Stop Invoice Fraud with
Cryptographic Verification
Attestiv provides a verified, encrypted registry of vendor banking details and cryptographic invoice signing. Verify any invoice or payment instruction in seconds with zero-knowledge security.
How Attestiv Works
Three integrated systems work together to prevent invoice and payment fraud at every step.
1 Invoice Signing
2 Invoice Verification
3 Secure Banking Registry
Verification Methods
Multiple ways to verify invoices and banking details, designed for any workflow.
Web Portal
Simple drag-and-drop interface for anyone to verify invoices instantly. No account required.
- Upload PDF, PNG, JPEG, TIFF
- Instant verification result
- View vendor details & history
REST API
Integrate verification directly into your ERP, accounting, or payment systems.
- JWT authentication
- Verify by file or hash
- Webhook notifications
AI Integration (MCP)
Model Context Protocol server enables AI assistants to verify invoices automatically.
- Claude, GPT compatible
- Automated verification
- Natural language queries
Security Architecture
Built with cryptographic best practices. Your data is protected by the same algorithms used by secure messaging apps and government systems.
Cryptographic Primitives
Elliptic curve digital signatures provide 128-bit security with fast signing and verification. Used for invoice attestation.
Authenticated encryption with 256-bit keys. Banking details are encrypted client-side before transmission.
Elliptic curve Diffie-Hellman enables secure key sharing between vendors and customers without exposing secrets.
Memory-hard password hashing protects encryption keys derived from user passwords against brute-force attacks.
Security Principles
The Attestiv server never sees plaintext banking details. All sensitive data is encrypted client-side before upload. We cannot read your data even if compelled.
Private keys are generated on your device and never transmitted. Only public keys are stored on our servers for signature verification.
Compromised keys can be revoked instantly. Verification checks key validity at signing time, ensuring revoked keys cannot be used.
All verification attempts are logged with timestamps. Complete audit trail for compliance and forensics.
Cryptographic comparisons use constant-time algorithms to prevent timing attacks that could leak information.
Data Protection at Every Layer
Simple API Integration
Integrate invoice verification into your systems with just a few lines of code.
curl -X POST https://attestiv.io/api/v1/invoices/sign/ \
-H "Authorization: Bearer $TOKEN" \
-F "file=@invoice.pdf" \
-F "key_id=sk_abc123" \
-F "metadata={\"invoice_number\": \"INV-001\"}"
# Response
{
"id": "inv_xyz789",
"file_hash": "sha256:a1b2c3...",
"signature": "ed25519:...",
"signed_at": "2026-01-19T12:00:00Z",
"verify_url": "https://attestiv.io/v/inv_xyz789"
}
curl -X POST https://attestiv.io/api/v1/verify/invoice/ \
-F "file=@invoice.pdf"
# Response
{
"verified": true,
"vendor": {
"name": "Acme Corp",
"domain": "acme.com",
"verified_since": "2025-03-15"
},
"signed_at": "2026-01-19T12:00:00Z",
"key_status": "valid"
}
Frequently Asked Questions
Common questions about invoice verification and banking security.