This document defines requirements and use cases for representing supply chain events as Verifiable Credentials, enabling interoperable and cryptographically verifiable data exchange across organizational boundaries. It establishes the problem space, shared terminology, motivating scenarios, and testable functional and non-functional requirements that will guide the development of the VSC Core Data Model and related specifications.

The VSC framework maps [[EPCIS]] event semantics onto [[VC-DATA-MODEL]] representations, using [[DID-CORE]] for actor identity binding. The approach is grounded in published W3C, GS1, ISO, IETF, and regulatory standards and aligns with established community work including the [[TRACEABILITY-V1]] vocabulary and [[UNTP]].

This document is intended for:

This document is a Community Group Draft produced by the Verifiable Supply Chain Community Group. It has not been endorsed by the W3C membership and is not a W3C Standard. It may be updated, replaced, or made obsolete at any time.

Feedback is welcome. The preferred mechanism is to open a GitHub issue. For general discussion, see the public mailing list. See Contributing for full contributor guidance.

Introduction

Background and Motivation

Global supply chains are among the most complex information systems humans operate. They span hundreds of organizations, dozens of jurisdictions, and thousands of individual product movements per day. Despite this complexity, the underlying data infrastructure remains fragmented: proprietary formats, bilateral EDI agreements, and centralized intermediary platforms are the norm rather than the exception.

The GS1 [[EPCIS]] standard, widely adopted across retail, healthcare, and logistics, provides a common vocabulary for supply chain events — captures of who did what to which item, where, and when. However, EPCIS defines what to record, not how to prove it. A receiving party cannot cryptographically verify that an EPCIS record was created by an authorized party, has not been tampered with, or corresponds to any real-world act of authority.

Simultaneously, the W3C Verifiable Credentials Data Model and [[DID-CORE]] provide a mature, widely deployed infrastructure for cryptographically signed, decentralized identity. These technologies have been adopted in digital credentials for education, healthcare records, and government identity, but have not yet been systematically applied to supply chain event data.

Regulatory pressure is accelerating the need. The US [[DSCSA]] mandates electronic, interoperable tracing of prescription drug products across the entire pharmaceutical distribution chain by 2023. The EU [[EUDR]] requires due diligence documentation for commodities associated with deforestation. The EU [[EU-BEV]] requires battery passport data covering the full material supply chain. These regulations require auditable, tamper-evident records — a property EPCIS alone cannot provide.

The Verifiable Supply Chain (VSC) framework addresses this gap by defining how [[EPCIS]] events can be represented as [[VC-DATA-MODEL]] credentials, binding event data to the issuing party's [[DID-CORE]] identifier and enabling cryptographic verification across organizational boundaries without requiring a shared central database.

Problem Statement

Current supply chain data systems exhibit three structural deficiencies that VSC is designed to address:

Fragmentation
No standard mechanism exists to exchange verifiable supply chain event records across organizational boundaries in a vendor-neutral way. Point-to-point integrations and proprietary platforms create data silos that prevent end-to-end visibility (see [[ISO28000]] Section 4.2 on supply chain security risk assessment).
Lack of verifiability
EPCIS provides rich event semantics but contains no native mechanism for a receiver to verify the identity of the asserting party, the integrity of the record, or the authority of the issuer to make the claimed assertion. A well-formed EPCIS document is indistinguishable from a fabricated one without out-of-band authentication mechanisms.
Regulatory non-compliance risk
Regulations including [[DSCSA]], [[EUDR]], and [[EU-BEV]] require auditable, tamper-evident records of product provenance and chain of custody. Existing data systems cannot satisfy these requirements without significant bespoke engineering, creating compliance risk for supply chain participants.

The VSC Approach

VSC addresses the deficiencies identified in Problem Statement by:

VSC does not require distributed ledger technology. DID methods backed by web infrastructure (e.g., did:web) are explicitly supported and are expected to be the dominant deployment pattern for enterprise supply chains. Ledger-based DID methods MAY be used but are not privileged.

Document Conventions

Requirement identifiers take the form REQ-Xn where X is F (functional) or NF (non-functional) and n is a two-digit sequence number. Every requirement includes a rationale, a testability statement, and normative references to inform conformance test development.

Use case identifiers take the form UC-n. Each use case cross-references the requirements it motivates.

Defined terms appear in small-caps style and are linked on first use in each section.

Document Structure

Conformance

The key words MUST, MUST NOT, REQUIRED, SHALL, SHALL NOT, SHOULD, SHOULD NOT, RECOMMENDED, NOT RECOMMENDED, MAY, and OPTIONAL in this document are to be interpreted as described in [[RFC2119]] and [[RFC8174]] when, and only when, they appear in all capitals, as shown here.

A VSC-conformant implementation is a software system that satisfies all MUST and MUST NOT requirements in Requirements. Conformance is assessed against the testability statements accompanying each requirement.

This document defines two conformance classes:

VSC Issuer
A software component that produces Verifiable Credentials representing Supply Chain Events in conformance with this specification.
VSC Verifier
A software component that accepts and validates Verifiable Credentials or Verifiable Presentations representing Supply Chain Events in conformance with this specification.

Holder conformance requirements are not independently specified in this document because a holder can be implemented by either an issuer or verifier system. Future VSC specifications MAY define an explicit holder conformance class.

Scope

In Scope

Out of Scope

Terminology

The following terms are used throughout this specification. Terms defined in [[VC-DATA-MODEL]] and [[DID-CORE]] are imported by reference where noted.

