Four pillars, one shared substrate, plus Sovereign Stack as a productized deployment
Every pillar captures value from the attestation work the platform produces anyway. This pillar is highlighted in gold. Sovereign Stack is the productized deployment of the whole stack - see /sovereign.
JIL CourtChain - Litigation-Grade Attestation-as-a-Service
Document ID: COURTCHAIN-PILLAR-001 Version: 1.0 Status: Planning. Ready for stakeholder review → Phase 1 execution. Owner: Jeff Mendonca (exec sponsor); Head of BD (product owner, TBH); engineering lead TBD. Upstream: - JIL Asset Intelligence Complete Master - shared infrastructure - JIL Asset Intelligence In-House Architecture - data substrate - Patent Claim 53 - Civil-Admissible Sealed Verdict Record - legal foundation
Scope of this doc: productize the sealed-attestation + quorum-signed receipt layer as a standalone litigation-support pillar. Customers: civil litigators, government enforcement, forensic accountants, e-discovery vendors, expert witnesses.
1. The market and the gap
Market size
- Forensic accounting / litigation support services: $23B/year globally (Thomson Reuters, 2025), growing 7-9%.
- Crypto-specific forensic services: ~$2-4B subset, growing 30%+. Chainalysis, TRM, Elliptic dominate the compliance-monitoring slice but all three are explicitly investigative tools - they do not produce court-admissible evidence artifacts; they produce investigator-facing graphs and reports.
- Civil e-discovery market: $19B/year (Everlaw market sizing, 2024). Of which the cryptocurrency/blockchain subset is fragmented - no established vendor.
- DOJ MLARS referrals involving crypto: +180% YoY 2024→2025 (per DOJ annual report).
- FTC Section 13(b) crypto actions: +210% YoY.
The gap
Civil and criminal proceedings require electronic evidence that satisfies:
- FRE 901(a) - authentication. The proponent must produce evidence sufficient to support a finding that the item is what the proponent claims.
- FRE 901(b)(9) - system or process authentication. Evidence describing a process or system and showing that it produces an accurate result.
- FRE 902(14) - self-authentication of records generated by an electronic process.
- FRE 803(6) - business-records hearsay exception.
- Lorraine v. Markel (2007) - the seminal case setting the floor for electronic evidence admissibility: authentication, hearsay, original-writing, relevance, and probative value.
Today's reality when a plaintiff or government counsel needs to introduce crypto-transaction evidence:
- Subpoena the exchange. Months of delay, corrupted/limited records, often foreign jurisdictions that ignore US subpoenas.
- Contract a forensic firm. Chainalysis Reactor report: $10K-$100K per investigation, takes 4-8 weeks, report is an expert opinion (admissible only with the investigator on the stand).
- Run the analysis in-house. Most DOJ units and firms cannot - they outsource. Those that can (FBI Cyber, FinCEN) use Chainalysis anyway.
- Rely on social-media-sourced claims. Inadmissible.
None of these produce an artifact that self-authenticates at the courthouse door.
CourtChain does. A JIL-attested settlement carries its own proof of authenticity - the Sovereign Compliance Network (SCN) validator quorum signature, the post-quantum seal, the L1 anchor hash, the verification URL that any third party can hit to independently confirm. FRE 902(14) was written for exactly this.
2. Strategic thesis
The market for civil-admissible crypto evidence does not exist yet because the primitive didn't exist. Chainalysis etc. sell investigator tools; nobody sells courtroom-ready artifacts. JIL already produces them on every settlement. Productizing this layer is the shortest path from "we have the tech" to signed SOWs with law firms and government.
Three structural advantages:
- Patent-pending novelty. Claim 53 specifically covers the civil-admissible sealed verdict record. No competitor can ship the same primitive without a license.
- Post-quantum moat. The attestation is ML-DSA-65 bound in addition to Ed25519. In 15 years when Q-Day hits, every other electronic-evidence artifact becomes forgeable. Ours doesn't.
- Quorum-signed, not issuer-signed. A DocuSign record is signed by DocuSign. A JIL record is signed by 14+ independent SCN validators across 13 jurisdictions. The issuer cannot unilaterally forge history. This is the Lorraine v. Markel floor - plus multi-party verification that exceeds what any current vendor offers.
