Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
← Back to Patent Claims
Patent Claim 08 All Patents →

Container Image Digest Verification

SHA-256 Integrity Verification Against Centrally Pinned Manifests

Patent Claim JIL Sovereign February 2026 Claim 8 of 36

Executive Summary

The container image digest verification system provides cryptographic assurance that every container running on a validator node matches the exact version pinned and signed by the fleet controller. This prevents supply-chain attacks where modified container images could compromise consensus operations.

Verification Protocol

Each validator node maintains a local inventory of all running container images. During bootstrap Gate 3, the node computes SHA-256 digests for each image and transmits them to the fleet controller for comparison against the centrally pinned manifest stored in hq_image_digests.

StepActionFailure Mode
1Enumerate all local container images (17+)Incomplete inventory halts bootstrap
2Compute SHA-256 digest for each imageComputation failure halts bootstrap
3Submit digest list to fleet controllerNetwork failure triggers retry
4Controller compares against pinned manifestAny mismatch halts bootstrap
5Controller returns signed approvalMissing approval halts bootstrap

Pinned Manifest Management

The fleet controller maintains the authoritative manifest of approved image digests. When a new image version is deployed through the secure image pipeline, its digest is registered, signed, and pinned in the manifest. The pipeline flow is: DevNet build, push to Artifact Registry, JILHQ register and sign, validators pull on refresh, digest verify before deploy.

Supply Chain Security: Images are signed during the release process on the fleet controller. The signing key is held exclusively by the fleet controller HSM, preventing unauthorized image modifications.

Implementation Details

The verification service runs as part of the validator update agent. It compares digests at bootstrap and optionally during periodic health checks (every 60 seconds via the AI Fleet Inspector).

// Image digest table schema
CREATE TABLE hq_image_digests (
    service_name   TEXT NOT NULL,
    image_tag      TEXT NOT NULL,
    sha256_digest  TEXT NOT NULL,
    signed_by      TEXT NOT NULL,
    pinned_at      TIMESTAMPTZ DEFAULT NOW(),
    PRIMARY KEY (service_name, image_tag)
);

Patent Claim

Dependent Claim 8: The method of claim 7, wherein the code integrity verification gate computes SHA-256 digests for each of 17+ container images and compares each against a centrally pinned manifest maintained in a hq_image_digests table, with any single mismatch halting bootstrap.