Supply Chain Event
A structured record of an occurrence at a specific point in time within a supply chain, such as the observation, commissioning, aggregation, transformation, or custody transfer of goods. In VSC, supply chain events are modeled on [[EPCIS]] v2.0 event types. See also: EPCIS Event.
Supply Chain Actor
An organization or individual that participates in a supply chain and is capable of asserting Supply Chain Events. In VSC, each actor is identified by at least one Decentralized Identifier (DID). Multiple DID methods are supported; the DID method used is not prescribed by VSC.
EPCIS Event
A standardized supply chain event as defined by [[EPCIS]] v2.0, belonging to one of the following event types: ObjectEvent, AggregationEvent, TransformationEvent, TransactionEvent, or AssociationEvent. Each event type has a normative field set defined in [[EPCIS]] and [[GS1-CBV]].
Event-to-Credential Mapping
The normative, field-level transformation of an EPCIS Event into a Verifiable Credential, as defined by VSC. The mapping is required to be lossless with respect to the event's temporal context, business context, product identifiers, and event type semantics.
Verifiable Credential
As defined in [[VC-DATA-MODEL]] Section 4: a cryptographically verifiable set of claims made by an issuer about a subject. In VSC, each Supply Chain Event is represented as a Verifiable Credential where the asserting Supply Chain Actor is the issuer and the event data constitutes the credential subject.
Verifiable Presentation
As defined in [[VC-DATA-MODEL]] Section 4: a collection of one or more Verifiable Credentials assembled by a holder for presentation to a verifier. In VSC, presentations are used to convey custody chains, compliance histories, or provenance claims.
Event Chain
An ordered sequence of Supply Chain Events, each represented as a Verifiable Credential, linked by reference such that a verifier can reconstruct the full provenance or custody history of a product or batch. Each credential in the chain references the credential identifier of its predecessor.
Selective Disclosure
A mechanism by which a holder can present a Verifiable Credential to a verifier revealing only a specified subset of credential fields, without invalidating the issuer's signature over the full credential. Supported mechanisms include [[BBS-2023]] proofs and [[SD-JWT]].
Business Step
As defined in [[GS1-CBV]]: a controlled vocabulary term (e.g., shipping, receiving, manufacturing) that describes the step in the business process at which an EPCIS Event occurred.
Disposition
As defined in [[GS1-CBV]]: a controlled vocabulary term (e.g., in_transit, recalled, destroyed) describing the condition or status of an EPC or product class at the time of an EPCIS Event.
Trust Framework
A set of policies, rules, and agreements that govern how Supply Chain Actors are admitted to, and trusted within, a VSC ecosystem. A trust framework defines which DID methods and issuer registries are accepted by verifiers in a given context. Trust framework governance is out of scope for VSC specifications but trust framework references MUST be expressible in VSC credentials.
Issuer Registry
A machine-readable list of DIDs that are authorized to assert Supply Chain Events within a given context or Trust Framework. An issuer registry may be published by an industry body, regulator, or platform operator.
Credential Status
A machine-checkable mechanism by which the current validity of a Verifiable Credential can be determined (e.g., revoked, suspended, or valid) by a verifier, as described in [[VC-DATA-MODEL]] Section 7.

Conceptual Architecture

Roles

VSC defines three primary roles, aligned with [[VC-DATA-MODEL]] Section 1.3. In supply chain deployments these roles are typically held by different organizations.

Issuer
A Supply Chain Actor that asserts a Supply Chain Event and creates the corresponding Verifiable Credential. The issuer signs the credential using the cryptographic key material associated with its [[DID-CORE]] identifier. The issuer is responsible for the accuracy of the event claims and for maintaining Credential Status information.
Holder
An entity that receives and stores Verifiable Credentials and may assemble them into Verifiable Presentations for submission to verifiers. In supply chain contexts, holders are typically downstream trading partners, freight forwarders, customs agents, or regulatory bodies. A holder may also be an issuer (e.g., a manufacturer issues a provenance credential and later presents it to a retailer).
Verifier
An entity that accepts Verifiable Credentials or Presentations and validates their integrity, authenticity, and policy compliance. Verifiers check the issuer's DID resolution, cryptographic signature, credential status, and — where a Trust Framework is in scope — whether the issuer is authorized to assert events in the claimed business context.

EPCIS Event Types and VSC Mapping

[[EPCIS]] v2.0 defines five event types. VSC requires a normative credential schema for each:

EPCIS Event Type Typical Business Use VSC Credential Schema (placeholder)
ObjectEventCommissioning, observation, shipping, receiving of itemsVscObjectEventCredential
AggregationEventPacking items into a container; disaggregating a palletVscAggregationEventCredential
TransformationEventManufacturing: input materials consumed, output products createdVscTransformationEventCredential
TransactionEventLinking events to business transactions (orders, invoices)VscTransactionEventCredential
AssociationEventAssociating sub-objects with a parent objectVscAssociationEventCredential

The schema names in the table above are placeholders. Normative schema identifiers and JSON-LD context URIs will be defined in the VSC Core Data Model specification.

Object Model

The core objects in VSC are:

Supply Chain Event
The occurrence being recorded, conforming to one of the five [[EPCIS]] event types. The event carries the event-time, record-time, business step, disposition, read point, business location, and EPC or product class lists.
Verifiable Credential
The cryptographically signed representation of the event. The credential's issuer is the asserting Supply Chain Actor's DID. The credentialSubject contains the EPCIS Event fields. The credential carries a credentialStatus endpoint for revocation checks.
Event Chain
A directed graph of Verifiable Credentials linked by credential identifier references. The chain enables reconstruction of provenance or custody histories.
Verifiable Presentation
A holder-assembled collection of event credentials (and optionally other credentials, e.g., certification credentials) submitted to a verifier for a specific verification context such as customs clearance or regulatory audit.

Information Flow

The canonical VSC information flow is:

Event Source Issuer Holder Verifier System Event occurs 1. Capture event EPCIS event Apply mapping Sign with DID 2. VC transmitted Store VC Assemble VP 3. Present VP Resolve DID Verify proof Check status Check registry 4. Outcome Accept / Reject via TIR

Figure 1 — Canonical VSC information flow: Event capture, credential issuance, holder storage, verifier validation.

