RAC — Recipient Authority Confirmation
A governance layer for high-liability enterprise communications: version-locked content, identity-bound access, revocable acknowledgement, exportable evidence.
Traditional systems prove transmission. Veridex proves authorization — who approved what, at what version, with what authority, verified without system access.
01 — Control Surface Domain Configuration
Tiered assurance, configurable identity, and revocation policy — because governance is never one-size-fits-all. Same kernel, many compliance postures.
02 — Deterministic State Machine Monotonic Transitions
—
AWAITING VERIFICATION
Append receipts and run verification to produce an offline-verifiable verdict.
Envelope Hash
—
Receipt Hash
—
Signature (Demo)
—
Prior Hash
—
Every authorized transition produces a receipt bound to identity, time, version, and prior-chain hash. Hit Tamper then Verify to see what that means in practice.
03 — Append-Only Event Log Chain-of-Custody
Enterprise truth: audit requires a timeline. Verification requires invariants. Evidence requires export. Event-sourced by design.
04 — Enterprise Surfaces Workflow View
Acquirer lens: Is this a reusable kernel? Does it plug in? Can auditors verify without system access? This view answers those questions clearly.