Security-First Protocol

Zero-Fraud
Verification.

A static QR code is a security hole. Proximatic uses Dynamic, Single-Use QR Codes that expire in seconds.

Secure Protocol v4.2 // Rolling-JTI
Supervisor Mode

Check-in Terminal

Token RotationTTL: 10s
AES-256 Signedsig: initial...

The Burn.

Why simple QR forms fail high-stakes coordinators

Static Forgery

Volunteers take a photo of a static code and text it to friends. Your 80-hour log is now a work of fiction.

Remote Check-ins

Without verification, 'check-ins' happen from coffee shops and parking lots miles away from the event site.

Buddy Punching

One volunteer scans for three others. The system records four attendees, but only one is actually doing the work.

Core Architecture

The Rolling
Defense.

Military-grade security logic, distilled into a frictionless supervisor experience.

90-Second Lifespan

Every QR code generated by a supervisor is unique and expires in 90 seconds. A photo taken now is worthless a minute later.

Single-Use JTIs

Once a code is scanned, its unique identifier (JTI) is marked as used. It cannot be scanned twice, even if it hasn't expired yet.

Supervisor-Linked

Every scan is cryptographically signed and tied back to the specific supervisor who generated it. Audit trails are bulletproof.

Protocol: Secure-Roll v4.2
AES-256-GCM.Inspector

Inspection: Rolling_JTI

01constpayload={
02"shiftId":"uuid-99a2-11ef",
03"supervisorId":"uuid-88b1-22cd",
04"action":"checkin",
05"exp":1770416822,
06"jti":"k8s_92nsl021",
07"sig":sha256(secret + payload)
08}
Security Note: Any modification to the payload after signing will cause a signature mismatch, nullifying the check-in attempt instantly.

Compliance
Simplified.

Precision data for the auditors that demand it. From legal aid to federal grant reporting.

Audit-Ready Modules

Court-Related Service Logs
High-Accuracy Activity Data
Supervisor-Verified Check-ins
Standardized DSS/SNAP Exports

The Audit Trail.

Logged with sub-second precision, including supervisor signatures and rolling cryptographic keys.

Reporting Outputs.

Export high-fidelity logs designed for agency audits, grant reporting, and legal mandates.

Host Responsibility & Disclosure

Final verification of volunteer hours remains the host organization's responsibility. Proximatic provides the engine; you provide the oversight.

Agency names (SNAP, WIC, DSS) are descriptive only. Proximatic is not a legal entity or government agency.

Stop The
Time Theft.

Deploy in under 5 minutes • No special hardware required

Privacy & Cookies

WE USE COOKIES TO ENHANCE YOUR EXPERIENCE AND ANALYZE OUR TRAFFIC. CONTROL YOUR DATA, OR ACCEPT ALL TO CONTINUE.