Home/Docs/Pillars/02 - CourtChain

JIL CourtChain - Litigation-Grade Attestation

Productizes the sealed-attestation + quorum-signed receipt layer as a standalone litigation-support pillar. Customers: civil litigators, government enforcement, forensic accountants. $23B market; Year-1 $5-15M target.

NDA Confidential Version 2026-04-21
How the 4 pillars relate

Four pillars, one shared substrate, plus Sovereign Stack as a productized deployment

Every pillar captures value from the attestation work the platform produces anyway. This pillar is highlighted in gold. Sovereign Stack is the productized deployment of the whole stack - see /sovereign.

Shared Substrate
fleet-signer attestation engine L1 anchor MPC asset-intelligence YubiKey trust

JIL CourtChain - Litigation-Grade Attestation-as-a-Service

Document ID: COURTCHAIN-PILLAR-001 Version: 1.0 Status: Planning. Ready for stakeholder review → Phase 1 execution. Owner: Jeff Mendonca (exec sponsor); Head of BD (product owner, TBH); engineering lead TBD. Upstream: - JIL Asset Intelligence Complete Master - shared infrastructure - JIL Asset Intelligence In-House Architecture - data substrate - Patent Claim 53 - Civil-Admissible Sealed Verdict Record - legal foundation

Scope of this doc: productize the sealed-attestation + quorum-signed receipt layer as a standalone litigation-support pillar. Customers: civil litigators, government enforcement, forensic accountants, e-discovery vendors, expert witnesses.


1. The market and the gap

Market size

  • Forensic accounting / litigation support services: $23B/year globally (Thomson Reuters, 2025), growing 7-9%.
  • Crypto-specific forensic services: ~$2-4B subset, growing 30%+. Chainalysis, TRM, Elliptic dominate the compliance-monitoring slice but all three are explicitly investigative tools - they do not produce court-admissible evidence artifacts; they produce investigator-facing graphs and reports.
  • Civil e-discovery market: $19B/year (Everlaw market sizing, 2024). Of which the cryptocurrency/blockchain subset is fragmented - no established vendor.
  • DOJ MLARS referrals involving crypto: +180% YoY 2024→2025 (per DOJ annual report).
  • FTC Section 13(b) crypto actions: +210% YoY.

The gap

Civil and criminal proceedings require electronic evidence that satisfies:

  • FRE 901(a) - authentication. The proponent must produce evidence sufficient to support a finding that the item is what the proponent claims.
  • FRE 901(b)(9) - system or process authentication. Evidence describing a process or system and showing that it produces an accurate result.
  • FRE 902(14) - self-authentication of records generated by an electronic process.
  • FRE 803(6) - business-records hearsay exception.
  • Lorraine v. Markel (2007) - the seminal case setting the floor for electronic evidence admissibility: authentication, hearsay, original-writing, relevance, and probative value.

Today's reality when a plaintiff or government counsel needs to introduce crypto-transaction evidence:

  1. Subpoena the exchange. Months of delay, corrupted/limited records, often foreign jurisdictions that ignore US subpoenas.
  2. Contract a forensic firm. Chainalysis Reactor report: $10K-$100K per investigation, takes 4-8 weeks, report is an expert opinion (admissible only with the investigator on the stand).
  3. Run the analysis in-house. Most DOJ units and firms cannot - they outsource. Those that can (FBI Cyber, FinCEN) use Chainalysis anyway.
  4. Rely on social-media-sourced claims. Inadmissible.

None of these produce an artifact that self-authenticates at the courthouse door.

CourtChain does. A JIL-attested settlement carries its own proof of authenticity - the Sovereign Compliance Network (SCN) validator quorum signature, the post-quantum seal, the L1 anchor hash, the verification URL that any third party can hit to independently confirm. FRE 902(14) was written for exactly this.


2. Strategic thesis

The market for civil-admissible crypto evidence does not exist yet because the primitive didn't exist. Chainalysis etc. sell investigator tools; nobody sells courtroom-ready artifacts. JIL already produces them on every settlement. Productizing this layer is the shortest path from "we have the tech" to signed SOWs with law firms and government.

