Receipt Verification

Verify a receipt

Every CCPA Shield scan produces a cryptographic receipt. Enter the receipt ID to independently verify its integrity.

How receipt verification works

01

Scan Produces Receipt

Every CCPA Shield scan generates a unique receipt with a SHA-256 payload hash and HMAC-SHA256 integrity token.

02

Chain Linked

Each receipt references the previous receipt's hash, creating a tamper-evident chain. Modify one receipt and the entire chain breaks.

03

Independently Verifiable

Enter any receipt ID here. We verify the hash chain, payload integrity, and token format — all cryptographically.