Step 4 (verification) may fail if the DID cannot be resolved, the signature is invalid, the credential has been revoked, or the issuer is not in the required issuer registry. Verifier behavior in each failure case is defined in Requirements.

Use Cases

This section describes motivating scenarios for VSC. Each use case includes actors, preconditions, a nominal flow, failure modes, and a mapping to the requirements it motivates. Use cases are non-normative.

UC-01: Raw Material Provenance for Deforestation Due Diligence

Regulatory driver
EU Deforestation Regulation [[EUDR]], Article 3 — operators must ensure commodities are deforestation-free and legally produced.
Actors
Raw material supplier (issuer); first processor (holder/issuer); EU market operator / importer (holder/verifier); EU competent authority (verifier).
Preconditions
Supplier holds a did:web identifier registered with a sector trust framework. Importer has declared a reference DID set of accepted supplier issuers.

Nominal flow:

  1. A soy supplier in Brazil harvests a batch and records an ObjectEvent in their EPCIS system with the batch EPC, harvest timestamp, geo-coordinates of the plot, and species information.
  2. The supplier's VSC-conformant software applies the Event-to-Credential Mapping and signs a VscObjectEventCredential, with an extension for geospatial data and the relevant commodity type.
  3. The credential includes a reference to the supplier's deforestation-free certification credential (issued by a certification body) as a linked credential.
  4. The signed credential is transmitted to the first processor (crusher), who stores it and issues their own ObjectEvent credential for the crushing step, referencing the supplier's credential.
  5. The EU importer requests a Verifiable Presentation from the processor containing the full Event Chain from harvest to processed shipment.
  6. The importer's system verifies each credential in the chain: DID resolution, signature, revocation status, and presence in the sector Issuer Registry.
  7. The importer submits the presentation to the EU Information System for EUDR due diligence statements.

Failure modes:

Requirements motivated: REQ-F01, REQ-F02, REQ-F03, REQ-F04, REQ-F07, REQ-NF03.

UC-02: Pharmaceutical Custody Transfer (DSCSA Compliance)

Regulatory driver
US Drug Supply Chain Security Act [[DSCSA]] Section 582 — electronic, interoperable product tracing at the package level by November 2023.
Actors
Manufacturer (issuer); wholesaler (holder/issuer); dispenser / pharmacy (holder/verifier); US FDA (verifier).
Preconditions
All actors are registered in an FDA-recognized DSCSA authorized trading partner registry that maps GLN identifiers to DIDs.

Nominal flow:

  1. The manufacturer applies a serialized SGTIN (GS1 item-level identifier) to each drug package and records an ObjectEvent (bizStep: commissioning) as a signed VSC credential.
  2. At shipping, the manufacturer records an ObjectEvent (bizStep: shipping) credential for the pallet SSCC, referencing the commissioned item credentials via AggregationEvent.
  3. The wholesaler records an ObjectEvent (bizStep: receiving) and issues their own credential referencing the manufacturer's shipping credential by its credential identifier.
  4. The process repeats at each custody transfer (repackaging, onward shipment, final delivery to pharmacy).
  5. The pharmacy's dispensing system requests a Verifiable Presentation covering the product's full custody chain before dispensing.
  6. The presentation is verified: each credential's signature, issuer DID, revocation status, and authorized trading partner registration are confirmed.
  7. In the event of a recall, the manufacturer revokes the relevant event credentials. Verifiers checking revocation status MUST reject these credentials and SHOULD surface a specific recall indicator.

Failure modes:

Requirements motivated: REQ-F01, REQ-F02, REQ-F03, REQ-F04, REQ-F05, REQ-F08, REQ-NF01.

UC-03: Automated Customs Clearance

Regulatory driver
WCO SAFE Framework; EU Union Customs Code Article 163 (supporting documents requirement).
Actors
Exporter (issuer); freight forwarder (holder); customs authority (verifier).
Preconditions
Customs authority publishes a trusted issuer registry of accepted certification and origin credential issuers.

Nominal flow:

  1. The exporter assembles a Verifiable Presentation containing: an origin credential (country of origin declaration), an inspection credential (phytosanitary or product safety), and transport event credentials covering the journey from factory to port.
  2. The presentation uses Selective Disclosure to reveal only the fields required by customs (e.g., tariff codes, declared value, origin) without exposing commercially sensitive pricing or supplier identity data.
  3. The freight forwarder's system submits the presentation to the customs authority's automated clearance API.
  4. The customs system verifies each credential against its trusted issuer registry, checks signatures and revocation status, and runs automated rules (e.g., sanctions screening, tariff classification validation).
  5. Clearance is granted or a referral for physical inspection is issued, with the verification result recorded.

Failure modes:

Requirements motivated: REQ-F05, REQ-F06, REQ-F07, REQ-NF02, REQ-NF03.

UC-04: Battery Passport for EV Supply Chain

Regulatory driver
EU Battery and Electric Vehicle Regulation [[EU-BEV]], Article 77 — battery passport required for EV batteries from February 2027.
Actors
Cathode material supplier (issuer); cell manufacturer (holder/issuer); battery pack manufacturer (holder/issuer); vehicle OEM (holder/verifier); EU market surveillance authority (verifier); end consumer (verifier).
Preconditions
Battery identifier issued using GS1 Digital Link [[GS1-DIGITAL-LINK]] scheme resolving to the battery passport.

