Protocol Infrastructure · Post-Quantum Era · Patent Pending

Governing the Machine.
From identity to proof.

XAP, the Execution Authority Protocol: a new protocol category for governance of autonomous systems. Verifiable execution, one operation at a time.

XAP is not an extension of identity or access management. It operates above session-time authorization and below the operation itself, producing a cryptographic record of each decision an independent party can verify without access to the enforcement system.

Read the XAP Paper
1+1
Parent +
Continuation Filed
52
Claims Across
Both Applications
1
New Protocol
Category Defined
Track
One
Parent on Prioritized
Examination
Market Position
Compliance Gap
SOC 2 · ISO 27001 · NIST · FedRAMP · CMMC
These frameworks specify what authorization controls organizations must implement and how authorization decisions should be monitored. None specify a protocol-level mechanism for verifying that each governance decision was made correctly at execution time, against current machine state, with cryptographic evidence an independent party can reproduce. XAP addresses this gap with tamper-evident, independently verifiable execution authorization records applicable across commercial and regulated deployments alike.
Deployment Context
Alongside existing infrastructure
XAP deploys as an enforcement layer alongside existing OPA, Istio, Envoy, or API gateway infrastructure, not as a replacement. No infrastructure replacement required. No new trust root. Additive to zero-trust network architectures. The continuation extends category coverage to distributed enforcement topologies where no single component generates a complete proof structure.
Structural Differentiation
Beyond scoped access and persona definitions
Recent industry announcements have introduced infrastructure-level scoping for autonomous agents — defining what an agent may call, on whose behalf, with what credential. This is a starting point, not the destination. Execution authority is a different layer. It requires governance that operates at the moment of each operation, against the runtime conditions that exist at that moment, with cryptographic evidence an independent party can verify — not just static permissions evaluated at session start. XAP defines this layer as a coherent protocol category. The continuation extends category coverage to the distributed enforcement topologies real production deployments use.
Research Foundation
Practitioner-Developed Architecture
XAP reflects hands-on work with real-world enterprise deployment architectures, drawing on fifteen-plus years of operational experience across cybersecurity architecture, automation, and applied cryptography. The protocol is grounded in production reality, not academic abstraction.
Patent Portfolio
YH-AMIAP-001
March 2026
Nonprovisional · Track One
30 total
Patent Pending · Pre-examination

The foundational application defining the Execution Authority Protocol (XAP) category: a new layer of the security stack addressing per-operation execution authority with cryptographic proof an independent party can verify. The category is complementary to authentication, access authorization, and channel security; each governs a distinct function at a distinct point in the execution lifecycle. Specific claim language is held in the filed application and made available to qualified evaluators under NDA.

YH-AMIAP-CON-1
April 2026
Continuation under 35 U.S.C. § 120
YH-AMIAP-001
22 total
Patent Pending · Pre-examination

Extends category coverage to distributed enforcement topologies: the architectures real production deployments use, where governance is performed by cooperating components rather than a single point. Specifies how XAP category membership applies in these settings, so that the category matches the systems it is designed to govern. Specific claim language is held in the filed application and made available to qualified evaluators under NDA.

Prosecution Posture
Independent patentable basis
Stands on subject matter distinct from the Parent. Prosecution history firewall preserved between applications.
Insulated
Category Architecture
Category Layer
Defines the new protocol category
XAP PARENT · YH-AMIAP-001
Autonomous Machine Identity & Authority Protocol
Defines the protocol category at the level of per-operation execution authority, with cryptographic evidence an independent party can verify.
Structural Layer
Covers distributed enforcement topologies
CONTINUATION · YH-AMIAP-CON-1
Continuation Application — Distributed Execution Authority
Extends category coverage to distributed enforcement topologies, where governance is performed by cooperating components rather than a single point.
Together · Parent + Continuation
The Execution Authority Protocol (XAP) Category
The Parent defines the category. The continuation specifies how category membership applies to distributed enforcement as a structural property. Prosecution of each application is insulated through a prosecution history firewall.
Both Filed