Skip to main content

How It Works

How Audrie Works

Audrie is a two-sided platform. On one side, identity-verified individuals and organisations authenticate documents – creating a permanent, tamper-evident record. On the other, any receiver of an authenticated file can verify it in seconds, for free.

Every authentication is cryptographically bound to a verified identity. Every verification returns a definitive result.

Prove your documents are genuine.

When you authenticate a document through Audrie, you create a verifiable record that cannot be denied, altered, or forged. Anyone who receives your document can check it against the Audrie register instantly.

Step 1

Verify Your Identity

Before you can authenticate documents, Audrie confirms who you are. This is a one-time process.

Identity verification is conducted through a government-grade identity verification provider. The process includes:

  • Government document verification (passport, driver's licence)
  • Liveness testing to confirm you are a real person
  • Biometric capture for future authentication challenges

For company directors and employees, Audrie also confirms your authority against the relevant government register – for example, ASIC in Australia.

For accountants and lawyers, your professional standing is confirmed against your professional body's register (CPA Australia, Law Society, and equivalent). This extra step enables registered professionals to access the higher standard ‘Independent Authentication’ standard.

Enterprise clients (e.g. ASX 200 and equivalent private companies) complete an additional in-person verification with the Audrie team. This establishes the highest level of chain-of-trust assurance.

Step 2

Authenticate Your Document

Log in to app.audrie.io using your passkey. Your device prompts a biometric challenge – fingerprint, face ID, or equivalent – every time you log in.

Upload the document you want to authenticate. Audrie accepts any file type up to 100MB.

Review the document, then tap “Issue Authentication.” A second biometric passkey challenge is triggered.

Upon confirmation, Audrie:

  • Generates a unique cryptographic hash of your document
  • Binds that hash to your verified identity using ML-DSA (FIPS 204) – a NIST post-quantum cryptographic signature standard
  • Records the authentication with a timestamp in the Audrie database

Your document is not stored nor any data from its contents. Only the cryptographic hash and your identity reference are retained.

Step 3

Share Your Document

The authenticated document is identical to the original – it is not modified, or embedded with metadata. Download it, email it, or send it directly from Audrie.

The authenticated filename is prefixed with “A-” to indicate authentication (for example, A-Results_Announcement_Q3_2025.pdf).

Recipients can verify the document through the Audrie verification endpoint at any time, for free.

Check any document in seconds.

If you have received a document and want to confirm it is genuine and unaltered, verification takes less than a minute.

Step 1

Go to the Verification Endpoint

Navigate to app.audrie.io/verify. No account required. Enter your email address and complete a CAPTCHA. That's it. Returning verifiers are recognised automatically via cookie, reducing friction for repeat checks.

Step 2

Upload the Document

Upload the document exactly as you received it. Do not alter any of the contents (eg. adding a signature) as any modification will change the cryptographic hash and will affect the verification result.

Step 3

Receive Your Result

Audrie returns a result in under one second. The result includes:

  • Match status: whether the document hash matches a record in the Audrie database confirming that the document hasn't been modified since being authenticated
  • Authenticator identity: the name, role, and organisation of the person who authenticated the document
  • Authentication date: the precise timestamp of authentication
  • Authenticator current status: whether the authenticator remains active or has been revoked
  • Onboarding tier: whether the authenticator completed Enterprise Verified or Standard onboarding

Step 4

Download Your Verification Certificate

Every successful verification generates a Verification Certificate – a downloadable record that proves you checked the document, when you checked it, and what result you received.

The Verification Certificate is itself system-authenticated by Audrie. It's a tamper-evident record of your due diligence.

This certificate is your evidence to regulators and other authorities that you relied on an authenticated document.

Not all authentication is equal.

Audrie supports two types of authentication. They reflect different levels of trust and different use cases.

Type 1

Self-Authenticated

A company director or authorised employee authenticates a document on behalf of their organisation. The authenticator is identity-verified and their authority is confirmed against the relevant government register.

This is the standard authentication type for corporate documents: financial statements, company disclosures, contracts, and correspondence.

Type 2

Independently Authenticated

A qualified professional – an accountant or lawyer – authenticates a document on behalf of a client. The professional's identity is verified and their professional standing is confirmed against their professional body's register.

Independent authentication provides a higher trust tier. The professional warrants to the authenticity of the document, adding their professional accountability to the authentication record. This type is appropriate for documents where a professional opinion or sign-off adds evidential weight: audited accounts, legal documents, trust deeds, and regulatory submissions.

Enterprise Verified

Initial authenticators are verified in person by a member of the Audrie team, followed by the standard remote IDV process. This establishes the highest level of chain-of-trust assurance and prevents remote impersonation of a corporation's identity. Enterprise Verified status is displayed on all verification results for documents authenticated by enterprise clients. Only Enterprise Verified businesses are permitted to create automated system-issued authenticated documents.

Standard

Remote identity verification plus register checks. Available for all self-authenticated and independently authenticated users.