook




A document describing the attestation type, namespace(s), and other features for a specific attestation type

30




Attestation Type




An identifier for a type of attestation, unique within the context of the EUDI Wallet ecosystem

31



Electronic identification scheme

Electronic identification scheme




A system for electronic identification under which electronic identification means are issued to natural or legal persons or natural persons representing other natural persons or legal persons

32

Verifier







A role an entity performs by receiving one or more verifiable credentials, optionally inside a verifiable presentation for processing. Other specifications might refer to this concept as a relying party

33







Credential Verifier

Entity that requests and verifies Digital Credentials presented by a Holder

34




Relying Party Instance




A software and/or hardware module with the capability to interact with a Wallet Unit and to perform Relying Party authentication, that is controlled by a Relying Party

35







Credential Verifier Instance

A software application that allows an individual to request to an Holder and receive from that Holder a Digital Credential, sometimes in a proximity flow, and then verify the received Digital Credential

36



Relying Party

Relying Party




A natural or legal person that relies upon electronic identification, European Digital Identity Wallets or other electronic identification means, or upon a trust service

37





(Wallet-) Relying Party



A Relying Party that intends to rely upon Wallet Units for the provision of public or private services by means of digital interaction

38





(Wallet-relying party) access certificate



A certificate for electronic seals or signatures authenticating and validating the (Wallet-) Relying Party, issued by a provider of wallet-relying party access certificates

39





(Wallet-relying party) registration certificate



A data object that indicates the attributes the Relying Party has registered to intend to request from Users

40

Verifiable Data Registry







A role a system might perform by mediating the creation and verification of identifiers, verification material, and other relevant data, such as verifiable credential schemas, revocation registries, and so on, which might require using verifiable credentials. Some configurations might require correlatable identifiers for subjects. Some registries, such as ones for UUIDs and verification material, might act as namespaces for identifiers

41




Trusted List




Repository of information about authoritative entities in a particular legal or contractual context which provides information about their current and historical status

42



Conformity Assessment Body (CAB)

Conformity Assessment Body (CAB)




A conformity assessment body as defined in Article 2, point 13, of Regulation (EC) No 765/2008, which is accredited in accordance with that Regulation as competent to carry out conformity assessment of a qualified trust service provider and the qualified trust services it provides, or as competent to carry out certification of European Digital Identity Wallets or electronic identification means.

43



Qualified Trust Service Provider (QTSP)

Qualified Trust Service Provider (QTSP)




Qualified Trust Service Provider means a trust service provider who provides one or more qualified trust services and is granted the qualified status by the supervisory body

44

Credential Repository







Software, such as a file system, storage vault, or personal verifiable credential wallet, that stores and protects access to holders' verifiable credentials

45



Authentic Source

Authentic Source




A repository or system, held under the responsibility of a public sector body or private entity, that contains and provides attributes about a natural or legal person or object and that is considered to be a primary source of that information or recognised as authentic in accordance with Union law or national law, including administrative practice.

46







Authentic Source

A protected Resource Server, not necessarily an OAuth 2.0 Resource Server, utilized by the Credential Issuer to retrieve the data necessary for issuing a Credential related to a subject

47

Claim







An assertion made about a subject

48



Attribute

Attribute




A characteristic, quality, right or permission of a natural or legal person or of an object.

49



Person Identification Data (PID)

Person Identification Data (PID)




A set of data that is issued in accordance with Union or national law and that enables the establishment of the identity of a natural or legal person, or of a natural person representing another natural person or a legal person

50




Pseudonym




Data uniquely representing a user which in itself does not allow to infer any user's attribute or person identification data, without the use of additional information that is kept separately by the issuer of the data uniquely representing the user

51

Credential







A set of one or more claims made by an issuer. The claims in a credential can be about different subjects. The definition of credential used in this specification differs from, NIST's definitions of credential

52

Verifiable Credential







A tamper-evident credential whose authorship can be cryptographically verified. Verifiable credentials can be used to build verifiable presentations, which can also be cryptographically verifiable

53

Presentation







Data derived from one or more verifiable credentials issued by one or more issuers that is shared with a specific verifier

54

Verifiable Presentation







A tamper-evident presentation of information encoded in such a way that authorship of the data can be trusted after a process of cryptographic verification. Certain types of verifiable presentations might contain data that is synthesized from, but does not contain, the original verifiable credentials (for example, zero-knowledge proofs)

55




Attestation




When not further qualified, a collective term for a QEAA, PuB-EAA, or (non-qualified) EAA.

