Industry-standard ACDC credential types for the humanitarian-service-marketplace ecosystem. Generated by
/keri-c0-ecosystem. Schema fields define the ACDCa(attributes) block.
| ID | Name | Issuer | Holder | Verifiers | Disclosure |
|---|---|---|---|---|---|
sedi_identity |
State-Endorsed Digital Identity | government_agency | individual | service_platform, grassroots_org, kyv_provider, credential_provider, government_agency | selective |
kyv_credential |
Know Your Volunteer Credential | kyv_provider | individual | service_platform, grassroots_org, individual | selective |
skill_credential |
Skill/Training Certificate | credential_provider | individual | service_platform, grassroots_org, individual, kyv_provider | full |
service_record |
Verified Service Record | service_platform | individual | service_platform, grassroots_org, government_agency, individual | selective |
equipment_inventory |
Equipment/Tool Availability | individual | individual | service_platform, grassroots_org, individual | full |
org_membership |
Organization Membership | service_platform | individual | service_platform, grassroots_org, individual | full |
service_need |
Service Need Publication | individual | individual | service_platform, grassroots_org, individual | selective |
service_commitment |
Service Commitment Agreement | individual | individual | service_platform, grassroots_org, individual | full |
proof_of_service |
Proof of Service | verification_service | individual | service_platform, grassroots_org, individual, government_agency | selective |
platform_registration |
Platform Registration | government_agency | service_platform | government_agency, service_platform, individual | full |
kyv_standard |
KYV Standard Definition | service_platform | kyv_provider | kyv_provider, individual, service_platform | full |
interop_agreement |
Interoperability Agreement | service_platform | service_platform | service_platform, grassroots_org | full |
background_check |
Background Check Result | verification_service | individual | kyv_provider | selective |
guardian_delegation |
Guardian Delegation Authority | individual | guardian | service_platform, grassroots_org, government_agency | selective |
attribution_agreement |
Service Attribution Agreement | service_platform | service_platform | service_platform, government_agency | full |
sedi_identity)Description: Government-issued digital identity credential backed by KERI protocols. The gold standard root of identity. Utah is leading adoption with multi-state expansion underway. Apple and Google wallets in talks for integration. Provides the foundational identity that all other credentials reference.
Issuer role: government_agency Holder role: individual Verifier roles: service_platform, grassroots_org, kyv_provider, credential_provider, government_agency Disclosure mode: selective
| Field | Type | Required | Description |
|---|---|---|---|
legal_name |
string | yes | Legal name of the individual |
date_of_birth |
date | yes | Date of birth |
jurisdiction |
string | yes | Issuing state or jurisdiction |
sedi_id |
string | yes | State-endorsed digital identity number |
address |
string | no | Residential address |
photo_hash |
string | no | Hash of photo for biometric matching |
kyv_credential)Description: Composable credential attesting that a volunteer has been vetted to a specific standard. Built from component credentials (background checks, training certs, psych evals, etc.). Multiple KYV standards coexist — each with different compositions and trust levels. The ACDC chaining makes the composition transparent so verifiers can see exactly what went into it.
Issuer role: kyv_provider Holder role: individual Verifier roles: service_platform, grassroots_org, individual Disclosure mode: selective
| Field | Type | Required | Description |
|---|---|---|---|
kyv_standard_said |
string | yes | SAID of the KYV standard this credential satisfies |
vetting_date |
date | yes | Date the vetting was completed |
expiration_date |
date | yes | When the KYV credential expires and requires renewal |
component_credentials |
string[] | yes | SAIDs of component credentials that compose this KYV |
verification_methods |
string[] | yes | Methods used (in-person, background check, training, etc.) |
in_person_verified |
boolean | yes | Whether in-person verification was part of the vetting |
This credential chains from background_check. The issuer MUST hold a valid, unrevoked background_check credential. The edge block (e) of this ACDC references the chained credential’s SAID, creating a cryptographically verifiable provenance chain.
skill_credential)Description: Credential issued by a training provider, trade school, or licensing body attesting to a specific skill or qualification. CPR certification, electrical license, painting certification, medical training, harassment awareness, etc. The issuing entity is also the verifier.
Issuer role: credential_provider Holder role: individual Verifier roles: service_platform, grassroots_org, individual, kyv_provider Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
skill_name |
string | yes | Name of the skill or certification |
skill_category |
string | yes | Category (medical, trade, safety, etc.) |
issuing_institution |
string | yes | Name of the issuing training provider |
issue_date |
date | yes | Date the credential was issued |
expiration_date |
date | no | Expiration date if the credential has a limited validity |
skill_level |
string | no | Proficiency level (beginner, intermediate, advanced, etc.) |
service_record)Description: Credential attesting that a volunteer performed a specific service. Issued by the party that received the service or the platform that coordinated it. Accumulates over time to build portable reputation. Includes verification method metadata (geolocation, biometric, digital tool, manual attestation) so verifiers can assess proof strength.
