Platform

Overview

How It Works

Beneficiary Identity

Policy Corridors

Deterministic Finality

Architecture

Security Model

Governance

Integration

Solutions

Corridors Overview

Institutional Overview

Pricing

All Scenarios

Humanitarian Impact Fund

Assurance

Technical Assurance

Verify Receipt

Receipt Example

Developers

Documentation

APIs & Bridges

Architecture Docs

Glossary

BID API

Company

About

Team

Partners

Roadmap

Investors

Contact

Blog

All Documentation

Schedule Consultation
← Back to Patent Claims
Patent Claim 09 All Patents →

Time-Limited Consensus Authorization

24-Hour Consensus Tokens with Mandatory Daily Re-Verification

Patent Claim JIL Sovereign February 2026 Claim 9 of 36

Executive Summary

JIL Sovereign's time-limited consensus authorization system issues 24-hour validity tokens to validators only after successful completion of both code integrity verification and identity authentication. This ensures that any node compromise, code tampering, or key rotation is detected within a single day.

Token Architecture

PropertySpecification
FormatJWT (JSON Web Token)
SigningHMAC-SHA256 with fleet controller secret
Validity24 hours maximum (non-renewable)
ScopeConsensus participation, settlement processing
RevocationImmediate via fleet controller blocklist
RenewalFull re-bootstrap (Gates 1-7) required
Non-Renewable: Tokens cannot be extended or refreshed. When a token expires, the validator must complete the full 7-gate bootstrap sequence again, including fresh code integrity and identity verification.

Security Properties

Compromise Detection Window

The 24-hour token expiry guarantees that even if a validator is compromised, it will be detected within one day when it attempts to re-bootstrap with tampered code. The integrity verification gate (Gate 3) will detect modified container images and halt the bootstrap.

Immediate Revocation

The fleet controller can immediately revoke a consensus token by adding it to a distributed blocklist. All other validators check this blocklist before accepting consensus messages from the revoked node. Revocation propagates within seconds.

Integration with Fleet Inspector

The AI Fleet Inspector monitors token expiry across all validators. If a validator's token expires without renewal (indicating bootstrap failure), the inspector flags it for investigation and may trigger automatic remediation based on the dual-policy model.

Patent Claim

Dependent Claim 9: The method of claim 7, wherein the identity verification gate uses a 5-key-type challenge-response protocol comprising: ed25519 consensus key signing, HMAC-SHA256 shared secret computation, API key verification, SSH key verification, and HSM attestation.