Reference Implementation Notice

This site presents a reference view of an IDDAS-compatible implementation.

Outcomes shown here are computed deterministically from committed inputs and published, versioned protocol rules. No discretionary adjustments, manual overrides, simulations, or illustrative examples are used.

This reference exists to demonstrate protocol behavior, verification properties, and rule enforcement. It does not constitute a product guarantee, a commercial offer, or a statement of implementation completeness.

Protocol rules are authoritative and versioned. Implementation details may evolve without altering past outcomes.

Protocol behavior is fixed. Implementations may vary.

Search
ACTIVATION BEFORE IDENTITY

IDDAS is a deterministic protocol for identity-free activation, lineage-based attribution, and verifiable outcomes.

In other words, IDDAS enables activation with immutable attribution and independent verification.

Once an activation occurs, its lineage, attribution path, and resulting outcomes are deterministically bound and cannot be altered retroactively. Verification does not depend on platform trust, identity disclosure, or discretionary control, and may be independently recomputed from recorded inputs and published rules.

This property is protocol-level. Applications may vary. Outcomes do not.

No account is required to begin. Identity is optional. Attribution follows lineage. Rule versions and verification proofs are anchored to a public blockchain - no silent changes.

IDDAS starts with action in the real world: a scan, a tap, a placement, or a verified event. The system records intentional actions first and derives outcomes from those actions, rather than from identity, negotiation, or trust in an operator.

This allows IDDAS to function in crowds, public spaces, and shared environments where accounts, permissions, and coordination add friction.

Key properties:
• Action comes first
• Attribution follows lineage
• Outcomes are rule-based
• Results are verifiable

Results are verifiable Attribution follows lineage Outcome computation is rule-based Economic rules are fixed and versioned
Lineage-based attribution - what it means

In IDDAS, attribution does not depend on who the user is. It depends on the lineage of actions. Lineage is the verifiable chain of how this happened - which object was activated, which environment it belonged to, and which upstream placements or invitations led to the outcome.

This matters because crowds and public environments cannot rely on accounts. People come and go. Lineage lets value be attributed and shared without forcing identity at the start.

When revenue occurs, payouts follow the published economic rule and the recorded lineage. The verification layer anchors rule versions and payout proofs on-chain so outcomes can be audited independently.

The thesis

Most systems start by asking who you are. Then they ask you to trust the system, create an account, accept permissions, and follow a flow.IDDAS flips that order.

IDDAS starts with action in the real world - a scan, a tap, a placement, a verified event. Identity is optional. The system does not need to know who you are to begin.

Instead of trusting first and proving later, IDDAS proves outcomes through verifiable actions and lineage-based attribution. When real revenue occurs, distribution follows a fixed rule that is published in advance - not negotiated per client and not changed quietly.

This is why IDDAS works in crowds, public spaces, and shared environments where accounts and coordination add friction.

Before Anything Else, Here’s What Makes This Different

Capabilities live in the object, not the user.

Most digital systems work the same way.

You identify yourself. You log in. You are granted access to features tied to your account.

IDDAS works differently.

With IDDAS, capabilities are embedded into the object itself. Identity is optional, and in many cases not required at all.

This may feel unfamiliar at first. That’s normal. It is not how most digital experiences are designed.

If you only read one section on this site, read this one.

Read how this actually works

What does “capabilities live in the object” mean?

Think of physical objects you already understand.

  • A parking meter does not ask who you are.
  • A ticket does not ask for your identity.
  • A light switch does not require an account.

The object itself determines what can happen.

IDDAS applies this same idea to digital interactions. Instead of asking who you are first, IDDAS asks: What is this object allowed to do, right here, right now?

Those allowed actions are called capabilities.

Why most systems tie everything to identity

  • Identity becomes the control mechanism.
  • Permissions live on user accounts.
  • Context is inferred indirectly.
  • Every interaction starts with friction.

This works well for personal software. It works poorly for shared spaces, crowds, public environments, and spontaneous moments. It also makes simple interactions feel heavy.

How IDDAS flips this model

  • The object is stable.
  • Capabilities are pre-bound to the object.
  • Context determines which capabilities are active.
  • Identity is optional, not foundational.

The same object can behave differently in different contexts without explanation. People simply interact.

Why IDDAS is a protocol (not just infrastructure)

Infrastructure is software that can change. A protocol defines rules others can rely on.

IDDAS is a protocol because it fixes the order of operations, the attribution logic, and the economic rules in advance. Even the operator cannot silently change outcomes.

IDDAS runs on infrastructure, but it is not merely infrastructure. The protocol defines what must remain true regardless of implementation.

Why this is not a crypto product

IDDAS uses blockchain only as a verification layer - to lock rules and make outcomes auditable. It is not a token system, not a marketplace, and not a wallet-based user experience. Participants can activate and participate without touching crypto.

Why this matters in the real world

  • Shared moments without coordination.
  • Participation without sign-ups.
  • Collective action without instruction.
  • Calm interactions in noisy environments.
  • Trust without data collection.

