PBI
Presence-Bound Identity
Presence verification for irreversible actions · exportable evidence

If it can’t be undone, it must be presence-verified.

PBI is a drop-in presence layer for high-risk systems. Bind a WebAuthn challenge to an action hash, require a live UP+UV ceremony (FaceID / TouchID), and receive a signed, non-replayable receipt — plus optional portable proof bundles for offline verification, audit, and chain-of-custody.

Presence-bound verification in under a minute.
Action-bound proof
Receipts bind presence to the exact operation you intended to perform.
Non-replayable by design
Single-use challenges stop replays, scripts, and delegated approvals.
Portable evidence
Export PBI Packs/Proofs for offline verification, audits, and disputes.
No identity database
Verify presence without storing users, passwords, or biometrics.
Built for teams who can’t afford “maybe” approvals
Treasury & payoutsAdmin control planesGovernance & multisigDeploy & production changesLegal / ownership actions
Proof in under a minute
Run the live presence ceremony
The demo shows the full ceremony end-to-end. The tool is an integration harness (BYOK) for real API keys, real action hashes, and receipt/proof debugging.
Recommended
Plan
Live Demo
Free
Public-safe demo. No API keys. Runs the full ceremony.
Best for: buyers, security reviewers, engineers validating the flow.
No keys required
Register passkey → attest → verify
Receipt minted + decision shown
Safe to share in public
Plan
Attester Tool
BYOK
Integration harness for real keys and real API bases.
Best for: customers integrating PBI into production endpoints.
Use your real API key
Custom action payload + actionHash
Receipt hashes + portable proofs
Requires portal account
Plan
Developer Hub
Start
Quickstart, patterns, canonicalization and enforcement guidance.
Best for: teams integrating PBI into real endpoints.
5-minute quickstart
Action hashing guidance
Enforcement patterns
Links to reference docs
Plan
API Docs
Read
Exact endpoints, payloads, and response semantics.
Best for: implementation + security review.
/v1/pbi/challenge
/v1/pbi/verify
/v1/pbi/receipts?createdAfter&order&cursor
/v1/pbi/receipts/{receiptId}
/v1/pbi/receipts/export
/v1/portal/webhooks
Auth: Bearer API key
Receipt + pack/proof model
Why PBI exists
From account trust → human presence proof
Passwords, sessions, and tokens prove only that something authenticated. PBI proves a human was physically present and authorized the exact action you care about — then exports a proof you can verify later.
From Account Trust to Human Presence Proof — Legacy Authentication vs PBI
Legacy auth answers “who has access?” PBI answers “was a human present for this exact irreversible action?”
Mechanism
Presence verification is a simple, strict flow
Hash the action, issue a challenge bound to that hash, require UP+UV, then store the receipt. If verify doesn’t return PBI_VERIFIED, you do not proceed.
PBI Workflow: Proof of Human Presence
PBI Integration into a Sensitive Endpoint
WebAuthn Challenge-Verify Flow for Presence-Bound Identity
1) Bind the action
Hash what you’re about to do (transfer, rotate keys, deploy). Challenge is bound to that hash.
2) Prove presence (UP+UV)
User completes a live WebAuthn ceremony. No accounts required for the proof.
3) Enforce + store receipt
Proceed only on PBI_VERIFIED. Store receipt hash for audit, forensics, disputes.
Offline verification (optional)
For audits and custody chains, PBI can export a signed pack/proof that verifies offline under a trust policy (rotation/revocation/expiry).
pbi-pack-verify ../pbi-pack --trust ./trust.json
pbi-pack-verify --proof proofs/0001.proof.json --trust ./trust.json
Where it belongs
If it can’t be undone, it must be presence-verified
PBI is for operations where “approved” must mean “a human was physically present and knowingly authorized it.”
Irreversible actions use-case grid for PBI
Common enforcement points
Wrap the endpoints that move money, change control, or create irreversible commitments.
Treasury & transfers
Presence-gate wires, payouts, escrow release.
Admin & access control
Gate role changes, key rotations, deploy approvals.
Governance actions
Gate votes, proposals, multisig flows.
Authorship confirmation
Presence-stamp contracts, releases, publications.
Critical config changes
Gate flags, production settings, incident actions.
High-risk user actions
Gate recovery, withdraw, device enrollment.
Evidence layer
The PBI receipt: proof, not logs
Logs are mutable, incomplete, and rarely dispute-ready. A receipt is cryptographic evidence: action-bound, timestamped, single-use, and verifiable long after the event.
PBI Receipt Anatomy: Proof, Not Logs
No biometric data stored. No identity stored. Receipts remain verifiable.
Integration
PBI does not replace identity — it hardens actions
Keep your existing auth (SSO/OAuth/JWT). Add PBI only where you need cryptographic proof of human presence for irreversible operations.
Where PBI fits in your architecture
Pricing
Choose your verification capacity. Usage is metered automatically. A “verification” is one successful /v1/pbi/verify returning PBI_VERIFIED.
Plan
Starter
$99
/month
Ship presence gates fast.
Best for: teams shipping their first high-risk presence gates.
Presence verification core
Includes 10,000 verifications/mo
Receipt hash + audit trail
Overage billed per verification (shown in portal)
Recommended
Plan
Pro
$499
/month
Higher throughput + more automation.
Best for: products scaling enforcement coverage.
Everything in Starter
Includes 100,000 verifications/mo
Priority processing
Overage billed per verification (shown in portal)
Recommended
Plan
Scale
$1,999
/month
Authoritative human presence at scale.
Best for: financial infrastructure, governance, mission-critical control.
Everything in Pro
Includes 1,000,000 verifications/mo
Enterprise throughput + reliability
Portable proofs for audit workflows
Overage billed per verification (shown in portal)
Recommended
Plan
Enterprise (PBI Assured)
Talk to Sales
Procurement-ready. Governance support and enterprise guarantees.
Best for: banks, governments, platforms, custodians, and mission-critical control planes.
Paid pilot available (1 endpoint, 2 weeks)
Custom verification capacity + burst
SLA / priority support options
Security review packet on request
Trust policy + key rotation guidance
Audit export & evidence bundling
Get access
Sign in with a magic link.
You’ll land in the client portal to activate billing, create API keys, and track usage. No passwords.
By continuing, you agree to the Terms and Privacy Policy.
For security reviewers
What PBI guarantees (and what it doesn’t)
PBI produces cryptographic proof of live human presence for a specific action. It does not attempt to identify who the user is, nor does it store biometric data.
Guarantee
UP+UV ceremony occurred for this action hash, single-use, within expiry.
Does not do
Identity resolution, KYC, biometric storage, or user databases.
Portable evidence
Optional PBI Packs/Proofs allow offline verification with rotation/revocation/expiry.
Operational model
challenge → verify → receipt; enforce only on PBI_VERIFIED.