Positioning vs incumbents:
| Vendor | What they produce | What's missing vs CourtChain |
|---|---|---|
| Chainalysis Reactor | Investigator graph + expert-witness report | Admissible only with the investigator on the stand; single-vendor signed |
| TRM Labs | Same pattern | Same |
| CipherTrace | Same pattern | Same |
| LexisNexis Accurint | Person-level data dossier | Not blockchain-native; single-vendor signed |
| DocuSign + e-notarization | Single-party signed document | No quorum; not blockchain-anchored; not PQ-secure |
| CourtChain | Self-authenticating verdict artifact + verification URL | - |
3. Product line structure
CourtChain is one pillar of the litigation-support business. Three products layer on top of the shared attestation substrate:
3.1 CourtChain Record (per-artifact)
What it is: the primary product. A sealed PDF+JSON bundle for a specific transaction or entity, signed by the JIL SCN validator quorum, anchored to the L1 ledger, with a public verification URL.
Customer: a law firm, AG's office, insurance subrogation unit, or corporate compliance group that needs to introduce evidence.
Sold as: per-artifact, self-serve via a portal.
Pricing: $500-2,500 per record depending on depth (single-transaction vs multi-entity dossier).
3.2 CourtChain Dossier (matter-level subscription)
What it is: bundled artifacts for a whole legal matter. Plaintiff sends JIL the case parties + known wallets + known entities; JIL returns a full dossier of every attestable transaction + sealed verdict records + entity intelligence + sanctions/UBO snapshots.
Customer: Am Law 100 firms, state AGs, DOJ civil divisions, OCC enforcement, DOL ERISA investigations.
Sold as: matter-level subscription - flat fee per matter.
Pricing: $10K-$75K per matter depending on complexity. Add-on: expert-witness support (~$5K/day).
3.3 CourtChain Expert Witness Packet (professional services)
What it is: a polished expert-witness declaration, CV, direct-testimony outline, Daubert-challenge defense memo, plus live deposition/court testimony from a JIL cryptographic-methodology expert. Wraps the technical record in admissibility-ready legal work product.
Customer: any litigator producing a CourtChain Record at trial.
Sold as: professional services engagement.
Pricing: $15K retainer + hourly for deposition/trial. Expert is either an internal JIL cryptographer (peer-reviewed credentials) or a named academic on retainer.
3.4 CourtChain Audit Trail Export (regulator/oversight)
What it is: a complete attested history for an entity, in a tamper-evident archive format, signed off for regulatory submission. FRE 902(14)-compliant.
Customer: regulated entities responding to SEC/FinCEN/OCC/FDIC/state AG requests.
Sold as: one-time flat fee per export.
Pricing: $2,500-$15,000 depending on entity complexity + custody of archive (cold-storage optional add-on).
4. Target customer segments
| Segment | Size | Sales motion | Year-1 revenue target |
|---|---|---|---|
| AmLaw 100 litigation firms | ~100 firms | direct BD; conference booths at ABA Tech Show, ILTACON | $2M-$5M |
| State AG offices (50 + DC) | ~40 actively pursuing crypto matters | direct BD; NAAG events; often public-procurement RFPs | $1M-$3M |
| Federal enforcement (DOJ MLARS, FBI Cyber, FinCEN, IRS-CI, SEC Enforcement, FTC Section 13(b)) | ~15 units | GSA Schedule + FedRAMP path; typically per-matter contracts | $3M-$8M (long tail) |
| Insurance subrogation (crypto claims) | ~50 carriers | indirect via broker partnerships | $500K-$2M |
| Corporate compliance (fraud + internal investigation groups at Fortune 500) | ~200 target firms | inside-sales motion | $1M-$3M |
| Forensic accounting firms (EY Forensic, Deloitte Financial Advisory, Kroll, AlixPartners) | ~20 firms | partnership / white-label | $1M-$5M (resell channel) |
| e-Discovery platforms (Everlaw, Relativity, Logikcull) | ~10 platforms | API integration / OEM | $500K-$2M (indirect) |
Year-1 conservative total: $8-15M. Year-3: $40-80M. Year-5: $150-300M.
