SPECIFICATION

GTVS Protocol Specification

Global Trust Verification Standard — Version 3.0

This document describes the public specification of the VeriBureau protocol. It defines what the protocol guarantees, how trust is modeled, and how integrity is maintained. Implementation details, scoring parameters, and source code are proprietary to AIST Telecommunications.

1. Abstract

VeriBureau defines a protocol for verified business reviews where every review is cryptographically tied to a provable transaction, weighted by the reviewer's accumulated trust history, and permanently recorded in an immutable audit chain.

The protocol ensures every review has cryptographic proof of origin rather than relying on post-hoc detection. It achieves this through three axioms that form the foundation of all system behavior.

2. Core Axioms

Axiom 1: Cryptographic Proof Requirement

Every review MUST be linked to a unique, single-use Proof Token generated by the business for a specific transaction. A token is a cryptographically random string that is created before the review and consumed upon submission. No token — no review. One token — one review. Tokens cannot be reused, forged, or generated retroactively.

Axiom 2: Trust-Based Reviewer Scoring

Every reviewer accumulates a Reviewer Trust Score (RTS) based on their behavior across the entire ecosystem. RTS determines the weight of each review in the business score calculation. New reviewers have minimal influence. Trust is earned over time through consistent, verified behavior. The weight function is nonlinear — manipulation requires exponentially more effort as the target score increases.

Axiom 3: Immutable Audit Chain

Every event in the system — token creation, review submission, score recalculation, dispute, response — is recorded in a cryptographic hash chain. Each record contains a SHA-256 hash of the previous record. If any record is altered or deleted, the chain breaks. Chain integrity is publicly verifiable at any time by any party.

3. Trust Model

The protocol defines four types of trust, each independently verifiable:

Transaction Trust

Established by the Proof Token. The token proves that a business-customer interaction occurred. The protocol does not verify the nature of the transaction — only its existence.

Identity Trust

Established by email verification (OTP). The reviewer proves control of an email address. The address is immediately hashed after verification — the system retains only the irreversible hash.

Behavioral Trust

Established by the Reviewer Trust Score. RTS increases with consistent, verified behavior over time. Factors include: account age, review volume (logarithmic), review quality, behavioral consistency, identity verification level, and dispute history. The exact weights are proprietary.

Institutional Trust

Established by business certification. Businesses verify their identity through email, domain ownership (DNS TXT records), and protocol declaration. Each level increases the public certification status displayed on their profile.

4. Identity Layer

The protocol handles identity at two levels:

Reviewer Identity

Reviewers are identified by the SHA-256 hash of their email address. The system never stores plaintext email. After OTP verification, the email is immediately converted to a one-way hash. The reviewer is pseudonymous — identifiable across reviews (same hash = same person) but not deanonymizable from the hash alone.

Business Identity

Businesses are identified by a unique slug and authenticated by an API key. Business identity is progressively verified through certification levels: email verification (OTP), domain verification (DNS TXT record), protocol declaration (dedicated DNS subdomain), and profile publication.

5. Verification Mechanisms

Proof Token Verification

Tokens are validated on submission: must exist, must be in ACTIVE status, must not be expired, must not be previously used. Upon use, the token is permanently marked USED with a timestamp. One token — one review, enforced at the database level.

Email Verification

Six-digit OTP sent to the claimed email address. Code expires after a defined period. Rate-limited per email and per IP. After successful verification, the email is hashed and the OTP is destroyed.

Domain Verification

Three-tier DNS verification using standard TXT records. Tier 1: ownership proof (unique token on main domain). Tier 2: protocol declaration (structured record on _veribureau subdomain, analogous to DMARC). Tier 3: profile publication. DNS is queried in real-time; records are not cached by the protocol.

Audit Chain Verification

Any party can verify the entire audit chain via public API or download the full chain for offline verification. The system iterates all records, recomputes each hash from the previous record, and confirms chain continuity. A discontinuity indicates that records have been altered. The verification endpoint returns: chain validity, total records, root hash, and timestamp.

6. Scoring Architecture

The Composite Business Score (CBS) is computed from all verified reviews using a weighted formula. The weight of each review depends on three factors: the reviewer's RTS (behavioral trust), recency (exponential decay calibrated per industry), and the review score itself.

The scoring function is nonlinear by design. This means:

A single review from a new reviewer has minimal impact on a business with many reviews

Manipulating a score requires many high-trust accounts acting consistently over months

Recent reviews have more influence than old reviews, calibrated by industry

The system supports 27 industry categories, each with independent calibration

The exact parameters (exponents, decay rates, weight curves, industry calibration values) are proprietary and are not published.

