Human authority stays visible
Critical actions do not disappear into automation. The user's role remains deliberate and understandable.
§ 03 · TRUST · RELIANCE MODEL
Paphwey is designed around the conditions enterprises look for in high-assurance environments: explicit user authority, identity-backed approval, scoped action control, and outcomes that hold up to review.
Guarantees
Critical actions do not disappear into automation. The user's role remains deliberate and understandable.
The signal is stronger than interface consent because it is tied to trusted identity context.
Organizations can define what kind of action is being approved and where stronger trust should apply.
Confidence is shaped for downstream governance, partner reliance, and enterprise accountability.
Enterprise readiness
The same outcome has to satisfy different readers — each with their own standard of proof.
Create AI-powered experiences without making sensitive approval moments feel reckless or opaque.
Understand how approval was obtained and why the resulting trust signal should be accepted.
Receive a result that is usable in decisioning, review workflows, and customer support pathways.
What trust looks like
What it avoids
Credential shape
When a principal grants authority, Paphwey packs the grant into a JWS envelope carrying the W3C Verifiable Credential v2 payload. The same credential is the anchor point for every downstream decision: caps, audience, scope, and lifecycle are all derivable from it.
The credential is issued by Paphwey with the active key and published via JWKS so relying parties can verify offline.
The payload carries a standard vc claim — @context, type, and credentialSubject — so it reads cleanly into VC tooling.
Scopes, challenge types, spend caps, and validity windows live inside the credential, not alongside it. What was signed is exactly what is enforced.
Every credential carries a kid header. A rotation publishes a new key on JWKS with a grace window; old credentials remain verifiable until expiry.
Lifecycle
A grant is not a one-way door. Principals can pause a delegation from the wallet (soft halt, reversible) or revoke it outright (hard stop). Relying parties poll a signed status endpoint and a signed revocation snapshot so their own systems stay in sync without private integrations.
Pause
paused; new challenges are rejected.Revoke
revoked with revoked_at.Audit
Audit events include the hash of the previous event, so any edit breaks the chain. Once a day, Paphwey publishes a signed Merkle root over the day's events to a well-known endpoint. Auditors, regulators, and partner RPs can independently verify that the story was not rewritten.
Each audit event stores the previous event's hash. Tampering with an older row breaks every row after it.
A single signed root covers the whole day. Verifiers compare the published root against a root they compute themselves.
Polling /.well-known/paphwey-audit-anchor with a date returns the signed envelope — cached, auditable, low-friction.
Signatures use the same key set that signs attestations, so verifiers only need one discovery endpoint.
Framework
Governance teams and auditors should not have to read a bespoke architecture diagram. Paphwey operates as a ToIP Layer 3 credential issuer and Layer 4 application, so every interop question maps onto a layer the framework already defines.
/.well-known/did.jsonThe gateway's did:web document lists JsonWebKey2020 verification methods drawn from the active JWKS — one discovery endpoint for DID-aware verifiers.
/.well-known/jwks.jsonExisting JWT verifiers do not have to learn DID resolution. The Plan 3 JWKS endpoint continues to serve the same keys with a 60-second cache.
Delegation credentials and attestations are W3C Verifiable Credentials signed by the gateway's DID, suitable for governance frameworks like EUDI ARF and NIST SP 800-63 (planned conformance statements).
The orchestration APIs (challenge, approval, attestation, revocation) are the application-layer surface that sits on top of the credential and identifier layers.
Key custody
Paphwey's trust story is simple to audit because the cryptographic chain maps one-to-one onto the human story: the user authorises on their phone, the phone signs the delegation binding, the agent signs every challenge, and the gateway signs the credentials the business consumes. No shared signing key, no ambiguous envelope.
The user is the authority but never signs anything themselves. Their consent travels exclusively through the wallet device, which means a stolen password can't forge delegation.
device_pem
Holds a per-enrolment PEM keypair. Signs challenge approvals
and the delegation binding payload that pins a
specific agent public key to a delegation. Registered at
POST /api/v1/mobile/auth/device/key/register.
agent_jwk
Holds an ES256 or Ed25519 keypair it generated for this
delegation. The public half is pinned into
cnf.jwk of the delegation VC. The agent proves
possession at every challenge by signing
{challenge_id, nonce, audience, timestamp}.
gateway_jwks
Signs the delegation VC and the attestation. The active
JWKS is published at /.well-known/jwks.json
and mirrored through the gateway's did:web
document. RPs verify everything off this one endpoint.
The business holds an RP API key for rate-limiting and billing, but no signing key enters the trust chain. That's deliberate: it keeps RPs stateless verifiers rather than trusted issuers.
Rotating any one key invalidates only that actor's future signatures — a leaked agent key doesn't re-issue the VC, and a revoked delegation doesn't invalidate the gateway's JWKS. Blast radius is bounded by key custody.
For the CISO, MLRO, and audit committee
We do not ask a risk function to accept a new regulatory story. We emit the artefacts — a delegation credential, an attestation token, a hash-chained receipt — that slot into frameworks already being read against. Detail and jurisdictional coverage live in the compliance FAQ.
The attestation token captures the strong-customer-authentication moment and the transaction-risk signal in a form the relying party's PSP can verify under the PSD2 regulatory technical standards. A delegated agent action still traces back to a user-approved SCA event on the wallet device.
Identity-proofing obligations under regulation 28 are carried by the IAT; record-keeping obligations under regulation 40 are carried by the hash-chained receipt and daily Merkle anchor. Paphwey itself is not a regulated entity under MLR 2017 — the obligations remain with the relying party.
Assurance-level semantics follow NIST's identity framework: IAL, AAL, and FAL signals ride inside the credential the agent presents. The same credentials cover the emerging Non-Human Identity (NHI) guidance for software acting on a user's behalf.
Company