Reference Integration · Prediction Integrity
BetFire AI
An implementation pattern for tamper-evident AI prediction records in a high-trust-deficit category. Every AI-generated pick is certified at issuance and bundled into a daily manifest at period close.
The integration demonstrates the prediction integrity primitives — signed receipts, pre-outcome timestamps, daily manifest certification, and independent public verification — applied to a single live use case.
The challenge
AI prediction platforms operate in a category with structural trust deficits. Readers cannot tell which platforms revise predictions after the outcome, publish only favorable picks, or backfill records that appear to have been issued in advance.
Screenshots are weak evidence. Timestamps in a database are display-only. Even an honest platform has no easy way to demonstrate that the published archive is the complete record of what the AI actually claimed in advance.
The BetFire AI integration solves the verification problem by binding every pick to a signed certificate at issuance — and binding every day's complete pick set to a signed manifest at period close.
The integration pattern
Seven steps. Each one independently verifiable. The full flow takes seconds per pick.
BetFire's prediction model produces a pick. Input context, model version, predicted outcome, and confidence are captured at generation time.
The pick is serialized into a canonical prediction_receipt.v1 payload — source, prediction_id, model_version, predicted_at, and context_summary.
The canonicalized payload is hashed locally (RFC 8785). The hash is the unique fingerprint of the prediction at issuance time.
The canonicalized payload is submitted to the CertifiedData issuance endpoint. The server hashes it again as a check, signs it with Ed25519, and issues a certificate.
BetFire stores the returned certificate_id alongside the pick in its own database. This is the durable link between BetFire's pick record and the CertifiedData certificate.
Each pick page displays a 'Verify this prediction' link pointing to /verify/<certificate_id>. Readers can verify integrity without leaving BetFire, or independently if they prefer.
At day close, BetFire collects every prediction_hash issued during the day, builds a prediction_manifest.v1 payload, and submits it as a MANIFEST certificate. The manifest ID is the canonical record of the day's complete prediction set.
What the integration proves
- →Each pick existed at the certified predicted_at timestamp
- →No pick has been edited since issuance
- →The daily archive is complete — no picks silently removed
- →Selective disclosure can be detected by comparing the public archive to the manifest
- →Every certificate is independently verifiable without contacting BetFire
- →That any individual prediction was correct
- →That the underlying model is calibrated, fair, or unbiased
- →That BetFire is licensed in any jurisdiction
- →That the prediction was profitable to act on
- →That historical performance predicts future outcomes
CertifiedData proves the record. It does not certify outcomes, evaluate accuracy, or claim regulatory standing.
What a reader sees when they verify a pick
The verification surface is the public-facing payoff for the entire integration. A reader who clicks the "Verify this prediction" link on a BetFire pick should land on a page that demonstrates the proof immediately — without requiring them to understand the cryptography.
The pattern: the public verification page fetches the certificate from the CertifiedData verification endpoint, displays the signed prediction payload alongside the recomputed hash, and shows a green check or red warning indicating whether the signature validates. Power users can copy the certificate ID and run the verification independently. The default user just sees that the record holds.
- →Certificate ID — the durable identifier the reader can quote, save, or paste elsewhere
- →Predicted at — the timestamp inside the signed payload (not the platform's display time)
- →Signing key ID — which CertifiedData signing key was used; verifiers can confirm it is the current published key
- →Signature status — clear pass/fail indication backed by the actual Ed25519 verification
- →Manifest reference — the daily manifest certificate ID this prediction appears in, with a link to the manifest verification page
- →Independent verify button — opens a code example showing how to verify offline with the public key
Live verification examples
Surface the proof, not the picks. The examples below show what BetFire AI prediction integrity records look like as certification artifacts — not as wagering content.
Reference records are illustrative until the production BetFire integration is live. Once live, these cards will populate from the real CertifiedData certificate registry.
