Skip to content
Patent Checker
PatentChecker

Verification & Audit Guide

This guide explains how PatentChecker outputs can be independently verified, offline, without access to source code, private repositories, or registries.

PatentChecker is designed so that trust is not required to validate results.

What can be verified

PatentChecker produces three independently verifiable layers. Each layer can be verified separately or together.

Run directory

The concrete outputs of a monitoring run.

Runner image

The executable used to produce the run.

Release receipt

A signed record binding the runner image, signatures, and metadata.

Trust chain overview

A single view of how watchlists, signed execution, artifacts, and verification connect to audit-ready outcomes.

Trust chain diagram: watchlist to runner to artifacts to artifacts verify to audit.

Verifying a run directory (offline)

A run directory is a self-contained set of artifacts produced by a single monitoring execution. No network access is required.

Includes
  • run manifest
  • run digest
  • evidence packets
  • watchlist state
  • input metadata
  • optional receipts
Command
patentchecker artifacts verify ./runs/<run_dir>

No network access is required.

What this verifies
  • All JSON files validate against their schemas
  • All artifact hashes match the values recorded in the manifest
  • Run completeness (no missing required artifacts)
  • Corpus snapshot consistency
  • Adapter contract compatibility
  • Digest integrity
  • Embedded license receipt verification (if present)
Example success output
✔ schemas valid
✔ artifact hashes verified
✔ corpus snapshots consistent
✔ adapter contract verified
✔ run digest verified
✔ run directory complete
Example failure output
✖ hash mismatch: evidence/family_123.json
expected: sha256:abc...
actual:   sha256:def...

Determinism guarantees

PatentChecker is deterministic by design:

  • Same inputs produce the same outputs
  • Execution order is stable and documented
  • Multi-sequence watchlists execute in sorted sequence order
  • Artifact paths and identifiers are predictable

This allows replay, comparison across time, and independent verification long after execution.

Verifying the runner image (public, keyless)

PatentChecker is distributed as a signed container image. Signatures are keyless, issued via GitHub Actions OIDC, and publicly discoverable.

Unauthenticated verification
# Receipt is the source of truth for digest + signing identity.
# (Use the values from runner_receipt.v0.1.json for the release you are verifying.)
export DIGEST="sha256:<64>"
export IDENTITY="https://github.com/omniscoder/patentchecker/.github/workflows/release.yml@refs/<ref>"

IMG=ghcr.io/omniscoder/patentchecker@"$DIGEST"

DOCKER_CONFIG=/tmp/emptydocker cosign verify \
  --certificate-identity "$IDENTITY" \
  --certificate-oidc-issuer "https://token.actions.githubusercontent.com" \
  "$IMG"

Replace both digest and identity with the values from the release receipt you are verifying.

Offline verification with release bundles

For air-gapped or archival review, each release includes cosign.bundle.json and runner_receipt.v0.1.json. These allow verification without registry access.

Receipt binds
  • • image digest
  • • signature bundle
  • • runner version
  • • schema version
  • • adapter provenance (if present)
  • • signing identity

Adapter provenance

Each run records adapter provenance explicitly, ensuring adapter behavior is pinned and incompatible changes are detectable.

  • adapter identity
  • adapter contract version
  • adapter version
  • adapter configuration hash

Corpus snapshot integrity

PatentChecker records corpus snapshots and enforces exact snapshot equality between inputs and outputs.

  • corpus snapshot identifiers
  • content hashes
  • coverage metadata

Verification prevents silent corpus drift and preserves defensibility.

What is intentionally not required

  • access to source code
  • access to adapter implementations
  • trust in the operator
  • access to the execution environment
  • live network connectivity

Only the artifacts themselves are needed.

Summary

PatentChecker outputs are:

  • deterministic
  • replayable
  • hash-addressed
  • provenance-tracked
  • offline verifiable

This enables inspection-ready patent monitoring suitable for legal, regulatory, and high-assurance environments.