USPTO Patent Application No. 19/433,835 · Referenced in NIST Comment NIST-2025-0035-0211
Cryptographic RuntimeGovernance
Attested Intelligence defines the versioned, conformance-backed reference specification for cryptographic runtime governance. It specifies how autonomous systems produce cryptographically sealed policy artifacts, hash-chained enforcement receipts, and portable evidence bundles that any third party can verify without network access.
◈ Core Artifacts
Policy Artifacts
Sealed, versioned governance objects that bind integrity baselines, telemetry rules, and enforcement mappings into a single cryptographically signed document.
Enforcement Receipts
Signed, append-only records proving that specific enforcement actions occurred at specific times, linked into a hash chain for tamper detection.
Evidence Bundles
Portable, offline-verifiable packages containing policy artifacts, receipt chains, and verification tools, auditable without network access.
◈ Start Here: Learning Path
◈ Latest Research
The Agent Evidence Gap
Autonomous agents optimize everything, except proof of what they did.
Read the full analysis →◈ Glossary Quick Links
◈ Architecture aligned with