3 STEPS
What this demo shows
- 01Pick a sample
3 industries × Valid (legitimate) / Invalid (tampered, model-swap, duplicate) — 6 cases in all.
- 02Press Verify
A 5-step cryptographic verification runs: schema → envelope → input commitment → output commitment → policy.
- 03Read the result
Valid shows what was cryptographically proven and what it changes in production. Invalid shows what Lemma rejected and why.
Pick a sample
Six bundled samples cover three industries with one valid and one invalid pair each. Or upload your own proof bundle — verification runs entirely in your browser.
Banking & Finance
Manufacturing
Agent Economy
Pick a sample to begin.
Cryptographic primitives
Poseidon over BN254 BBS+ over BLS12-381 Groth16
Regulatory alignment
PPSI EUDR CBAM KYC/AML GDPR