Skip to main content
PATENT PENDING

Intellectual Property

Systems and Methods for Generating and Enforcing Attested Governance Artifacts

Patent Overview

USPTO Application No. 19/433,835. Filed December 28, 2025.

Our patent application covers 20 claims across three independent claims: runtime integrity enforcement, privacy-preserving disclosure, and tamper-evident continuity chains.

Independent Claims

1

Runtime Integrity Enforcement

Generating sealed policy artifacts from attestation, executing subjects within a portal runtime that continuously measures integrity against the sealed reference, and automatically enforcing predetermined actions upon drift detection.

  • Policy artifact sealing with cryptographic signatures
  • Continuous measurement at policy-specified cadence
  • Automatic enforcement without human intervention
  • Signed receipts documenting enforcement events
2

Privacy-Preserving Disclosure

Maintains a claims taxonomy with sensitivity classifications and ordered substitute lists. When a claim is denied by policy, iteratively traverses substitutes to find a permitted lower-sensitivity equivalent, generating signed substitution receipts.

  • Claims taxonomy with sensitivity classification
  • Ordered substitute claim traversal
  • Signed substitution receipts with reason codes
  • Chain-linked audit trail for disclosure decisions
3

Continuity Chain System

Append-only chain of continuity events where leaf hashes are computed from structural metadata (excluding payload), enabling third-party integrity verification without payload disclosure. Periodic Merkle checkpoints anchored to immutable storage.

  • Structural metadata leaf hashes (payload-excluded)
  • Previous leaf hash linking for tamper evidence
  • Merkle root checkpoints with anchor references
  • Offline evidence bundle verification

Technical Specification

The patent application defines the technical requirements for cryptographic runtime enforcement, privacy-preserving disclosure, and continuity chain systems. The reference implementation is available on npm and PyPI.

Reference implementation available on npm with 1,227 automated tests and an independent cryptographic verifier.

Implementation note: The patented architecture uses standard cryptographic primitives (Ed25519, SHA-256, Merkle trees) and does not require Trusted Execution Environments, Zero-Knowledge Proofs, or specialized hardware. TEE attestation quotes may be consumed as one measurement input but are not architecturally required.

Licensing Inquiries

Partnership and acquisition discussions

For licensing, acquisition, or strategic partnership discussions regarding our patent-pending technology, please contact our intellectual property team.

View NIST submissions and diligence materials →

Cryptographic Primitives

SHA-256Ed25519ML-DSA-65RFC 8785