Three structural advantages:

  1. Patent-pending novelty. Claim 53 specifically covers the civil-admissible sealed verdict record. No competitor can ship the same primitive without a license.
  2. Post-quantum moat. The attestation is ML-DSA-65 bound in addition to Ed25519. In 15 years when Q-Day hits, every other electronic-evidence artifact becomes forgeable. Ours doesn't.
  3. Quorum-signed, not issuer-signed. A DocuSign record is signed by DocuSign. A JIL record is signed by 14+ independent SCN validators across 13 jurisdictions. The issuer cannot unilaterally forge history. This is the Lorraine v. Markel floor - plus multi-party verification that exceeds what any current vendor offers.

Positioning vs incumbents:

Vendor What they produce What's missing vs CourtChain
Chainalysis Reactor Investigator graph + expert-witness report Admissible only with the investigator on the stand; single-vendor signed
TRM Labs Same pattern Same
CipherTrace Same pattern Same
LexisNexis Accurint Person-level data dossier Not blockchain-native; single-vendor signed
DocuSign + e-notarization Single-party signed document No quorum; not blockchain-anchored; not PQ-secure
CourtChain Self-authenticating verdict artifact + verification URL -

3. Product line structure

CourtChain is one pillar of the litigation-support business. Three products layer on top of the shared attestation substrate:

3.1 CourtChain Record (per-artifact)

What it is: the primary product. A sealed PDF+JSON bundle for a specific transaction or entity, signed by the JIL SCN validator quorum, anchored to the L1 ledger, with a public verification URL.

Customer: a law firm, AG's office, insurance subrogation unit, or corporate compliance group that needs to introduce evidence.

Sold as: per-artifact, self-serve via a portal.

Pricing: $500-2,500 per record depending on depth (single-transaction vs multi-entity dossier).

3.2 CourtChain Dossier (matter-level subscription)

What it is: bundled artifacts for a whole legal matter. Plaintiff sends JIL the case parties + known wallets + known entities; JIL returns a full dossier of every attestable transaction + sealed verdict records + entity intelligence + sanctions/UBO snapshots.

Customer: Am Law 100 firms, state AGs, DOJ civil divisions, OCC enforcement, DOL ERISA investigations.

Sold as: matter-level subscription - flat fee per matter.

Pricing: $10K-$75K per matter depending on complexity. Add-on: expert-witness support (~$5K/day).

3.3 CourtChain Expert Witness Packet (professional services)

What it is: a polished expert-witness declaration, CV, direct-testimony outline, Daubert-challenge defense memo, plus live deposition/court testimony from a JIL cryptographic-methodology expert. Wraps the technical record in admissibility-ready legal work product.

Customer: any litigator producing a CourtChain Record at trial.

Sold as: professional services engagement.

Pricing: $15K retainer + hourly for deposition/trial. Expert is either an internal JIL cryptographer (peer-reviewed credentials) or a named academic on retainer.

3.4 CourtChain Audit Trail Export (regulator/oversight)

What it is: a complete attested history for an entity, in a tamper-evident archive format, signed off for regulatory submission. FRE 902(14)-compliant.

Customer: regulated entities responding to SEC/FinCEN/OCC/FDIC/state AG requests.

Sold as: one-time flat fee per export.

Pricing: $2,500-$15,000 depending on entity complexity + custody of archive (cold-storage optional add-on).


4. Target customer segments

Segment Size Sales motion Year-1 revenue target
AmLaw 100 litigation firms ~100 firms direct BD; conference booths at ABA Tech Show, ILTACON $2M-$5M
State AG offices (50 + DC) ~40 actively pursuing crypto matters direct BD; NAAG events; often public-procurement RFPs $1M-$3M
Federal enforcement (DOJ MLARS, FBI Cyber, FinCEN, IRS-CI, SEC Enforcement, FTC Section 13(b)) ~15 units GSA Schedule + FedRAMP path; typically per-matter contracts $3M-$8M (long tail)
Insurance subrogation (crypto claims) ~50 carriers indirect via broker partnerships $500K-$2M
Corporate compliance (fraud + internal investigation groups at Fortune 500) ~200 target firms inside-sales motion $1M-$3M
Forensic accounting firms (EY Forensic, Deloitte Financial Advisory, Kroll, AlixPartners) ~20 firms partnership / white-label $1M-$5M (resell channel)
e-Discovery platforms (Everlaw, Relativity, Logikcull) ~10 platforms API integration / OEM $500K-$2M (indirect)

Year-1 conservative total: $8-15M. Year-3: $40-80M. Year-5: $150-300M.