Issuer role: service_platform Holder role: individual Verifier roles: service_platform, grassroots_org, government_agency, individual Disclosure mode: selective
| Field | Type | Required | Description |
|---|---|---|---|
service_description |
string | yes | What service was performed |
service_date |
date | yes | Date the service was performed |
hours_served |
number | yes | Number of hours served |
service_category |
string | yes | Category of service (manual labor, skilled trade, companionship, etc.) |
verification_method |
string | yes | How the service was verified (geolocation, biometric, digital, manual) |
verification_strength |
string | yes | Strength rating of the verification method |
location |
string | no | Where the service was performed |
requester_satisfaction |
string | no | Feedback from the service requester |
skills_applied |
string[] | no | Skills that were applied during the service |
This credential chains from proof_of_service. The issuer MUST hold a valid, unrevoked proof_of_service credential. The edge block (e) of this ACDC references the chained credential’s SAID, creating a cryptographically verifiable provenance chain.
equipment_inventory)Description: Self-asserted credential listing tools and equipment a volunteer has access to — from gloves and shovels to backhoes and heavy equipment. Can be endorsed by organizations that have witnessed the equipment in use, which increases trust.
Issuer role: individual Holder role: individual Verifier roles: service_platform, grassroots_org, individual Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
equipment_name |
string | yes | Name of the equipment or tool |
equipment_category |
string | yes | Category (hand tools, power tools, heavy equipment, vehicles, etc.) |
availability |
string | yes | Availability status and conditions |
endorsements |
string[] | no | AIDs of organizations that have endorsed/witnessed the equipment |
org_membership)Description: Credential attesting that an individual is a member of a service organization or grassroots group. Enables cross-platform discovery and attribution tracking.
Issuer role: service_platform Holder role: individual Verifier roles: service_platform, grassroots_org, individual Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
organization_name |
string | yes | Name of the organization |
membership_type |
string | yes | Type of membership (volunteer, staff, board, etc.) |
join_date |
date | yes | When the individual joined |
status |
string | yes | Current membership status (active, inactive, etc.) |
service_need)Description: Declarative credential publishing a need for service. Issued by an individual, grassroots org, or service platform. Uses selective disclosure to protect requester vulnerability — only qualified volunteers see full details. Publication scope follows the graduated model: friends/family, neighborhood, community, city, organizations. AI assists with formality gap-filling.
Issuer role: individual Holder role: individual Verifier roles: service_platform, grassroots_org, individual Disclosure mode: selective
| Field | Type | Required | Description |
|---|---|---|---|
need_description |
string | yes | Description of what help is needed |
service_category |
string | yes | Category (yard work, skilled trade, companionship, event setup, etc.) |
location |
string | yes | General location where service is needed |
timeframe |
string | yes | When the service is needed |
required_skills |
string[] | no | Skills required to fulfill the need |
required_credentials |
string[] | no | Specific credential SAIDs required of volunteers |
required_kyv_level |
string | no | Minimum KYV standard required |
publication_scope |
string | yes | How broadly this need is published (friends, neighborhood, city, platform) |
formality_level |
string | yes | Formality level (informal, semi-formal, formal) |
estimated_hours |
number | no | Estimated hours to complete the service |
volunteers_needed |
number | no | Number of volunteers needed |
service_commitment)Description: Contractual credential where a volunteer commits to meeting a published service need. Binds the volunteer to the terms of the service need. Forms the basis for proof-of-service verification — you cannot prove you did something you did not agree to do.
Issuer role: individual Holder role: individual Verifier roles: service_platform, grassroots_org, individual Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
service_need_said |
string | yes | SAID of the service need being committed to |
volunteer_aid |
string | yes | AID of the committing volunteer |
commitment_date |
date | yes | Date the commitment was made |
agreed_terms |
string | yes | Terms the volunteer agrees to |
verification_plan |
string | yes | How completion will be verified |
This credential chains from service_need. The edge block (e) of this ACDC references the service need’s SAID, creating a cryptographically verifiable link between the commitment and the original need.
proof_of_service)Description: Automated or manual proof that service was rendered. Multi-modal verification: geolocation + barometric + biometric (phone KEL logs), digital tool interaction logs, or manual sponsor attestation. Each method produces a different verification strength. Chains from service_commitment.
Issuer role: verification_service Holder role: individual Verifier roles: service_platform, grassroots_org, individual, government_agency Disclosure mode: selective
| Field | Type | Required | Description |
|---|---|---|---|
service_commitment_said |
string | yes | SAID of the service commitment being proved |
verification_method |
string | yes | Method used (geolocation, biometric, digital_tool, manual) |
verification_strength |
string | yes | Strength rating (high, medium, low) |
start_time |
datetime | yes | When the service started |
end_time |
datetime | yes | When the service ended |
location_proofs |
string[] | no | Signed location data points from phone KEL |
biometric_confirmed |
boolean | no | Whether biometric confirmation was performed |
digital_tool_logs |
string[] | no | Signed interaction logs from digital service tools |
manual_attestation_aid |
string | no | AID of the person who manually attested completion |
This credential chains from service_commitment. The issuer MUST reference the service commitment’s SAID. The edge block (e) of this ACDC references the chained credential’s SAID, creating a cryptographically verifiable provenance chain from need → commitment → proof.
platform_registration)Description: Government-issued credential recognizing a service platform as a registered nonprofit or service organization. Not required for grassroots participation but necessary for formal organizations seeking tax-exempt status and government reporting integration.
