Architecture
Four services. Cryptographic signatures. Fail-closed enforcement. Every decision produces a cryptographic receipt or the action does not execute.
Four-Service Architecture
Issuer
Issues consent tokens and signs receipts. Every consent decision — ALLOW or DENY — produces a cryptographically signed receipt.
Verifier
Validates consent tokens against policy state. If token is invalid or absent, the action is denied. Fail-closed.
Policy Registry
Stores policy definitions and consent state. Immutable. Supports instant revocation across all enforcement points.
Oracle
Hardware-timed attestation service. Provides tamper-evident timestamps and hardware attestation quotes. Clock skew resistant.
Enforcement Flow
Receipt Data Model
Every receipt is a JSON-LD Verifiable Credential containing dual cryptographic signatures, timing attestations, accumulator membership proof, and registry URI. Receipts are issued for every decision — ALLOW and DENY alike.
| Field | Description |
|---|---|
| @context | W3C Verifiable Credentials + FinalBoss consent schema |
| type | ["VerifiableCredential", "CDTDeletionReceipt"] |
| id | URN UUID — globally unique receipt identifier |
| issuer | DID of the Issuer service |
| verifier | DID of the Verifier service |
| credentialSubject | Subject pseudonym, dataset, policy reference, consent status, event type |
| timestamps | T0 (trigger), T1 (start), T2 (complete) — hardware-attested |
| durations_ms | Init (T0→T1) and Complete (T0→T2) in milliseconds |
| evidence | RAM zeroization, cache overwrite, DFS pointer orphaning, media key forget |
| accumulator_root | Cryptographic accumulator — tamper-evident membership proof |
| registry_uri | DID URI for non-repudiation registry lookup |
| zk_proof | Zero-knowledge proof binding consent decision to timing attestation |
| proof[] | Cryptographic signatures: quantum-resistant |
Timing SLA
Hot-Path Performance (p99)
Benchmark Details
Cryptographic Posture
Classical Signatures
Industry-standard algorithms. Every receipt cryptographically signed.
Post-Quantum Signatures
Quantum-resistant algorithms. Resistant to quantum computing attacks. Harvest-now-decrypt-later defense.
Zero-Knowledge Proofs
Optional ZK proof binding consent token, accumulator root, revocation epoch, and timing data. Verifiable without revealing inputs.
Verification Workflow
Any third party can independently verify a receipt offline. Five steps. No platform access required.
Schema + SLA Gate
Validate receipt against JSON-LD schema. Confirm all required fields present. Check timing SLA compliance.
validate_receipt.py receipt.jsonld → [OK]Signature Verification
Verify cryptographic signatures over the receipt payload. All signatures must pass.
verify_signatures(receipt, pubkeys) → PASSZero-Knowledge Proof
Verify zero-knowledge proof binding consent decision to timing attestation.
zk_verify(proof, public_inputs) → PASSAccumulator Membership
Verify cryptographic accumulator membership. Confirm receipt is included in the tamper-evident record.
accumulator_verify(receipt, root) → trueRegistry Lookup
Query Policy Registry by receipt_id. Confirm block number, index, and timestamp. Ensure no replay (unique receipt).
registry_lookup(receipt_id) → FOUND, no_replayThreat Model & Controls
Insider Edits / Backdating
Quorum receipts with cryptographic signatures. Tamper-evident accumulator prevents history rewriting. Oracle provides hardware-attested timestamps.
Clock Skew / Manipulation
Hardware-attested timing. Tamper-evident timestamps from Oracle. Temporal ordering enforced: T0 ≤ T1 ≤ T2.
Replay / Partial Delete
Proprietary revocation mechanism with fail-closed semantics. Instant token invalidation across all enforcement points.
Ledger Equivocation
Tamper-evident accumulators. Registry non-repudiation with unique receipt URIs. Anti-fork protections.
Protected by Multiple Patent Filings
35 patent applications across 7 technology clusters. All Patent Pending Examination. Details available under NDA.
Want the full technical whitepaper?
15-minute demo. Real receipts. Offline verification pack included.
Request Technical Deep Dive