Bank-developed use case demos
The Lab includes a range of capabilities intended to stimulate ideas for innovative use cases. For details on its design, including capabilities, see the Digital Pound Lab main page.
The demonstrations below explore a base set of payments use cases as examples of how some of the Lab’s capabilities might be used to support a range of payments services.
We have also developed some sample applications to support the demonstration of these use cases, including:
- mobile wallet applications for two sample PIPs, called ‘Barley’ and ‘Oat’. Some aliases used in the Lab reference the sample PIPs (eg LUCAS@BARLEY) – these are called PIP-bound aliases
- web wallet applications for Barley and Oat
- an e-commerce website in the form of a bookstore called ‘Baseline’
- a mobile merchant application for the Baseline bookstore, to accept payments at point of sale and give refunds
- a chat application to explore integrating payments with third-party applications
- a digital assets marketplace for buying digital assets from Baseline using the Lab’s smart contract capability
All aliases and personal details presented in these demonstrations are fictitious and used solely for experimentation purposes; they do not relate to any real individuals or businesses.
Verifiable credentials
Verifiable credentials, also known as trusted credentials, enable users to prove specific characteristics about themselves in a privacy-preserving way. In the Lab, these credentials map to payment aliases for secure payee authentication, ensuring payments go to the intended recipient. At creation, each account is automatically assigned a random alias, with a corresponding verifiable credential for privacy. Users may also add additional aliases, such as random strings, phone numbers or email addresses, as needed. This underlying data (including the alias and other relevant details) is shared with relevant PIPs for anti-money laundering compliance during the payment process but is never accessed by the demonstration ledger or its operator.
Verifiable credentials enable many of the use cases explored in Phase 1.