Authentication Services (Group 1)

The live batch-authentication surface for checking and, when requested, rotating coin authenticity numbers.

Overview

Group 1 covers the live authentication commands. These are the commands clients use to verify ownership against RAIDA servers and, in the pown variants, rotate ownership secrets as part of successful validation.

Key terms

Term Meaning
ANAuthenticity number currently recognized by a RAIDA for a coin.
PANProposed new authenticity number supplied by the client.
POWNPassword-own flow that validates a coin and rotates AN to PAN on success.
MixedStatus 243. Some items passed and some failed, or the batch needs body-level inspection.

Live commands

Code Name Use it when
10detectYou want per-coin validation without rotating ANs.
11detect_sumYou want compact batch validation based on an aggregate proof.
20pownYou want validation plus AN rotation for each item.
21pown_sumYou want compact batch rotation based on a summed proof.

10 — detect

detect verifies the supplied AN for each coin but does not change coin ownership. It is the right choice for health checks, inventory scans, and read-only authenticity probes.

Response pattern

Expect 241 for all pass, 242 for all fail, and 243 when the server returns a mixed-result bitfield in the response body.

11 — detect_sum

detect_sum compresses authentication input by using an aggregate proof rather than transmitting every AN independently. Use it when the batch is large and the client prefers bandwidth efficiency over per-item detail on the first pass.

20 — pown

pown validates a coin and replaces its AN with the PAN supplied in the request. This is the standard ownership-rotation flow used during receive, recovery, and transfer workflows.

21 — pown_sum

pown_sum is the compact batch form of pown. It is appropriate when the client already has a stable aggregate proof and wants to rotate many coins with less request overhead.

Live surface note

Only 10, 11, 20, and 21 are part of the active audited authentication set on this site.