56



Electronic attestation of attributes (EAA)

Electronic attestation of attributes (EAA)




An attestation in electronic form that allows attributes to be authenticated

57



Electronic attestation of attributes issued by or on behalf of a public sector body (PuB-EAA)

Electronic attestation of attributes issued by or on behalf of a public sector body (PuB-EAA)




An electronic attestation of attributes issued by a public sector body that is responsible for an authentic source or by a public sector body that is designated by the Member State to issue such attestations of attributes on behalf of the public sector bodies responsible for authentic sources in accordance with Article 45f and with Annex VII

58



Qualified Electronic Attestation of Attributes (QEAA)

Qualified Electronic Attestation of Attributes (QEAA)




An electronic attestation of attributes which is issued by a qualified trust service provider and meets the requirements laid down in Annex V

59

Graph







A set of claims, forming a network of information composed of subjects and their relationship to other subjects or data. Each claim is part of a graph; either explicit in the case of named graphs, or implicit for the default graph

60

Default Graph







The graph containing all claims that are not explicitly part of a named graph

61

Named Graph







A graph associated with specific properties, such as verifiableCredential. These properties result in separate graphs that contain all claims defined in the corresponding JSON objects

62

Decentralized Identifier







A portable URL-based identifier, also known as a DID, is associated with an entity. These identifiers are most often used in a verifiable credential and are associated with subjects such that a verifiable credential can be easily ported from one credential repository to another without reissuing the credential. An example of a DID is did:example:123456abcdef

63

Verification Material







Information that is used to verify the security of cryptographically protected information. For example, a cryptographic public key is used to verify a digital signature associated with a verifiable credential

64



Qualified Electronic Signature (QES)

Qualified Electronic Signature (QES)




An advanced electronic signature that is created by a qualified electronic signature creation device, and which is based on a qualified certificate for electronic signatures

65



Qualified Electronic Signature Creation Device (QSCD)

Qualified Electronic Signature Creation Device (QSCD)




Configured software or hardware used to create an electronic signature that meets the requirements laid down in Annex II of the [European Digital Identity Regulation

66




Qualified Electronic Signature Remote Creation Provider




A natural or a legal person that offers services related to the remote creation, validation, and management of qualified electronic signatures that meet legal requirements and standards in the [European Digital Identity Regulation] to be considered as legally equivalent to handwritten signatures

67



(Electronic) signature

(Electronic) signature




Data in electronic form which is attached to or logically associated with other data in electronic form and which is used by the signatory to sign

68



(Electronic) seal

(Electronic) seal




Data in electronic form which is attached to or logically associated with other data in electronic form to ensure the latter’s origin and integrity

69




Public Key Infrastructure (PKI)




Systems, software, and communication protocols that are used by EUDI Wallet ecosystem components to distribute, manage, and control public keys. A PKI publishes public keys and establishes trust within an environment by validating and verifying the public keys mapping to an entity

70

Verification







The evaluation of whether a verifiable credential or verifiable presentation is an authentic and current statement of the issuer or presenter, respectively. This includes checking that the credential or presentation conforms to the specification, the securing mechanism is satisfied, and, if present, the status check succeeds. Verification of a credential does not imply evaluation of the truth of claims encoded in the credential.

