PBI
Presence-Bound Identity
Enterprise · PBI Assured

When approvals must be provable, not just logged.

PBI Assured is the enterprise onboarding path for regulated and mission-critical environments. You get a scoped rollout plan, security review packet, and a fast pilot that hardens one irreversible endpoint with action-bound presence verification and receipts.

Paid pilot (2 weeks)
One endpoint hardened end-to-end with strict enforcement on PBI_VERIFIED.
Security packet
Threat model, data flow, trust policy, evidence formats, and failure-mode expectations.
Rollout sequencing
Start where blast radius is highest, then expand coverage across irreversible operations.
Procurement-ready
Clear guarantees, clear boundaries, and integration patterns that pass review.
Fit
Who uses PBI Assured
If you operate systems where a wrong approval becomes a reportable incident, PBI is the missing gate.
Banks & fintech
Money movement, payout approval, treasury controls, and high-risk account actions.
Custodians & exchanges
Withdrawals, settlement releases, key rotations, and governance controls.
Control planes
Admin role changes, deploy approvals, production config, incident actions.
Gov / regulated
Evidence-heavy operations that require non-repudiation and dispute-ready trails.
Legal workflows
Contract execution, ownership actions, and authorizations that must be provable later.
AI oversight
Human-in-the-loop approvals where presence must be provable for compliance.
Pilot
A fast, scoped pilot that proves ROI
Enterprises don’t adopt primitives by reading; they adopt by proving reliability and reducing risk on a real enforcement point.
2-week paid pilot (recommended)
We harden one irreversible endpoint. You get strict enforcement, receipt logging, optional evidence export, and a rollout plan for expanding coverage.
Week 1: integrate
Canonical action → actionHash → challenge → WebAuthn UP+UV → verify → enforce.
Week 2: harden
Replay/expiry tests, failure-mode drills, audit receipt mapping, and operational runbook.
Outcome
A production-ready presence gate, plus a playbook to expand to more endpoints.
Deliverables
What your team receives
This is designed to reduce review friction and accelerate implementation inside enterprise SDLC.
PBI Assured package
Everything you need to pass security review, implement quickly, and roll out safely.
Security packet
Threat model, data flow, expected failures, and explicit non-goals.
Trust policy guidance
Key rotation, revocation, expiry windows for offline verification governance.
Evidence mapping
What to store: receiptHash + decision + actionHash ref + timestamps + actor context.
Rollout plan
Sequence endpoints by blast radius; define enforcement and break-glass exceptions.
Integration patterns
Node/Go/Python examples, webhooks, and stable canonicalization strategy.
Ops & runbook
Retry rules, idempotency guidance, incident response mapping, and audit retrieval.
Procurement
What enterprise reviewers care about (we address directly)
This section is written for CISOs, compliance, and platform security teams.
Guarantees are strict
We define exactly what is proven (UP+UV for an actionHash within expiry) and avoid unverifiable claims.
Data minimization
No biometric data stored. No password database. Receipts and metadata only.
Failure-mode clarity
If verify is not PBI_VERIFIED, you do not proceed. We document expected deny paths.
Compatibility
Keep existing SSO/OAuth/JWT. PBI hardens only irreversible operations.
Audit readiness
Receipt hashes provide durable evidence references; optional portable proofs support offline review workflows.
Next step
Pick the one endpoint you can’t afford to get wrong.
We’ll scope a pilot that hardens it with presence verification and receipts. Once it works there, expanding coverage is straightforward.