Disruptive Technologies
Open Innovation Campus
Disruptive Technologies
Resources
Are you interested?
If you are a professor or university student and you are interested in participating in the TUTORING program, register your information so that we can start the program.
This challenge is aimed at students of Computer Engineering, Telecommunications Engineering, and Business Administration (with a focus on digital transformation) who want to develop their TFG or TFM and who have knowledge of Digital Identity and Public Key/Asymmetric Cryptography concepts, as well as basic knowledge of the European regulatory framework (eIDAS, GDPR). Python, JavaScript/Node.js, or similar.
With rigorous research skills and analytical thinking and/or a strong interest in disruptive technologies and their social impact.
The implementation of the EUDI Wallet represents a paradigm shift in digital identity management in Europe, moving from centralized models to a decentralized, user-controlled approach.
The success of this ecosystem depends on the correct technical application of Verifiable Credentials to ensure interoperability, privacy by design, and non-correlation of data.
This project is of high academic and professional relevance, as it aligns with one of the major digital transformations promoted by the European Union.
It offers students the opportunity to explore cutting-edge technology and a rapidly evolving regulatory framework, addressing the challenges of trust, security, and usability of the future European digital identity.
The project consists of researching and/or implementing a specific use case based on the Sovereign Identity (SSI) and Verifiable Credentials (VC) paradigm, in the context of the new European eIDAS 2.0 regulation and its central component, the EUDI Wallet.
The challenge we propose is twofold:
Regulatory-Functional Analysis: Study how the EUDI Wallet facilitates cross-border digital identification and what implications SSI has in terms of privacy (GDPR) and security.
Technical Design/Prototyping: Design or prototype the complete life cycle of a verifiable credential (issuance, presentation, verification, and revocation) for the selected use case, demonstrating its compatibility with European technical standards.