5. Service architecture
The customer-facing service is services/courtchain/. It's a thin product layer over the existing attestation + asset-intelligence + fleet-signer stack - we are packaging, not rebuilding.
services/courtchain/
├── package.json
├── Dockerfile
├── tsconfig.json
├── src/
│ ├── index.ts # Express bootstrap, health/ready/metrics
│ ├── types.ts
│ │
│ ├── api/
│ │ ├── record.ts # POST /v1/courtchain/record (single-transaction)
│ │ ├── dossier.ts # POST /v1/courtchain/dossier (matter-level)
│ │ ├── export.ts # POST /v1/courtchain/audit-export
│ │ ├── verify.ts # GET /v1/courtchain/verify/:artifact_id (public, no auth)
│ │ ├── expert-witness.ts # GET /v1/courtchain/witness/:artifact_id/declaration
│ │ └── delivery.ts # S3 signed URLs + email + courier tracking
│ │
│ ├── composer/
│ │ ├── record-assembler.ts # per Claim 53 §0030-0038: verdict → sealed-record
│ │ ├── pdf-generator.ts # archival PDF/A-3 with embedded JSON
│ │ ├── qr-builder.ts # QR code → verification URL
│ │ └── narrative.ts # human-readable executive summary
│ │
│ ├── sealer/
│ │ ├── verdict-fetch.ts # pulls from fraud-attestation-engine
│ │ ├── quorum-collect.ts # collects 14+ validator signatures from fleet
│ │ ├── l1-anchor.ts # writes L1 transaction with record hash
│ │ ├── pq-seal.ts # ML-DSA-65 seal via @jil/fleet-signer
│ │ └── merkle-build.ts # builds PQ-006-compatible evidence Merkle tree
│ │
│ ├── delivery/
│ │ ├── s3-archive.ts # Hetzner Object Storage (existing SDV)
│ │ ├── email.ts # watermarked PDF + signed JSON attachment
│ │ ├── courier.ts # physical cold-storage USB/Glacier option
│ │ └── expert-calendar.ts # books JIL cryptographer for deposition
│ │
│ ├── verifier/ # PUBLIC - no auth required
│ │ ├── public-page.ts # /verify/:id landing page
│ │ ├── sig-verify.ts # independently verifies quorum sigs
│ │ └── anchor-check.ts # confirms L1 anchor matches record hash
│ │
│ └── jobs/
│ ├── cold-storage-seal.ts # daily - seal today's records into tamper-evident archive
│ └── key-rotation.ts # scheduled - rotate sealing keys on 90-day cycle
│
├── templates/
│ ├── record-pdf-a3.tex # LaTeX → PDF/A-3 archival template
│ ├── executive-summary.hbs # handlebars for the narrative section
│ ├── witness-declaration.docx # expert-witness declaration template
│ └── daubert-defense.docx # Daubert challenge response memo template
│
└── migrations/
├── 001_init.sql # courtchain.records, courtchain.deliveries
├── 002_billing.sql # per-matter billing + invoicing
└── 003_audit.sql # access log for FRE 1006 summary-of-voluminous-records
Ports
| Port | Path | Purpose |
|---|---|---|
8950 |
/health, /ready, /metrics |
standard |
8950 |
POST /v1/courtchain/record |
single-transaction record (auth) |
8950 |
POST /v1/courtchain/dossier |
matter-level dossier (auth) |
8950 |
POST /v1/courtchain/audit-export |
regulated-entity export (auth) |
8950 |
GET /v1/courtchain/verify/:id |
public verification page |
| Kafka | courtchain.record.sealed |
downstream: billing, audit, archive |
| Kafka | courtchain.verification.requested |
analytics (who's verifying what) |
Integrations with existing JIL services
| Upstream service | What CourtChain consumes |
|---|---|
fraud-attestation-engine |
verdict records + FWEA check results |
asset-intelligence (in progress) |
entity dossiers, UBO chains, sanctions state |
fleet-signer |
hybrid Ed25519 + ML-DSA-65 sealing |
@jil/fleet-signer trust bundle |
public verification keys |
jil5600-core L1 |
transaction anchor (write record hash to ledger) |
| SCN Validator fleet (all 10) | quorum signatures - 14-of-20 minimum per Claim 53 |
central-portal |
public verification page frontend (reuses existing attestation UI) |
billing-metering |
per-record + per-matter invoicing |
6. Legal framework
The record is designed to self-authenticate under these rules. Each field in the sealed record maps to a specific rule:
| Sealed-record component | Rule it satisfies |
|---|---|
