Published January 23, 2026 | Version vHIST-1.6
Standard Open

Clinical Truth Chain (CTC): Permit-to-Pay for AI-Governed Billing (CTC-AAS v1.0; CB-1 v1.1)

Authors/Creators

Description

Clinical Truth Chain (CTC): Permit-to-Pay for AI-Governed Billing (vHIST-1.6)

Normative requirements are defined only in AAS v1.0 and CB-1 v1.1.
The whitepaper and technical addendum are informative and do not redefine normative requirements.

Clinical Truth Chain (CTC) defines a deployable, standardizable integrity pattern for AI-influenced healthcare workflows that replaces narrative justification with replay-verifiable evidence. CTC operationalizes Admissible Automation as a safety property: payment, denial, adjustment, submission, and other settlement-critical actions are admissible only when an independent verifier can recompute declared predicates from canonical, signed receipts anchored to an append-only Continuity-Verified Log (CVL) under explicit freshness bounds. If required evidence is missing, stale, ambiguous, or unverifiable, the default is fail-closed (HOLD/manual review, or deterministic DENY/PEND per policy).

CTC supports two high-stakes governance modes:

  • Permit-before-action for AI-assisted clinical Decision Support Intervention (DSI) episodes (safety governance).

  • Permit-to-pay conformance for financially consequential workflows (prior authorization → claim binding → billing gates → correction/recoupment).

What makes CTC different

CTC turns “AI touched it” into a measurable, independently checkable claim. Receipts bind:

  • Policy pinning (policy id/version/digest via PAR/PARR),

  • Configuration lineage and provenance (who/what/when, signature verification),

  • Integrity and continuity (canonicalization, digest commitments, CVL inclusion/consistency proofs),

  • Deterministic failure semantics (stable reason codes for audit comparability),

  • Correction without rewriting history (forward-linked AOR/CR receipts; bounded propagation via a Correction Propagation Policy (CPP)).

Verification is privacy-preserving by default: verifiers can recompute admissibility predicates using minimal disclosure (commitments/selective disclosure) under explicit access policy, while still validating integrity, continuity, and freshness.

Contents of this Zenodo record

This record publishes the core specification set for procurement- and audit-grade adoption:

  • CTC Whitepaper vHIST-1.6 (Informative): architecture, the five-rail evidence spine, evaluation plan, and procurement toolkit.

  • CTC Constitution — Admissible Automation Standard (AAS) v1.0 (Normative): fail-closed admissibility rule; canonicalization, signatures, and policy pinning; CVL predicates; replay verification algorithm; deterministic reason codes; forward-linked correction semantics.

  • CB-1 Permit-to-Pay Conformance Badge v1.1 (Normative): minimum receipt sets and required predicates per rail; PASS/FAIL semantics; signed Conformance Result expectations.

  • Technical Addendum vHIST-1.6A (Informative): HL7 FHIR R4+ mapping (DocumentReference + Provenance + AuditEvent) and expanded threat model.

  • AAS v1.0 Change Log (Informative): release notes and migration checklist.

  • Conformance artifacts: CB-1 Open Conformance Pack, test vectors, and independent verifier implementations to support reviewer-runnable replay verification.

Intended users

Payers, health systems/IDNs, RCM vendors, regulators, auditors, and implementers who need procurement-grade, replayable evidence for AI-influenced decisions—reducing dispute friction, audit burden, and post-payment recoupment risk by making admissibility checkable rather than narrative.

Integrity

This record includes CHECKSUMS_MINIMAL.sha256 for fixity verification (e.g., sha256sum -c CHECKSUMS_MINIMAL.sha256).

Licensing & Notices
Informational/technical only; not legal, medical, coding, compliance, reimbursement, or regulatory advice.
All examples, fields, schemas, thresholds, mappings, and workflows are illustrative and non-limiting; implementations may vary.

Text and figures in this record are licensed under CC BY 4.0 unless a specific file states otherwise.
Software/data artifacts (e.g., ZIP archives) may include their own LICENSE/NOTICE files; those terms govern for the contents of that artifact.
No patent license is granted by this publication; any patent license requires a separate written agreement.
Vendor-neutral does not mean IP-unencumbered; implementers are responsible for obtaining any necessary rights.
No admission is made that any reference constitutes prior art.

Files

CTC_Whitepaper_Apex_vHIST-1.6_DOI18340955.pdf

Files (4.2 MB)

Name Size Download all
md5:402c49db6bc039389c8fbf0ac655a936
764 Bytes Download
md5:0cd377e3eb69f2fae93ce81448d17bc4
455 Bytes Download
md5:91c969497fbcd7af2e5e26753670bc2e
473.3 kB Preview Download
md5:a19afc31b7aafbe5acaa11783ca92ca0
346.1 kB Preview Download
md5:7fc58df9ce2147659513017377fd39d0
378.5 kB Preview Download
md5:e71efbb8736f456c7c5710887b9baaaf
11.3 kB Preview Download
md5:2a80bd6c3c89d466ad95effb7fc39c9b
9.4 kB Preview Download
md5:827bc6e270baaa405ae19781d85cae12
1.2 MB Preview Download
md5:29f91c278cd5fef4b993467f6989572c
160.5 kB Preview Download
md5:c22515a5c0670851db57c214868241eb
1.2 MB Preview Download
md5:71f5163f719c074084b216c6a9294de9
404.8 kB Preview Download
md5:12601b49369198f58956f133ae550476
32.3 kB Preview Download
md5:fff3de6703835d3c50f6254a052e0d2d
1.1 kB Preview Download
md5:05cb0f9218ea3ca458ec8e558e271dd7
931 Bytes Preview Download
md5:402bbb1ec1c3f97a5628ae72ece3686a
2.3 kB Preview Download
md5:6d7d1f5a472bbc26e82b4200f0be49e2
3.4 kB Preview Download

Additional details

Additional titles

Subtitle (English)
Replay-verifiable receipts from prior authorization through billing to corrections/recoupment (clawbacks), backed by a normative standard (CTC-AAS), a procurement-grade badge profile (CB-1), and runnable verifiers with test vectors.

Related works

Is referenced by
Standard: 10.5281/zenodo.18236114 (DOI)

Dates

Issued
2026-01-23