InvoanceInvoance
Log inGet access
Event Ledger
How it worksEvent Ledger

How Event Ledger creates permanent, signed records

The Event Ledger accepts any structured business event and returns a permanent, cryptographically signed, independently verifiable record. From a single API call to permanent proof.

Back to Event Ledger

What you send

Every event is a JSON payload with four required fields: the event type, the actor (who triggered it), a human-readable description, and arbitrary metadata that your business cares about.

Example Request
POST /v1/events
{
  "event_type": "payment.completed",
  "actor": "user_8kx92mf",
  "description": "Invoice #4021 payment confirmed",
  "metadata": {
    "invoice_id": "inv_4021",
    "amount_cents": 245000,
    "currency": "USD",
    "method": "wire_transfer"
  }
}
event_type

A dot-notation string identifying the event category. Examples: payment.completed, order.shipped, user.deleted, contract.signed.

actor

The identifier (user ID, system name, or role) that triggered the event. Proves who performed the action.

description

A human-readable explanation of what happened. Used when presenting the event to auditors, customers, or regulators.

metadata

Arbitrary JSON. Include whatever context your business needs: order IDs, amounts, timestamps, references, or custom fields.

What happens on ingestion

When Invoance receives your event, a deterministic 5-step cryptographic flow begins. Each step is atomic and irreversible.

1
Ingestion & Timestamping

The event payload is received and an ingestion timestamp is recorded in UTC with nanosecond precision. This timestamp marks when Invoance accepted the event.

2
SHA-256 Hashing

A SHA-256 hash is computed over the canonical JSON representation of the event payload. The hash binds the proof to the exact content submitted.

3
Ed25519 Signing

The hash (combined with timestamp and event metadata) is signed using your organization's Ed25519 private key, held securely by Invoance. The signature proves the record came from you.

4
Append-Only Storage

The complete record (payload, hash, signature, timestamp) is written to Postgres with an INSERT-only constraint. No UPDATE, no DELETE, no override possible at the database level.

5
Public URL Generation

A verification URL is generated and returned to you. This URL allows anyone to retrieve and independently verify the event without authentication.

What you receive

After the 5-step flow completes, Invoance returns a response containing the event ID, all hashes, the signature, and a public verification URL.

API Response
200 OK
{
  "id": "evt_a1b2c3d4",
  "event_type": "payment.completed",
  "actor": "user_8kx92mf",
  "sha256": "e3b0c44298fc1c149afbf4c8996fb924...",
  "signature": "d4f5e6a7b8c9d0e1f2a3b4c5d6e7f8...",
  "timestamp": "2025-03-15T14:32:07.123456Z",
  "verification_url": "https://www.invoance.com/proof/event/evt_a1b2c3d4",
  "status": "anchored"
}
id

Unique identifier for this event (evt_...). Use this to retrieve the event later.

event_type

The event type you submitted, returned for confirmation.

actor

The actor you submitted, confirming who triggered the event.

sha256

The SHA-256 hash of your original payload. Any change to the payload invalidates this hash.

signature

The Ed25519 signature, verifiable against your organization's public key.

timestamp

UTC timestamp at nanosecond precision, recorded at ingestion and embedded in the signature.

verification_url

Public URL where anyone can retrieve and verify this event without authentication.

status

Current state of the event (anchored, archived, etc.). Anchored events are immutable.

How verification works

Verification is deterministic and requires no trust in Invoance. Anyone with the event data and your organization's public key can independently verify that the record is authentic and unchanged.

1
Retrieve the event

Fetch the event via public verification URL or API. This returns the payload, hashes, timestamp, and signature.

2
Recompute SHA-256

Hash the original event payload using SHA-256. If the result matches the returned hash, the payload is unchanged.

3
Verify Ed25519 signature

Use the Ed25519 signature and your organization's public key to verify the signature. A valid signature proves the record came from you.