71

Validation







The assurance that a claim from a specific issuer satisfies the business requirements of a verifier for a particular use. This specification defines how verifiers verify verifiable credentials and verifiable presentations. It also specifies that verifiers validate claims in verifiable credentials before relying on them. However, the means for such validation vary widely and are outside the scope of this specification. Verifiers trust certain issuers for certain claims and apply their own rules to determine which claims in which credentials are suitable for use by their systems

72



Authentication

Authentication




An electronic process that enables the confirmation of the electronic identification of a natural or legal person or the confirmation of the origin and integrity of data in electronic form

73




Administrative validity period (of a PID or attestation)




The date(s) from and/or up to which the attributes in the attestation are valid, which are represented as attribute(s) in the attestation

74




Technical validity period (of a PID or attestation)




The dates (and possibly times) from and up to which the attestation is valid, which are represented as metadata of the attestation. Note: All PIDs and attestations have a technical validity period, which is typically much shorter than its administrative validity period (if existent). The technical validity period is chosen based on a risk analysis, e.g. with regard to User privacy.

75

Selective Disclosure







The ability of a holder to make fine-grained decisions about what information to share.

76



Selective Disclosure

Selective Disclosure




Selective disclosure is a concept empowering the owner of data to disclose only certain parts of a larger data set, in order for the receiving entity to obtain only such information as is necessary for the provision of a service requested by a user

77




Selective Disclosure




The capability enabling the User to present a subset of the attributes included in a PID or attestation.

78





Embedded disclosure policy



A set of rules, embedded in an electronic attestation of attributes by its provider, that indicates the conditions that a wallet-relying party has to meet to access the electronic attestation of attributes

79




Namespace




A specification of the attribute identifier, syntax and semantics of attributes that can be used in an attestation, having an identifier that is unique within the context of the EUDI Wallet ecosystem

80




Notification




The act of transferring information to the European Commission



[1] https://www.w3.org/TR/vc-data-model-2.0/#terminology

[2] https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/latest/annexes/annex-1/annex-1-definitions/#a2-definitions-from-the-european-digital-identity-regulation

[3] https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/latest/annexes/annex-1/annex-1-definitions/#a2-definitions-from-the-european-digital-identity-regulation and https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/latest/annexes/annex-1/annex-1-definitions/#a4-additional-definitions-used-in-the-arf

[4] https://eu-digital-identity-wallet.github.io/eudi-doc-architecture-and-reference-framework/latest/annexes/annex-1/annex-1-definitions/#a3-definitions-from-the-adopted-commission-implementing-regulations

[5] https://openid.net/specs/openid-federation-wallet-1_0.html#name-terminology

(Building Material)

Core Terminology in EU Standards

  1. Architecture Reference Framework (ARF)
    Defines technical standards, protocols, and roles for the EU Digital Identity Wallet ecosystem[1][2].
  2. Implementing Acts (November 2024)
    Five regulations formalizing technical standards, including:

Functional Terminology

Implementation-Specific Variations

While the EU standardizes terminology via the ARF and Implementing Acts, non-EU or private-sector approaches may use differing terms:

Interoperability vs. Localization

This terminology reflects the EU’s focus on harmonization under eIDAS 2.0, while alternative paradigms (e.g., SSI or national systems) may prioritize different terms for similar functions.

  1. https://ec.europa.eu/digital-building-blocks/sites/display/EUDIGITALIDENTITYWALLET/Technical+Specifications
  2. https://www.bosch-stiftung.de/sites/default/files/publications/pdf/2024-10/European-Digital-Identity-Wallet-Brief.pdf
  3. https://bmi.usercontent.opencode.de/eudi-wallet/eidas-2.0-architekturkonzept/01-architecture-proposal/
  4. https://www.dock.io/post/eu-digital-identity-wallet
  5. https://www.biometricupdate.com/202411/eu-adopts-technical-standards-for-eudi-wallet
  6. https://www.european-digital-identity-regulation.com
  7. https://www.bobsguide.com/eu-adopts-technical-standards-for-digital-identity-wallets/
  8. https://idtechwire.com/european-commission-sets-standards-for-cross-border-digital-identity-wallets/