Getting Started

Govern Quick Start

Full artifact extraction, sealing, and verification — 10 minutes

The Govern Workflow

Create governed emotional data artifacts with cryptographic integrity proofs. Each step produces an artifact that the next step depends on.

1
Create API Key
2
Extract
3
Seal
4
Verify

Step 1: Create an API Key

Required for all API requests

Generate an API key from the console. Keys follow the format dda_live_* and are scoped to specific operations.

Tip: For the Govern workflow, create a key with extract, issue, and verify scopes enabled.

Step 2: Extract

Interpret content into an EDM artifact

Call POST /v1/extract to interpret natural-language content into a structured affective record. The response contains an EDM artifact with 96 fields across 10 domains.

curl -X POST https://www.deepadata.com/api/v1/extract \
  -H "Authorization: Bearer dda_live_YOUR_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "content": "I felt a deep sense of relief today after finally resolving the conflict with my colleague.",
    "jurisdiction": "GDPR",
    "consent_basis": "consent"
  }'

Example response (abbreviated):

{
  "success": true,
  "data": {
    "artifact": {
      "meta": { "id": "edm_abc123...", "version": "0.5.0" },
      "core": {
        "anchor": "Finally resolving a workplace conflict",
        "spark": "Relief after conflict resolution"
      },
      "constellation": {
        "emotion_primary": "relief",
        "emotion_secondary": "contentment"
      },
      "governance": {
        "jurisdiction": "GDPR",
        "consent_basis": "consent"
      }
    }
  }
}

Save the artifact object — you'll use it in the next step.

Step 3: Seal

Create a cryptographically signed .ddna envelope

Call POST /v1/issue to seal the artifact into a .ddna envelope with a W3C Data Integrity Proof. This creates an immutable, verifiable record with a certificate of issuance.

curl -X POST https://www.deepadata.com/api/v1/issue \
  -H "Authorization: Bearer dda_live_YOUR_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "artifact": { ... },
    "pathway": "delegated",
    "authority": "app:your-platform"
  }'

Example response:

{
  "success": true,
  "data": {
    "envelope": {
      "ddna_header": { "version": "1.0", "format": "ddna" },
      "edm_payload": { ... },
      "proof": {
        "type": "DataIntegrityProof",
        "cryptosuite": "eddsa-jcs-2022",
        "verificationMethod": "did:key:z6Mk...",
        "proofValue": "z5vgFc8h2YR3..."
      }
    },
    "certificate_id": "cert_8f7a3b2c...",
    "certification_level": "standard"
  }
}

Save the envelope and certificate_id for verification and audit trails.

Step 4: Verify

Confirm provenance and certification level

Call POST /v1/verify to verify the cryptographic provenance of any .ddna envelope. This checks the Ed25519 signature, schema validity, consent attestation, and governance completeness.

curl -X POST https://www.deepadata.com/api/v1/verify \
  -H "Authorization: Bearer dda_live_YOUR_KEY" \
  -H "Content-Type: application/json" \
  -d '{
    "envelope": { ... }
  }'

Example response:

{
  "success": true,
  "data": {
    "verified": true,
    "certification": {
      "level": "standard",
      "checks": {
        "schema_valid": true,
        "provenance_intact": true,
        "consent_attested": true,
        "governance_complete": true,
        "non_biometric": true
      }
    },
    "signer": {
      "did": "did:key:z6Mk...",
      "verification_method": "did:key:z6Mk...#key-1"
    }
  }
}

What's Next?