This document specifies Global Digital Identity Scheme (GDIS) Core as a web-first profile for physical-to-digital identity binding evidence.
It defines deterministic subject-binding outcomes, governance-policy binding, and verifier-checkable issuance evidence that can be evaluated without implementation-specific assumptions.
This specification does not create legal recognition or qualified status by itself. Legal effect is an external policy and governance decision.
This is an unofficial draft.
Document authority: this text is not a legal instrument and does not create jurisdictional recognition effects.
AI assistance disclosure: this draft used OpenAI GPT-5 Codex for drafting support, structure proposals, and editorial rewrites. Human editor review determined normative intent, accepted/rejected changes, and final wording.
Source currency note: linked source pages were checked on February 17, 2026.
The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all capitals.
Conforming implementations MUST satisfy all requirements for at least one conformance class in Conformance Classes.
Unless explicitly overridden, data-model terms such as list, set, tuple, and byte sequence are interpreted according to Infra [INFRA]. JSON payload and array semantics are interpreted according to [RFC8259].
This specification defines externally observable data models, verification invariants, and deterministic processing outcomes. It does not define implementation architecture, runtime internals, or optimization strategy.
End-to-end machine verifiability is mandatory: any acceptance decision, legal-status claim, or policy-compatibility claim MUST be backed by machine-verifiable artifacts and explicit source references.
Conformance in this specification is outcome-based: required verifier outputs and security/privacy invariants are normative; implementation strategy remains implementation-defined.
This document does not define programming-language implementations or API usage recipes.
NOTE: The openapi.yaml contracts are indicative and are not yet normative. Official schemas will be finalized after the first reference implementation.
This specification covers:
This specification does not:
This specification defines web-native, verifier-checkable device-assurance evidence for signature-creation security outcomes. Adoption is expressed by stakeholder action chains: goal -> required artifact/interface -> verifier behavior -> adoption pathway.
Implementing specifications may profile this core for platform-specific delivery while preserving the same conformance and verification semantics.
| Stakeholder | Goal | Required artifact/interface | Verifier behavior | Adoption pathway |
|---|---|---|---|---|
| Device and platform manufacturers | Ship signer-controlled key-custody and intent-assurance controls | Device evidence records, attestation outputs, and discovery metadata | Verify key non-exportability, approval binding, and state evidence against policy | Publish conformance targets and implementation profiles for assessed configurations |
| Wallet and app implementers | Deliver end-user controlled signing and attestation flows | User-approved-object binding artifacts and verifiable signing-event evidence | Reject signing results lacking deterministic proof and payload equality evidence | Publish profile conformance evidence and avoid remote-by-default custody patterns |
| Standards development organizations (SDOs) | Create interoperable profiles and test suites | Profile specifications, test assertions, and registry/discovery rules | Run deterministic pass/fail checks against declared profile requirements | Standardize profile work items and reuse common terminology and evidence formats |
| Governments and regulators | Support recognition procedures without conflating legal status and cryptographic validity | Authoritative registries/discovery endpoints and status publication procedures | Separate technical verification output from legal-recognition determination | Publish compatibility-profile rules over the web profile baseline |
| Auditors, CABs, and assessors | Evaluate implementation evidence with machine-verifiable checks | Test assertions, evaluation procedures, and evidence corpora | Validate cryptographic proofs and reproducible requirement mappings | Issue assessment outcomes bound to reproducible artifacts instead of narrative-only claims |
| Verifiers and relying parties | Make deterministic acceptance/rejection decisions | Evidence records, discovery metadata, and policy input independent of UI labels | Verify every security claim cryptographically and report explicit failure reasons | Adopt classed conformance verification and policy overlays per jurisdiction |
ReSpec prose in this specification defines interface invariants and processing behavior. It does not restate wire-format field contracts.
During the provisional phase, openapi.yaml provides the indicative interface surface (suuntaa antavia) for implementation trials and interoperability testing.
Normative requirements in this specification remain authoritative for verification behavior, failure semantics, and conformance outcomes until schema finalization.
External Fact Layer
This section states legal/standards facts as external constraints. GDIS does not redefine these facts; it models and references them.
A GDIS root identity anchor MUST be a physical identity item issued under a governance area. Any claim that such an item is mandated, recognized, qualified, notified, or trusted MUST be backed by authoritative registries or legal texts for that governance area, such as EUR-Lex acts, trusted lists, or official notification dashboards [EU-910/2014] [EU-2024/1183] [EU-TRUSTED-LISTS] [EU-QSCD-NOTIFICATIONS].
