Protocol Walkthrough
Experience "Verifiable Sovereignty." Follow the flow of data from your device to our sovereign storage.
The EUDI "Identity-to-Key" Bridge
Visualizing how your verified EU Identity Wallet generates a localized decryption key strictly on your device, ensuring no central authority can bypass your access.
1. EUDI Request
Wallet presents verifiable credentials locally.
2. Local Key Generation
Zero-knowledge proof creates a session key on-device.
3. Vault Access
Ciphertext is downloaded and decrypted locally.
The cornerstone of our architecture is native integration with the emerging EUDI Wallet framework. When an authorized user requests access to an encrypted legal or medical dossier, the SovCore server delivers the ciphertext. The decryption happens in memory on the authorized device, validated against the EUDI credential.
Step 1: The Identity Bridge
Scan the QR code with your NL-Wallet to provide a "Qualified Legal Professional" credential. We use the OIDC4VP flow for selective disclosure.