Originary Receipts: cryptographic proof for every AI interaction
Originary generates tamper-evident proofs of policy, consent, attribution, and payment events. Audit usage, resolve disputes, and demonstrate compliance with cryptographic certainty.
What receipts provide
Cryptographic evidence for every interaction, verifiable against published public keys.
Cryptographically Signed
JWS payloads with Ed25519 signatures. Tamper-evident by design.
Policy Binding
Each receipt binds to a specific policy version via SHA-256 hash.
Offline Verification
Verify against published JWKS endpoints. No API call required.
Timestamped
Precise iat/exp claims establish when interactions occurred.
Payment Evidence
Transaction references and payment rail details included.
Audit Ready
Export logs in standard formats for internal review.
Receipt anatomy
Each PEAC-Receipt is a signed JWS payload containing interaction metadata, policy bindings, and optional payment evidence.
{
"header": {
"alg": "EdDSA",
"typ": "peac-receipt+jwt",
"kid": "originary-2025-01"
},
"payload": {
"iss": "https://originary.xyz",
"iat": 1734048000,
"jti": "rcpt_7f92ab31",
"peac": {
"version": "0.9.16",
"resource": "/api/content",
"policy_hash": "sha256:9f3c..."
},
"payment": {
"rail": "x402",
"amount": "0.10"
}
},
"signature": "base64url..."
}Built for real workflows
From internal audits to dispute resolution, receipts provide the evidence trail you need.
Internal Audits
Detailed records of AI interactions for governance and risk management.
Content Licensing
Verify content was accessed according to licensing terms.
Dispute Resolution
Cryptographic evidence when disputes arise about terms.
Usage Analytics
Track AI access patterns with verifiable records.
Payment Reconciliation
Match payments to specific API interactions.
Policy Compliance
Demonstrate interactions occurred under specific policies.
Verification in 3 steps
Verify any receipt against published keys, no API required.
Extract header
Parse the JWS header to get the key ID (kid)
Fetch public key
Retrieve the key from /.well-known/jwks.json
Verify signature
Validate Ed25519 signature against payload
PEAC-Receipts provide cryptographic evidence of interactions and policy snapshots. How this evidence is interpreted in legal or regulatory contexts depends on jurisdiction and specific circumstances. Consult legal counsel for compliance guidance.
Ready to add Originary Receipts?
Start generating cryptographic proofs for every AI interaction with Originary.