Nominal flow:

  1. The cathode material supplier issues ObjectEvent credentials for each batch, including cobalt and lithium provenance data, mine location, and responsible sourcing certification references.
  2. The cell manufacturer issues TransformationEvent credentials mapping input material batches (cathode, anode, electrolyte) to output cell identifiers.
  3. The battery pack manufacturer assembles cell credentials into AggregationEvent credentials and issues a composite battery passport presentation referencing all upstream event credentials.
  4. The vehicle OEM's system verifies the full passport presentation and stores it linked to the Vehicle Identification Number (VIN).
  5. A consumer or recycler can scan a GS1 Digital Link QR code on the battery, resolve the battery passport, and verify the event chain.

Failure modes:

Requirements motivated: REQ-F01, REQ-F04, REQ-F06, REQ-NF01, REQ-NF04.

UC-05: Product Recall Propagation

Regulatory driver
General Product Safety Regulation (EU) 2023/988; US CPSC recall authority.
Actors
Manufacturer (issuer, revocation authority); downstream holders; regulators; retailers.
Preconditions
All event credentials for the affected product batch are known and the manufacturer controls the credential status service.

Nominal flow:

  1. A safety defect is identified. The manufacturer's system identifies all event credentials linked to the affected batch using batch-level identifiers.
  2. The manufacturer revokes the ObjectEvent credential for the affected batch via the Credential Status service. The revocation is cryptographically signed by the manufacturer's DID.
  3. Any downstream verifier checking an affected credential against the status service receives a revoked status and MUST reject the credential.
  4. Downstream holders receive a recall notification (out-of-band) and can verify the revocation independently by resolving the credential status.
  5. The regulator can independently verify the breadth of the recall by querying which credentials issued by the manufacturer have been revoked for the affected lot.

Requirements motivated: REQ-F03, REQ-F08, REQ-NF01.

UC-06: Regulatory Audit Trail

Regulatory driver
General requirement across regulated industries (pharma, food, aerospace) for multi-year auditable records.
Actors
Multiple supply chain actors (issuers/holders); sector regulator (verifier).
Preconditions
Credentials have been issued and held for up to 10 years. Some issuer DIDs may have changed or been retired.

Nominal flow:

  1. A regulator issues a data request to a holder for all event credentials related to a specific product class over a 5-year period.
  2. The holder assembles a Verifiable Presentation with selective disclosure applied to protect third-party business data.
  3. The regulator's system verifies each credential. For credentials where the issuer DID is no longer resolvable, the system checks a historical DID log maintained by the sector trust framework.
  4. The audit result is recorded as a signed audit event credential by the regulator, completing the audit trail.

Failure modes:

Requirements motivated: REQ-F05, REQ-F07, REQ-NF02, REQ-NF05.

Requirements

The following requirements are derived from the use cases in Use Cases and from the regulatory and standards landscape described in Introduction. Each requirement is identified by a stable identifier, states the conformance level, provides a rationale grounded in published sources, and includes a testability statement to guide conformance test development.

All VSC-conformant implementations MUST also satisfy the MUST-level requirements of [[VC-DATA-MODEL]]. The requirements below are additional VSC-specific requirements that go beyond the base VC Data Model.

Requirements Summary

IDTitleLevelClassUse Cases
REQ-F01Event-to-Credential MappingMUSTIssuerUC-01–04
REQ-F02Event Semantics PreservationMUSTIssuerUC-01, UC-02
REQ-F03Issuer DID BindingMUSTIssuerUC-01–05
REQ-F04Event LinkingSHOULDIssuerUC-01–04
REQ-F05Selective DisclosureMUSTIssuer, VerifierUC-02, UC-03, UC-06
REQ-F06Batch and Lot TraceabilitySHOULDIssuerUC-03, UC-04
REQ-F07Issuer Authority VerificationMUSTVerifierUC-01, UC-03, UC-06
REQ-F08Credential Status and RevocationMUSTIssuer, VerifierUC-02, UC-05
REQ-F09Chain Integrity DetectionSHOULDVerifierUC-01, UC-02, UC-04
REQ-F10Trust Framework ReferenceSHOULDIssuer, VerifierUC-01–03
REQ-NF01ScalabilityMUSTIssuer, VerifierUC-02, UC-04, UC-05
REQ-NF02Privacy PreservationSHOULDIssuer, VerifierUC-03, UC-06
REQ-NF03InteroperabilityMUSTIssuer, VerifierUC-01, UC-03
REQ-NF04ExtensibilitySHOULDIssuerUC-04
REQ-NF05Long-term VerifiabilitySHOULDVerifierUC-06

Functional Requirements

REQ-F01 — Event-to-Credential Mapping

A VSC Issuer MUST support producing a [[VC-DATA-MODEL]]-conformant Verifiable Credential for each of the five [[EPCIS]] v2.0 event types: ObjectEvent, AggregationEvent, TransformationEvent, TransactionEvent, and AssociationEvent. The mapping applied MUST conform to the normative Event-to-Credential Mapping defined in the VSC Core Data Model specification (once published).

EPCIS v2.0 [[EPCIS]] defines five event types covering the full range of supply chain observations. Requiring support for all five ensures that VSC can represent any supply chain event without loss of semantics. The GS1 [[GS1-CBV]] provides the controlled vocabulary used within these events.

A test vector set MUST be published containing at least one syntactically and semantically valid EPCIS event document for each of the five event types. A conformant issuer MUST produce a valid, verifiable Verifiable Credential for each test vector that: (a) passes [[VC-DATA-MODEL]] validation; (b) preserves all EPCIS fields specified in REQ-F02; and (c) carries a valid [[VC-DATA-INTEGRITY]] proof.

[[EPCIS]] Section 7; [[GS1-CBV]]; [[VC-DATA-MODEL]] Section 4.