A governance area MUST designate legally valid PID issuance authorities and, if delegation exists, MUST designate each delegated PID issuer and publish machine-verifiable authority chain references.
Governance profiles that support or require remote eID provider issuance as the default path are NOT RECOMMENDED due to centralization risk. Remote delegation MAY be allowed only as a documented fallback when direct physical identity-item issuance is infeasible in the applicable governance context.
Governance profiles SHOULD include a direct path for binding PID-derived identity evidence to a DID without mandatory dependence on a remote issuance service, and SHOULD maximize availability of proper physical identity items for that path.
If implementers use EU eIDAS vocabulary (for example "electronic identification", "electronic identification means", "person identification data"), those usages SHOULD be anchored to Article 3 definitions and related amendments [EU-910-CONS] [EU-2024/1183].
MRZ semantics are defined by ICAO Doc 9303 and MUST NOT be replaced by ad hoc field interpretations [ICAO-9303] [ICAO-9303-P3].
If a governance profile requires chip-assisted authenticity checks (for example NFC reads), the profile MUST publish a physical validity method profile and authoritative trust-source inputs through the normative PID policy contract.
GDIS MAY claim technical comparability or stronger verifier cryptographic evidence, but it MUST NOT claim legal equivalence unless legal text explicitly supports that conclusion [EU-910/2014] [EU-910-CONS].
Architecture Layer
This section is the technical design proposal for GDIS. It defines how physical identity anchors become portable cryptographic evidence.
Scope boundary: this walkthrough describes technical evidence flow in GDIS. Legal qualification outcomes are external policy-layer decisions.
GDIS v1 defines binding outcomes, not one mandated implementation. Conforming profiles MUST define deterministic verifier behavior for the binding tuple: (subjectBindingValue, endpointBindingValue).
If a profile uses hash-derived identifiers, it MUST define deterministic serialization (for example tuple expression format), canonicalization rules, and verifier failure semantics.
The binding MUST be materialized as a W3C VC [VC-DM2] issued to a DID [DID-CORE] and signed using Data Integrity or JOSE-compatible proof suites [VC-DI] [RFC7515].
{
"@context": [
"https://www.w3.org/ns/credentials/v2"
],
"type": ["VerifiableCredential", "GDISBindingCredential"],
"issuer": "did:example:governance-issuer",
"credentialSubject": {
"id": "did:example:subject",
"subjectBinding": {
"mode": "profile-defined-hidden-binding",
"policyId": "EX-GOV-001-pid-v4"
},
"endpoint": "https://registry.example.gov/.well-known/gidas/verify",
"endpointBindingValue": "profile:v1:K7xJ8G2y9N....",
"governanceArea": "EX-GOV-001"
},
"evidence": [{
"type": "IssuerEvidenceBundle",
"statusList": "https://registry.example.gov/.well-known/gidas/status",
"discovery": "https://registry.example.gov/.well-known/gidas/discovery"
}],
"proof": {"type": "DataIntegrityProof"}
}
GDIS requires publication of verification material to a decentralized event log, but transport, replication, ordering, and distribution semantics are delegated to the declared host profile. This specification defines publication obligations and identity-binding semantics; it does not define host network internals. [GQTS-CORE]
Conforming implementations MUST produce and process explicit evidence artifact objects. Artifact schemas MAY evolve by profile version, but required semantics and verification checks in this section are stable.
| Artifact | Required Fields | Produced By | Validated By | Freshness or Retention Rule |
|---|---|---|---|---|
| Binding credential artifact | issuer, subject DID, subject-binding evidence reference, endpoint reference, proof | Issuer | Verifier | Retain until superseded or revoked. |
| physical validity evidence artifact | physicalValidityProfileId, input-channel result (for example mrz-only or mrz-plus-nfc), governance trust source references, checkedAt timestamp, integrity proof | Issuer or delegated inspection authority | Issuer and Verifier | MUST be valid for the effective policy interval and verifier decision time. |
| Endpoint status artifact | endpoint URI, status payload, timestamp, signer data | Governance endpoint operator | Verifier | MUST satisfy verifier freshness policy at decision time. |
| Publication evidence artifact | hostProfileId, publication target URI, published artifact digest, and publication receipt proof (profile-defined) | Issuer or Subject agent | Verifier | MUST be verifiable against the declared host profile semantics. |
| Verification transcript artifact | challenge, audience, evaluated inputs, decision output | Verifier | Auditor, governance review process | SHOULD be retained per governance audit policy. |
The provisional interface description in openapi.yaml is suuntaa antavia (indicative). This requirement defines normative endpoint invariants and conformance outcomes [OAS-3.1.2].
