OID4VP · OID4VCI · W3C VC · did:key

Financial Services
Gated by Verifiable
Credentials

OHNexus Protocol is the open infrastructure layer that lets regulated financial service providers gate access behind W3C Verifiable Credentials — without centralising identity data.

OHNexus
566 Automated Tests
47+ Protocol Issues Closed
eIDAS 2.0 Regulatory Alignment
Sepolia On-Chain Anchoring

Identity should travel with the user,
not live in every silo

Financial institutions re-verify the same users across services. The result is duplicated KYC cost, stale data, and no user control. OHNexus fixes the infrastructure layer.

Problem

Every service re-verifies from scratch

  • KYC/AML checks repeated per provider at high cost
  • User identity data duplicated across dozens of silos
  • No cryptographic proof of credential authenticity
  • Compliance posture impossible to audit end-to-end
  • Siloed onboarding blocks inter-service eligibility chaining
Solution

Present once, access everywhere — verifiably

  • W3C Verifiable Presentations verify credentials cryptographically
  • Raw credential payloads never stored — only claim-key indices
  • Publishers declare required VC types; eligibility evaluated on-demand
  • Issued credentials anchor results on Ethereum for audit
  • Inter-service eligibility chaining via platform-issued VCs

Four steps from credential to access

The protocol separates verification, eligibility evaluation, and execution — each as an auditable, isolated step.

Step 01
💼

Hold a Credential

Users hold W3C Verifiable Credentials issued by trusted KYC providers, the platform, or compliant third-party issuers. Stored in a browser-native SSI wallet.

Step 02
🔐

Present via OID4VP

User signs a Verifiable Presentation with their did:key identity. The VP is submitted directly to the verifier — the platform never stores the raw credential.

Step 03
⚖️

Eligibility Evaluated

The protocol checks VP claim summaries against publisher-defined service requirements. GRANTED or DENIED — every decision persisted for compliance audit.

Step 04
⛓️

Access & Anchor

On AUTHORIZED, the provider API is invoked and an IssuedCredential is minted. Execution result hash is anchored on Ethereum as an immutable audit record.

Built for regulated financial ecosystems

Any actor in a credential-regulated workflow benefits — publishers creating gated services, issuers managing trust, and end users controlling their own identity.

🏦

Financial Service Publishers

Banks, fintechs, and asset managers that want to gate service access behind verified KYC/AML or MiFID suitability credentials without building their own identity stack.

🛡️

Credential Issuers & KYC Providers

Regulated identity providers and KYC bureaus whose issued credentials become trust anchors across the protocol — with DID-based issuer registry and verification logging.

👤

End Users

Retail and institutional clients who complete identity verification once and present portable credentials across multiple services — maintaining full control and data minimisation.

⚙️

Compliance & RegTech Teams

Teams that need an end-to-end audit trail: every credential verification logged, every eligibility decision persisted, every execution anchored on-chain for immutable evidence.

🌐

eIDAS 2.0 Integrators

Platforms aligning with EU Digital Identity Wallet mandates. OHNexus implements OID4VP and OID4VCI natively — the same standards mandated by the ARF.

🔗

Protocol Developers

Teams building on SSI primitives who need a production reference implementation of did:key generation, VP signing, credential issuance, and on-chain anchoring in Rust.

Europe is mandating exactly this stack

Three converging regulatory forces make credential-gated infrastructure mandatory for European financial services from 2026 onwards.

eIDAS 2.0

EU Digital Identity Wallet

ARF 1.4 mandates OID4VP and OID4VCI as the interoperability protocols for the European Digital Identity Wallet. Every member state must offer compliant wallets by 2026. OHNexus is built on these exact standards.

MiCA

Markets in Crypto-Assets

MiCA requires CASPs to implement robust KYC/AML and investor suitability checks before granting access to crypto-asset services. Verifiable Credentials provide the cryptographic audit trail regulators require.

DORA

Digital Operational Resilience

DORA mandates traceable audit records for all digital service access. OHNexus's on-chain anchoring and immutable eligibility logs directly satisfy DORA's evidence requirements for ICT incident reporting.

Production-grade SSI infrastructure

Built in Rust on AWS, with walt.id for W3C VC operations and Ethereum for immutable anchoring.

┌──────────────────────────────────┐
│   ohnexus.eu  (CloudFront CDN)   │
├──────────────────────────────────┤
│  React SPA  │  OID4VP / OID4VCI  │
├─────────────┴──────────────────┤
│   Rust API  (AWS ECS · Fargate)  │
├──────────────┬───────────────────┤
│  walt.id     │  DynamoDB         │
│  Verifier    │  Credentials      │
├──────────────┴───────────────────┤
│  Ethereum Sepolia  (Anchoring)   │
└──────────────────────────────────┘
Rust actix-web OID4VP OID4VCI did:key W3C VC SIWE walt.id AWS ECS DynamoDB Secrets Manager Ethereum
🔒

Privacy by Design

Raw VC/VP JWTs are never stored. Claim-key indices only. SHA-256 hashes for audit correlation. GDPR Art. 25 data minimisation enforced at the protocol layer.

Cryptographic Verification

Every VP is verified against a DID-resolved issuer public key via walt.id's W3C VC verification engine. No self-reported credentials accepted.

⛓️

On-Chain Audit Anchoring

Execution result hashes are registered on Ethereum via registerExecution() — creating a tamper-proof, time-stamped record of every credential-gated service invocation.

🏗️

Separation of Concerns

Verification, eligibility evaluation, and execution are three isolated protocol steps. Each is independently auditable, independently replaceable, and tested to 566 automated tests.

Protocol in production. Seeking first deployments.

Core infrastructure is complete and deployed to AWS. Active development continues on enterprise integrations and multi-chain anchoring.

Q3 2025

Core Protocol Architecture

backend-core Rust library, DynamoDB models, JWT auth, SIWE login, service publication lifecycle.

Q4 2025

SSI Wallet & OID4VCI

Browser-native did:key generation, OID4VCI pre-auth code flow, Ed25519 VP signing, walt.id integration.

Q1 2026

VP Verification & Eligibility Engine

OID4VP direct_post flow, cryptographic VP verification, requirement matching, on-chain anchoring, 566 tests.

Q2–Q3 2026

Enterprise Pilot

First regulated financial service publisher onboarded. Credential issuance & revocation webhook. Rate limiting & production hardening.

Current Protocol Status

Rust API (AWS ECS Fargate) LIVE
OID4VP / VP Verification LIVE
OID4VCI Credential Issuance LIVE
Publisher Service Registry LIVE
Eligibility Evaluation Engine LIVE
On-Chain Anchoring (Sepolia) LIVE
Auto-Issued VC JWT Signing COMPLETE
Production Mainnet Anchoring IN PROGRESS
Credential Revocation Callbacks PLANNED
Enterprise SSO / SAML Bridge PLANNED

Interested in deploying credential-gated services?

We are onboarding regulated financial service providers, KYC issuers, and strategic partners. Get in touch to discuss a pilot deployment.