REQ-F02 — Event Semantics Preservation

The Event-to-Credential Mapping MUST preserve, without loss or transformation, the following fields from the source [[EPCIS]] event: eventTime, eventTimeZoneOffset, recordTime, eventType, action, bizStep, disposition, readPoint, bizLocation, epcList / inputEPCList / outputEPCList (as applicable to the event type), and quantityList / inputQuantityList / outputQuantityList (as applicable). Extension fields (ILMD, sensor elements) MUST also be preserved where present.

Regulatory requirements under [[DSCSA]] and [[EUDR]] require that the specific event-time, location, and identifier information are auditable and have not been altered. Loss of any of these fields would undermine the legal validity of the credential as a regulatory record. The [[ISO28000]] supply chain security management framework similarly requires complete and accurate event records.

For each test vector in REQ-F01: a conformant parser applied to the resulting credential MUST recover values bit-for-bit identical to the source EPCIS event for each listed field. Automated round-trip tests MUST be defined in the conformance test suite.

[[EPCIS]] Sections 7–9; [[DSCSA]]; [[EUDR]] Article 9; [[ISO28000]].

REQ-F03 — Issuer DID Binding

Every Verifiable Credential representing a Supply Chain Event MUST include an issuer value using [[DID-CORE]] syntax. The DID MUST be resolvable to a DID Document containing the public key material used to verify the credential's [[VC-DATA-INTEGRITY]] proof. A VSC Issuer MUST NOT use a bare HTTP URL or an opaque identifier as the issuer value.

The core security property of VSC is the cryptographic binding between the event assertion and the asserting party's identity. Without a resolvable DID, a verifier cannot retrieve the public key needed to verify the signature, making the credential unverifiable. [[DID-CORE]] provides the standardized mechanism for this binding, supported by existing W3C infrastructure.

Given a VSC event credential: (a) the issuer value MUST conform to the DID syntax rule defined in [[DID-CORE]] Section 3.1; (b) resolving the DID via a conformant DID resolver MUST return a DID Document; and (c) the DID Document MUST contain a verificationMethod entry whose public key successfully verifies the credential's proof.

[[DID-CORE]] Sections 3, 7; [[VC-DATA-MODEL]] Section 4.5; [[VC-DATA-INTEGRITY]].

REQ-F04 — Event Linking

A VSC Issuer SHOULD include, in event credentials that represent a step in a multi-party custody chain, a reference to the credential identifier(s) of immediately preceding events in the chain. References MUST use the id property of the referenced credential, expressed as a URI, in the credential subject. A VSC Verifier SHOULD follow event links to reconstruct the chain and verify each linked credential.

Custody chain reconstruction is required by [[DSCSA]] (full tracing from manufacturer to dispenser), [[EUDR]] (origin to importer), and [[EU-BEV]] (material to battery). Without event linking, a verifier cannot confirm that consecutive custody transfers are contiguous or that no unauthorized party intervened. The linking pattern is consistent with the linked data approach of [[JSON-LD]].

Given a two-credential chain where credential B references credential A by URI: (a) a conformant verifier MUST resolve and verify credential A when requested; (b) if credential A's ID is altered, the verifier MUST detect the broken link; (c) a verifier MUST signal non-verifiability if a referenced credential cannot be retrieved.

[[DSCSA]]; [[EUDR]] Article 4; [[EU-BEV]] Annex XIII; [[JSON-LD]] Section 3.

REQ-F05 — Selective Disclosure

A VSC Issuer MUST produce event credentials using a proof format that supports Selective Disclosure. Supported proof formats include [[BBS-2023]] and [[SD-JWT]]. A VSC Verifier MUST be capable of verifying selective disclosure presentations produced by at least one of these proof formats. Selective disclosure presentations MUST NOT allow an adversary to infer unrevealed field values from the presented proof.

Supply chain data contains commercially sensitive information (supplier identities, pricing, production volumes) that participants are not willing to share beyond regulatory minimum disclosure. [[GDPR]] Article 5(1)(c) data minimization principle requires that only necessary data be shared. [[BBS-2023]] and [[SD-JWT]] are standardized selective disclosure mechanisms with W3C and IETF backing respectively.

Given a credential with N fields: (a) a conformant holder MUST be able to produce a presentation revealing any subset of k fields (1 ≤ k < N) while maintaining proof validity; (b) the verifier MUST accept the presentation for the revealed fields; (c) the verifier MUST NOT be able to recover the values of the unrevealed fields from the proof material; (d) a tampered proof MUST be rejected.

[[BBS-2023]]; [[SD-JWT]]; [[GDPR]] Article 5(1)(c); [[VC-DATA-MODEL]] Section 5.9; [[NIST-SP800-53]] SI-12.

REQ-F06 — Batch and Lot Traceability

A VSC Issuer SHOULD support batch-level and lot-level identifiers (e.g., LGTIN as defined in [[GS1-CBV]]) in event credentials, in addition to serialized-item identifiers (SGTIN, SSCC). Implementations supporting batch traceability MUST ensure that batch identifiers are expressed using GS1 EPCIS quantity element syntax or an equivalent normative vocabulary.

Not all supply chain scenarios track at the per-item serialization level. Bulk commodities (agricultural products, chemicals, minerals) are tracked at batch or lot level. Batch identifiers are mandatory for EUDR due diligence claims and EU battery material traceability. Requiring per-item identifiers would make VSC undeployable for bulk commodity supply chains.

A conformant issuer MUST produce a valid credential carrying an LGTIN quantity element. A conformant verifier MUST parse and validate this element without error.

[[EPCIS]] Section 7.3.3; [[GS1-CBV]] Section 7; [[EUDR]] Article 9(1)(d); [[EU-BEV]] Annex XIII.

REQ-F07 — Issuer Authority Verification

A VSC Verifier MUST verify that the credential issuer's DID is authorized to assert events for the claimed business context when an Issuer Registry is referenced in the credential or specified by the verifier's Trust Framework. A verifier MUST NOT accept a credential whose issuer DID does not appear in a required issuer registry. Where no issuer registry is required by the verification context, the verifier SHOULD surface a warning indicating that issuer authority has not been confirmed.

