Purpose
Portable trust
A seal gives downstream systems one verifiable object instead of a set of informal logs, screenshots, or application-side signatures.
Portable Trust Object
A Digital Seal is the on-chain attestation record minted when a supermajority of Aethelred validators agrees on an AI computation result. It is the object that turns verified execution into something another application, institution, contract, or chain can inspect without inheriting opaque trust. The current model is defined in the whitepaper, exposed through the SDK and API surfaces, and relayable over IBC on port aethelred.seal.
The seal exists because consensus accepted the computation evidence, not because an application saved a convenient receipt.
SDKs, APIs, contracts, and other chains can consume a Digital Seal without replaying the full workload.
Different verification types can converge into one portable output object once the network agrees on the result.
Definition
The seal is the network-native evidence object that sits between verified execution and downstream consumption.
Purpose
A seal gives downstream systems one verifiable object instead of a set of informal logs, screenshots, or application-side signatures.
Minting Context
The network mints a seal only after the validators agree on the computation result and the seal-creation transaction passes the current rules.
Consumption
Seals can be consumed by SDKs, exposed through APIs, checked by contracts, and relayed over IBC to other compatible chains.
Anatomy
The whitepaper structure is precise: seals tie identity, commitments, evidence, and chain context into a single object.
The API and SDK surface still let developers inspect associated attestations and commitments when a workflow needs deeper review.
Lifecycle
The seal lifecycle is a consensus flow, not a post-processing attachment.
The workload runs under TEE, zkML, or hybrid verification based on the sensitivity and assurance requirements.
Validators package job identity, commitments, and attestation evidence into the `ComputeVerification` data that consensus evaluates.
If conditions pass, `PrepareProposal` injects seal creation transactions at the front of the block, subject to the documented per-block caps.
Once the block commits, the seal is part of the on-chain state and can be queried, verified, or relayed.
Verification
There is more than one consumption path, but the trust object stays the same.
| Surface | Current Interface | What it gives you |
|---|---|---|
| SDKs | client.seals.verify(...) | Programmatic seal validity checks inside application code. |
| REST / gRPC | /aethelred/seal/v1 | Direct network query surface for seal retrieval and inspection. |
| Oracle / contracts | verifySeal and verifySealWithOutput | Contract-level validity and output-commitment matching. |
| Attestation retrieval | getAttestations | Deeper review of the TEE evidence bound to the sealed result. |
| Tooling | Seal verifier and CLI | Local inspection before promoting a workflow into broader operations. |
Digital Seals are designed to move. The current whitepaper specifies IBC relay over port aethelred.seal, which lets other compatible chains consume verified AI results without recreating the full execution environment.
Applications
Seals are the evidence layer behind several workload categories already documented on the site.
Seals provide a transportable provenance object for experiment outputs, enabling cross-institution review without informal trust transfer.
Open research use case →Clinical-support and life-sciences workflows can bind model, input, and output commitments into a reviewable artifact for downstream systems.
Open healthcare use case →Origin, transfer, compliance, and anomaly outputs become shareable trust objects instead of opaque records inside one participant's system.
Open supply-chain use case →One agent can pass a sealed result to another agent, giving the downstream system something verifiable to inspect before acting.
Open agent-to-agent use case →Implementation References
If this page is where the trust model clicks, the next practical step is the contract and tooling surface that consumes seals in real workflows.
Contract Reference
The Smart Contracts page shows the current Solidity-facing seal surface, including verifySeal, verifySealWithOutput, oracle reads, callbacks, and conservative copyable patterns built from the live contracts package.
Open Smart Contracts →Tooling Surface
Use the Seal Verifier, API surface, and documentation hub when the next step is operational inspection rather than contract consumption. That path is better for teams validating evidence flows before writing on-chain policy.
Open Seal Verifier →Move from this page into the API surface, the seal verifier, and the workload-specific use-case pages when you need to turn the concept into a real integration pattern.