Anonyome’s Mobile Wallet SDK Secures Mobile Credentials with Hardware Security Modules

We’ve updated our market-leading decentralized identity (DI) mobile wallet SDK to secure mobile credentials with hardware security modules (HSMs), as required under European Union Digital Identity (EUDI) regulations.

As a refresher, our mobile wallet SDK lets our customers easily integrate DI and verifiable credential (or reusable credential) solutions into their applications. It is a native SDK for both iOS and Android and notably does not rely on any third-party frameworks such as JavaScript frameworks.

Our 3.0 release of the mobile wallet SDK primarily brought in European Union Digital Identity (EUDI)-aligned standards, such as OpenID4VC (OpenID4VCI and OpenID4VP) and IETF SD-JWT VCs. Our 3.1 release bundled in new support for resolving three DID methods that are gaining mass adoption: cheqdWeb, and JWK. And now our 3.2 release takes this a step further, allowing our SDK consumers to use HSMs, such as those built into modern mobile phones, for securing verifiable credentials (VCs) as required by EUDI regulations.

EUDI requires mobile wallets to secure credentials with HSMs

The cryptographic keys that a user owns can bind the VCs stored in the DI wallet to the user (commonly called holder or device binding). The presentation of the VCs is secured by a cryptographically verifiable signature that the same key bound to the VCs produces. This mechanism gives verifiers certainty that only the key holder can present the VCs.

Obviously then, it is critical to protect the cryptographic keys and so the EUDI has pushed for highly sensitive VCs (such as government IDs) to be secured by keys managed by an adequate HSM rather than mechanisms such as “software keys”, where in-app software manages the keys but lacks the same security assurances.

Version 3.2 of Anonyome Labs’ mobile wallet SDK makes it simple to secure credentials with HSMs

We have updated our SDK so that the keys used to bind the W3C VCDM and IETF SD-JWT VCs that it receives can now be easily configured to use the embedded HSM on the mobile device running the wallet.

Using either Android Strongbox or iOS SecureEnclave, the HSMs supported in the EUDIW ARF documentation, our SDK isolates the cryptographic keys from the rest of the device and makes them non-exportable. In this way, we achieve the high level of security the EUDI regulations now demand.

In other news, we’ve also designed the SDK so that consumers can “BYO cryptography provider”. This is particularly exciting because it allows consumers to develop custom cryptography providers to fit their use cases. For instance, remote cloud-based HSMs are a popular option in EUDI developments, and “local external” HSMs, such as the YubiKey, offer exciting opportunities that we’ve also been experimenting with and we’ll make an announcement about soon!

Talk to us today 

Suggested articles:

Day of Action for Stalking Awareness

January 18th marks the National Day of Action for Stalking Awareness, a pivotal moment to shine a light on the often-overlooked issue of stalking.  On…

What’s a “State Endorsed Digital Identity” and Why is Utah Creating One?

Trusting Digital Identity The modern web provides users with instantaneous access to information and a wide range of digital capabilities never before seen in the…

DVAM 2025: MySudo discount for survivors of domestic violence

October is National Domestic Violence Awareness Month (DVAM), an annual event dedicated to shedding light on the devastating impact of domestic violence and advocating for…