architecture
The architectural case for execution evidence.
EEI is a layered architecture. Below: the primitives, the property they implement, and the engineering investment that makes the substrate run at scale.
Five layers. Two are ours. Seven primitives between them.
The full stack is five layers — hardware at the floor, policy at the top. EEI is layers 02 and 03: the Trusted Runtime Primitive and the Execution Evidence Layer. The other three are adjacent — informational here, owned elsewhere. Click any primitive to expand it in place; multiple in the same layer can be open at once. Or hit expand all to read everything inline. Layer numbering follows YEI-001.
Issuer · Network · Processor · Edge · Dispute platform
Consume evidence, own all enforcement. EEI does not decide.
Android Play Integrity · iOS DeviceCheck · TPM · StrongBox attestation
Attestation establishes the checkpoint. Runtime coherence establishes what happened between checkpoints.
·03 Evidence Token
The Evidence Token is a JWS compact structure, signed ES256, carried inline with each request. Two profiles: Minimal (~200 bytes, fits ISO 8583 DE 48) and Standard (~300 bytes, richer inline context).
Same cryptographic semantics, same verifier code path, different byte budgets. The channel is an integration decision; the token is a trust decision.
·04 Local Evidence Ledger & Commander
Every signed event is appended to a hash-linked, device-resident ledger. Tampering at any link breaks the chain visibly. The ledger does not leave the device.
The Commander module is the operator-controlled forensic channel into that ledger — encrypted commands in, signed responses out. PGP-analogous: the operator key authors, the device key replies, no third party in the loop.
·05 Zero Trust Bootstrap Protocol
At first initialisation, the device generates a keypair inside its trusted execution environment. The private key never leaves. The public key is registered to the operator backend over an operator-controlled onboarding channel — a path that does not include us.
From that moment, the operator owns the verification material. Sovereign verification is a property the bootstrap establishes.
·06 Sovereign Verification
Any party with the registered public key verifies the evidence independently — exactly as it would for any standard PKI signature. There is no YinkoShield endpoint in the verification path, no licence check, no runtime dependency.
Reference verifiers exist in Python, JavaScript, Go, and Java. The eight-step pipeline — parse, resolve key, verify signature, validate claims, freshness, replay, sequence regression, trust level — is the same in every language.
·02 Trusted Runtime Primitive
One platform-portable primitive runs in your application's user-land — Android, iOS, POS, SoftPOS, SST. It observes execution at the syscall level, measures the runtime, declares its trust basis, and signs evidence with a hardware-bound key.
The TRP is the substrate every other piece sits on. It is what makes a signed event a witness, not a claim.
·01 Runtime Coherence
Backend systems prove receipt. Credentials prove identity at the moment of use. Between the two sits the device-side execution path — historically silent, the partition that adversaries operate inside.
Runtime coherence is the property the TRP delivers. A signed, hash-linked sequence of execution events, ordered, attributable, and reconstructible. The deep article walks through the architectural case in full.
·07 Threat Model
The TRP defends against application-layer compromise, user-space manipulation, runtime injection, and the fabrication or replay of events. Those threats surface as evidence — not as silent failures.
What the TRP does not defend against — kernel-level compromise, supply-chain compromise, backend infiltration — is declared, not silently ignored. A narrow, honest model is the only one that survives a CISO's review.
TEE · Secure Enclave · HSM · Strongbox · TPM
The hardware floor we depend on — bounds the trust we declare.
The gap is engineering cost, not awareness.
Execution evidence requires operating infrastructure that doesn't sit inside standard payment-engineering organisations. Three capabilities have to exist; we have spent thirteen years building them.
- ·01
Fragmented device populations
Around 13,000 distinct Android hardware configurations today. The hardware abstraction layer was extracted from running it; the spec is the artefact.
- ·02
Chaos engineering for partition
Network simulation, memory pressure, execution interruption. Ledger coherence under partition is not testable in standard CI — purpose-built infrastructure we maintain in house.
- ·03
Adversarial runtime testing
Triggered, dormant, and injection-based attacks against the evidence layer. We validate detection of execution interference, not static presence of a threat.
This is what it costs to run execution evidence in production. This is why it doesn't already exist in your stack.
YEI-001 is shared with regulators and qualifying partners under NDA.
The full specification, conformance checklists, threat model, and the agentic-payment extension are available on request. Reference verifiers in Python, JavaScript, Go, and Java accompany.
Request access to the specification