Receipt Verification
Verify a receipt
Every CCPA Shield scan produces a cryptographic receipt. Enter the receipt ID to independently verify its integrity.
How receipt verification works
01
Scan Produces Receipt
Every CCPA Shield scan generates a unique receipt with a SHA-256 payload hash and HMAC-SHA256 integrity token.
02
Chain Linked
Each receipt references the previous receipt's hash, creating a tamper-evident chain. Modify one receipt and the entire chain breaks.
03
Independently Verifiable
Enter any receipt ID here. We verify the hash chain, payload integrity, and token format — all cryptographically.