A Claim Schema is a formal data model that defines the structure, data types, and validation rules for a specific type of verifiable claim or credential. It acts as a blueprint, ensuring all claims of that type contain the same required fields (e.g., issuanceDate, credentialSubject.id) and adhere to a consistent format. This standardization is critical for interoperability, allowing different systems—issuers, verifiers, and holders—to understand and process claims without prior negotiation. Common formats for defining schemas include JSON Schema and W3C Verifiable Credentials Data Model conventions.
Claim Schema
What is a Claim Schema?
A Claim Schema is a formal data model that defines the structure and validation rules for a specific type of verifiable claim or credential.
In practice, a schema is referenced by its unique identifier, often a Decentralized Identifier (DID) or a URI, within the verifiable credential itself. This allows a verifier to fetch the schema definition to validate the credential's structure and semantic meaning. For example, a "University Degree" schema would mandate fields for degreeName, awardingInstitution, and dateOfAward. By checking a credential against its declared schema, a verifier can programmatically confirm it contains all necessary information in the expected format before trusting its content.
The use of schemas decouples the trust in the data's structure from the trust in the issuer's signature. Even if a credential is cryptographically signed by a trusted entity, an invalid structure could indicate tampering or error. Schemas also enable the creation of selective disclosure proofs, where a holder can prove specific attributes (like being over 18) conforming to a known schema without revealing the entire credential. This makes schemas foundational for privacy-preserving, machine-verifiable interactions in decentralized identity systems like OpenID for Verifiable Credentials (OIDC4VC) and W3C Verifiable Credentials.
Beyond core identity, claim schemas are instrumental in token-gating, reputation systems, and on-chain attestations. A decentralized application (dApp) can define a schema for a "Proof of Humanity" or "DAO Membership" credential. Other smart contracts or platforms can then reliably check for credentials conforming to that specific schema to grant access or rights. This creates a reusable, composable layer of attested data across the Web3 ecosystem, moving beyond simple token holdings to rich, semantically understood qualifications.
How a Claim Schema Works
A claim schema is the formal blueprint that defines the structure, data types, and validation rules for a verifiable credential, ensuring interoperability and machine-readability.
A claim schema is a formal specification that defines the structure and constraints for a verifiable credential. It acts as a shared contract between an issuer and a verifier, specifying the exact data fields (e.g., degreeType, issuingDate, GPA), their data types (string, integer, boolean), and any validation rules (e.g., date format, value ranges). This standardization is critical for interoperability, allowing different systems to understand and process credentials without prior coordination. Schemas are typically published to a decentralized registry or a blockchain, where they are referenced by a unique schema identifier (like a DID or a hash) within the credential's metadata.
The core function of a schema is data integrity and validation. When an issuer creates a credential, they bind its data to the published schema. Verifiers can then fetch the schema using its identifier to validate that the credential's structure matches the expected format and that all required fields are present and correctly typed. This process prevents malformed or tampered data from being accepted. For example, a ProofOfAge schema might define a single birthDate field as an ISO 8601 date string, ensuring any credential claiming to conform to it presents the data in a universally parsable format.
Technically, claim schemas are often implemented using JSON-based formats like JSON Schema or W3C's JSON-LD contexts. A schema document includes properties like $schema, title, description, and a properties object detailing each field. Advanced schemas can define conditional logic, required fields, and custom vocabularies. In blockchain-based systems like those using Indy's AnonCreds or Verifiable Credentials Data Model, the schema's identifier is anchored on-chain, providing a tamper-evident record of its original structure, which is essential for long-term verification and audit trails.
Beyond basic structure, schemas enable selective disclosure and privacy-preserving proofs. Zero-knowledge proof systems can use the schema to understand the data model, allowing a holder to prove statements about their credentials (e.g., 'age > 21') without revealing the underlying data. The schema defines what attributes exist so the cryptographic proof can be constructed correctly. This makes schemas foundational not just for data exchange, but for advanced identity and access management protocols where minimizing data exposure is paramount.
In practice, developing a claim schema requires careful design to balance specificity with flexibility. A well-designed schema is reusable across multiple issuers for the same type of claim (e.g., a standard employee ID schema), fostering ecosystem growth. Governance models often emerge around popular schemas to manage updates and versions. The lifecycle of a schema—from creation and publication to possible deprecation—is a key consideration in building sustainable, trustless credential ecosystems where data format and meaning are persistently clear.
Key Features of a Claim Schema
A Claim Schema is a formal specification that defines the structure, validation rules, and semantics of a verifiable credential or attestation. It acts as a blueprint for creating and interpreting claims.
Structured Data Fields
The schema defines the precise key-value pairs that constitute a claim. This includes:
- Subject Identifier: The entity the claim is about (e.g., a wallet address, DID).
