Autonomous machine governance · Protocol patents

The authority layer
for the autonomous
machine era.

Foundational patent portfolio governing how autonomous machines are identified, authorized, governed, and receipted — across every enforcement architecture.

4+2
Patent applications
4 parent · 2 continuation
109
Total claims
across the family
4
Statutory categories
per parent application
Track
One
All parent applications
expedited examination
Patent portfolio
Inventor — Papa Gora Samb

AMIAP establishes the foundational protocol governing how autonomous machines acquire, exercise, and are held accountable for execution authority. Every execution request must be accompanied by a cryptographically signed authority artifact encoding the exact scope, permission boundary, constraints, and expiration of the authorization — issued by an authority whose signing key is held in a Hardware Security Module. No action executes unless the artifact is valid, the runtime context satisfies all encoded constraints, and the result is recorded as a tamper-evident verifiable receipt.

The prior art — including XACML, Open Policy Agent, and conventional IAM systems — evaluates policy at credential issuance or session establishment time, not at the moment of execution. AMIAP enforces constraints against the runtime context obtained at the time the computational operation is actually requested, closing the window between authorization and execution that existing systems leave ungoverned.

Track One (expedited)
G06F 21/57 · H04L 9/32
2025
machine-identityauthority-artifactconstraint-evaluationexecution-enforcementtiered-delegationhsm-key-custodyverifiable-receiptsspiffe-compatible
Total claims
30 / 30
Independent
4 / 4
Continuation applications
CON1 — Latency-bounded timing receipt
YH-002-CON1 · Regular track · 24 claims · 4 independent · maximum evaluation latency bound encoded in authority artifact · elapsed evaluation time field · race condition detection
Filed

VEMP governs how encrypted communications are admitted into enterprise systems through a dual-plane architecture that evaluates a message authority artifact before any decryption key is released. The admission control plane operates on the ciphertext — never exposing plaintext to the evaluation layer. Only upon satisfaction of all artifact-encoded admission preconditions does the state machine advance to the release-qualified state and authorize HSM key release.

The protocol defines nine formally specified communication states — delivered, admission-pending, admitted, release-qualified, released, partially-released, reevaluation-pending, revoked, and expired — with deterministic, artifact-bound transition logic. Lineage constraints propagate cryptographically to derived communications, preventing any derived communication from asserting a wider authority scope than its parent.

Track One (expedited)
H04L 9/32 · G06F 21/60
March 2026
dual-plane-architecturehsm-key-releasepre-decryption-admissionstate-machine-governancelineage-controlfips-204fips-203ai-agent-communications
Total claims
30 / 30
Independent
4 / 4
Continuation applications
CON-V1 — Message authority artifact
YH-VEMP-CON1 · Regular track · 30 claims · 4 independent · MAA structure · cryptographic binding · lineage field · HSM signing · post-quantum profile enforcement
Filed

CVEAR defines the receipt layer beneath all enforcement architectures. A CVEAR-compliant receipt carries a globally unique receipt identifier, a request-bound nonce contributed by the requesting machine entity that prevents replay, a prior receipt hash chain linking every receipt to its predecessor, and an issuer cryptographic signature — enabling any authorized verifier in any administrative domain to confirm, from the receipt and the enforcement point's public key alone, that an authorization decision was made under stated conditions.

CVEAR is a standalone root application filing independently of AMIAP, VEMP, and AIRAP. Any enforcement system that generates verifiable receipts — regardless of which governance protocol sits above it — operates within the CVEAR receipt layer and requires a CVEAR license independently.

receipt-identifierrequest-bound-nonceprior-receipt-hash-chaincross-domain-verificationappend-only-registrypost-revocation-annotationtransparency-anchoringon-chain-verification

Standalone root application — horizontal receipt infrastructure underlying AMIAP, VEMP, and AIRAP. Any enforcement system generating verifiable receipts licenses this protocol independently of the governance layer above it.

AIRAP applies the artifact-bound governance model to cybersecurity incident response. Every automated remediation action must be authorized by a cryptographically signed incident authority artifact encoding the exact set of authorized actions, affected asset scope, severity tier, escalation rules, and revocation conditions for that specific incident. No action executes without it.

The protocol enforces a ten-state deterministic finite automaton governing the complete incident lifecycle from DETECTED through VALIDATED, TRIAGED, AUTHORIZED, CONSTRAINED_EXECUTION, ESCALATED, REMEDIATED, REEVALUATION_PENDING, REVOKED, to CLOSED. Each transition requires cryptographic validation of the incident authority artifact and generation of a verifiable transition receipt.

incident-authority-artifactten-state-automatonconstraint-evaluationseverity-escalationrollback-governancehash-chained-receiptseu-ai-act-art14nis2-compliant
Regulatory alignment
EU AI Act · Article 14
Immutable AI decision trails
High-risk AI systems must maintain tamper-evident, auditable records of every consequential decision. CVEAR provides the cryptographic receipt infrastructure satisfying this requirement across all enforcement architectures simultaneously.
CVEARAMIAP
NIST AI RMF · Govern function
Autonomous machine accountability
AI risk frameworks require verifiable evidence that AI agents operated within authorized boundaries at the time of each action — not just at session establishment. AMIAP enforces this at execution time.
AMIAPCVEAR
NIS2 · SEC Cyber Disclosure Rules
Incident response documentation
Mandatory documentation of incident response actions with cryptographic evidence of the authority under which they were taken. AIRAP governs precisely this — every remediation action is bound to a signed artifact and receipted.
AIRAPCVEAR
Building autonomous
machine infrastructure?
Let's talk.
Licensing inquiries, partnership discussions, and standards participation are welcome. All conversations are confidential.