Cryptographic proof of integrity (signature verification) is necessary but not sufficient for supply chain verifiability. An attacker can create a validly signed credential from a DID they control for a business step they are not authorized to assert. Checking the issuer against an authoritative registry — analogous to the certificate authority model in TLS — closes this gap. This pattern is aligned with [[NIST-SP800-53]] IA-5 (Authenticator Management) and the authorization model in [[RFC6749]].

Given a credential whose issuer DID is not in the verifier's configured issuer registry: the verifier MUST reject the credential and MUST return an error code distinguishing "issuer not authorized" from "signature invalid." A credential whose issuer IS in the registry MUST be accepted (assuming valid signature and status).

[[NIST-SP800-53]] IA-5; [[RFC6749]] Section 1.1; [[ISO28000]] Section 6.5; [[DSCSA]] Section 582(c).

REQ-F08 — Credential Status and Revocation

Every VSC event credential MUST include a credentialStatus property referencing a machine-readable status endpoint conformant with [[VC-DATA-MODEL]] Section 7. A VSC Verifier MUST check the status of each credential presented before accepting it. Cached revocation status information SHOULD NOT be relied upon for more than 24 hours for high-stakes verification contexts (pharmaceutical, food safety) and MAY be cached for up to 7 days in lower-stakes contexts.

Product recalls ([[DSCSA]], EU General Product Safety Regulation) require that invalid credentials be rejected promptly. A revocation mechanism that verifiers cannot check renders recall notifications ineffective. Cache lifetime limits balance performance (avoiding status service overload) against timeliness of revocation propagation, consistent with [[NIST-SP800-53]] SI-7.

(a) A verifier presented with a revoked credential MUST reject it and return a revoked status indicator. (b) A verifier with a stale (>24h) cached status for a high-stakes credential MUST re-fetch the status before accepting the credential. (c) A verifier MUST distinguish "revoked" from "status service unreachable" and SHOULD treat the latter as a verification failure.

[[VC-DATA-MODEL]] Section 7; [[DSCSA]] Section 582(h); [[NIST-SP800-53]] SI-7.

REQ-F09 — Event Chain Integrity Detection

A VSC Verifier SHOULD detect gaps in an Event Chain — specifically, cases where a credential references a predecessor credential that cannot be retrieved, verified, or that has been revoked — and MUST signal non-verifiability of the chain in such cases, with a specific error distinguishing: (a) missing predecessor, (b) invalid predecessor signature, (c) revoked predecessor, and (d) broken link (credential ID does not resolve).

An incomplete event chain may indicate either accidental data loss or a deliberate attempt to obscure an unauthorized custody transfer. Undifferentiated error signaling would prevent operators and regulators from distinguishing these cases. Distinct error codes enable targeted remediation. This is consistent with [[NIST-SP800-53]] AU-12 (Audit Record Generation) and the DSCSA requirement for complete, unbroken tracing.

Given a three-credential chain A→B→C where credential B's predecessor reference is corrupted: the verifier MUST return a "broken link" error specifically identifying B. A chain where B has been revoked MUST return a "revoked predecessor" error. A complete valid chain MUST return success.

[[NIST-SP800-53]] AU-12; [[DSCSA]] Section 582(j); [[ISO28000]] Section 6.4.

REQ-F10 — Trust Framework Reference

A VSC event credential SHOULD include a machine-readable reference to the Trust Framework under which it was issued, expressed as a URI in the credential's terms-of-use or evidence property. A VSC Verifier SHOULD use this reference to determine which Issuer Registry to consult for authority verification (REQ-F07).

Supply chains operate under sector-specific governance frameworks (pharmaceutical, food, automotive, etc.) with different authorization rules. Embedding a trust framework URI in the credential allows verifiers to apply the correct governance rules automatically, enabling cross-sector interoperability without bilateral configuration. This pattern follows the trust framework approach used in the [[PEPPOL]] e-procurement network.

A credential carrying a trust framework URI MUST allow a verifier to dereference the URI and retrieve a machine-readable document listing authorized issuer DIDs. A credential lacking a trust framework URI MUST be accepted with a warning (not rejected) by a verifier that does not require one.

[[VC-DATA-MODEL]] Section 5.12 (terms of use); [[PEPPOL]]; [[TRACEABILITY-INTEROP]] Section 4.

Non-Functional Requirements

REQ-NF01 — Scalability

A VSC-conformant implementation MUST be capable of issuing and verifying event credentials at a rate commensurate with enterprise supply chain event volumes. As a benchmark, conformant implementations SHOULD be capable of verifying a ten-credential event chain in under 2 seconds under normal network conditions, and of issuing 1,000 credentials per minute on commodity cloud hardware. These benchmarks are indicative; normative performance requirements will be specified in the conformance test suite.

Large retail and pharmaceutical supply chains generate millions of EPCIS events per day. A verifiable credential system that cannot sustain production event volumes will not be adopted. Battery passport use case (UC-04) requires verification of chains spanning thousands of credentials. The benchmark figures are derived from GS1's published EPCIS throughput guidance and typical cloud instance capabilities as of 2024.

The conformance test suite MUST include a load test that exercises issuance at 1,000 credentials per minute and chain verification of 10 credentials within 2 seconds, recording pass/fail and actual throughput figures.

[[EPCIS]] Appendix D (performance guidance); [[ISO28000]].

REQ-NF02 — Privacy Preservation

VSC implementations SHOULD avoid requiring globally unique, long-lived correlatable identifiers for all participants in all verification contexts. Where pairwise [[DID-CORE]] identifiers are available, implementations SHOULD use them. Credential schemas MUST NOT require the inclusion of personally identifiable information (PII) beyond what is required for the regulatory context in question.

