Loading vLEI.wiki
Fetching knowledge base...
Fetching knowledge base...
This comprehensive explanation has been generated from 7 GitHub source documents. All source documents are searchable here.
Last updated: October 7, 2025
This content is meant to be consumed by AI agents via MCP. Click here to get the MCP configuration.
Note: In rare cases it may contain LLM hallucinations.
For authoritative documentation, please consult the official GLEIF vLEI trainings and the ToIP Glossary.
Value that maintains its utility and can be transferred between different contexts or domains, enabling interoperability and cooperation across non-competing value systems without loss of authenticity or control.
Trans-contextual value refers to value that can be transferred between different contexts while maintaining its utility, authenticity, and verifiability. This concept addresses a fundamental challenge in digital identity and data economics: how to enable cooperation and value exchange across different domains, platforms, or organizational boundaries without requiring centralized intermediaries or sacrificing control over personal or organizational data.
The core principle is that different value contexts are typically not directly competitive. For example, a healthcare provider and a financial institution operate in different contexts, but an individual's verified identity attributes could have value in both contexts. Trans-contextual value creation focuses on identifying and enabling the transfer of such value across context boundaries while preserving cryptographic verifiability and control authority.
Key properties of trans-contextual value include:
Traditional digital identity and data systems have struggled with the "walled garden" problem, where value created in one context (platform, organization, or domain) cannot easily transfer to another. This has led to:
Implementing trans-contextual value requires careful attention to governance frameworks that define:
The vLEI ecosystem governance framework provides a model for how to structure governance for trans-contextual credentials.
To realize trans-contextual value while preserving privacy:
Trans-contextual value creation suggests new economic models:
Contexts seeking to participate in trans-contextual value exchange must:
The concept of trans-contextual value emerged from recognizing that these barriers are not inherent to the nature of digital identity and data, but rather artifacts of centralized, platform-specific architectures. The question "How do we recapture the value in our data?" drives the search for mechanisms that enable value to flow across contexts while maintaining cryptographic integrity and user control.
KERI (Key Event Receipt Infrastructure) provides foundational infrastructure for enabling trans-contextual value through its approach to decentralized identity and verifiable data structures.
The KERI ecosystem addresses trans-contextual value through two complementary approaches:
1. Leverage Cooperative Network Effects
KERI removes primary barriers to cooperation by providing:
By making identifiers and their associated data verifiable across contexts, KERI enables cooperative network effects where value created in one context can fuel growth and utility in other contexts. Different contexts can cooperate rather than compete because the cryptographic infrastructure ensures authenticity without requiring trust in specific platforms or intermediaries.
2. Retake Control of Data
KERI explicitly assists in enabling individuals and organizations to retake control of their data through:
This control is prerequisite for capturing trans-contextual value. Without control over data, individuals and organizations cannot determine how and where their data creates value, nor can they capture that value for themselves.
ACDCs extend KERI's trans-contextual value capabilities by providing:
ACDCs enable trans-contextual value by allowing credentials issued in one context (e.g., a government-issued identity credential) to be presented and verified in completely different contexts (e.g., financial services, healthcare, education) without requiring the issuer to have any relationship with or knowledge of the verifying context.
OOBIs provide the discovery mechanism for trans-contextual value by:
This discovery mechanism is crucial for trans-contextual value because it enables value to flow between contexts that have no prior relationship or shared infrastructure.
Cross-Industry Credential Portability
A professional certification issued by an industry association (context A) can be verified by employers in different industries (contexts B, C, D) without requiring the association to establish relationships with each potential verifier. The credential's value transfers across employment contexts.
Supply Chain Provenance
Product authenticity attestations created at manufacturing (context A) maintain their verifiability through distribution (context B), retail (context C), and resale markets (context D). The provenance value transfers across the entire supply chain.
Healthcare Data Sharing
Medical records and test results from one healthcare provider (context A) can be verifiably shared with specialists (context B), researchers (context C), and insurance providers (context D) while maintaining patient control and cryptographic integrity.
Legal Entity Verification
The vLEI (verifiable Legal Entity Identifier) ecosystem demonstrates trans-contextual value by enabling legal entity credentials issued by GLEIF-authorized issuers to be verified in any business context globally—financial services, supply chain, regulatory compliance, etc.—without requiring context-specific credential issuance.
Reduced Friction
Trans-contextual value eliminates the need for repeated verification and credential issuance in each new context, reducing administrative overhead and improving user experience.
Network Effects
As more contexts adopt KERI-based infrastructure, the value of credentials and attestations increases because they become usable in more places. This creates positive feedback loops that accelerate adoption.
Data Sovereignty
Individuals and organizations maintain control over their data while still enabling it to create value across multiple contexts. This aligns incentives between data subjects and data users.
Interoperability Without Standards Committees
Cryptographic verifiability enables interoperability without requiring extensive coordination between contexts. As long as both contexts can verify KERI identifiers and ACDCs, they can exchange value.
Reduced Intermediary Dependence
Trans-contextual value flows directly between contexts without requiring trusted third parties to broker or validate transfers, reducing costs and single points of failure.
Complexity
Implementing trans-contextual value requires understanding cryptographic primitives, key management, and verifiable data structures. This creates a learning curve for developers and organizations.
Privacy Considerations
While selective disclosure helps, the ability to transfer credentials across contexts creates potential correlation risks. Careful design is needed to prevent unwanted tracking across contexts.
Governance Challenges
Determining which credentials and attestations should be transferable across which contexts requires governance frameworks. The vLEI ecosystem addresses this through explicit governance documents.
Infrastructure Requirements
Realizing trans-contextual value requires contexts to adopt compatible infrastructure (KERI, ACDC, CESR). This creates coordination challenges during the transition period.
Key Management Burden
Controllers must properly manage cryptographic keys to maintain control over their identifiers and associated value. Key compromise can result in loss of control across all contexts.
Trans-contextual value represents a fundamental shift from platform-centric to user-centric data economics. By enabling value to flow across contexts while preserving cryptographic integrity and control authority, KERI-based systems create the infrastructure for cooperative network effects that benefit data subjects rather than extracting value from them.
The concept challenges the assumption that value creation requires centralized platforms or intermediaries. Instead, it demonstrates that cryptographic verifiability can enable direct value exchange between contexts, with controllers maintaining authority over how their data creates and captures value.
For organizations and developers, trans-contextual value suggests focusing on creating value that can be leveraged across multiple contexts rather than trying to capture users within a single context. This aligns with the broader shift toward decentralized identity and verifiable credentials as foundational infrastructure for the digital economy.