This table provides clause-level cross-references for deployments that profile GDIS with GQSCD-Core and GQTS-Core. It is intended for conformance audit traceability.
| GDIS Clause | External Spec | Referenced Clauses | Binding Context |
|---|---|---|---|
| REQ-GDIS-04 | [GQSCD-CORE] | REQ-GQSCD-06, REQ-GQSCD-17, REQ-GQSCD-26, REQ-GQSCD-27, REQ-GQSCD-28, REQ-GQSCD-29 | Controller evidence, user-intent binding, and verifier-checkable signing-control semantics. |
| REQ-GDIS-05 | [GQTS-CORE] | REQ-GQTS-01, REQ-GQTS-02, REQ-GQTS-03, REQ-GQTS-04, REQ-GQTS-05, REQ-GQTS-06, REQ-GQTS-07 | Host discovery, publication, append-only event retrieval, and event-address integrity. |
| REQ-GDIS-10 | [GQSCD-CORE] | REQ-GQSCD-06, REQ-GQSCD-24, REQ-GQSCD-29 | Deterministic zero-trust validation of physical-validity evidence and governance-source checks. |
A verifier MUST execute REQ-GDIS-03, REQ-GDIS-05, REQ-GDIS-06, REQ-GDIS-07, and REQ-GDIS-10 before returning a decision. The verifier output MUST be an explicit, machine-consumable verification result.
{
"subjectHandle": "aud:merchant.example:2f1f7e6f9a3e",
"linkabilityClass": "verifier-scoped",
"mechanicalValidity": "pass",
"recognitionStatus": "accepted",
"decision": "valid",
"status": "active",
"evaluatedAt": "2026-02-17T12:34:56Z",
"physicalValidity": {
"physicalValidityProfileId": "EX-GOV-001-physical-v2",
"channel": "mrz-plus-nfc",
"verified": true
},
"issuerKeyState": "trusted",
"freshness": {
"endpointOk": true,
"withinPolicyWindow": true
},
"publicationEvidence": {
"hostProfileId": "https://z-base.github.io/gqts/",
"accepted": true
},
"replayCheck": {
"nonceBound": true,
"audienceBound": true
}
}
If decision is not valid, verifiers MUST return an explicit failure reason code and MUST NOT collapse all failures into one opaque error.
| Requirement Unit | Primary Artifact | Producer | Primary Checker |
|---|---|---|---|
| REQ-GDIS-01 Physical anchor | Issuer anchor evidence artifact | Issuer | Verifier |
| REQ-GDIS-02 MRZ-derived subject binding | Canonicalization and binding transcript | Issuer | Verifier |
| REQ-GDIS-03 Endpoint verification | Endpoint status artifact | Endpoint operator | Verifier |
| REQ-GDIS-05 Publication profile binding | Publication evidence artifact | Issuer | Verifier |
| REQ-GDIS-06 Replay/freshness | Verifier transcript artifact | Verifier | Auditor or policy authority |
| REQ-GDIS-04 VC to DID binding | Binding credential artifact | Issuer | Verifier |
| REQ-GDIS-07 Cryptographic agility | Cryptographic profile declaration | Issuer | Verifier |
| REQ-GDIS-08 Issuer processing | Issuance transcript and evidence bundle | Issuer | Verifier |
| REQ-GDIS-09 Verifier processing | Verification result and failure reason outputs | Verifier | Auditor or policy authority |
| REQ-GDIS-10 Physical validity evidence | Physical validity evidence artifact | Issuer or delegated inspection authority | Verifier |
| Class | Required Sections |
|---|---|
| GDIS Issuer | REQ-GDIS-01, REQ-GDIS-02, REQ-GDIS-03, REQ-GDIS-04, REQ-GDIS-05, REQ-GDIS-06, REQ-GDIS-07, REQ-GDIS-08, and REQ-GDIS-10. |
| GDIS Verifier | REQ-GDIS-03, REQ-GDIS-05, REQ-GDIS-06, REQ-GDIS-07, REQ-GDIS-09, and REQ-GDIS-10. |
A conformance claim MUST be accompanied by a machine-readable conformance report with at least the following fields.