| SCN Validator quorum signatures (14-of-20) across 13 jurisdictions | FRE 901(a) - authentication via multiple independent attestors |
| Cryptographic methodology declaration + JIL system description | FRE 901(b)(9) - system/process authentication |
| PDF/A-3 archival format + verification-URL QR code | FRE 902(14) - self-authentication for electronic records |
| L1 transaction anchor (immutable ledger timestamp) | FRE 902(14) + FRE 901(b)(9) - process accuracy |
| Chronological audit trail (courtchain.records + Kafka ledger) | FRE 803(6) - business records exception |
| Evidence hash Merkle tree (PQ-006 compatible) | FRE 1002/1006 - original writing / summary of voluminous records |
| Human-readable executive summary | FRE 403 + 901 - comprehensibility for the fact-finder |
Daubert-proofing the methodology: 1. Testable: anyone can run the public verifier and independently confirm a record. [DONE - it's online] 2. Subject to peer review: we'll publish the methodology paper at a top security venue (USENIX Security, IEEE S&P, CCS) - referenced in Claim 53 defense memo. 3. Known error rate: the false-positive rate on signature verification is bounded by the ECDSA-P384 + ML-DSA-65 break probability (effectively zero under current cryptanalytic knowledge). Will be published with the methodology paper. 4. Standards + controls: NIST FIPS 204 (ML-DSA), FIPS 186-5 (ECDSA), FIPS 180-4 (SHA-256), NIST SP 800-56A (key agreement). All referenced explicitly. 5. General acceptance: cryptographic primitives are standardized by NIST - the highest bar possible.
This is Daubert-proof by construction. Chainalysis reports are not - they're expert opinion, not self-authenticating system output.
7. Record anatomy (per Claim 53, simplified)
+----------------------+
| [QR CODE] CourtChain Record |
| Record ID: CCR-2026-041234 |
| Issued: 2026-04-21 14:32 UTC|
| Version: 1.0 |
+----------------------+
| EXECUTIVE SUMMARY |
| Subject: Acme Corp received $1.25M USDC |
| from wallet 0x3a...f7 on 2026-03-14, |
| originating from sanctioned wallet |
| 0x9c...b2 via 3 intermediaries. All 42 |
| FWEA checks evaluated; verdict: BLOCK. |
+----------------------+
| STRUCTURED DATA |
| subject: Acme Corp (EIN 12-3456789) |
| counterparty: 0x3a...f7 |
| amount: 1,250,000 USDC |
| asset: USDC on Ethereum mainnet |
| timestamp: 2026-03-14T08:22:17Z |
| verdict: BLOCK |
| fwea_score: 87/100 |
+----------------------+
| CRYPTOGRAPHIC ATTESTATION |
| Quorum: 14-of-20 |
| Validators (13 jurisdictions): |
| US, DE, EU, SG, CH, JP, GB, AE, BR, KY |
| Ed25519 sigs: [14 signatures] |
| ML-DSA-65 sigs: [14 signatures] |
| L1 anchor tx: jil-mainnet-1:0x7f...a3 |
| Anchored at: block 1,234,567 |
| PQ-006 Merkle: 0xa8b9...d3 |
+----------------------+
| MACHINE-READABLE MANIFEST |
| [embedded JSON with full record schema] |
+----------------------+
| VERIFICATION |
| Verify independently at: |
| https://jilsovereign.com/verify/CCR-2026- |
| 041234 |
| |
| Methodology: |
| https://jilsovereign.com/methodology |
| |
| Trust bundle: |
| https://jilsovereign.com/.well-known/ |
| trust-bundle.json |
+----------------------+
8. Pricing
| SKU | Price | Margin |
|---|---|---|
| CourtChain Record - single transaction | $500 | ~90% |
| CourtChain Record - multi-transaction (up to 100) | $2,000 | ~85% |
| CourtChain Dossier - matter-level | $10K-$75K | ~80% |
| Expert Witness retainer | $15K | ~70% |
| Expert Witness deposition/trial day | $5K-$15K | ~75% |
| Audit Trail Export - standard | $2,500 | ~85% |
| Audit Trail Export - cold-storage courier | $15K | ~65% |
| Annual subscription - AmLaw or state AG | $50K-$250K | ~85% |
| Federal contract - GSA Schedule | varies ($100K-$2M) | ~75% |
Gross margin thesis: software delivery + self-serve verification → very high margins on the Record + Audit Export SKUs. Expert Witness + dossier work is people-heavy and scales linearly with headcount - but those customers are the ones paying AmLaw rates anyway, so the hourly is there.