[[GDPR]] Article 25 (Data Protection by Design) requires that data minimization and privacy-by-design be embedded in system design. Supply chain credentials frequently traverse jurisdictional boundaries and may be subject to multiple data protection regimes. Long-lived correlatable identifiers enable tracking of supply chain participant behavior across contexts beyond the intended disclosure.

A conformance test MUST verify that a credential schema does not include mandatory PII fields beyond regulatory minimum. A verifier MUST NOT require a holder to present more fields than the minimum needed for the stated verification purpose.

[[GDPR]] Articles 5, 25; [[NIST-SP800-53]] AR-7; [[VC-DATA-MODEL]] Section 10 (privacy considerations).

REQ-NF03 — Interoperability

A VSC event credential issued by one conformant implementation MUST be verifiable by any other conformant implementation without prior bilateral configuration. Implementations MUST use the VSC JSON-LD context URI (to be defined in the VSC Core Data Model) and MUST NOT require proprietary extensions for basic credential exchange. Implementations SHOULD conform to the [[TRACEABILITY-INTEROP]] HTTP API profile for credential exchange.

The primary value proposition of VSC is cross-organizational verifiability. Without interoperability, VSC becomes a series of proprietary bilateral integrations — the same problem it is designed to solve. The [[TRACEABILITY-INTEROP]] profile provides a tested, deployed HTTP API standard for credential exchange in supply chain contexts.

The VSC interoperability test suite MUST include an implementation-A-issues / implementation-B-verifies scenario for each of the five credential types. A credential issued by implementation A MUST be verified successfully by implementation B without any bilateral pre-configuration.

[[TRACEABILITY-INTEROP]]; [[VC-DATA-MODEL]] Section 1.3; [[JSON-LD]] Section 5.

REQ-NF04 — Extensibility

The VSC credential schema SHOULD support sector-specific and jurisdiction-specific extension vocabularies without invalidating base credential verification. Extension vocabularies MUST be expressed using [[JSON-LD]] context extension mechanisms. Verifiers that do not understand an extension MUST still be able to verify the base credential.

Supply chain verticals (pharmaceutical, food, automotive, aerospace) have distinct data requirements. A rigid schema would require a separate specification for each vertical. The JSON-LD extension mechanism provides a standards-based, proven approach to extensibility, as demonstrated by [[TRACEABILITY-V1]] and [[UNTP]].

A credential carrying an unknown JSON-LD extension term MUST be parsed and its base fields MUST be verifiable by a conformant verifier that does not have the extension context loaded. Verifier MUST NOT fail on unknown extension terms.

[[JSON-LD]] Sections 5, 9; [[TRACEABILITY-V1]]; [[UNTP]].

REQ-NF05 — Long-term Verifiability

VSC-conformant implementations SHOULD support verification of event credentials issued up to 10 years prior. This requires that: (a) issuer DID key history is preserved and accessible, either via the DID Document or a trust-framework-maintained historical key archive; and (b) the cryptographic algorithms used for signing remain secure and supported for the expected credential lifetime.

Regulatory audit requirements in pharmaceutical (FDA, EMA), food safety (FDA FSMA), and financial sectors require records retention of 5–10 years. A credential that cannot be verified after its issuer rotates keys or deactivates its DID provides no audit value. Key history preservation is analogous to the certificate transparency log model in TLS.

A conformance test MUST simulate DID key rotation and verify that a credential signed before rotation can still be verified using the pre-rotation key retrieved from the DID Document history or trust framework archive.

[[DID-CORE]] Section 7.2 (DID Document history); [[NIST-SP800-53]] SI-12; [[DSCSA]] Section 582(n).

Security Considerations

The security considerations of [[VC-DATA-MODEL]] Section 11 and [[DID-CORE]] Section 10 apply in full. This section identifies supply-chain-specific threats using the [[STRIDE]] threat classification framework and specifies mitigations.

Threat Model

VSC threats are analyzed at the four primary trust boundaries: (1) issuer key material, (2) event credential content, (3) event chain linkage, and (4) issuer registry integrity.

IDSTRIDE CategoryThreatSeverityMitigationReq
T-01Spoofing Adversary creates a fabricated event credential using a DID they control, not authorized for the business context. High Issuer authority verification against an issuer registry (REQ-F07). Trust framework reference in credential (REQ-F10). REQ-F07, REQ-F10
T-02Tampering Adversary modifies event data (e.g., alters origin coordinates or timestamps) after credential issuance. High Cryptographic proof over all credential fields (REQ-F03). Selective disclosure proofs protect unrevealed fields (REQ-F05). REQ-F03, REQ-F05
T-03Repudiation Issuer denies having issued a specific event credential. Medium Non-repudiation is provided by the issuer's DID-bound cryptographic signature. Verifiers SHOULD log verification results. REQ-F03
T-04Information Disclosure Verifier extracts commercially sensitive supply chain data from a credential beyond what was intended for disclosure. Medium Selective disclosure (REQ-F05) ensures unrevealed fields cannot be recovered from proof material. Pairwise DIDs (REQ-NF02) limit correlation. REQ-F05, REQ-NF02
T-05Denial of Service Adversary floods the credential status service or DID resolution endpoint, preventing legitimate verification. Medium Status service SHOULD implement rate limiting and geographic redundancy. Verifiers SHOULD implement caching per REQ-F08 cache lifetime limits. REQ-F08
T-06Elevation of Privilege Adversary registers a DID in an issuer registry without meeting the registry's eligibility requirements. High Issuer registry governance is out of scope for VSC but trust frameworks MUST define eligibility criteria. Credential SHOULD reference the registry (REQ-F10). REQ-F10

Fraudulent Event Injection (T-01)

A malicious actor may attempt to inject fabricated Supply Chain Events by creating validly signed credentials from an authorized DID for events that never occurred, or from an unauthorized DID. VSC implementations MUST verify issuer identity and authority as specified in REQ-F03 and REQ-F07. Verification SHOULD include checking the issuer's DID against the Issuer Registry referenced in the credential or the verifier's trust framework configuration.