| Report Field | Requirement |
|---|---|
| Implementation identifier and version | MUST be declared. |
| Conformance class set | MUST list all claimed classes. |
| Requirement coverage | MUST list satisfied and excluded REQ-GDIS-xx identifiers. |
| Profile and schema versions | MUST identify the evaluated profile versions and contract revision. |
| Host profile declarations | MUST declare host profile URI and version pinning when publication evidence is evaluated. |
| Cryptographic suite declaration | MUST declare mandatory suites and key constraints. |
| Test evidence | MUST include pass/fail results and artifact samples. |
| Determinism vectors | MUST include canonicalization and URI-normalization compatibility vectors. |
| Policy evaluation evidence | MUST include PID policy source references, physical-validity profile outputs, and delegated-issuance posture outputs. |
| Security assumptions | MUST declare clock/freshness policy values and trust-anchor inputs. |
Reports SHOULD include machine-readable fields so independent tooling can compare behavior across implementations.
Implementations MUST treat web standards as the primary interoperability baseline (web profile):
EU compatibility profile requirements are mapping layers on top of the primary web profile and do not replace web-profile baseline semantics.
| Compatibility Concern | Web Profile Baseline | EU Mapping Reference |
|---|---|---|
| Wallet integrity and secure components | Controller and key custody evidence in VC/DID artifacts | [EU-2024/2979] |
| Protocol and interface interoperability | HTTP + VC/DID transport and data model constraints | [EU-2024/2982] |
| PID and electronic attribute issuance semantics | Credential claims, PID mapping, and issuer evidence handling | [EU-2024/2977] |
| EU wallet protocol alignment details | Profile mappings MUST document which protocol families and data interfaces are implemented. | [EU-2024/2982] [ISO-18013-5] [ISO-18013-7] |
| Legal status determination | Verifier-side cryptographic validity checks | [EU-910-CONS] [EU-TRUSTED-LISTS] |
This subsection is a discussion aid for cross-community alignment. It is conceptual and does not, by itself, establish legal status.
| EU Concept | Closest Web/GIDAS Expression | Important Boundary |
|---|---|---|
| Electronic Signature (natural-person intent act) | DID-controller signing act with explicit user-intent evidence (for example GQSCD-class controller evidence and verifier challenge binding). | Signature is an act by a signing subject. A DID-based proof can represent this act if intent and key-control evidence are present. |
| Electronic Seal (issuer/legal-entity integrity act) | Issuer proof over a VC or other signed artifact, where issuer identity and key authority are independently verifiable. | A VC is a data container; the proof over it is the cryptographic act that is closest to sealing. |
| Electronic Attestation of Attributes | VC claims bound to issuer proof material and verifier-checkable evidence references. | Attribute semantics and legal effect remain policy-layer outputs, separate from cryptographic validity. |
| Qualified status labels (QES/QSeal/EAA qualification) | Recognition-status output derived from trusted lists, supervisory registries, and profile policy inputs. | Cryptographic validity is necessary but not sufficient for legal qualification status. |
Implementations MUST assume hostile client/network environments unless security boundaries are cryptographically enforced.
Verifier behavior MUST follow a zero-trust verification model: each acceptance decision MUST be based on explicit, cryptographically checkable artifacts and declared policy inputs.
At minimum, conforming designs MUST model key exfiltration attempts, endpoint spoofing, replay attempts, and policy abuse where governance minimum host requirements are misused as maximum exclusivity constraints.
| Threat | Required Control | Evidence Type |
|---|---|---|
| Key exfiltration | Hardware-backed non-exportability + controller attestation | Device or controller evidence chain |
| Endpoint spoofing | Endpoint hash binding + TLS + issuer signatures | Bound endpoint hash and signed metadata |
| Replay of proof artifacts | Nonce/audience/timestamp checks | Verifier transcript and challenge log |
| Adversarial or compromised issuer | Rotation lineage enforcement + compromise status handling + registry-backed issuer validation | Issuer status evidence and key-state transition artifacts |
| Adversarial governance endpoint operator | Signed endpoint responses + key pinning policy + independent corroboration where profile requires | Endpoint signature chain and mismatch audit transcript |
| Governance over-closure of host set | Mandatory host sets treated only as publication floor | Publication policy and host-distribution record |
| Centralization by default remote-eID issuance dependency | Physical-item-primary issuance policy + fallback-only remote delegation + issuer-authority chain verification | PID policy delegated-issuance object and authority-chain evidence |
"Approved software lists" or governance labels alone MUST NOT be treated as technical guarantees without cryptographic enforcement.
Conformance reports SHOULD list which threats were tested directly and which threats are mitigated by inherited platform controls.