ROOTKey provides a single, composable primitive - cryptographic proof that data existed in a specific state at a specific time - that applies across a wide range of industries and integration patterns. This section maps that primitive to concrete use cases: what problem is being solved, how ROOTKey fits into the architecture, which protocol and deployment model to use, and where to go in the documentation to implement it.Documentation Index
Fetch the complete documentation index at: https://docs.rootkey.ai/llms.txt
Use this file to discover all available pages before exploring further.
Tamper-Evident Document Management
Anchor documents at creation or approval - contracts, filings, certificates - and prove their integrity to any third party without relying on a trusted intermediary.
Regulatory Compliance & Audit Trails
Build immutable, independently verifiable audit trails for NIS2, DORA, ISO 27001, and financial regulatory frameworks. Evidence that holds up under adversarial scrutiny.
Supply Chain Traceability
Anchor custody events and provenance data across multi-party supply chains. Any participant - including regulators - can verify product authenticity independently.
IoT & Industrial Data Integrity
Protect sensor data, SCADA events, and OT telemetry at source. High-frequency integrity anchoring over MQTT without disrupting existing OT network architecture.
Software & Artifact Integrity
Anchor build artifacts, container images, and release artefacts in CI/CD pipelines. Detect tampering between build and deployment with cryptographic evidence.
Healthcare & Life Sciences
Integrity-protect clinical data, trial records, and patient information at scale - with GDPR erasure compatibility and auditability for regulatory submissions.
AI System Integrity & Auditability
Anchor model versions, training data provenance, decision logs, and conformity assessment records - the tamper-evident audit trail that high-risk AI systems require under the EU AI Act.
How to Use This Section
Each use case page follows the same structure:- The problem - what breaks without cryptographic integrity
- How ROOTKey solves it - the architectural role ROOTKey plays
- Implementation - step-by-step, with links to the relevant API endpoints
- Recommended configuration - which protocol and deployment model to use
- Compliance alignment - which regulatory frameworks this use case addresses
- CTA - where to go next
Not sure which use case fits your architecture?
Talk to our engineering team
We’ll map your specific data integrity requirements to a concrete ROOTKey architecture and walk you through a working implementation.
Start with the Quickstart
Create your first vault and anchor a record in under 5 minutes - no commitment required.

