Protocol Walkthrough

Experience "Verifiable Sovereignty." Follow the flow of data from your device to our sovereign storage.

The EUDI "Identity-to-Key" Bridge

Visualizing how your verified EU Identity Wallet generates a localized decryption key strictly on your device, ensuring no central authority can bypass your access.

1. EUDI Request

Wallet presents verifiable credentials locally.

2. Local Key Generation

Zero-knowledge proof creates a session key on-device.

3. Vault Access

Ciphertext is downloaded and decrypted locally.

The cornerstone of our architecture is native integration with the emerging EUDI Wallet framework. When an authorized user requests access to an encrypted legal or medical dossier, the SovCore server delivers the ciphertext. The decryption happens in memory on the authorized device, validated against the EUDI credential.

Step 1: The Identity Bridge

Scan the QR code with your NL-Wallet to provide a "Qualified Legal Professional" credential. We use the OIDC4VP flow for selective disclosure.

Click to Mock Scan