BetFire AI prediction integrity status
- Total certified prediction records
- 1248
- Daily manifests certified
- 42
- Latest manifest
- 2026-05-14
- Latest certification
- 2026-05-14T12:03:24Z
- Verification method
- SHA-256 + Ed25519
- Status
- Verifiable
- Source
- BetFire AI
- Prediction ID
- bf_2026_05_14_001
- Model version
- EV-8.2
- Predicted at
- 2026-05-14T12:03:22Z
- Certified at
- 2026-05-14T12:03:24Z
- Outcome status
- Settled
- Verification
- Valid
- Period
- 2026-05-14 00:00 to 23:59 UTC
- Prediction count
- 42
- Manifest hash
- sha256:xyz000…
- Certified at
- 2026-05-15T00:00:14Z
- Verification
- Valid
- Coverage
- Complete (all 42 hashes match)
- Source
- BetFire AI
- Prediction ID
- bf_2026_05_13_017
- Predicted at
- 2026-05-13T17:48:11Z
- Resolved at
- 2026-05-14T02:14:09Z
- Outcome status
- Settled
- Resolution evidence
- External source reference recorded
- Verification
- Valid
- Resolver identity
- Recorded in payload
- Rules hash
- sha256:r1l3h4sh…
- Resolution timestamp
- 2026-05-14T02:14:09Z
- Linked prediction certificate
- Verified
- Manifest membership
- Confirmed
- Verification
- Valid
Redacted prediction record (CertifiedData surface)
{
"artifact_type": "prediction",
"artifact_schema": "prediction_receipt.v1",
"source": "betfire-ai",
"prediction_id": "bf_2026_05_14_001",
"model_version": "EV-8.2",
"predicted_at": "2026-05-14T12:03:22Z",
"certified_at": "2026-05-14T12:03:24Z",
"outcome_status": "settled",
"verification_status": "valid"
}CertifiedData surfaces the integrity-relevant fields only. The full prediction details — including any betting odds, market data, or platform-specific metadata — remain on BetFire AI.
Proof, not performance
CertifiedData verifies that a prediction record existed at a specific timestamp and has not been silently altered. It does not certify prediction accuracy, profitability, fairness, or legal compliance.
Implementation notes
Reference integration, not live customer
BetFire AI is documented here as a reference integration pattern. The page is intended to help other AI forecasting platforms understand how to implement the prediction integrity model — not to advertise a production deployment unless explicitly stated as live.
Schema-light, content-heavy
The integration uses the existing CertifiedData notary issuance flow with no schema migrations. The prediction_receipt.v1 and prediction_manifest.v1 schemas live entirely in the signed payload — backed by the documented payload convention.
Storage at the platform, certificate at CertifiedData
BetFire stores predictions in its own database with a certification_id reference. CertifiedData stores only the signed certificate envelope and payload. The full prediction record never has to leave BetFire's infrastructure.
Verification is offline-capable
The public signing key is published at /.well-known/signing-keys.json. Any party can verify a BetFire pick certificate using only the public key and the original prediction payload — no API calls to CertifiedData or BetFire required.
Machine-readable summary
{
"concept": "BetFire AI reference integration",
"concept_type": "reference-integration",
"canonical_url": "https://certifieddata.io/customers/betfire-ai",
"parent_concept": "Prediction Integrity",
"customer_status": "reference-integration",
"customer_status_note": "Documented as an implementation pattern. Not marketed as a live production deployment unless explicitly stated as such elsewhere.",
"integration_pattern": [
"pick_generated",
"canonical_json_snapshot",
"sha256_fingerprint",
"certifieddata_signs_receipt",
"certification_id_stored",
"public_verification_page",
"daily_manifest_certification"
],
"artifact_schemas_used": [
"prediction_receipt.v1",
"prediction_manifest.v1"
],
"signing_algorithm": "Ed25519",
"hash_algorithm": "SHA-256 (RFC 8785 canonicalized)",
"what_this_proves": "Each pick existed at the certified predicted_at timestamp; no pick has been edited since issuance; the daily archive is complete.",
"what_this_does_not_prove": "That any individual prediction is correct, calibrated, fair, profitable, or legally compliant."
}Build the same integration
The integration pattern is reusable across any platform publishing AI predictions. The schemas, endpoints, and verification flow are all documented.