15 April 2025
This is the foundational question Story aims to answer.
Legitimacy is a form of digital scarcity; in IP, scarcity underpins value. As humans and AI generate and publish IP at an unprecedented scale, legitimacy becomes the signal that helps us distinguish originality from noise.
So, how do we define legitimacy in this new paradigm?
We believe legitimacy comes down to three core components:
While not exhaustive, these factors offer a practical foundation. If we can verify authorship, method, originality, and compliance, we can establish trust in the legitimacy of any IP. That trust becomes the bedrock for marketplaces, licensing, provenance, and attribution.
Story uses a decentralized, multi-layered system to validate IP legitimacy, built on two core components:
Together, they enable low-friction IP provenance and conflict resolution, supporting registration workflows while letting participants decide which attestations they trust.
These components form the IP Validation Service (IPVS), a decentralized marketplace for trust. We envision an expanding network of signal contributors—each offering verifiable, domain-specific assessments of IP.
Rather than blocking duplicates, which risks front-running, Story enables signal-based differentiation, helping legitimate IP surface organically.
Example Attestations by Legitimacy Component:
Legitimacy Component | Attestation Example |
---|---|
Origin: Is the author who they claim to be? | KYC/KYB providers |
Origin: Was the IP created in the way claimed? | Apptestations confirming provenance |
Originality: Is this original work? | Infringement detection (e.g., Yakoa, Pex) |
Compliance: Is this legal/appropriate to display? | Providers like Google NSFW classifiers |
Story attestations operate in two phases:
The system needs to be designed to handle:
We use Temporal for reliable workflow orchestration, split into two primary flows:
Workflow 1: Infringement Check & Persistence
Workflow 2: On-Chain Attestation Broadcast
This system is built for reliability, composability, and scale—ensuring robustness across Web2 and Web3 components.
Attestations are anchored on-chain using the Ethereum Attestation Service (EAS), a permissionless protocol for creating and verifying attestations about any subject matter.
EAS provides two key smart contracts:
0x5F983ab12EE78535C9067dE1CDFc7C511320fB7d
0x2a3565551548abfcdeB9983230D9CAcBb8c6c16c
0x5bF79CECE7D1C9DA45a9F0dE480589ecCE1B48c8
0xDcd40C896274E7e9776A48deB0fA34999935Ee55
Both schema registration and attestations are fully permissionless—any application can define or use custom attestation formats.
Let’s walk through a real example of how a content validation provider attests that an IP is not infringing:
A new schema is registered via SchemaRegistry.sol
. See example tx.
Schema ID: 0x9f898eca4ae41fb754e11c0062de5a4c6f35b52baa22df17bffa20a0d9fad28e
Example schema fields:
address ipId,
string ipUri,
uint64 attestationDate,
string providerName,
string providerUrl,
bool infringementDetected,
string infringementDetails,
string customData
Once a schema is created, the final step is to submit an attestation based on that schema. This involves interacting with the EAS.sol contract by invoking the attest()
function. The resulting transaction hash reflects an on-chain attestation made using the above schema.
Frontend applications can query EAS to display legitimacy signals, indicating whether a piece of IP has been flagged or verified as original.
This simple but flexible system allows developers to build customized trust layers directly into their user interfaces.
To enable automated checks, IP creators must supply:
Property Name | Type | Description |
---|---|---|
mediaUrl | string | Direct URL to content (image/audio) |
mediaHash | string | SHA-256 hash of content |
mediaType | string | Type of media (audio, video, image), based on mimeType. See the allowed media types here. |
If these fields are missing, no infringement check is triggered.
media.*
fields must be set before commercial terms are applied (commercialUse = true)
We are actively expanding SAS in three key areas:
If you validate IP through detection, identity, or provenance, we’d love to collaborate.