How ASU's Trusted Learner Network and ASU Pocket put privacy first

In a world that is filled with increasingly more artificial intelligence (AI)-generated generic resumes and data breaches, ensuring data privacy and security is paramount. Arizona State University's Trusted Learner Network (TLN) and ASU Pocket are at the forefront of this evolution, incorporating verifiable digital credentials and self-sovereign identity (SSI) to give learners and earners full control over their personal data.

We recently spoke with Marianna Milkis, Group Product Manager, Credentialing at ASU’s Enterprise Technology, to learn more about how they do it and why cross-device compatibility and data localization matter more than ever.

Cross-device compatibility: Bridging the gap

TLN and ASU Pocket have built a seamless ecosystem that prioritizes cross-device functionality: while TLN operates as a web-based application for issuing credentials, ASU Pocket serves as an edge-only digital wallet. Most credential issuers currently rely on traditional web-based methods to send credentials to users.

The challenge: Milkis explained that the process works well today but introduces complexities when we consider SSI principles. The standard method of sending a credential link via email — although functional — reintroduces a layer of identity mediation that SSI aims to eliminate because your email provider, like Google or Yahoo!, essentially owns your identity and data. Text-based credential delivery has been explored as a more secure alternative, but adoption is limited.

A secure, future-ready solution: To truly achieve portability and self-sovereignty, ASU’s approach emphasizes device-based data handling. When a user selects a credential in the TLN to send to ASU Pocket, the system generates a secure QR code on the computer screen. Users then scan this QR code on their phone, ensuring that their data transfers directly from ASU’s database to their personal device. No data lives on third-party servers, reinforcing the ideal of true data ownership, said Milkis.

“Unlike many existing digital wallets, Pocket is designed to operate exclusively on your device, which is secured through biometric authentication and encryption,” she continued. “This model eliminates server-side data storage, crucial for implementing self-sovereign identity and data agency.”

Why data localization matters

The key principle driving this innovation is the concept of true ownership. For data to be genuinely private, it must live only on the user’s device. Traditional methods involving intermediaries, like email providers, introduce potential vulnerabilities. Even if minimal, these risks go against self-sovereign identity, which is defined by giving the user full control over their personal data and accounts. “True ownership is you holding your data,” said Milkis. “To do that, we need to remove servers from the equation.”

Milkis went on to explain that by leveraging a direct device-to-device transfer protocol and eliminating mediators, TLN and ASU Pocket pave the way for a future where users have unparalleled control over their credentials. It’s not just about convenience — it's about empowering individuals with true data agency.

As digital credentials become more ingrained in our academic, professional and personal lives, ASU's Trusted Learner Network and ASU Pocket are setting a new standard for security and privacy. “By prioritizing cross-device compatibility and ensuring data remains securely localized, we are building a foundation for a more private, self-sovereign digital future,” said Milkis.

Stay tuned as we continue to explore these advances and what they mean for the future of secure, user-owned digital credentials.