Technical Whitepaper — Version 2.0

The Universal Verification Layer for Records, Credentials, and Asset Attestations

By Carson Seeger & Sarah Rushton · March 2026

1. The Attestation Challenge

1.1 Rising audit costs and compliance pressure

Audit costs and expectations keep rising while evidence remains hard to trust across systems and borders. Public-company audit fees increased 6.4% in 2023 to an average of about $3.01 million per enterprise, and the new Global Internal Audit Standards became effective for quality assessments on January 9, 2025. Regulations including Sarbanes-Oxley (SOX), ESIGN, UETA, and eIDAS are raising the bar for retention, tamper evidence, and cross-border compatibility.

1.2 Verification gaps persist

Verification gaps show up in multiple markets. In healthcare, Operation Nightingale uncovered over 7,600 fraudulent nursing diplomas that were used to obtain professional licenses across 47+ states. In hiring, surveys indicate a majority of American workers have misrepresented something on a resume. In government benefits, Minnesota investigations revealed billions in allegedly stolen taxpayer funds. These failures share a common root: verification processes that rely on the issuer's cooperation rather than independent mathematical proof.

1.3 Technology solutions are emerging, but slowly

The root problem is the absence of a neutral, portable proof layer for records and their lifecycle events. Conventional audit trails live inside vendor-controlled systems, forcing third parties to trust operator access controls and change management. As assets and attestations migrate on-chain, investors and regulators will expect independently checkable proofs of holdings and lifecycle events, not screenshots or PDFs.

1.4 The agent trust gap

AI agents are rapidly becoming the primary interface between people, institutions, and records. As these agents retrieve, present, and act on documents — credentials, contracts, licenses, certificates — a fundamental trust gap has emerged: there is no standardized way to verify that a record an agent presents is authentic, unaltered, and issued by the claimed source.

When an AI agent takes an autonomous action — signing a contract, filing a regulatory report, making a hiring recommendation — the only evidence is a log entry in whatever system the agent runs on. That log is mutable, controlled by the agent's operator, and provides no independent verification.

2. The Solution

Arkova provides the universal verification layer that has been missing. By anchoring compliance-aligned event metadata to a neutral public ledger while leaving sensitive content in existing systems, any counterparty can validate that a specific item existed, was signed, or was updated at a given time, and whether it remains active or has been revoked or superseded.

Arkova's initial deployment focus is credential verification — one of the most universal and immediately measurable verification problems. By solving credential verification first, Arkova establishes the infrastructure needed for lifecycle tracking, independent verification, and compliance-aligned evidence before expanding to legal documents, asset attestations, and audit artifacts.

3. Platform Overview

Arkova is middleware that adds provable integrity to documents, signatures, credentials, and real-world asset attestations. Evidence becomes portable, tamper-evident, and easy to share. Your files stay where they are. Arkova supplies the independent proof layer.

3.1 What users do

  • Upload or register a record from existing systems such as SharePoint, Google Drive, or Amazon S3.
  • Sign or co-sign as usual with your preferred e-signature tool.
  • Attest to facts such as a credential's validity or an inventory snapshot.
  • Share a verification link with counterparties for sampling, diligence, or onboarding.
  • Update lifecycle status when needed — revoke, supersede, or renew.
  • Verify any shared record in seconds with a simple check rather than a back-and-forth.

3.2 What users get

  • A tamper-evident timeline of lifecycle events for each record that is independently verifiable.
  • Clear status semantics that survive system changes: active, revoked, superseded, and expired.
  • A public verification page that counterparties can check without trusting a vendor — no account required.
  • Proofs that travel across borders and between organizations, reducing manual reconciliation.
  • Downloadable PDF proof certificates with complete audit trails for compliance and legal use.

3.3 What Arkova is not

  • Not a token or trading product. Arkova never issues tokens and does not monetize customer data.
  • Not a data-custody platform. Sensitive documents remain in your storage and e-signature tools.
  • Not a rip and replace. Arkova integrates with current workflows and systems as middleware.
  • Not legal counsel or an external auditor. Proofs are designed to support, not replace, those functions.

4. Technical Architecture

Arkova adds a portable proof layer to the systems you already use. Record content remains in the customer's existing systems or on user devices, and Arkova receives only cryptographic fingerprints and structured metadata required for verification. This boundary is a core architectural principle designed to minimize regulatory exposure, storage risk, and data-residency obligations.

4.1 At a glance

Hash and timestamp events — When a record is created, signed, amended, revoked, or attested, Arkova generates a cryptographic fingerprint (SHA-256) of the payload and timestamps the event. Fingerprinting runs entirely in the user's browser using the Web Crypto API — the document never leaves the user's device.

