Skip to main content

Documentation Index

Fetch the complete documentation index at: https://docs.rootkey.ai/llms.txt

Use this file to discover all available pages before exploring further.

ROOTKey provides a single, composable primitive - cryptographic proof that data existed in a specific state at a specific time - that applies across a wide range of industries and integration patterns. This section maps that primitive to concrete use cases: what problem is being solved, how ROOTKey fits into the architecture, which protocol and deployment model to use, and where to go in the documentation to implement it.

Tamper-Evident Document Management

Anchor documents at creation or approval - contracts, filings, certificates - and prove their integrity to any third party without relying on a trusted intermediary.

Regulatory Compliance & Audit Trails

Build immutable, independently verifiable audit trails for NIS2, DORA, ISO 27001, and financial regulatory frameworks. Evidence that holds up under adversarial scrutiny.

Supply Chain Traceability

Anchor custody events and provenance data across multi-party supply chains. Any participant - including regulators - can verify product authenticity independently.

IoT & Industrial Data Integrity

Protect sensor data, SCADA events, and OT telemetry at source. High-frequency integrity anchoring over MQTT without disrupting existing OT network architecture.

Software & Artifact Integrity

Anchor build artifacts, container images, and release artefacts in CI/CD pipelines. Detect tampering between build and deployment with cryptographic evidence.

Healthcare & Life Sciences

Integrity-protect clinical data, trial records, and patient information at scale - with GDPR erasure compatibility and auditability for regulatory submissions.

AI System Integrity & Auditability

Anchor model versions, training data provenance, decision logs, and conformity assessment records - the tamper-evident audit trail that high-risk AI systems require under the EU AI Act.

How to Use This Section

Each use case page follows the same structure:
  1. The problem - what breaks without cryptographic integrity
  2. How ROOTKey solves it - the architectural role ROOTKey plays
  3. Implementation - step-by-step, with links to the relevant API endpoints
  4. Recommended configuration - which protocol and deployment model to use
  5. Compliance alignment - which regulatory frameworks this use case addresses
  6. CTA - where to go next

Not sure which use case fits your architecture?

Talk to our engineering team

We’ll map your specific data integrity requirements to a concrete ROOTKey architecture and walk you through a working implementation.

Start with the Quickstart

Create your first vault and anchor a record in under 5 minutes - no commitment required.