4
Confirm timestamp integrity

The timestamp is part of the signed payload. If the signature is valid, the timestamp cannot have been backdated or adjusted.

No Invoance account required. The verification process uses only cryptography and your organization's public key. No one needs to trust Invoance — they verify against mathematics.

Technical guarantees

These guarantees are structural properties of the Event Ledger, enforced by cryptography and database design. They hold for every organization, every event, regardless of plan or usage.

Immutability

No admin, API endpoint, or override can modify a record. The database enforces this at the structural level — events can only be added, never updated or deleted.

Tamper evidence

Any change to the original payload, no matter how small, produces a completely different SHA-256 hash, instantly invalidating the proof.

Non-repudiation

The Ed25519 signature cryptographically binds the record to your organization's private key. You cannot deny that your organization signed the record.

Timestamp integrity

The timestamp is recorded at the moment of ingestion and included in the signed payload. It cannot be backdated, adjusted, or overwritten.

Independent verification

Any party can verify the record offline using only the public key and Ed25519 signature. No Invoance server required. No network call necessary.

Append-only enforcement

The database constraint is not a policy or application rule. It is a structural property enforced by Postgres. No override exists.

Compliance mapping

Event Ledger's technical controls align with major compliance frameworks. Your auditor maps these controls to your specific compliance context.

SOC 2 (CC6.1, CC7.2, CC8.1)

Integrity controls (hash verification), monitoring (append-only logs), review procedures (independent verification URLs).

HIPAA (§164.312(c)(1), §164.312(e)(2)(i))

Integrity and authentication mechanisms for PHI, audit controls and accountability for data access and modification.

ISO 27001 (A.12.4, A.18.1.3)

Event logging (every event is timestamped and signed), records of information processing (compliance and audit trails).

GDPR (Art. 5(1)(f), Art. 30)

Integrity and confidentiality of personal data, records of processing activities (Event Ledger as proof of processing).

Invoance provides the technical control. Your auditor or compliance officer maps it to your specific audit scope and regulatory context.

Ready to anchor your events?

Start with one event. Scale from there. The same cryptographic guarantees apply whether you're anchoring 10 events a month or 10 million.

Start for freeView API docsBack to Event LedgerHow it works hub

How Event Ledger Works — Invoance

Technical walkthrough of how Invoance Event Ledger creates permanent, cryptographically signed records for business events using SHA-256 hashing, Ed25519 signing, and append-only storage. Every event is immutable, timestamped, and independently verifiable.

Invoance

Neutral digital proof infrastructure for business. Tamper-evident, independently verifiable records.

Subscribe to our newsletter

Products
Platform
How It Works
Developers
Verify
Resources
Help & Legal
Products
  • Event Ledger
  • Document Anchoring
  • AI Attestation
  • Traces
Platform
  • Why Invoance
  • For Compliance Teams
  • Pricing
  • Security
How It Works
  • Overview
  • Event Ledger
  • Document Anchoring
  • AI Attestation
Developers
  • Overview
  • Endpoints
  • Authentication
  • Concepts
Verify
  • Verify Document
  • Verify AI Attestation
  • Verify Event
  • Verify Trace
Resources
  • All Resources
  • SOC 2 Guide
  • HIPAA Guide
  • ISO 27001 Guide
Help & Legal
  • Support
  • Verification Help
  • FAQ
  • Legal Notice

Invoance provides technical verification and proof infrastructure for digital records. Invoance does not issue legal, financial, or regulatory advice.

Records anchored through Invoance are cryptographically signed and tamper-evident by design. Invoance does not verify the accuracy, legality, or authenticity of document contents — only that a record existed in a specific form at a specific time. Verification links are publicly resolvable and do not require authentication. Invoance does not act as a custodian of funds, a legal authority, or a regulated financial entity. Use of Invoance does not constitute legal compliance. Consult qualified counsel for your specific obligations.

© 2025 – 2026 Invoance. All rights reserved.•