Issuer role: government_agency Holder role: service_platform Verifier roles: government_agency, service_platform, individual Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
organization_name |
string | yes | Legal name of the organization |
registration_number |
string | yes | Government registration number |
jurisdiction |
string | yes | Issuing jurisdiction |
registration_type |
string | yes | Type of registration (501c3, etc.) |
registration_date |
date | yes | Date of registration |
tax_exempt_status |
string | no | Tax-exempt classification if applicable |
kyv_standard)Description: Published definition of a Know Your Volunteer standard — specifying what component credentials are required, what verification methods are accepted, and what governance processes must be followed. Multiple standards coexist. Organizations can adopt existing standards or define their own.
Issuer role: service_platform Holder role: kyv_provider Verifier roles: kyv_provider, individual, service_platform Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
standard_name |
string | yes | Human-readable name of the KYV standard |
version |
string | yes | Version of the standard |
required_components |
string[] | yes | List of required component credential types |
accepted_verification_methods |
string[] | yes | Accepted verification methods |
in_person_required |
boolean | yes | Whether in-person verification is mandatory |
renewal_period |
string | yes | How often the KYV credential must be renewed |
interop_agreement)Description: Mutual credential between service platforms establishing cross-platform interoperability — shared service need publication, volunteer credential recognition, and service record portability. Defines which KYV standards each platform recognizes from the other.
Issuer role: service_platform Holder role: service_platform Verifier roles: service_platform, grassroots_org Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
partner_platform_aid |
string | yes | AID of the partner platform |
agreement_date |
date | yes | Date the agreement was established |
recognized_kyv_standards |
string[] | yes | KYV standards recognized across platforms |
shared_service_categories |
string[] | yes | Service categories shared between platforms |
attribution_terms |
string | yes | How service attribution is handled |
background_check)Description: Credential issued by a verification service attesting to the results of a background check. A component credential that feeds into KYV credentials. Uses selective disclosure — the KYV provider sees what they need, but the full details are not exposed beyond that.
Issuer role: verification_service Holder role: individual Verifier roles: kyv_provider Disclosure mode: selective
| Field | Type | Required | Description |
|---|---|---|---|
check_type |
string | yes | Type of background check performed |
check_date |
date | yes | Date the check was performed |
result |
string | yes | Result of the check (clear, flagged, etc.) |
jurisdiction |
string | yes | Jurisdiction the check covers |
expiration_date |
date | yes | When the check result expires |
guardian_delegation)Description: Credential establishing a guardian’s authority to manage a delegated AID on behalf of a ward (minor, elderly, person with disabilities). The ward retains their own AID — the guardian’s delegated AID operates within a cryptographically bounded scope. May originate from the individual, a family agreement, or a court order. Revocable when the ward gains capacity.
Issuer role: individual Holder role: guardian Verifier roles: service_platform, grassroots_org, government_agency Disclosure mode: selective
| Field | Type | Required | Description |
|---|---|---|---|
ward_aid |
string | yes | AID of the person being guarded |
guardian_aid |
string | yes | AID of the guardian |
scope |
string | yes | Scope of the guardian’s delegated authority |
authority_source |
string | yes | Source of authority (self, family, court order) |
effective_date |
date | yes | When the delegation takes effect |
expiration_date |
date | no | When the delegation expires (if applicable) |
revocation_conditions |
string | yes | Conditions under which delegation is revoked |
attribution_agreement)Description: Contractual credential between platforms defining how service hours are attributed when volunteers cross organizational boundaries. Based on the social graph of contribution — who published the need, who matched the volunteer, where credentials came from, who verified completion. Ensures fair recognition without double-counting.
Issuer role: service_platform Holder role: service_platform Verifier roles: service_platform, government_agency Disclosure mode: full
| Field | Type | Required | Description |
|---|---|---|---|
partner_platform_aid |
string | yes | AID of the partner platform |
attribution_model |
string | yes | Model for attributing service hours |
attribution_factors |
string[] | yes | Factors considered (who published, who matched, credential source, etc.) |
reporting_method |
string | yes | How attributed hours are reported |
effective_date |
date | yes | When the agreement takes effect |
This credential chains from interop_agreement. The issuer MUST hold a valid, unrevoked interop_agreement credential with the partner platform. The edge block (e) of this ACDC references the chained credential’s SAID, creating a cryptographically verifiable provenance chain.
Lists chaining relationships between credentials in this ecosystem.
background_check --> kyv_credential
proof_of_service --> service_record
service_need --> service_commitment
service_commitment --> proof_of_service
interop_agreement --> attribution_agreement
/keri-c1-system to design services that issue, hold, and verify these credentials.