7. Integrity Model

The protocol addresses the following integrity challenges:

Unverified Review Submission

Not possible without a valid Proof Token. Tokens are generated only by authenticated businesses. Each token is single-use. Automated creation is rate-limited and monitored.

Unauthorized Review Submission

A third party cannot generate tokens for another business. Even if tokens were obtained, the resulting reviews would come from new reviewers with minimal RTS, producing negligible score impact.

Coordinated Inauthentic Behavior

Coordinated review campaigns using many accounts are mitigated by the nonlinear weight function. New accounts have minimal influence. Building trust requires months of consistent, verified behavior across multiple businesses.

Score Manipulation by Operator

The operator (VeriBureau) cannot alter scores. CBS is computed deterministically from review data. Any manual alteration would require modifying the audit chain, which would break its cryptographic integrity and be publicly detectable.

Data Tampering

The audit chain makes tampering detectable. Each record contains a hash of the previous record. Altering any historical record invalidates all subsequent hashes. The chain is publicly verifiable.

Identity Duplication

Creating multiple identities is mitigated by email verification (one hash = one identity) and the logarithmic review volume factor in RTS (diminishing returns from more reviews).

Review Suppression

Reviews cannot be deleted by anyone — including the operator. The audit chain is append-only. Disputes add context but do not remove reviews. This is enforced architecturally.

8. Business Certification Protocol

Businesses progress through certification levels by completing verifiable actions:

LEVEL 1

Email Verified

Business email confirmed via OTP.

LEVEL 2

Domain Verified

DNS TXT record proves domain ownership. Record format: veribureau-verify=VB-[id]-[hash]

LEVEL 3

Protocol Declared

Dedicated DNS subdomain declares protocol participation. Record on _veribureau.[domain] with format: v=vb1; id=[slug]; status=verified

LEVEL 4

Fully Certified

All levels completed. Profile published in DNS. Maximum trust status.

Certification cannot be purchased or manually assigned. Each level is verified programmatically.

9. Public API Surface

The protocol exposes a RESTful API over HTTPS. All data is transmitted in JSON. Authentication uses API keys in a custom header. Rate limiting is applied per endpoint.

# Public endpoints (no authentication)

GET  /api/v1/businesses/:slug

GET  /api/v1/businesses/:slug/badge

GET  /api/v1/reviews/business/:slug

GET  /api/v1/audit/verify

GET  /api/v1/directory

# Authenticated endpoints (API key required)

POST /api/v1/tokens

POST /api/v1/reviews/submit

POST /api/v1/verify/domain/start

# Full documentation

veribureau.com/docs

10. Cryptographic Infrastructure

Merkle Tree and Inclusion Proofs

Records are grouped into Batches. Each Batch constructs a binary SHA-256 Merkle Tree from canonical record hashes (RFC 8785). The Merkle Root commits to all records in the batch. Inclusion Proofs allow verification that a specific record exists in a batch without downloading the entire chain — logarithmic in size.

GET /api/v1/audit/proof/:recordId

RFC 3161 Trusted Timestamps

Each batch is timestamped by an independent RFC 3161 Timestamp Authority. This provides cryptographic proof of existence at a specific point in time, independent of the VeriBureau operator. The timestamp response can be verified offline using standard OpenSSL tools.

Ed25519 Signatures

All signed audit records use Ed25519 digital signatures. The public signing key is available at /signing-key.pub.

Key Rotation

The signing key can be rotated through a secure protocol: the old key signs the new key, and the new key signs the old key. This bidirectional binding is recorded in the audit chain. Historical records remain verifiable against the key that signed them.

DNS Anchoring

The current audit chain root hash is published as DNS TXT records across three independent domains. This provides an external, tamper-evident reference point outside the VeriBureau infrastructure.

11. Intellectual Property

The VeriBureau protocol, including all scoring algorithms, calibration parameters, and implementation code, is the proprietary intellectual property of AIST Telecommunications (LLC “AIST-Telecommunication”, EDRPOU 30635430).

This specification describes the public interface and guarantees of the protocol. It does not grant any license to implement, reproduce, or create derivative works.

The protocol name “VeriBureau” and the standard name “GTVS” (Global Trust Verification Standard) are the property of AIST Telecommunications.

12. Versioning

Protocol version: 3.0
API version: v1
Specification date: March 2026
Author: AIST Telecommunications

This specification may be updated. Changes to the scoring algorithm do not constitute a new protocol version. Protocol version changes indicate structural changes to axioms, trust model, or verification mechanisms.