5. Service architecture

The customer-facing service is services/courtchain/. It's a thin product layer over the existing attestation + asset-intelligence + fleet-signer stack - we are packaging, not rebuilding.

services/courtchain/
├── package.json
├── Dockerfile
├── tsconfig.json
├── src/
│   ├── index.ts                 # Express bootstrap, health/ready/metrics
│   ├── types.ts
│   │
│   ├── api/
│   │   ├── record.ts            # POST /v1/courtchain/record (single-transaction)
│   │   ├── dossier.ts           # POST /v1/courtchain/dossier (matter-level)
│   │   ├── export.ts            # POST /v1/courtchain/audit-export
│   │   ├── verify.ts            # GET /v1/courtchain/verify/:artifact_id (public, no auth)
│   │   ├── expert-witness.ts    # GET /v1/courtchain/witness/:artifact_id/declaration
│   │   └── delivery.ts          # S3 signed URLs + email + courier tracking
│   │
│   ├── composer/
│   │   ├── record-assembler.ts  # per Claim 53 §0030-0038: verdict → sealed-record
│   │   ├── pdf-generator.ts     # archival PDF/A-3 with embedded JSON
│   │   ├── qr-builder.ts        # QR code → verification URL
│   │   └── narrative.ts         # human-readable executive summary
│   │
│   ├── sealer/
│   │   ├── verdict-fetch.ts     # pulls from fraud-attestation-engine
│   │   ├── quorum-collect.ts    # collects 14+ validator signatures from fleet
│   │   ├── l1-anchor.ts         # writes L1 transaction with record hash
│   │   ├── pq-seal.ts           # ML-DSA-65 seal via @jil/fleet-signer
│   │   └── merkle-build.ts      # builds PQ-006-compatible evidence Merkle tree
│   │
│   ├── delivery/
│   │   ├── s3-archive.ts        # Hetzner Object Storage (existing SDV)
│   │   ├── email.ts             # watermarked PDF + signed JSON attachment
│   │   ├── courier.ts           # physical cold-storage USB/Glacier option
│   │   └── expert-calendar.ts   # books JIL cryptographer for deposition
│   │
│   ├── verifier/                # PUBLIC - no auth required
│   │   ├── public-page.ts       # /verify/:id landing page
│   │   ├── sig-verify.ts        # independently verifies quorum sigs
│   │   └── anchor-check.ts      # confirms L1 anchor matches record hash
│   │
│   └── jobs/
│       ├── cold-storage-seal.ts # daily - seal today's records into tamper-evident archive
│       └── key-rotation.ts      # scheduled - rotate sealing keys on 90-day cycle
│
├── templates/
│   ├── record-pdf-a3.tex        # LaTeX → PDF/A-3 archival template
│   ├── executive-summary.hbs    # handlebars for the narrative section
│   ├── witness-declaration.docx # expert-witness declaration template
│   └── daubert-defense.docx     # Daubert challenge response memo template
│
└── migrations/
    ├── 001_init.sql             # courtchain.records, courtchain.deliveries
    ├── 002_billing.sql          # per-matter billing + invoicing
    └── 003_audit.sql            # access log for FRE 1006 summary-of-voluminous-records

Ports

Port Path Purpose
8950 /health, /ready, /metrics standard
8950 POST /v1/courtchain/record single-transaction record (auth)
8950 POST /v1/courtchain/dossier matter-level dossier (auth)
8950 POST /v1/courtchain/audit-export regulated-entity export (auth)
8950 GET /v1/courtchain/verify/:id public verification page
Kafka courtchain.record.sealed downstream: billing, audit, archive
Kafka courtchain.verification.requested analytics (who's verifying what)

Integrations with existing JIL services

Upstream service What CourtChain consumes
fraud-attestation-engine verdict records + FWEA check results
asset-intelligence (in progress) entity dossiers, UBO chains, sanctions state
fleet-signer hybrid Ed25519 + ML-DSA-65 sealing
@jil/fleet-signer trust bundle public verification keys
jil5600-core L1 transaction anchor (write record hash to ledger)
SCN Validator fleet (all 10) quorum signatures - 14-of-20 minimum per Claim 53
central-portal public verification page frontend (reuses existing attestation UI)
billing-metering per-record + per-matter invoicing

The record is designed to self-authenticate under these rules. Each field in the sealed record maps to a specific rule:

Sealed-record component Rule it satisfies
SCN Validator quorum signatures (14-of-20) across 13 jurisdictions FRE 901(a) - authentication via multiple independent attestors
Cryptographic methodology declaration + JIL system description FRE 901(b)(9) - system/process authentication
PDF/A-3 archival format + verification-URL QR code FRE 902(14) - self-authentication for electronic records
L1 transaction anchor (immutable ledger timestamp) FRE 902(14) + FRE 901(b)(9) - process accuracy
Chronological audit trail (courtchain.records + Kafka ledger) FRE 803(6) - business records exception
Evidence hash Merkle tree (PQ-006 compatible) FRE 1002/1006 - original writing / summary of voluminous records
Human-readable executive summary FRE 403 + 901 - comprehensibility for the fact-finder

Daubert-proofing the methodology: 1. Testable: anyone can run the public verifier and independently confirm a record. [DONE - it's online] 2. Subject to peer review: we'll publish the methodology paper at a top security venue (USENIX Security, IEEE S&P, CCS) - referenced in Claim 53 defense memo. 3. Known error rate: the false-positive rate on signature verification is bounded by the ECDSA-P384 + ML-DSA-65 break probability (effectively zero under current cryptanalytic knowledge). Will be published with the methodology paper. 4. Standards + controls: NIST FIPS 204 (ML-DSA), FIPS 186-5 (ECDSA), FIPS 180-4 (SHA-256), NIST SP 800-56A (key agreement). All referenced explicitly. 5. General acceptance: cryptographic primitives are standardized by NIST - the highest bar possible.

This is Daubert-proof by construction. Chainalysis reports are not - they're expert opinion, not self-authenticating system output.


7. Record anatomy (per Claim 53, simplified)

+----------------------+
|  [QR CODE]    CourtChain Record           |
|               Record ID: CCR-2026-041234  |
|               Issued: 2026-04-21 14:32 UTC|
|               Version: 1.0                |
+----------------------+
| EXECUTIVE SUMMARY                          |
| Subject: Acme Corp received $1.25M USDC    |
| from wallet 0x3a...f7 on 2026-03-14,       |
| originating from sanctioned wallet         |
| 0x9c...b2 via 3 intermediaries. All 42     |
| FWEA checks evaluated; verdict: BLOCK.     |
+----------------------+
| STRUCTURED DATA                            |
|  subject:     Acme Corp (EIN 12-3456789)  |
|  counterparty: 0x3a...f7                  |
|  amount:      1,250,000 USDC              |
|  asset:       USDC on Ethereum mainnet    |
|  timestamp:   2026-03-14T08:22:17Z        |
|  verdict:     BLOCK                       |
|  fwea_score:  87/100                       |
+----------------------+
| CRYPTOGRAPHIC ATTESTATION                  |
|  Quorum: 14-of-20                         |
|  Validators (13 jurisdictions):           |
|    US, DE, EU, SG, CH, JP, GB, AE, BR, KY |
|  Ed25519 sigs:   [14 signatures]          |
|  ML-DSA-65 sigs: [14 signatures]          |
|  L1 anchor tx:   jil-mainnet-1:0x7f...a3  |
|  Anchored at:    block 1,234,567          |
|  PQ-006 Merkle:  0xa8b9...d3              |
+----------------------+
| MACHINE-READABLE MANIFEST                  |
|  [embedded JSON with full record schema]   |
+----------------------+
| VERIFICATION                               |
|  Verify independently at:                  |
|  https://jilsovereign.com/verify/CCR-2026- |
|  041234                                    |
|                                            |
|  Methodology:                              |
|  https://jilsovereign.com/methodology      |
|                                            |
|  Trust bundle:                             |
|  https://jilsovereign.com/.well-known/     |
|  trust-bundle.json                         |
+----------------------+

8. Pricing

SKU Price Margin
CourtChain Record - single transaction $500 ~90%
CourtChain Record - multi-transaction (up to 100) $2,000 ~85%
CourtChain Dossier - matter-level $10K-$75K ~80%
Expert Witness retainer $15K ~70%
Expert Witness deposition/trial day $5K-$15K ~75%
Audit Trail Export - standard $2,500 ~85%
Audit Trail Export - cold-storage courier $15K ~65%
Annual subscription - AmLaw or state AG $50K-$250K ~85%
Federal contract - GSA Schedule varies ($100K-$2M) ~75%

Gross margin thesis: software delivery + self-serve verification → very high margins on the Record + Audit Export SKUs. Expert Witness + dossier work is people-heavy and scales linearly with headcount - but those customers are the ones paying AmLaw rates anyway, so the hourly is there.