- Issuer Identifier: The authority making the claim.
- Claim Properties: The specific attributes being attested (e.g.,
isKYCVerified: true,membershipTier: "gold"). - Metadata: Timestamps, schema version, and context URIs.
Data Type & Validation Rules
It enforces data integrity by specifying the expected data type (string, integer, boolean) and validation constraints for each field. For example:
- A
birthDatefield must be an ISO 8601 date string. - A
scorefield must be an integer between 0 and 1000. - A
countryCodefield must be a valid ISO 3166-1 alpha-2 code. This ensures all claims conforming to the schema are machine-readable and interoperable.
Semantic Context (JSON-LD)
Often implemented using JSON-LD (Linked Data), the schema links its fields to globally unique URIs that define their meaning. This prevents ambiguity. For instance, the property address could be linked to https://schema.org/address instead of a proprietary definition. This creates a verifiable data graph where terms have shared, unambiguous meanings across different systems.
Versioning & Immutability
Schemas are versioned (e.g., MyCredentialV1.0.0) and typically stored on-chain or in content-addressable storage (like IPFS) to ensure immutability and non-repudiation. Once published, the schema's hash (e.g., a schemaId) becomes its permanent identifier. Applications can trust that a claim referencing a specific schemaId conforms to a known, unchangeable structure.
Interoperability Standard
By adhering to common schema formats like W3C Verifiable Credentials or EIP-712 for typed signing, claim schemas enable cross-platform interoperability. A credential issued by one organization (e.g., a DAO membership card) can be understood and verified by any application that recognizes the schema, breaking down data silos.
Example: Proof of Personhood Schema
A real-world schema for a Proof of Personhood attestation might define:
json{ "@context": ["https://www.w3.org/2018/credentials/v1"], "type": ["VerifiableCredential", "ProofOfPersonhoodCredential"], "credentialSubject": { "id": "did:ethr:0x...", "isUniqueHuman": true, "verificationProtocol": "Worldcoin Orb", "verificationDate": "2023-10-05T12:00:00Z" } }
The schema ensures every credential has these exact fields with proper types.
Technical Details & Implementation
A claim schema is the formal structure defining the data model for a verifiable credential or attestation on-chain.
A claim schema is a standardized data template that defines the structure, data types, and constraints for the information contained within a verifiable credential or on-chain attestation. It acts as a blueprint, specifying the permissible fields (e.g., issuanceDate, credentialSubject.id, credentialSubject.degree.type) and their expected formats (e.g., string, integer, boolean). By enforcing a common schema, systems can reliably parse, validate, and interoperate with claims issued by different entities, ensuring semantic consistency across decentralized applications.
In practice, a schema is often implemented as a JSON Schema or a similar declarative language, which is then referenced by a unique identifier, such as a schema ID or DID. This ID is typically stored immutably on a blockchain or a decentralized storage network like IPFS. When a claim is issued, it includes a reference to its schema ID, allowing any verifier to fetch the schema definition and validate the claim's structure and data integrity independently, without relying on the issuer.
The technical implementation involves several key components: the schema registry (a smart contract or database storing schema definitions), the schema author (the entity defining the schema), and the schema resolver (a service that fetches a schema given its ID). For example, in the Verifiable Credentials Data Model, the credentialSchema property points to the schema file. This decouples the data definition from the issuance process, enabling reuse, versioning, and the creation of complex, composable credential ecosystems where trust is rooted in the verifiable structure of the data itself.
Examples of Claim Schemas
A claim schema defines the structure and validation rules for a verifiable credential. These examples illustrate common patterns used in decentralized identity and on-chain reputation systems.
KYC/AML Attestation
A standardized schema for verifying a user's identity and compliance status, often required for regulated DeFi access. This schema typically includes:
- Fields:
fullName,dateOfBirth,countryOfResidence,kycProvider,kycLevel,expiryDate. - Validators: Checks for issuer signature, expiry, and accredited provider list.
- Use Case: Grants access to permissioned pools or higher transaction limits based on verified identity.
Credit Score Attestation
A portable, user-controlled financial reputation credential. This schema structures off-chain credit data for on-chain use.
- Fields:
creditScore,scoreProvider(e.g., Experian, Equifax),timestamp,riskTier,debtToIncomeRatio. - Validators: Ensures data is recent (e.g., < 30 days old) and signed by a trusted oracle or institution.
- Use Case: Underwriting for undercollateralized lending protocols without exposing raw personal data.
Proof of Humanity / Uniqueness
A schema attesting that a credential holder is a unique human, often used for Sybil resistance in governance or airdrops.
- Fields:
uniqueHumanId,verificationMethod(e.g., video attestation, government ID),verificationDate. - Validators: Confirms the claim is issued by a recognized proof-of-humanity system like Worldcoin or BrightID.