Physical-world corroboration (IoT sensor data, GPS timestamps, third-party inspection certificates referenced as linked credentials) provides additional assurance that event credentials correspond to actual physical events. VSC implementations SHOULD support referencing corroboration evidence as linked credentials in the credential evidence property.

Credential Replay (T-02 / T-01)

A valid Verifiable Credential for one shipment may be replayed in a presentation for a different shipment, or a credential may be presented outside its intended time window.

Implementations SHOULD include one or more of the following context-binding mechanisms to mitigate replay:

Broken Custody Chains (T-02)

A verifier may receive an Event Chain from which one or more credentials have been omitted — either accidentally (data loss) or deliberately (to conceal an unauthorized custody transfer). VSC-conformant verifiers MUST detect gaps in event chains and signal non-verifiability with specific error codes as defined in REQ-F09. Implementations SHOULD treat a broken chain as a verification failure unless the verification context explicitly permits incomplete chains (e.g., for partial audit queries).

Issuer Key Compromise

If an issuer's DID private key is compromised, an adversary can issue fraudulent event credentials indistinguishable from legitimate ones. Issuers MUST implement key management practices consistent with [[NIST-SP800-53]] IA-5, including:

The VSC Trust Framework specification SHOULD define sector-specific key management requirements and mandatory incident response procedures for key compromise events.

Privacy Considerations

The privacy considerations of [[VC-DATA-MODEL]] Section 10 apply in full. This section identifies supply-chain-specific privacy risks and recommended mitigations.

Commercially Sensitive Supply Chain Data

Supply chain event credentials frequently contain information that is commercially sensitive: supplier identities, production volumes, pricing signals embedded in batch sizes, and logistics routing. Disclosing this information beyond the minimum required by a verification context:

VSC implementations MUST support selective disclosure (REQ-F05) and SHOULD use pairwise DIDs (REQ-NF02) to minimize information disclosure.

Credential Linkability

If all credentials issued by a given Supply Chain Actor use the same long-lived DID, a verifier can correlate all events asserted by that actor across time and contexts. This enables surveillance of supply chain participants' business activity beyond the scope of individual verification requests. Implementations SHOULD use pairwise DIDs per trading relationship, or short-lived credential identifiers, to limit cross-context correlation. Zero-knowledge proof mechanisms (e.g., [[BBS-2023]]) SHOULD be preferred for contexts where correlation risk is high.

Personal Data in Event Credentials

Some supply chain events may involve personally identifiable information (e.g., the name of a quality inspector, a driver's identity, or patient-level pharmaceutical dispensing data). VSC credential schemas MUST NOT require PII fields beyond the regulatory minimum. Where PII is required by regulation, issuers MUST apply selective disclosure to prevent disclosure of PII to parties who do not require it, consistent with [[GDPR]] Article 25 and analogous data protection frameworks.

Accessibility Considerations

This specification does not define a user interface. However, implementations of VSC-conformant systems that expose user interfaces for credential issuance, presentation, or verification SHOULD conform to WCAG 2.1 Level AA guidelines. In particular:

Internationalization Considerations

Supply chains are global. VSC implementations must be prepared to handle data from multiple locales and character sets.

Future Work

This requirements document identifies the following areas for future normative specification work by the VSC Community Group, listed in expected priority order:

  1. VSC Core Data Model — Normative JSON-LD context and credential schemas for each [[EPCIS]] event type, including required and optional fields, JSON-LD context URI, and extensibility patterns. This is the immediate follow-on deliverable to this document.
  2. EPCIS–VC Mapping Specification — A detailed, testable normative mapping from [[EPCIS]] v2.0 event structures to VSC credential schemas, including handling of EPCIS 1.2 backward compatibility.
  3. VSC Interoperability Test Suite — A machine-executable conformance test suite covering all MUST-level requirements in this document, with test vectors for each event type and failure mode scenario.
  4. VSC Trust Framework Guidance — Non-normative guidance on establishing Trust Frameworks for specific sectors (pharmaceutical, food and agriculture, automotive), including Issuer Registry design patterns and key management requirements.
  5. Credential Exchange Profile — A normative profile of [[TRACEABILITY-INTEROP]] adapted for VSC event credentials, including endpoint definitions, error codes, and authentication requirements using [[RFC6749]].
  6. Sensor Data and IoT Integration Guidance — Non-normative guidance on binding IoT sensor data (temperature, location) to VSC event credentials as corroboration evidence.

Contributing to This Specification

All contributions are welcome. You do not need to be a W3C member to contribute to a Community Group specification.

How to Contribute

Editorial Process

Changes to this document follow the W3C Community Group process. Pull requests require at least one review from an editor before merging. New requirements must include:

New use cases must include all fields in the use case template (scenario description, actors, preconditions, nominal flow, at least one failure mode, and requirement cross-references).

Intellectual Property

Contributions to W3C Community Group deliverables are subject to the W3C Community Contributor License Agreement (CLA). By submitting a pull request or email contribution, you agree to the terms of the CLA.

Good First Issues for New Contributors

Issues tagged good first issue on GitHub are suitable for contributors who are new to the specification. These typically involve:

Acknowledgments

The editors thank the participants of the Verifiable Supply Chain Community Group for their contributions and feedback. This document has benefited from the prior work of the W3C CCG Traceability Task Force, GS1, and UN/CEFACT UNTP contributors.