THIIC Tokenized Healthcare Identity Interchange Cryptography
SESSION ACTIVE · ----
Get in touch
PROTOCOL DOCUMENTATION

Reference Documents

Technical documentation for the THIIC protocol. No gating, no forms. Share freely with security, legal, and engineering teams.

PDF
Protocol White Paper
Full protocol specification: cryptographic primitives, key derivation, attack scenarios, compliance posture, and audit log design.
Download
PDF
Architecture One-Pager
Single-page visual overview of the bilateral exchange architecture. Built for executive briefings and technical pre-meetings.
Download
PDF
Compliance Posture Summary
HIPAA Safe Harbor framing, BAA compatibility, state health privacy considerations, FIPS 140-2 primitives. Forward to compliance and legal teams.
Download
PARTNER ACCESS

Gated Documentation

The three documents above cover the public protocol specification. Implementation reference code, integration documentation, and SDK materials are distributed separately through docs.thiic.com.

Access to the full documentation suite is available to authorized Summit Exchange partners under an active license. Contact jake@summitaudiencesegments.com to initiate partner onboarding.

Sign in to partner portal →

DOCS.THIIC.COM CONTENT
Reference implementation — Client SDK in TypeScript and Python for bilateral token exchange
Integration guide — Step-by-step instructions for connecting to the Summit Exchange API
Key rotation schedule — Protocol-enforced rotation intervals and key ceremony documentation
Audit log verification — Partner instructions for independently verifying HMAC chain integrity
SIGNED

All THIIC documents are cryptographically signed. Signatures can be verified using the THIIC public key published at docs.thiic.com. A document whose signature fails verification has been modified after publication — do not rely on it. The signing key is Ed25519 (RFC 8032); verification instructions are included in the white paper.