- Use Case: One-person-one-vote DAO governance or fair token distribution.
Professional Accreditation
A verifiable credential for professional licenses, certifications, or guild membership.
- Fields:
accreditationName,issuingAuthority,dateIssued,dateExpires,credentialId. - Validators: Verifies the issuer is the legitimate accrediting body and the credential is not revoked.
- Use Case: Permissioned access for smart contract auditors, legal advisors, or certified developers within a protocol's ecosystem.
Transaction History Attestation
A schema summarizing a wallet's historical on-chain behavior as a reputation proxy.
- Fields:
totalVolume,protocolsUsed,ageOfAccount,successfulRepayments,defaultCount. - Validators: Checks that the attestation is generated and signed by a credible analytics oracle (e.g., Chainscore, Cred Protocol).
- Use Case: Building a DeFi Passport to access tailored financial products based on proven track record.
DAO Membership & Contribution
A claim that verifies an individual's membership and activity level within a Decentralized Autonomous Organization.
- Fields:
daoName,memberSince,role,contributionScore,proposalsVoted. - Validators: Confirms the claim is signed by the DAO's official governance module or designated signer.
- Use Case: Gating access to private channels, weighted voting power, or reward distribution based on participation.
Claim Schema
A Claim Schema is a standardized data structure that defines the format and validation rules for attestations or credentials on-chain. It serves as the foundational blueprint for creating, interpreting, and verifying claims within decentralized identity and reputation systems.
Core Structure & Components
A Claim Schema defines the essential fields and data types for a claim. Key components include:
- Issuer: The decentralized identifier (DID) of the entity making the claim.
- Subject: The DID of the entity the claim is about.
- Credential Type: A unique identifier for the schema (e.g.,
VerifiableCredential). - Claims Data: The specific attributes being attested, structured as key-value pairs.
- Proof: The cryptographic signature or zero-knowledge proof that validates the claim's authenticity and integrity.
Verifiable Credentials (VCs) Standard
Claim Schemas are the backbone of Verifiable Credentials (VCs), a W3C standard for digital credentials. A VC is a tamper-evident credential whose issuer can be cryptographically verified. The schema ensures interoperability by standardizing the credentialSubject object, which contains the actual claim data, allowing any compliant verifier to understand and process the credential without prior agreement with the issuer.
On-Chain vs. Off-Chain Schemas
Schemas can be stored and referenced in different ways:
- On-Chain Schema: The schema's structure (like a JSON Schema) is registered on a blockchain (e.g., Ethereum's EIP-712 for typed data, or a dedicated registry). This provides immutability and global consensus on the data format.
- Off-Chain Schema: The schema is hosted on a traditional web server or decentralized storage (like IPFS). The schema's URI is referenced in the claim, requiring verifiers to fetch it. This offers flexibility but depends on the URI's availability.
Schema Registries & Discovery
To ensure discoverability and prevent duplication, schemas are often published to Schema Registries. These are decentralized directories, often implemented as smart contracts or on IPFS, that map a unique Schema ID (like a hash or a DID) to the full schema definition. Projects like the Verifiable Credentials Data Model rely on such registries so verifiers can resolve a schema URI to understand how to validate a claim's data structure.
Use Case: Decentralized Identity (DID)
In Decentralized Identity (DID) systems, Claim Schemas enable portable, user-controlled credentials. For example, a university can issue a DegreeCredential using a standardized schema. The graduate can then present this VC to an employer, who verifies the schema and the cryptographic proof. This eliminates the need for centralized credential verification services and gives users control over their data.
Use Case: On-Chain Reputation & Access
Schemas are critical for building on-chain reputation systems and gated access. A DAO might define a ContributorCredential schema to attest to a member's work. Smart contracts can then be programmed to read claims conforming to this schema, automatically granting voting power or access to a token-gated channel based on the attested reputation score or role.
Claim Schema vs. Related Concepts
A comparison of the Claim Schema with other common data structures used for representing identity, reputation, and credentials in decentralized systems.
