What it is
A framework for determining whether approval is valid.
Credentis
It shifts approval confidence from a transferable code to a live authorization event, where identity, intent, and transaction context must align before approval is trusted.
This is not a stronger delivery method for a familiar approval artifact. It is a different basis for determining whether authorization is valid.
What it is
A framework for determining whether approval is valid.
What it is not
Not another OTP product. Not a delivery-channel variation.
What changes
Approval confidence comes from live alignment of identity, intent, and context.
Why it matters
Category distinction
Authentication may confirm account access, but it does not by itself determine whether the exact financial instruction was validly authorized.
Category distinction
A familiar artifact can still be replayed, relayed, or detached from the real approval context.
Category distinction
Changing the route of delivery is not enough unless the institution also changes what it evaluates before approval is accepted.
The framework evaluates authorization validity as a control question, distinct from code-centered approval.
What the Framework Defines
Transaction object
Authorization is tied to the exact business event requiring approval.
Control environment
Authorization does not occur inside the transaction-initiation environment.
Authorization event
Authorization is captured within defined initiation, controlled exchange, and termination conditions.
Decisive conditions
Identity, Intent, and Context must coherently align for the exact transaction.
Transaction object
Authorization is tied to the exact business event requiring approval.
Control environment
Authorization does not occur inside the transaction-initiation environment.
Authorization event
Authorization is captured within defined initiation, controlled exchange, and termination conditions.
Decisive conditions
Identity, Intent, and Context must coherently align for the exact transaction.
Control Architecture
No.
Control domain
Definition
The exact instruction, amount, beneficiary, and business context that define what is being authorized.
A transaction-bound challenge framed for the exact financial instruction rather than for generic account access.
Authorization occurs in a distinct environment so the event is not collapsed into the initiation surface.
Identity continuity and deliberate intent are captured under controlled conditions for the live authorization event.
The institution receives a decision-ready output together with structured evidence for later review.
Threat Resistance
Resistance property
Compromising the initiation environment alone does not yield valid authorization.
Resistance property
Approval must correspond to the real transaction, not to a detached action or generic prompt.
Resistance property
Replayable proofs, detached codes, or transferable artifacts do not become decisive control.
Resistance property
Authorization must arise from a transaction-specific cognitive act, not passive continuation.
Security posture
Outcome boundary
Detached prompts, replayable proofs, and initiation-only compromise stop short of valid authorization.
Control effect
The decision event depends on coherent identity, exact transaction context, and deliberate subscriber action under controlled conditions.
Evidence and Review
Authorization events are preserved as reconstructable institutional records.
Events can be reviewed for control quality, exceptions, and decision outcomes.
Evidence enables disciplined investigation and post-event analysis.
The evidence-bearing approval model supports governance-grade traceability and assurance.
Where to go next