Anchor the proof to Bitcoin — A compact commitment containing the fingerprint and event data is written to Bitcoin via OP_RETURN transaction with the ARKV protocol prefix. This creates a public, tamper-evident reference that any counterparty can look up.

Keep documents in existing storage — Files remain in your DMS, e-signature tool, student information system, or inventory platform. Arkova stores only minimal metadata needed for verification.

Provide a public verification page — Each record gets a shareable link and QR code. A counterparty can validate integrity and timing, view the lifecycle timeline, and see the current state — no account required.

4.2 What Arkova records for each event

  • Fingerprint of the file, credential, or asset snapshot (SHA-256, 64 hex characters)
  • Event type and version pointer (create, sign, amend, revoke, attest, transfer, renew)
  • Event time and anchoring transaction reference
  • Issuer or organization identifier and optional jurisdiction tag
  • Credential type, metadata fields, and lineage tracking

4.3 How verification works

  • The verifier opens the shared link, scans the QR code, or calls the Verification API.
  • Arkova recomputes the fingerprint or checks the declared identifier.
  • The fingerprint and event details are compared against the Bitcoin anchor via the chain index (O(1) lookup).
  • The page returns a clear result with the timeline and current status, along with the public transaction reference.

4.4 Status and version handling

Events are chained, not overwritten. New versions create new entries that point to prior ones. Revocations and supersessions are explicit and visible. Status values include: ACTIVE, REVOKED, SUPERSEDED, and EXPIRED.

5. Verification API

The Verification API transforms Arkova from a credential product into verification infrastructure. An agent, ATS platform, background check provider, or compliance system can call the API and receive a machine-readable, independently verifiable response — no browser, no login, no human in the loop.

5.1 Core endpoints

Single verification: GET /api/v1/verify/:publicId

Batch verification: POST /api/v1/verify/batch — up to 100 credentials per request.

Usage tracking: GET /api/v1/usage

5.2 Frozen response schema

The API response schema is frozen once published. No field removals, type changes, or semantic changes without a new version prefix and 12-month deprecation notice.

{
  "verified": true,
  "status": "ACTIVE",
  "issuer_name": "University of Michigan",
  "credential_type": "DEGREE",
  "issued_date": "2025-05-15",
  "anchor_timestamp": "2025-05-16T09:12:44Z",
  "network_receipt_id": "b8e381df09ca404e...",
  "record_uri": "https://app.arkova.io/verify/ARK-2025-00091"
}

5.3 Rate limits

TierLimit
Anonymous100 req/min per IP
API key1,000 req/min per key
Batch endpoints10 req/min per key
EnterpriseCustom

6. Agentic Verification Layer

As AI agents become participants in credentialing, hiring, and compliance workflows, the records they rely on need to be machine-verifiable, tamper-proof, and independently auditable.

6.1 Agent-native tools

Arkova exposes a remote Model Context Protocol (MCP) server that AI agents — Claude, GPT, custom agents — can call as native tools: verify_credential and search_credentials.

6.2 Agent-to-agent trust

Agent A presents a verified record to Agent B. Arkova's anchor provides the shared trust layer without a central intermediary. Both agents can independently verify the record against the public ledger.

6.3 Audit trail for AI decisions

Every verification call is logged with timestamp, querying agent ID, and result — creating a defensible audit trail for regulated industries.

7. AI-Powered Intelligence

Arkova's AI features enhance the user experience without blocking core verification. All AI features have manual fallback.

7.1 Smart extraction in progress

AI-powered metadata extraction identifies credential types, issuers, dates, and key fields from PII-stripped metadata. Documents are processed entirely on the user's device — only PII-stripped structured metadata flows to the server. The provider abstraction layer supports hot-swappable AI backends.

7.2 Semantic search in progress

pgvector-powered semantic search enables natural language queries across the credential database. The embedding schema and infrastructure are deployed.

7.3 Anomaly detection in progress

AI-powered analysis flags inconsistencies — date logic violations, issuer mismatches, field inconsistencies — and generates integrity scores per credential. Never makes definitive fraud claims — scores and flags only.

8. Globally Accepted Compliance

Arkova supports compliance by supplying independently verifiable evidence of integrity, timing, and lifecycle state. We do not provide legal advice.

