Built on open standards, verifiable by anyone.
No proprietary lock-in. Industry standards you can trust.
Verifiable Credentials
UMP uses W3C Verifiable Credentials 2.0 for signed maintenance events.
- W3C VC 2.0 data model
- JSON Web Signature (JWS) for signing
- did:web for issuer identity
- Portable, interoperable credentials
Immutable Ledger
Credential hashes anchored to append-only storage for tamper-evidence.
- AWS QLDB for append-only ledger
- Sigstore Rekor transparency log (optional, for public auditability)
- Provable inclusion proofs
- No speculative tokens or public chains
Asset Identity
Global identifiers that work across systems and scanners.
- GS1 GIAI standard for asset IDs
- Digital Link URIs
- QR/NFC for physical discovery
- Mapping to existing IDs (VIN, serial, tail)
Telemetry Standards
Native integration with industrial telemetry protocols.
- ISO 15143-3 / AEMP 2.0 (heavy equipment)
- OPC UA (industrial) - roadmap
- NMEA 2000 (marine) - roadmap
- Custom adapter framework
Aligned with global standards.
FAA AC 120-78B
Electronic signatures and electronic maintenance records for aviation.
EU ESPR / Digital Product Passports
Ecodesign for Sustainable Products Regulation establishing DPP framework.
EU Battery Regulation 2023/1542
Battery passport requirements for EV and industrial batteries by 2027.
ISO 15143-3 / AEMP 2.0
Fleet data exchange standard for construction and mining equipment.
USCG Electronic Logbooks
Acceptance of electronic record books for vessels.
Security at every layer.
Keys in KMS
Private keys never leave AWS KMS. Hardware-backed key protection.
S3 Object Lock
Evidence files stored with WORM (Write Once Read Many) protection.
Hash binding
Evidence bound by SHA-256 hash. Any modification is immediately detectable.
Reliable sync
Background task scheduling with exponential backoff ensures credentials sync reliably on any network.
AI never signs.
Humans sign credentials. AI assists with intake and lint, but never has signing authority.
Optional: Public transparency log
For organizations requiring public auditability, UMP supports optional anchoring to Sigstore Rekor — an open-source, publicly verifiable transparency log. Credential hashes become independently auditable by anyone, not just UMP.
Tamper-evident evidence binding.
Photos, work orders, and documents are cryptographically bound to credentials. Any modification is automatically detected during verification.
Capture & hash
Photo or document captured, SHA-256 hash computed client-side before upload.
Store immutably
Evidence uploaded to S3 with Object Lock (WORM mode). Cannot be modified or deleted.
Bind to credential
Hash recorded in the signed credential. Evidence URI points to stored file.
Verify on demand
During verification, file is re-hashed and compared against credential hash.
Verification results
Hash matches. File is unchanged since credential was signed.
Hash mismatch. File has been modified after credential was signed.
File not found. Evidence referenced in credential cannot be retrieved.
Evidence cannot be deleted or modified — even by us.
S3 Object Lock in GOVERNANCE mode ensures files are immutable for 7 years by default. Versioning provides a complete audit trail. The "PROTECTED" status shown during verification confirms evidence is in WORM (Write Once Read Many) storage.
AI assists. Humans sign.
AI accelerates data entry and improves quality — but never has signing authority. Every credential is signed by a human.
Document intake
Upload PDFs, photos, or scans. AI extracts event type, date, meter readings, parts, and labor — you review before signing.
Learn morePassport summaries
AI-generated overviews where every claim cites source events. Citation validation ensures traceability.
Learn moreSelective disclosure
AI recommends which events to share based on recipient type (buyer, lender, auditor, insurer, lessee).
Learn moreParts normalization
Consistent part naming across records even when technicians use different descriptions.
Passport QA
Pre-sharing quality checks identify potential issues before your counterparty sees them.
Risk flag computation
Automatic detection of meter anomalies, overdue PM, and evidence issues from signed events.
Learn moreOutputs are traceable
AI summaries cite source events. Confidence indicators show where AI is certain vs. uncertain.
Graceful fallbacks
If AI is unavailable, manual workflows remain fully functional. Core operations never depend on AI.
Privacy-first processing
Document analysis happens in isolated sessions. We don't train on your maintenance data.