9. Phased build plan

Phase 1 - MVP (Months 0-3)

Goal: ship CourtChain Record (single-transaction) + public verifier. One customer, one matter, one signed artifact in front of a judge.

Ship: - services/courtchain/ skeleton with Record + Verify endpoints - PDF/A-3 generator (LaTeX template → sealed PDF) - Quorum-collection module (pulls 14+ signatures via existing fleet infrastructure) - Public verifier page at /verify/:id - S3 archive (Hetzner SDV reuse) - Billing integration (per-record invoicing) - Integration with existing attestation engine (pulls verdicts, doesn't re-run checks) - Methodology paper draft (target: USENIX Security 2027)

Team: 1 engineer + 0.25 GTM (BD co-founder can wear both hats). Cost: ~$60K loaded (engineering) + BD time. First-customer target: a mid-market AmLaw firm already using us for compliance. Discount first artifact to $0 in exchange for a case study. Success metric: one sealed CourtChain Record filed as an exhibit in a civil matter.

Phase 2 - Dossier + Expert Witness (Months 3-9)

Goal: productize matter-level dossiers. Hire the first JIL expert witness.

Ship: - Dossier assembler (composes Records across entities + time windows) - Expert-witness declaration generator (DOCX templates) - Calendar + booking system for the witness - State AG pilot (one matter, pre-negotiated rate)

Team: +1 engineer, +1 expert witness (PhD cryptographer on retainer), +1 BD rep. Cost: ~$400K loaded. Success metric: 5+ active matter engagements; first deposition given by the JIL expert.

Phase 3 - Federal + FedRAMP (Months 6-18)

Goal: crack federal procurement. FedRAMP Moderate, GSA Schedule.

Ship: - FedRAMP Moderate ATO (~9 months, ~$500K) - GSA Schedule 70 listing - First federal contract (target: DOJ MLARS or IRS-CI per-matter agreement) - Multi-tenant isolation for government-hosted instances

Team: +1 compliance hire, +FedRAMP consulting. Cost: ~$800K loaded + ATO fees. Success metric: one signed federal contract; first DOJ-case artifact.

Phase 4 - Channel partnerships (Months 12-24)

Goal: e-discovery platform integrations; forensic accounting firm partnerships.

Ship: - Everlaw/Relativity/Logikcull integrations (JIL artifacts appear natively in their UIs) - OEM white-label for Deloitte, EY, Kroll - they resell CourtChain under their brand + JIL does the cryptographic work - API for internal-fraud groups at Fortune 500s

Team: +1 integration engineer, +1 channel BD. Cost: ~$400K loaded. Success metric: 3+ e-discovery integrations; 2+ forensic accounting resellers; $10M+ channel revenue run-rate.


10. Go-to-market

Year 1

Quarter Focus Target
Q1 MVP + first AmLaw pilot 1 signed artifact in court
Q2 First 3 paying law-firm customers; first state AG pilot $500K ARR
Q3 FedRAMP process starts; first federal pre-sales $2M ARR
Q4 State AG wave + first federal SOW $5M ARR

Sales channels: - Direct BD to AmLaw 100 + NAAG members - Booths at: ABA TechShow, ILTACON, LegalTech, NAAG summer/winter meetings, RSA (for federal) - Partnerships: Deloitte Forensic, EY Fraud Investigations, Kroll - resell channel - Content: methodology paper + Harvard Law Review / Stanford Law Review article on "Cryptographic Self-Authentication and the Future of Evidence Law"

Differentiation narrative

One sentence: "Chainalysis tells your investigator what happened. CourtChain tells the judge."

Three slides for every sales call: 1. The admissibility gap (Lorraine v. Markel + modern crypto litigation examples) 2. The CourtChain record anatomy (the diagram from §7) 3. The verifier - live demo. Show the URL. Show it works without JIL in the loop. That's the money slide.


