Counterparty Enrollment
SETUP
Each enrollment generates a 256-bit secret as an HSM stand-in.
Document Issuance
ISSUE
Document hash is bound to canonical content. Each verifier independently re-derives expected addresses + values.
Consensus Configuration
PROTOCOL
Stricter modes reject more aggressively; more lenient modes tolerate transient verifier outages.
Verification
VERIFY
All active verifiers re-derive the expected addresses & values independently from the counterparty secret & doc hash.
Targeted = adversarial AI optimised to fool one specific verifier. AI cross-fool = attempts to fool all verifiers (much harder). Tamper = changes document content.
VERIFIER A
Pipeline-CV
awaiting
Classical computer-vision pipeline · deterministic feature extraction · rule-based matching
Match score
score —
accept ≥ 85%
VERIFIER B
Neural-Transformer
awaiting
Attention-based feature classifier · learned decision boundary · pattern-driven
Match score
score —
accept ≥ 90%
VERIFIER C
Signal-Processing
awaiting
Frequency-domain analyser · wavelet decomposition · spectral fingerprint
Match score
score —
accept ≥ 80%
Binôme consensus
awaiting
Issue a document and run cooperative verification.
0 / 0 vote
accept · 0
reject · 0