Technical documentation for the OCC Protocol. Start with the concepts or jump directly to integration.
Core concepts: what the protocol does, what you get, and how proof is caused by system structure.
Wire specification for the occ/1 proof schema: fields, types, signed body, canonical serialization.
Five-step verification algorithm: digest check, signature verification, policy enforcement.
Assumptions, threat model, enforcement tiers, and trust anchor hierarchy.
Commit artifacts, verify proofs, and integrate OCC into your application.
Wrap AI tool calls with cryptographic execution receipts. Install, define tools, get portable proofs.
Precise distinctions: not a blockchain, not a watermark, not DRM, not proof of truth or authorship.
Common questions about the protocol, security model, and practical usage.