Wayru Docs
Get a MinerCompanyFoundationSupport
  • WAYRU NETWORK
    • What is Wayru?
    • How does Wayru work?
    • Why is Wayru needed?
    • Wayru Network Use Cases
  • Fundamentals
    • Token Dynamics
    • Hotspot Operators
      • Onboarding
      • Hosts
      • Location, location, location.
    • Non-fungible Node
    • Data Credits
    • Network Rewards
      • Distribution
      • wUBI
      • wUPI
      • Multipliers
        • Device Type
        • Location Type
        • Boosted Hexes
        • Network Speed
        • Overcrowding
        • Proximity
      • Reward Emissions
        • TestNet Rewards Emissions #1
        • TestNet Rewards Emissions #2
        • MainNet Rewards Emissions
    • Oracles
  • BUILD THE NETWORK
    • Wayru Miners
      • Genesis
      • Apocalypse
      • Eclypse
      • Prometheus
    • BYOD
      • MikroTik
        • hAP ac2 - HELIOS
        • wAP ac - LOKI
        • cAP ac - GAIA
      • Ubiquiti
        • AC Mesh - HEMERA
        • AC Mesh Pro - KRATOS
        • UAP AC Lite - ARTEMISA
        • UAP AC LR - ATENEA
      • TP- Link
        • Archer C7 V5 - ARES
        • Archer C6 V3/V3.2 - ARIA
        • Archer A7 V5 - DEIMOS
        • EAP225 V3 Outdoor - ZEUS
        • EAP613 V1 - CHRONOS
      • Linksys
        • E8450 - NERON
    • Data-only Nodes
      • Ubiquiti
      • Ruckus
      • Cambium Networks
      • Cisco
      • Cisco Meraki
      • Alta Labs
      • Edge-Core
      • Aruba
      • Motorola
  • PROTOCOLS
    • WayruOS
    • Passpoint
    • OpenRoaming
    • Decentralized Identity (DID)
    • Verifiable Credentials (VC)
  • Docs
    • White Paper
    • Token Paper
  • Mobile App
    • iOS/Android App
    • Create an Account
    • Add a Hotspot
    • Connect to a Network
    • Verify a Network
    • Claim Rewards
    • Offline Maps
  • Trusted DEPLOYERS
    • Overview
    • Current Deployers
      • Mycelium
      • LongFi Solutions
      • Telecu
      • WayruNet
  • CASE STUDY
    • United Nations
  • ABOUT
    • Wayru Foundation
    • Wayru Inc
    • Terms & Conditions
    • Privacy Policy
  • Join the conversation
    • Discord
    • Telegram
    • X / Twitter
Powered by GitBook
On this page

Was this helpful?

  1. PROTOCOLS

Verifiable Credentials (VC)

Enhanced Security and Functionality.

PreviousDecentralized Identity (DID)NextWhite Paper

Last updated 9 months ago

Was this helpful?

Wayru integrates Verifiable Credentials (VCs) to ensure secure, verifiable, and privacy-preserving identity claims within its ecosystem. VCs are digital certificates signed by a trusted issuer and stored decentralized. VCs allow users to present cryptographically signed credentials without contacting the issuer. This enhances security by making credentials tamper-evident and ensures privacy by allowing users to disclose only necessary information.

Learn more about Verifiable Credentials .

Understanding Verifiable Credentials

Verifiable Credentials (VCs) are digital certificates that contain cryptographically secure and verifiable claims about an identity (like passports, driver’s licenses, or academic diplomas).

VCs are a key component in the decentralized identity ecosystem. They allow individuals to prove a set of claims (e.g., name, age, qualifications) about their identity without centralized intermediaries.

Creations of VC

After generating a DID, Wayru issues a WiFi access credential confirming the user's identity and eligibility to access the network. These credentials are stored in a digital wallet on the user's device. When the user wants to connect to the Wayru network, the wallet presents the VC to the router.

Authentication

The router verifies the VC by checking the issuer’s public key on the blockchain. This ensures that the credential is valid and has not been tampered with. Upon successful verification, the user is granted access to the network.

By integrating VCs, Wayru enhances the security and efficiency of its WiFi network and empowers users with greater control over their digital identities. This aligns with the broader movement towards self-sovereign identity, ensuring privacy, security, and interoperability in the digital age.

So, in simple terms, Verifiable Credentials allow users to access services on a platform without revealing personal information.

here