PEAC-RECEIPTS

Originary Receipts: cryptographic proof for every AI interaction

Originary generates tamper-evident proofs of policy, consent, attribution, and payment events. Audit usage, resolve disputes, and demonstrate compliance with cryptographic certainty.

Ed25519 signaturesJWKS verificationOpen standard
PEAC-Receiptrcpt_7f92ab31
Verified
Resource/api/content
Policysha256:9f3c...c2ab
Payment$0.10 via x402
Timestamp2025-12-13T12:00:00Z

What receipts provide

Cryptographic evidence for every interaction, verifiable against published public keys.

Cryptographically Signed

JWS payloads with Ed25519 signatures. Tamper-evident by design.

Policy Binding

Each receipt binds to a specific policy version via SHA-256 hash.

Offline Verification

Verify against published JWKS endpoints. No API call required.

Timestamped

Precise iat/exp claims establish when interactions occurred.

Payment Evidence

Transaction references and payment rail details included.

Audit Ready

Export logs in standard formats for internal review.

Receipt anatomy

Each PEAC-Receipt is a signed JWS payload containing interaction metadata, policy bindings, and optional payment evidence.

HeaderAlgorithm, type, and key identifier
ClaimsIssuer, subject, audience, timestamps
PEAC payloadVersion, resource, policy hash, AIPREF snapshot
Payment (optional)Rail, amount, currency, transaction reference
receipt.jsonPEAC v0.9.16
{
  "header": {
    "alg": "EdDSA",
    "typ": "peac-receipt+jwt",
    "kid": "originary-2025-01"
  },
  "payload": {
    "iss": "https://originary.xyz",
    "iat": 1734048000,
    "jti": "rcpt_7f92ab31",
    "peac": {
      "version": "0.9.16",
      "resource": "/api/content",
      "policy_hash": "sha256:9f3c..."
    },
    "payment": {
      "rail": "x402",
      "amount": "0.10"
    }
  },
  "signature": "base64url..."
}

Built for real workflows

From internal audits to dispute resolution, receipts provide the evidence trail you need.

Internal Audits

Detailed records of AI interactions for governance and risk management.

Content Licensing

Verify content was accessed according to licensing terms.

Dispute Resolution

Cryptographic evidence when disputes arise about terms.

Usage Analytics

Track AI access patterns with verifiable records.

Payment Reconciliation

Match payments to specific API interactions.

Policy Compliance

Demonstrate interactions occurred under specific policies.

Verification in 3 steps

Verify any receipt against published keys, no API required.

1

Extract header

Parse the JWS header to get the key ID (kid)

2

Fetch public key

Retrieve the key from /.well-known/jwks.json

3

Verify signature

Validate Ed25519 signature against payload

A note on legal interpretation

PEAC-Receipts provide cryptographic evidence of interactions and policy snapshots. How this evidence is interpreted in legal or regulatory contexts depends on jurisdiction and specific circumstances. Consult legal counsel for compliance guidance.

Ready to add Originary Receipts?

Start generating cryptographic proofs for every AI interaction with Originary.