No Receipt.
No Run.
Cryptographic consent enforcement for AI. Every action gets a dual-signed receipt with post-quantum cryptography or it doesn't execute. Fail-closed. ≤8ms p99. Verifiable offline by anyone.
The Consent Problem
15M+ voices cloned without consent last year. Policy-based consent doesn't hold up in court. Cryptographic proof does.
Policies Are Promises
TOS checkboxes and opt-out letters are claims. They can be overridden, ignored, or lost. They don't enforce anything at runtime.
Logs Are Claims
"We logged it" means nothing to an auditor. Logs can be edited, deleted, or fabricated. They prove what you SAY happened.
Receipts Are Math
Cryptographic receipts prove what ACTUALLY happened. Signed, timestamped, Merkle-committed. Verifiable by anyone, offline.
How Archangel Works
Intercept
Every AI action passes through the Archangel gate before execution.
Verify
Proprietary consent token verified against live policy state. Verifier re-derives independently. ≤ 8ms initiation at p99.
Enforce
No valid CDT = action blocked. Fail-closed. No exceptions. DENY receipt emitted as evidence. Default is denial.
Prove
Dual-signed receipt with post-quantum cryptography. Merkle-committed. Chain-linked. Verifiable offline by anyone. ≤ 12ms complete.
Four-Service Architecture
Independent services with distinct trust boundaries. The Verifier never trusts the Issuer.
The Stack
Four enforcement modules. Each produces cryptographic receipts. Each fails closed.
CDT Gate
Consent DNA Token. Proprietary consent verification. Instant revocation via epoch flip. The foundation.
Receipt Rail
Every AI action gets a signed receipt. Merkle-batched. Append-only. Third-party verifiable offline.
LCES
Likeness Consent Enforcement. No consent token = no voice clone, no face synthesis. Cryptographic permission before deepfakes.
GPU Gate
No-Receipt-No-VRAM. Hardware-level enforcement. No governance receipt = no GPU memory allocation = no inference.
Pricing
Pilot is free. We prove it works, then we talk.
Scan
Consent gap analysis
- ✓Full compliance scan
- ✓Violation report
- ✓Remediation checklist
- ✓Risk severity ratings
Pilot
4-week proof of concept
- ✓One workflow end-to-end
- ✓ALLOW/DENY/REVOKE cycle
- ✓Signed receipt chain
- ✓Offline verification pack
- ✓8 binary pass/fail criteria
Enterprise
Full governance stack
- ✓All enforcement modules
- ✓Post-quantum signatures
- ✓Hardware-backed keys (HSM/TPM)
- ✓FedRAMP control mapping
- ✓Dedicated support + SLA
Receipts, not trust.
When the auditor asks “prove it,” you either have cryptographic evidence or you don't.
15 Minutes. Live Demo. Real Receipts.