Intellectual Property
Systems and Methods for Generating and Enforcing Attested Governance Artifacts
Patent Overview
USPTO Application No. 19/433,835. Filed December 28, 2025.
Our patent application covers 20 claims across three independent claims: runtime integrity enforcement, privacy-preserving disclosure, and tamper-evident continuity chains.
Independent Claims
Runtime Integrity Enforcement
Generating sealed policy artifacts from attestation, executing subjects within a portal runtime that continuously measures integrity against the sealed reference, and automatically enforcing predetermined actions upon drift detection.
- Policy artifact sealing with cryptographic signatures
- Continuous measurement at policy-specified cadence
- Automatic enforcement without human intervention
- Signed receipts documenting enforcement events
Privacy-Preserving Disclosure
Maintains a claims taxonomy with sensitivity classifications and ordered substitute lists. When a claim is denied by policy, iteratively traverses substitutes to find a permitted lower-sensitivity equivalent, generating signed substitution receipts.
- Claims taxonomy with sensitivity classification
- Ordered substitute claim traversal
- Signed substitution receipts with reason codes
- Chain-linked audit trail for disclosure decisions
Continuity Chain System
Append-only chain of continuity events where leaf hashes are computed from structural metadata (excluding payload), enabling third-party integrity verification without payload disclosure. Periodic Merkle checkpoints anchored to immutable storage.
- Structural metadata leaf hashes (payload-excluded)
- Previous leaf hash linking for tamper evidence
- Merkle root checkpoints with anchor references
- Offline evidence bundle verification
Technical Specification
The patent application defines the technical requirements for cryptographic runtime enforcement, privacy-preserving disclosure, and continuity chain systems. The reference implementation is available on npm and PyPI.
Reference implementation available on npm with 1,227 automated tests and an independent cryptographic verifier.
Implementation note: The patented architecture uses standard cryptographic primitives (Ed25519, SHA-256, Merkle trees) and does not require Trusted Execution Environments, Zero-Knowledge Proofs, or specialized hardware. TEE attestation quotes may be consumed as one measurement input but are not architecturally required.
Licensing Inquiries
Partnership and acquisition discussions
For licensing, acquisition, or strategic partnership discussions regarding our patent-pending technology, please contact our intellectual property team.
View NIST submissions and diligence materials →Cryptographic Primitives