| Feature / Attribute | Claim Schema | Verifiable Credential (W3C) | Soulbound Token (SBT) | On-Chain Reputation Score |
|---|---|---|---|---|
Primary Purpose | Structured attestation of a specific fact or property | Digital, cryptographically verifiable equivalent of a physical credential | Non-transferable token representing identity or affiliation | Aggregated numeric metric derived from on-chain activity |
Data Structure | Flexible key-value pairs with defined schema | Standardized JSON-LD format with proof section | NFT with a | Single numeric value or vector, often in a mapping |
Transferability | Inherently non-transferable; bound to subject | Can be presented by holder, but issuance is bound | Explicitly non-transferable by contract logic | Implicitly non-transferable; score is address-specific |
Standardization | Chainscore-specific schema registry | W3C International Standard | Emerging ERC-721/1155 extension pattern | Protocol or platform-specific calculation |
Proof Mechanism | Off-chain signature by issuer, on-chain verification | Linked Data Proofs (e.g., JWT, JSON-LD signatures) | On-chain mint/burn record and token ownership | On-chain verifiable computation of historical data |
Revocation | Supported via schema-level revocation lists | Supported via status lists or registries | Typically immutable; burn is only revocation | Dynamic; updates with new on-chain activity |
Composability | High; schemas can reference and build upon others | High; credentials can be bundled in presentations | Medium; SBT metadata can reference other data | Low; scores are typically monolithic outputs |
Primary Storage | Optimized for off-chain with on-chain pointers (e.g., IPFS) | Designed for portable, holder-controlled storage | On-chain token contract storage | On-chain state within a scoring contract |
Security & Privacy Considerations
A Claim Schema defines the structure of verifiable credentials on-chain. Its design directly impacts the security of the attestation system and the privacy of the subjects.
Data Minimization Principle
A core privacy-by-design principle dictating that a Claim Schema should request only the minimum necessary data to fulfill its purpose. This reduces the attack surface and privacy risk for the subject. For example, a schema for proof of age should request only a 'date of birth' or an 'isOver18' boolean, not a full government ID number.
Schema Immutability & Versioning
Once deployed, a schema's structure is typically immutable to prevent tampering with the meaning of existing attestations. Security relies on a clear versioning strategy (e.g., deploying a new schema ID for updates) to manage upgrades without invalidating prior claims. Poor versioning can lead to consensus failures among verifiers.
On-Chain Data Exposure
Data stored directly in a public claim on-chain is globally visible. Schemas must be designed to avoid storing sensitive Personally Identifiable Information (PII). Common mitigations include:
- Storing only cryptographic commitments (hashes) of data.
- Using zero-knowledge proofs to validate claims without revealing underlying data.
- Referencing encrypted data stored off-chain.
Schema Spoofing & Authenticity
Verifiers must trust the origin and integrity of a schema definition. Security mechanisms include:
- On-chain registry signatures from a trusted issuer or DAO.
- Schema metadata (like
authoredBy) to establish provenance. - Unique schema identifiers (e.g., a UID or on-chain address) to prevent collision attacks where a malicious actor deploys a similarly-named schema.
Revocation & Expiry Mechanisms
A robust schema design considers the lifecycle of claims. Built-in fields for revocation (e.g., a revocation registry index) and expiry timestamps are critical for security. Without them, compromised or outdated credentials cannot be invalidated, leading to system-wide trust failures.
Selective Disclosure & ZK-SNARKs
Advanced privacy is enabled by schemas designed for selective disclosure. This allows a subject to prove a specific property (e.g., 'age > 21') without revealing the exact data or other fields in the schema. This requires the schema to support zero-knowledge proof circuits (like with zk-SNARKs), where the data structure is optimized for cryptographic proving.
Common Misconceptions
Clarifying frequent misunderstandings about Claim Schemas, the structured data formats used to define and verify on-chain attestations and credentials.
No, a Claim Schema is not a smart contract; it is a data definition standard, while a smart contract is executable code. A schema defines the structure of a verifiable credential or attestation—its fields, data types, and optional constraints—much like a database schema. A smart contract may reference or validate data against a schema, but the schema itself is a non-executable template. For example, in the Ethereum Attestation Service (EAS), schemas are registered on-chain as data records, and separate attestation contracts use those schemas to issue structured claims.
Frequently Asked Questions (FAQ)
A Claim Schema is a standardized data structure that defines the format and validation rules for a claim within a decentralized attestation system. These FAQs cover its core purpose, technical implementation, and practical applications.
A Claim Schema is a formal, machine-readable specification that defines the structure, data types, and validation rules for a specific type of attestation or claim within a decentralized identity or credential system. Its primary purpose is to ensure interoperability and data integrity by providing a shared blueprint that all issuers and verifiers of a particular claim type agree upon. This prevents semantic drift, where the same claim name could mean different things across applications. For example, a "ProofOfAge" schema would precisely define the required fields (e.g., dateOfBirth, issuer, expiryDate), their data formats (e.g., ISO 8601 date), and any constraints (e.g., expiryDate must be in the future). By enforcing this structure, schemas enable trustless verification, as a verifier can cryptographically confirm that a claim's data conforms to the published schema without needing to trust the issuer's interpretation.
Further Reading
Explore the technical specifications, real-world applications, and related standards that define and extend the Claim Schema framework.
Get In Touch
today.
Our experts will offer a free quote and a 30min call to discuss your project.