Confidential — Pre-disclosure Internal prototype. No public discussion, demo, or embedding outside NDA until USPTO provisional is filed.
ARIA-AUT · Cross-cutting Modifier
Sequence-as-KeyTemporal Protocol
Side-by-side comparison · static vs sequenced verification · same secret, same document, same N addresses
VOXEL-DOC-2026-001 · Modifier — Phase 4
Inventor · Francois Flechter (sole)
Applies across · Embodiments A · B · C · D · F
Locale · Geneva · 2026-04-26
Address Set
N addresses chosen from M
Static entropy
log₂(C(M, N)) bits
Sequence contribution
log₂(N!) bits added
Sequenced total
Static + sequence + timing
Counterparty Enrollment
SETUP

Each enrollment generates a 256-bit secret as an HSM stand-in.

Document Issuance
ISSUE

Same key derives the same address set. Sequencing comes from the order of derivation, with optional session-nonce binding.

Session nonce binding

When ON, sequence depends on (secret, doc_hash, session_nonce). Defeats trace replay.

Timing-window enforcement

When ON, each step has a per-step timing window. Out-of-window submissions fail.

Verification
VERIFY

Runs both modes side-by-side. Static is instantaneous; sequenced animates step-by-step.

Replay = reuse a prior session's accepted trace. Out-of-order = same set, wrong sequence. Wrong timing = correct sequence, wrong intervals.

Static Modebaseline
EMBODIMENT B BASELINE

Verifier checks all N addresses at once and scores match rate. No temporal structure.

·
Awaiting verification
Issue a document and run verification.
Static check listed here after run.
Sequenced Modetemporal protocol
+ log₂(N!) BITS

Verifier walks addresses in derivation order. Wrong order, wrong timing, or replayed trace from a different session: immediate failure.

·
Awaiting verification
Sequenced check animates step-by-step.
Sequenced walk listed here as it executes.