11. Risks and mitigations

Risk Mitigation
Bar associations object to "automated expert testimony" Expert witness is a human on retainer - the PDF is exhibit, the human is the witness. Matches existing law of expert systems (e.g. gas chromatography reports).
A judge rules our methodology inadmissible at first trial Amicus brief + peer-reviewed paper published before first contested admission. Pick the first case carefully - uncontested (default judgment, settled case) to establish precedent.
Chainalysis sues on their compliance-platform patent Claim 53 is the offensive weapon here - our civil-admissibility architecture is novel. Freedom-to-operate analysis complete before we ship.
Government procurement takes longer than expected Launch state AG business first (12-month sales cycle) while FedRAMP runs in parallel (9-month ATO). AmLaw + corporate compliance fund the business in the meantime.
Expert witness is the bottleneck Train 3+ experts early. Partner with academic cryptographers (MIT, Stanford, CMU) on retainer for overflow and Daubert-resistant pedigrees.
One bad artifact (e.g. wrong verdict) lands in court Insurance + indemnity clauses in all contracts. Rigorous pre-issuance QA - every record generates a self-verification run before delivery; if any signature fails, the record is blocked.
Competitor builds knockoff Patent Claim 53 + methodology paper establish priority. Chainalysis / TRM would need to retrofit quorum signing + post-quantum sealing - ~3-5 years behind.

12. Build-vs-buy decisions

Component Build Buy
Sealing / quorum / PQ binding Build - we already have it -
Asset intelligence substrate Build - per in-house architecture doc -
PDF/A-3 generation Build on LaTeX - controllable, archival-grade (rejected: PDFKit/ReportLab - not PDF/A-3)
Public verifier page Build - extends existing /attestations/:id -
S3 archival Reuse - Hetzner Object Storage (SDV) already in place -
FedRAMP ATO documentation Hire - FedRAMP consulting firm ($200K-$500K) -
Expert witnesses Hire on retainer (rejected: rent-an-expert marketplaces - quality/pedigree issue)
e-Discovery platform integrations Build to their APIs -

13. Success metrics (12-month horizon)

  • Revenue: $5M ARR floor, $15M stretch
  • Artifacts sealed: 1,000+ CourtChain Records issued
  • Court appearances: 10+ matters where a JIL record was introduced as exhibit; 3+ uncontested admissions; 1 contested + granted
  • Customer concentration: top customer <25% of revenue (diversified book)
  • Methodology paper: accepted at USENIX Security 2027 or IEEE S&P 2027
  • Patent state: Claim 53 non-provisional filed; 1-2 continuation claims drafted
  • FedRAMP: Moderate ATO in flight (not yet granted expected in 12 months)

14. Relation to other JIL pillars

CourtChain sells the artifacts that every other JIL pillar produces. It is the value-capture layer for the compliance + attestation work the rest of the stack does anyway. No pillar of JIL operates without generating the substrate CourtChain productizes.

Other pillar CourtChain's relationship
Pre-Settlement Attestation every pre-settlement verdict is a potential CourtChain Record
Post-Settlement Audit every reconciled audit verdict is a potential CourtChain Record
Regulatory Attestation Network RAN regulator-facing queries can return a CourtChain Record as the canonical format
Asset Intelligence AI dossiers feed the CourtChain Dossier product directly
Sovereign Stack each sovereign deployment ships CourtChain as its court-admissibility layer
PoCS (Proof-of-Compliance Settlement) every on-chain settlement carries an attestation that can be materialized as a CourtChain Record

This is the monetization layer.


15. Next decisions (this week)

  1. Approve Phase 1. 1 engineer, ~$60K loaded, 3-month MVP.
  2. Identify first pilot customer. Ideally a JIL existing customer who is an AmLaw firm. Cold outreach is harder than leveraging warm intros.
  3. Line up the expert witness. Need a PhD cryptographer on retainer by end of Phase 1 (before first artifact goes to court).
  4. Start the methodology paper. Two-person effort: engineering lead + a named academic co-author. Target: USENIX 2027 submission window (deadline ~June 2026).
  5. Book NAAG Summer Meeting. June 2026 - that's the state AG audience.
  6. File Claim 53 non-provisional. The provisional was drafted; file non-provisional within 12 months of the provisional to preserve priority.
Pricing estimates · Pillar 2 · CourtChain

Pricing & revenue profile

All figures below are illustrative estimates. Final pricing is scoped per engagement; contact sales for a firm quote.

Per-record
$295
24h turnaround · single sealed verdict
Sealed PDF/A + JSON, FRE 902(14) cover, public verifier URL.
Firm subscription
$2,500/mo
Up to 25 seats · 50 records/mo included
Shared case workspace, overflow at $95/record, expert-declaration add-ons.
Judicial portal
$0/seat
Free for sitting judges + clerks
Verdict lookup, bench-memo export, jurisdictional eligibility check, pro-bono integration.
Market size (est.)
$2-4B TAM
US AmLaw 200 + qui tam + probate
~1.3M practising US attorneys × avg. 3-6 evidentiary records/year at platform pricing.
See full pricing → Firm trial