Clinical Truth Chain (CTC): Permit-to-Pay for AI-Governed Billing (CTC-AAS v1.0; CB-1 v1.1)
Authors/Creators
Description
Clinical Truth Chain (CTC): Permit-to-Pay for AI-Governed Billing (vHIST-1.6)
Normative requirements are defined only in AAS v1.0 and CB-1 v1.1.
The whitepaper and technical addendum are informative and do not redefine normative requirements.
Clinical Truth Chain (CTC) defines a deployable, standardizable integrity pattern for AI-influenced healthcare workflows that replaces narrative justification with replay-verifiable evidence. CTC operationalizes Admissible Automation as a safety property: payment, denial, adjustment, submission, and other settlement-critical actions are admissible only when an independent verifier can recompute declared predicates from canonical, signed receipts anchored to an append-only Continuity-Verified Log (CVL) under explicit freshness bounds. If required evidence is missing, stale, ambiguous, or unverifiable, the default is fail-closed (HOLD/manual review, or deterministic DENY/PEND per policy).
CTC supports two high-stakes governance modes:
-
Permit-before-action for AI-assisted clinical Decision Support Intervention (DSI) episodes (safety governance).
-
Permit-to-pay conformance for financially consequential workflows (prior authorization → claim binding → billing gates → correction/recoupment).
What makes CTC different
CTC turns “AI touched it” into a measurable, independently checkable claim. Receipts bind:
-
Policy pinning (policy id/version/digest via PAR/PARR),
-
Configuration lineage and provenance (who/what/when, signature verification),
-
Integrity and continuity (canonicalization, digest commitments, CVL inclusion/consistency proofs),
-
Deterministic failure semantics (stable reason codes for audit comparability),
-
Correction without rewriting history (forward-linked AOR/CR receipts; bounded propagation via a Correction Propagation Policy (CPP)).
Verification is privacy-preserving by default: verifiers can recompute admissibility predicates using minimal disclosure (commitments/selective disclosure) under explicit access policy, while still validating integrity, continuity, and freshness.
Contents of this Zenodo record
This record publishes the core specification set for procurement- and audit-grade adoption:
-
CTC Whitepaper vHIST-1.6 (Informative): architecture, the five-rail evidence spine, evaluation plan, and procurement toolkit.
-
CTC Constitution — Admissible Automation Standard (AAS) v1.0 (Normative): fail-closed admissibility rule; canonicalization, signatures, and policy pinning; CVL predicates; replay verification algorithm; deterministic reason codes; forward-linked correction semantics.
-
CB-1 Permit-to-Pay Conformance Badge v1.1 (Normative): minimum receipt sets and required predicates per rail; PASS/FAIL semantics; signed Conformance Result expectations.
-
Technical Addendum vHIST-1.6A (Informative): HL7 FHIR R4+ mapping (DocumentReference + Provenance + AuditEvent) and expanded threat model.
-
AAS v1.0 Change Log (Informative): release notes and migration checklist.
-
Conformance artifacts: CB-1 Open Conformance Pack, test vectors, and independent verifier implementations to support reviewer-runnable replay verification.
Intended users
Payers, health systems/IDNs, RCM vendors, regulators, auditors, and implementers who need procurement-grade, replayable evidence for AI-influenced decisions—reducing dispute friction, audit burden, and post-payment recoupment risk by making admissibility checkable rather than narrative.
Integrity
This record includes CHECKSUMS_MINIMAL.sha256 for fixity verification (e.g., sha256sum -c CHECKSUMS_MINIMAL.sha256).
Licensing & Notices
Informational/technical only; not legal, medical, coding, compliance, reimbursement, or regulatory advice.
All examples, fields, schemas, thresholds, mappings, and workflows are illustrative and non-limiting; implementations may vary.
Text and figures in this record are licensed under CC BY 4.0 unless a specific file states otherwise.
Software/data artifacts (e.g., ZIP archives) may include their own LICENSE/NOTICE files; those terms govern for the contents of that artifact.
No patent license is granted by this publication; any patent license requires a separate written agreement.
Vendor-neutral does not mean IP-unencumbered; implementers are responsible for obtaining any necessary rights.
No admission is made that any reference constitutes prior art.
Files
CTC_Whitepaper_Apex_vHIST-1.6_DOI18340955.pdf
Files
(4.2 MB)
| Name | Size | Download all |
|---|---|---|
|
md5:402c49db6bc039389c8fbf0ac655a936
|
764 Bytes | Download |
|
md5:0cd377e3eb69f2fae93ce81448d17bc4
|
455 Bytes | Download |
|
md5:91c969497fbcd7af2e5e26753670bc2e
|
473.3 kB | Preview Download |
|
md5:a19afc31b7aafbe5acaa11783ca92ca0
|
346.1 kB | Preview Download |
|
md5:7fc58df9ce2147659513017377fd39d0
|
378.5 kB | Preview Download |
|
md5:e71efbb8736f456c7c5710887b9baaaf
|
11.3 kB | Preview Download |
|
md5:2a80bd6c3c89d466ad95effb7fc39c9b
|
9.4 kB | Preview Download |
|
md5:827bc6e270baaa405ae19781d85cae12
|
1.2 MB | Preview Download |
|
md5:29f91c278cd5fef4b993467f6989572c
|
160.5 kB | Preview Download |
|
md5:c22515a5c0670851db57c214868241eb
|
1.2 MB | Preview Download |
|
md5:71f5163f719c074084b216c6a9294de9
|
404.8 kB | Preview Download |
|
md5:12601b49369198f58956f133ae550476
|
32.3 kB | Preview Download |
|
md5:fff3de6703835d3c50f6254a052e0d2d
|
1.1 kB | Preview Download |
|
md5:05cb0f9218ea3ca458ec8e558e271dd7
|
931 Bytes | Preview Download |
|
md5:402bbb1ec1c3f97a5628ae72ece3686a
|
2.3 kB | Preview Download |
|
md5:6d7d1f5a472bbc26e82b4200f0be49e2
|
3.4 kB | Preview Download |
Additional details
Additional titles
- Subtitle (English)
- Replay-verifiable receipts from prior authorization through billing to corrections/recoupment (clawbacks), backed by a normative standard (CTC-AAS), a procurement-grade badge profile (CB-1), and runnable verifiers with test vectors.
Related works
- Is referenced by
- Standard: 10.5281/zenodo.18236114 (DOI)
Dates
- Issued
-
2026-01-23