9. Phased build plan
Phase 1 - MVP (Months 0-3)
Goal: ship CourtChain Record (single-transaction) + public verifier. One customer, one matter, one signed artifact in front of a judge.
Ship:
- services/courtchain/ skeleton with Record + Verify endpoints
- PDF/A-3 generator (LaTeX template → sealed PDF)
- Quorum-collection module (pulls 14+ signatures via existing fleet infrastructure)
- Public verifier page at /verify/:id
- S3 archive (Hetzner SDV reuse)
- Billing integration (per-record invoicing)
- Integration with existing attestation engine (pulls verdicts, doesn't re-run checks)
- Methodology paper draft (target: USENIX Security 2027)
Team: 1 engineer + 0.25 GTM (BD co-founder can wear both hats). Cost: ~$60K loaded (engineering) + BD time. First-customer target: a mid-market AmLaw firm already using us for compliance. Discount first artifact to $0 in exchange for a case study. Success metric: one sealed CourtChain Record filed as an exhibit in a civil matter.
Phase 2 - Dossier + Expert Witness (Months 3-9)
Goal: productize matter-level dossiers. Hire the first JIL expert witness.
Ship: - Dossier assembler (composes Records across entities + time windows) - Expert-witness declaration generator (DOCX templates) - Calendar + booking system for the witness - State AG pilot (one matter, pre-negotiated rate)
Team: +1 engineer, +1 expert witness (PhD cryptographer on retainer), +1 BD rep. Cost: ~$400K loaded. Success metric: 5+ active matter engagements; first deposition given by the JIL expert.
Phase 3 - Federal + FedRAMP (Months 6-18)
Goal: crack federal procurement. FedRAMP Moderate, GSA Schedule.
Ship: - FedRAMP Moderate ATO (~9 months, ~$500K) - GSA Schedule 70 listing - First federal contract (target: DOJ MLARS or IRS-CI per-matter agreement) - Multi-tenant isolation for government-hosted instances
Team: +1 compliance hire, +FedRAMP consulting. Cost: ~$800K loaded + ATO fees. Success metric: one signed federal contract; first DOJ-case artifact.
Phase 4 - Channel partnerships (Months 12-24)
Goal: e-discovery platform integrations; forensic accounting firm partnerships.
Ship: - Everlaw/Relativity/Logikcull integrations (JIL artifacts appear natively in their UIs) - OEM white-label for Deloitte, EY, Kroll - they resell CourtChain under their brand + JIL does the cryptographic work - API for internal-fraud groups at Fortune 500s
Team: +1 integration engineer, +1 channel BD. Cost: ~$400K loaded. Success metric: 3+ e-discovery integrations; 2+ forensic accounting resellers; $10M+ channel revenue run-rate.
10. Go-to-market
Year 1
| Quarter | Focus | Target |
|---|---|---|
| Q1 | MVP + first AmLaw pilot | 1 signed artifact in court |
| Q2 | First 3 paying law-firm customers; first state AG pilot | $500K ARR |
| Q3 | FedRAMP process starts; first federal pre-sales | $2M ARR |
| Q4 | State AG wave + first federal SOW | $5M ARR |
Sales channels: - Direct BD to AmLaw 100 + NAAG members - Booths at: ABA TechShow, ILTACON, LegalTech, NAAG summer/winter meetings, RSA (for federal) - Partnerships: Deloitte Forensic, EY Fraud Investigations, Kroll - resell channel - Content: methodology paper + Harvard Law Review / Stanford Law Review article on "Cryptographic Self-Authentication and the Future of Evidence Law"
Differentiation narrative
One sentence: "Chainalysis tells your investigator what happened. CourtChain tells the judge."
Three slides for every sales call: 1. The admissibility gap (Lorraine v. Markel + modern crypto litigation examples) 2. The CourtChain record anatomy (the diagram from §7) 3. The verifier - live demo. Show the URL. Show it works without JIL in the loop. That's the money slide.
