top of page

The Trust Utility Doctrine

  • Writer: Ott Sarv
    Ott Sarv
  • 6 days ago
  • 3 min read

Layered digital infrastructure diagram illustrating the EUDI Wallet as a trust utility and governed data exchange layer.
In the EUDI Wallet era, acceptance governance is infrastructure, not an application feature.


Why the EUDI Wallet Must Be Governed as Infrastructure

Europe is building more than a digital wallet. Under the EUDI Wallet framework, Member States are required to deploy interoperable identity wallets capable of carrying verifiable attributes across borders. What appears at first glance to be a user-controlled container is, in practice, an acceptance and verification layer that will determine how businesses prove existence, representation, mandates, and compliance in real time.


The question is not whether the technology works. The question is how the economic and governance model is designed.


If treated as a software product, the wallet becomes another platform. If treated as a trust utility, it becomes part of Europe’s digital public infrastructure.

The distinction will determine whether digital identity reduces friction or recreates it in machine form.


The Doctrine in One Sentence

A business wallet ecosystem should be governed and funded as a Trust Utility: a lawful, purpose-bound data exchange capability that produces verifiable reliance outcomes with enforceable accountability, without converting trust into a priced toll per transaction.


Why This Is a Data Exchange Layer

In functional terms, the business wallet is not primarily storage. It is a governed exchange mechanism.


It enables:

  • Issuance of qualified electronic attestations of attributes under the EUDI Wallet

  • Presentation of those attestations

  • Verification by registered relying parties

  • Real-time status evaluation

  • Evidence-grade logging


This makes it closer to a controlled data exchange framework than to a consumer application. Interoperability does not grant entitlement. It creates capability.

The acceptance layer (not the wallet app) is where economic power concentrates.


The Economic Risk: Priced Trust Transactions

When trust becomes machine-verifiable, pricing tends to migrate toward the verification event itself. That is the most dangerous design choice.


If every verification under the EUDI Wallet is priced like notarisation, the system recreates document-era friction under a digital label. SMEs suppress usage. Large institutions internalise cost. Fragmentation returns.


The Trust Utility Doctrine therefore establishes a red line:

Trust must not be rationed through material per-verification tolling.

Charging is legitimate only where outcomes are attributable, auditable, and reversible under enforceable rules.

Mandate Gating Is the Constitution

Under the rules governing wallet relying party registration, relying parties must be identifiable and accountable. This is not a procedural detail. It is the beginning of a constitutional layer.


Mandate gating ensures that:

  • Disclosure is tied to lawful purpose

  • Competence boundaries are respected

  • Minimum necessary data is enforced

  • Request behaviour is reviewable


Without mandate gating, interoperability turns into entitlement.With mandate gating, interoperability becomes lawful capability.


Evidence and Remedy Are Infrastructure

A Trust Utility must survive dispute.


That requires:

  • Evidence-grade receipts

  • Time-stamped verification traces

  • Correction propagation when authoritative records change

  • Suspension and reversal mechanisms


If complaints cannot change outcomes, governance is decorative.

In the context of European Digital Identity, wallet ecosystems must be inspectable, not merely secure.


Sustainability Without Extraction

A financially sustainable business wallet provider under the EUDI Wallet model should anchor revenue in predictable participation, not transaction tolling.

Revenue Anchor

Why It Aligns With the Doctrine

Relying party subscription tiers

Funds acceptance governance without pricing frequency

Enterprise issuance subscriptions

Supports lifecycle management under short validity models

SLA tiers

Monetises reliability, not raw trust events

Premium compliance tooling

Funds high-liability use cases without distorting baseline access

This mirrors how neutral infrastructure layers operate: clearinghouses, payment networks, and regulated exchanges are funded through institutional participation, not punitive marginal tolling.


The Sovereignty Dimension

Digital sovereignty is not about server geography. It is about enforceability.


A Trust Utility must allow:

  • Compellable inspection

  • Operable suspension

  • Lawful correction

  • Transparent authority attribution


Without these, reliance becomes dependent on platform discretion rather than lawful authority.


The Sustainability Test

A business wallet ecosystem qualifies as a Trust Utility only if it satisfies three conditions:

Test

Pass Condition

Legitimacy

Every reliance outcome is traceable to lawful authority

Contestability

Evidence exists to challenge and correct outcomes

Sustainability

Governance and resilience are funded without suppressing adoption

The Editorial Bottom Line

The EUDI Wallet can either become Europe’s next friction-reduction infrastructure or the next layer of monetised intermediation.


If treated as an app, it will optimise features and pricing experiments.If treated as a Trust Utility (a governed data exchange layer) it can reduce repeated proof, accelerate cross-border enterprise, and remain financially stable without extracting value from each act of reliance.


The future of business wallets will not be decided by cryptography. It will be decided by economic design aligned with governance integrity.

Meet the author of the Seven Layer Model for Digital Public Infrastructure

Ott Sarv

  • LinkedIn
Ott Sarv The Seven Layer Model Author

author of the Seven Layer Model for Digital Public Infrastructure

Senior advisor in Digital Identity and Digital Public Infrastructure. Ott Sarv helps institutions align lawful authority, institutional mandate, canonical records, and machine-readable rules with verifiable execution, enabling enforceable outcomes. Engagements combine policy, architecture, and delivery support.

Download the Seven Layer Model for DPI

This paper is shared with practitioners and researchers working on digital public infrastructure and digital identity.


Submit your details to receive the PDF access link.

bottom of page