Puddingify Verification Tools
🔐 Create Identity Proof
Generate a cryptographically signed statement proving you control the private key bound to your alias and email — sealed with a Sectigo RFC 3161 timestamp.
Complete Workflow:
- Your alias and email are auto-populated from your Puddingify account — these are cryptographically bound to your private key at registration
- Add any Additional Claims (optional) — such as your website, social handles, or professional role
- Click Generate Message to Sign — this creates a timestamped plain-text statement asserting your control of the private key bound to your identity
- Review the generated statement, then upload your Puddingify private key — the tool verifies the key matches your account before signing
- Click Sign Message — or paste an externally generated Base64 signature if you signed using OpenSSL or GPG
- Your public key is auto-populated from your key file — or upload it separately
- Click Generate Identity Proof — your proof is cryptographically sealed with a Sectigo RFC 3161 timestamp
- Download your JSON proof file and raw message .txt — share the JSON with anyone who needs to verify your identity
⚠️ Important: Anyone who gains access to your private key file could sign statements as you. Keep your private key secure and never share it. If you believe your key has been compromised, contact Puddingify immediately to revoke it.
🕐 Sectigo RFC 3161 Timestamp — Once signed, your proof is automatically timestamped by Sectigo, one of the world's largest and most trusted Certificate Authorities, used by governments, law firms, and financial institutions globally. This timestamp is cryptographically sealed and independently verifiable by any RFC 3161 compliant tool — it cannot be backdated, altered, or disputed.
Click to select your public key file (.pem)
📄 Document Signing
Sign PDF, DOCX, TXT, and other documents to prove authorship.
Complete Workflow:
- Select your document file and add a description (your alias and email are auto-populated from your account)
- Generate the document hash — this creates a unique fingerprint of your file
- Upload your private key to sign the message
- Add your public key for verification
- Generate the complete proof
Click to select your public key file (.pem)
🔗 Sign a File Hash
Generate a SHA-256 hash of any file and sign it to prove you had access to that exact file at a specific time.
Complete Workflow:
- Enter a hash manually or upload a file to generate one
- Add a description and generate the message to sign
- Upload your private key to sign the message
- Add your public key for verification
- Generate the complete proof
Click to select your public key file (.pem)
📋 Sign JSON Data
Sign any JSON data structure to prove you authored it and that it hasn't been altered since signing.
Complete Workflow:
- Enter or paste your JSON data and validate it
- Add a description and generate the message to sign
- Upload your private key to sign the message
- Add your public key for verification
- Generate the complete proof
Click to select your public key file (.pem)
✅ Verify Signatures
Manually verify a raw digital signature — paste the original message, the signature, and the signer's public key to confirm it's authentic.
Verification Process:
- Paste the original message that was signed
- Paste the digital signature to verify
- Upload the signer's public key (.pem) file
- Click "Verify Signature" to confirm validity
📄 Click to select message .txt file — or type/paste below
📄 Click to select signature file — or paste Base64 below
📄 Click to select public key .pem file
🔍 Verify Identity Proof
Verify someone's digital identity proof — upload their JSON file or paste the contents below.
Verification Process:
- Upload the JSON proof file or paste the contents below
- Click "Verify Proof" to check the digital signature
- See instant ✅ VALID or ❌ INVALID result
- Review the verified identity claims
🔒 Why This Proves Identity
The JSON proof contains three things locked together cryptographically:
- The claims — the alias and email the person is asserting ownership of
- A digital signature — generated using a private key only they possess
- Their public key — which this tool uses to confirm the signature is genuine
If the result is ✅ VALID, it means: the signature on these exact claims was produced by whoever holds that private key — and the claims have not been altered since signing. No one can fake or modify this proof without the original private key.
📄 Click to select JSON proof file — or drag and drop here
📄 Verify Document Proof
Verify a document signature proof — upload the JSON file or paste its contents to confirm the document is authentic and unaltered.
Verification Process:
- Upload the JSON document proof file or paste its contents directly in the text area below
- Click "Verify Document Proof" to check the digital signature
- See instant ✅ VALID or ❌ INVALID result
- Review the verified document claims
📄 Click to select JSON proof file — or drag & drop here
🕐 Verify RFC 3161 Timestamp
Verify that a portfolio or copyright infringement notice was cryptographically timestamped by a trusted third party.
Verification Process:
- Paste the portfolio metadata JSON, or copyright infringement notice JSON, below
- Click "Verify Timestamp" to check RFC 3161 proof
- See instant ✅ VALID or ❌ INVALID result
- Confirm the timestamp cannot be backdated
What gets verified:
- TSR Token is cryptographically valid (signed by Sectigo/RFC3161.ai.moda)
- Merkle Root hash matches the timestamped hash
- Timestamp is from a trusted third party (Sectigo)
- Timestamp is legally binding proof of existence
📄 Click to select JSON file — portfolio metadata, identity proof, or copyright notice
🧾 Verify Manifest & Signature
Check whether a portfolio collection's manifest.json and its digital signature are authentic — enter the Collection ID and the creator's public key.
Verification Workflow:
- Enter the Collection ID to verify
- Upload the corresponding Public Key (.pem) file
- Click Verify Manifest & Signature to start
- View the verification result instantly ✅ or ❌
Click to select your public key file (.pem)
🎓 Certificate Package Verification
Upload and automatically verify a complete certificate package (ZIP file). This will check all cryptographic proofs, signatures, and manifests.
Automated Verification Workflow:
- Upload the Certificate Package ZIP file
- System automatically extracts all files
- Verifies all cryptographic components:
- ✓ Certificate authenticity
- ✓ File content hashes
- ✓ Filename manifest integrity
- ✓ Merkle root calculation
- ✓ Digital signature validity
- ✓ RFC 3161 timestamp (if present)
- View comprehensive verification report
📦 Click to select Certificate Package ZIP file