Architecture Deep Dive

How Praman Works

Three-Layer Source-Record Architecture

The Architectural Insight

The paper certificate a student holds is a COPY. The source of truth is the university's own examination registers — the physical ledgers, result sheets, and convocation records in the Controller of Examinations' office.

Praman digitizes the source, not the copy.

LAYER 01

Bulk Record Migration

University examination registers are digitized from the source — not from student-submitted paper certificates.

1

Deploy Team

Trained data-entry team on campus

2

Capture Data

Roll no, marks, result from registers

3

CoE Signs

Controller of Examinations reviews & signs

4

Registrar Signs

Counter-signature as second authority

5

On-Chain

Committed as W3C Verifiable Credentials

Why Multi-Signature Matters

Two university officers must sign every batch of records. The Controller of Examinations and the Registrar act as independent authorities. One person cannot unilaterally fake records — collusion between two designated officers is required, creating a structural barrier to fraud.

LAYER 02

Student Claim & Identity Binding

Students don't submit certificates. They claim credentials that already exist on-chain from the university's own records.

A

Identity Verification

Student provides their roll number, examination year, and completes Aadhaar eKYC to prove identity.

B

Record Matching

System matches the student’s claim against the digitized source records already committed on-chain by the university.

C

Credential Binding

The Verifiable Credential is bound to the student’s Decentralized Identifier (DID) and issued to their digital wallet.

D

Claim Fee

Student pays Rs. 150 — a one-time fee for a portable, reusable, cryptographically verifiable credential.

“The student never submits a paper certificate.There is nothing TO fake.”

LAYER 03

Assurance Levels

Not all source records are equally complete. Praman encodes this reality as machine-readable assurance levels that enable automated acceptance policies.

Level 3High

Condition

Source register exists, record found, dual-signed by CoE + Registrar

Action

Accept for direct appointment

Level 2Medium

Condition

Source register exists but has gaps (missing pages, illegible entries)

Action

Conditional appointment, pending physical verification

Level 1Low

Condition

Source register MISSING from university archives

Action

Treated as unverified; cannot be confirmed or denied

Assurance levels are embedded in the Verifiable Credential metadata, enabling employers like BPSC to automate acceptance and escalation policies.

EBSI Trust Model

Trust Chain

Bihar's institutional hierarchy mapped to the European Blockchain Services Infrastructure trust model.

Root TAOBihar Education Department

Root Trust Anchor — authorizes universities to issue

TAOUniversity Registrar

Trust Anchor — approves and counter-signs credential batches

Trusted IssuerController of Examinations

Issues credentials from source examination registers

VerifierBPSC / Employers

Queries the trust registry and verifies credentials via API

HolderStudent / Graduate

Claims and holds verifiable credentials in a digital wallet

Under the Hood

Technical Foundation

Every design decision traces to a published specification.

Hyperledger Fabric 2.x

Permissioned blockchain with institutional governance

Go Chaincode

Smart contracts for credential lifecycle management

W3C VC v2.0 + JSON-LD

Interoperable, standards-compliant credential format

Five On-Chain Registries

Identity, trusted issuers, schemas, verifiers, and credential status — each maintained independently for auditability

Ready to See Praman in Action?

Whether you represent a university, a state education department, or an employer — we'd welcome the conversation.