Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
← Back to Patent Claims
Patent Claim 07 All Patents →

Multi-Gate Validator Bootstrap

Integrity-First Sequencing with 7-Gate Ordered Protocol

Patent Claim JIL Sovereign February 2026 Claim 7 of 36

Executive Summary

JIL Sovereign implements a 7-gate ordered bootstrap protocol for validator nodes. The critical innovation is that code integrity verification (image digest matching) is a mandatory prerequisite before identity verification can begin. Combined with 24-hour consensus authorization tokens forcing daily re-verification.

Core Innovation: First validator bootstrap protocol that mandates code integrity verification before identity verification, preventing supply-chain attacks where tampered software authenticates and joins consensus.

Problem Statement

Existing validator bootstrap protocols (Kubernetes node join, AWS SSM, Tendermint) verify identity before verifying code integrity. This allows a node running tampered software to authenticate successfully and participate in consensus with compromised code.

  • Kubernetes: Identity first (service account token), no image verification gate
  • Docker Content Trust: Independent of node authentication, not sequenced
  • AWS SSM: IAM role verification, no code integrity gate
  • Tendermint: Staking transaction, no pre-auth verification

7-Gate Bootstrap Sequence

GateNamePurposeFailure Action
1HandshakeTLS connection to fleet controllerRetry with backoff
2RegistrationNode identity claimHalt bootstrap
3Image DigestSHA-256 verification of 17+ container images against pinned manifestHalt bootstrap
4Identity5-key-type challenge-response (ed25519, HMAC, API key, SSH, HSM)Halt bootstrap
5Authorization24-hour consensus token issuedHalt bootstrap
6ConfigurationHMAC-signed config bundle pull and validationHalt bootstrap
7Service StartAll services initialized, health checks passHalt bootstrap
Key Sequencing: Gate 3 (code integrity) MUST pass before Gate 4 (identity verification) can begin. A node with tampered images cannot even attempt authentication.

Image Digest Verification

Gate 3 computes SHA-256 digests for each of 17+ container images running on the validator and compares each against a centrally pinned manifest maintained in the hq_image_digests table on the fleet controller. Any single mismatch halts the bootstrap.

// Digest verification pseudocode
for each container_image in node.images:
    local_digest = sha256(container_image)
    pinned_digest = hq.get_pinned_digest(container_image.name)
    if local_digest != pinned_digest:
        HALT("Image digest mismatch: possible tampering")
        return BOOTSTRAP_FAILED

24-Hour Consensus Tokens

Upon successful completion of Gates 3 and 4, a time-limited consensus authorization token is issued with a maximum 24-hour validity period. This forces daily re-execution of the integrity and identity verification sequence, ensuring that any node compromise is detected within 24 hours.

PropertyValue
Token typeJWT with HMAC-SHA256
Validity24 hours maximum
RenewalFull re-bootstrap required
ScopeConsensus participation only

Patent Claim

Independent Claim 3: A computer-implemented method for bootstrapping a validator node in a distributed network, the method comprising an ordered sequence of gates wherein: a code integrity verification gate comparing local container image digests against a centrally pinned manifest is executed as a mandatory prerequisite before an identity verification gate using multi-key-type challenge-response authentication; and a time-limited consensus authorization token with a maximum 24-hour validity period is issued upon successful completion of both gates, requiring daily re-execution of the integrity and identity verification sequence.