FrameworkRequirementWhat Arkova Provides
SOX / PCAOBTamper-resistant format retentionBitcoin-anchored audit trails, immutable event timelines
ESIGN / UETAElectronic signature legal parityLifecycle tracking for signed documents, cross-vendor evidence
eIDAS / eIDAS 2Qualified trust servicesJurisdiction-aware metadata, timestamped proofs portable across borders
FERPAStudent education records privacyClient-side processing — documents never leave the device
EU AI ActTraceability for high-risk AIAudit trail for every AI-assisted verification decision

9. Use Cases

9.1 Cross-border credential verification

With Arkova, the issuer registers each credential event as compliance-aligned metadata. The public verification page exposes a tamper-evident timeline. Employers and regulators validate the claim without accessing the issuer's internal systems, and the proof survives vendor changes.

9.2 Legal documents and e-signature chain of custody

Each create, sign, amend, and revoke event receives an anchor and a human-readable timeline. Opposing counsel, clients, and courts can see the version lineage and confirm that the artifact matches a recorded fingerprint at a point in time.

9.3 Real-world asset attestations

Producers and custodians attest to inventory snapshots and transfers as event proofs. Each lot or asset gains a verifiable history that shows where and when custody changed and whether the current status matches stated holdings.

9.4 Audit evidence portability for SOX and ICFR

Teams register key evidence as verifiable events that are independent of any single vendor. Auditors use a stable verification page for sampling and exception review.

9.5 Government records modernization

Agency-issued credentials are fingerprinted in the recipient's browser (FERPA-compliant), anchored with a timestamp, and shareable via verification link and QR code. Any employer, agency, or member of the public can verify authenticity in seconds, independently.

10. Business Model

Arkova is delivered as a subscription platform with tiered plans aligned to organizational scale and deployment scope. The subscription includes the core verification service, verification pages, reporting, APIs, and standard support. Arkova never issues tokens and does not monetize customer data.

11. Competitive Landscape

CompanyVerticalHow Arkova is Differentiated
WorkivaAudit & GRCPublic, portable proofs that counterparties can verify without Workiva; event lifecycles survive vendor changes
SAP GRCAudit & GRCNeutral, ledger-anchored verification across SAP and non-SAP systems
DocuSignE-signatureCross-vendor signature evidence layer — verify without trusting a single e-sign tool
InterfolioAcademicNeutral proof layer so employers and regulators can verify independently
SimpleProofTimestampingAdds lifecycle semantics, revocation/supersession, and unified reporting

12. Risks and Mitigation

RiskWhy It MattersMitigation
Compliance interpretationStandards vary by jurisdictionShared-responsibility model; claims are "compliance-aligned," not determinative
Privacy and metadata exposurePoorly chosen metadata can reveal sensitive informationMinimal metadata by default; configurable redaction; DPIA support
Ledger fee/latency volatilityBitcoin fees and confirmation times varyBatch scheduling, fee estimation, pending status UX
Integration complexityEvidence scattered across toolsScoped pilots, reference connectors, SSO, documentation
Security and key managementTreasury and API keys require protectionAWS KMS, HMAC-SHA256, least-privilege design, incident runbooks

13. Roadmap

Phase I: Foundation — Credentialing & Verification API (2025–2026)

Trustless credential verification for universities, HR, and compliance teams. REST Verification API with batch processing. AI-powered metadata extraction. MCP server for AI agent integration.

Phase II: Attestations + Agentic Verification (2026–2027)

Extend verification into institutional attestations, asset provenance, and autonomous agent workflows. Enterprise system integrations. AI-powered fraud detection and compliance reports.

Phase III: Legally Recognized E-Signatures (2027–2028)

Jurisdiction-compliant signature engine (AdES + PKI). QTSP integration for eIDAS. SOC 2 evidence bundle and compliance center. Platform licensing for agent providers.

14. Conclusion

Organizations lack a portable, independently verifiable evidence layer. Proofs are trapped in vendor-controlled systems, revocation states are inconsistent, and cross-party checks are slow and costly. AI agents compound the problem — they need machine-speed verification without human intermediaries.

Arkova delivers a universal, jurisdiction-aware verification layer for documents, signatures, credentials, and real-world assets. By anchoring compliance-aligned metadata to Bitcoin, Arkova reduces audit costs, accelerates verification, and provides trust that survives system and vendor changes.

"The question is no longer which system to trust — it's which proofs anyone can verify."

15. About the Team

Carson Seeger — Founder & CEO. Over a decade in technical product and project management, working with distressed teams under tight regulatory deadlines.

Sarah Rushton — Founder & COO. 20 years experience as a Product / Program Manager in FMCG. Launched over 1,000 SKUs to market.

Dr. Yaacov Petscher — Founder & Advisor. 20 years Research & Data Science experience. Senior Member of the National Academy of Inventors.

Dr. Periwinkle Doerfler — Technical Advisor. Security architecture review.

Website: arkova.ai · Email: hello@arkova.ai

Arkova — Issue Once. Verify Forever.