11. Risks and mitigations
| Risk | Mitigation |
|---|---|
| Bar associations object to "automated expert testimony" | Expert witness is a human on retainer - the PDF is exhibit, the human is the witness. Matches existing law of expert systems (e.g. gas chromatography reports). |
| A judge rules our methodology inadmissible at first trial | Amicus brief + peer-reviewed paper published before first contested admission. Pick the first case carefully - uncontested (default judgment, settled case) to establish precedent. |
| Chainalysis sues on their compliance-platform patent | Claim 53 is the offensive weapon here - our civil-admissibility architecture is novel. Freedom-to-operate analysis complete before we ship. |
| Government procurement takes longer than expected | Launch state AG business first (12-month sales cycle) while FedRAMP runs in parallel (9-month ATO). AmLaw + corporate compliance fund the business in the meantime. |
| Expert witness is the bottleneck | Train 3+ experts early. Partner with academic cryptographers (MIT, Stanford, CMU) on retainer for overflow and Daubert-resistant pedigrees. |
| One bad artifact (e.g. wrong verdict) lands in court | Insurance + indemnity clauses in all contracts. Rigorous pre-issuance QA - every record generates a self-verification run before delivery; if any signature fails, the record is blocked. |
| Competitor builds knockoff | Patent Claim 53 + methodology paper establish priority. Chainalysis / TRM would need to retrofit quorum signing + post-quantum sealing - ~3-5 years behind. |
12. Build-vs-buy decisions
| Component | Build | Buy |
|---|---|---|
| Sealing / quorum / PQ binding | Build - we already have it | - |
| Asset intelligence substrate | Build - per in-house architecture doc | - |
| PDF/A-3 generation | Build on LaTeX - controllable, archival-grade | (rejected: PDFKit/ReportLab - not PDF/A-3) |
| Public verifier page | Build - extends existing /attestations/:id |
- |
| S3 archival | Reuse - Hetzner Object Storage (SDV) already in place | - |
| FedRAMP ATO documentation | Hire - FedRAMP consulting firm ($200K-$500K) | - |
| Expert witnesses | Hire on retainer | (rejected: rent-an-expert marketplaces - quality/pedigree issue) |
| e-Discovery platform integrations | Build to their APIs | - |
13. Success metrics (12-month horizon)
- Revenue: $5M ARR floor, $15M stretch
- Artifacts sealed: 1,000+ CourtChain Records issued
- Court appearances: 10+ matters where a JIL record was introduced as exhibit; 3+ uncontested admissions; 1 contested + granted
- Customer concentration: top customer <25% of revenue (diversified book)
- Methodology paper: accepted at USENIX Security 2027 or IEEE S&P 2027
- Patent state: Claim 53 non-provisional filed; 1-2 continuation claims drafted
- FedRAMP: Moderate ATO in flight (not yet granted expected in 12 months)
14. Relation to other JIL pillars
CourtChain sells the artifacts that every other JIL pillar produces. It is the value-capture layer for the compliance + attestation work the rest of the stack does anyway. No pillar of JIL operates without generating the substrate CourtChain productizes.
| Other pillar | CourtChain's relationship |
|---|---|
| Pre-Settlement Attestation | every pre-settlement verdict is a potential CourtChain Record |
| Post-Settlement Audit | every reconciled audit verdict is a potential CourtChain Record |
| Regulatory Attestation Network | RAN regulator-facing queries can return a CourtChain Record as the canonical format |
| Asset Intelligence | AI dossiers feed the CourtChain Dossier product directly |
| Sovereign Stack | each sovereign deployment ships CourtChain as its court-admissibility layer |
| PoCS (Proof-of-Compliance Settlement) | every on-chain settlement carries an attestation that can be materialized as a CourtChain Record |
This is the monetization layer.
15. Next decisions (this week)
- Approve Phase 1. 1 engineer, ~$60K loaded, 3-month MVP.
- Identify first pilot customer. Ideally a JIL existing customer who is an AmLaw firm. Cold outreach is harder than leveraging warm intros.
- Line up the expert witness. Need a PhD cryptographer on retainer by end of Phase 1 (before first artifact goes to court).
- Start the methodology paper. Two-person effort: engineering lead + a named academic co-author. Target: USENIX 2027 submission window (deadline ~June 2026).
- Book NAAG Summer Meeting. June 2026 - that's the state AG audience.
- File Claim 53 non-provisional. The provisional was drafted; file non-provisional within 12 months of the provisional to preserve priority.