Authorized Verification

How government officers, law-enforcement agencies, and court-appointed auditors verify a Lyrics D.N.A™ certificate without requiring SwaLay Digital or TalantonCore LLP to disclose private claimant data.

Every Lyrics D.N.A™ certificate carries the same 9-layer tamper-evidence stack (Tier 1a+Tier 1b PAdES B-LTA signatures, DocMDP+SigFieldLock, 11 RFC 3161 timestamps, Polygon/Ethereum/Bitcoin/Arweave/IPFS anchors, ML-DSA-65 post-quantum signature, hourly Merkle-root publication). We expose that evidence through three tiers scaled to the verifier's authority, balancing independent verifiability with data-principal privacy under DPDP Act 2023.

Tier 1 Public — anyone on the internet

Endpoint

GET https://verify.talantoncore.in/api/verify/{certificateId}

Returns

Does NOT return

Rate-limited to 60 req/hour/IP; HMAC-token bypass for authenticated QR-scan flows.

Tier 2 Authorized Verifiers — commitments-only, no PII

Endpoints

GET  https://verify.talantoncore.in/api/verify-private/{certificateId}
POST https://verify.talantoncore.in/api/verify-private/reverse-lookup
     Body: { "hashType": "lyrics|audio|fingerprint|pdf", "hashValue": "<sha256-hex>" }

Returns

Intended verifiers

Rate-limited to 20 req/hour/IP; every access audit-logged with IP, UA, certificateId, and (for reverse-lookup) match outcome. Abuse patterns automatically flagged for review. Officers are encouraged to identify themselves in the User-Agent header — this helps us whitelist legitimate investigations and review suspicious ones faster.

Offline replay — what Tier 2 enables

Combined with our published public keys (/.well-known/platform-ca-pem, /.well-known/platform-pq-pubkey), a Tier 2 response is sufficient for an auditor to perform a complete end-to-end integrity check without trusting SwaLay: verify the PAdES chain against CCA + internal CA, the PQ signature against the published ML-DSA-65 pubkey, the blockchain anchors against the respective chain explorers, and the RFC 3161 timestamps against each TSA's own verification tooling.

Tier 3 Court-Order Data Reveal — full PII

Trigger

Process

  1. Email legal@talantoncore.in with the signed order + officer ID + specific certificate IDs.
  2. DPO (Data Protection Officer) triage within 48 hours — verifies authority + scope under DPDP Act 2023 §8 (purpose limitation).
  3. If approved, SwaLay issues a time-limited signed URL (30-day expiry) releasing the requested PII. Access is scoped to the minimum fields specified in the order.
  4. The data principal is notified within 72 hours, unless the court order includes a gag clause.
  5. Every Tier 3 release is audit-logged (tier3.data_reveal_authorized) and reported in our annual DPDP transparency report.

What Tier 3 can reveal (if ordered)

Verbal requests, threats, or pressure tactics are logged + ignored. Every release is court-documented or nothing is released.

Legal basis