People do not feel processed. They feel included.

How others build on IDDAS

When builders extend IDDAS, they do not modify the object itself. They define capability layers that can be enabled, disabled, or contextually activated across environments. The object remains recognizable. The experience adapts.

What this is not

  • A QR code generator.
  • A feature marketplace.
  • A user-tracking system.
  • A dashboard-driven platform.

It is a different way of thinking about interaction.

Why this explanation exists

IDDAS is counterintuitive. If this model is not made clear early, familiar assumptions get projected onto it and the simplicity is mistaken for limitation.

Our goal is not to sound clever. Our goal is to be clear.

Once you understand this model, everything else on this site makes more sense.

What IDDAS is

Plain language, not a pitch

It is a rule, not a product

IDDAS is not a single app or a packaged offering. It is a rule set that governs what happens when a real, measurable outcome occurs - and only then.

If no value is created, no money moves. There is nothing to sell and nothing to persuade. The rule itself is the product: a predictable way to activate value, attribute contribution, and produce verifiable outcomes without negotiation, discretion, or exceptions.

IDDAS defines outcomes, not features. It defines how value moves, not how it is marketed or claimed.

  • Outcome-based distribution - only when value occurs
  • Attribution via lineage, not self-claims or reporting
  • Verification replaces trust and salesmanship

It is a protocol that runs on infrastructure

IDDAS runs on standard infrastructure such as cloud services, databases, and conventional software systems. It is not infrastructure itself.

Infrastructure executes the system. The protocol defines the limits of the system.

IDDAS defines the invariants - what must remain true regardless of implementation. These include activation before identity, lineage-based attribution, fixed rule enforcement, and verifiable outcomes anchored for independent audit.

Implementations may evolve. The rule cannot drift silently. The protocol is implementation-agnostic so others can build on it without changing the underlying economics or attribution logic.

  • Activation before identity - identity optional later
  • Published rules with versioning and no silent changes
  • Lineage-based attribution with verifiable outcomes
  • Independent of any single platform or implementation

What it is not

IDDAS is intentionally narrow in what it defines and deliberately broad in what it enables.

It does not attempt to replace entire industries or operate them directly. It provides a rule layer those industries can build on.

IDDAS is not:

  • A loyalty program
    Loyalty programs assume accounts, identity, and long-term tracking. IDDAS operates before any of that exists.
  • Affiliate marketing
    There are no claims-based referrals, cookies, or attribution disputes. Lineage replaces assertions.
  • MLM or network marketing
    There are no recruitment incentives, rank systems, or promises of income.
  • A marketplace
    IDDAS does not match buyers and sellers or intermediate transactions.
  • A social network
    There are no profiles, feeds, or attention mechanics.
  • A promise of income
    If no real value is created, no money moves. Participation alone guarantees nothing.

Many large industries rely on these models today and are constrained by their structure. IDDAS does not compete with those industries. It removes structural friction that prevents them from capturing value that already exists.

Why it matters

As systems scale, attribution becomes opaque and economics drift.

Rules change quietly. Exceptions accumulate. Trust is replaced by negotiation.

IDDAS exists to stop that drift by making the rule explicit, fixed, and verifiable.

When the rule is clear and cannot change silently:

  • Fairness becomes structural, not reputational
  • There is no operator discretion over winners or outcomes
  • Participants can verify results independently

This matters because much real-world activation is currently lost - especially in public spaces, shared environments, collective moments, and situations where identity-first systems create friction instead of value.

IDDAS is designed so others can build systems that capture that missing activation without changing the rule after adoption.

Patent applications are pending. The goal is not ownership of use cases, but durability of the rule.

Note: IDDAS is sometimes described as "infrastructure" because it sits beneath many systems. The precise term is protocol - the rule layer that constrains how infrastructure behaves.

The rule is simple. The system does not ask you to trust it - it gives you something you can verify.

Protocol vs Infrastructure

Why this distinction matters.

IDDAS runs on infrastructure.

But IDDAS is not infrastructure.

This distinction is important, because confusing the two leads to incorrect assumptions about flexibility, control, and trust.

Understand the difference

What infrastructure is

Infrastructure is software that executes behavior. It includes:

  • Servers and cloud services
  • Databases and storage
  • APIs and application code
  • Interfaces and user experiences

Infrastructure can be changed. That flexibility is useful, but it also means outcomes depend on who controls the system.

What a protocol is

A protocol defines rules that others can rely on. It specifies:

  • What happens first
  • What cannot be skipped
  • What cannot be changed quietly
  • How outcomes are determined

A protocol constrains infrastructure. It tells builders what must remain true, even as implementations evolve.

Why IDDAS is a protocol

IDDAS fixes several things in advance:

  • Action comes before identity
  • Attribution follows lineage
  • Economic splits are explicit
  • Outcomes are verifiable

These are not implementation choices. They are rules. Even IDDAS, as the operator, cannot silently change them.

What this enables

Because the rules are fixed:

  • Others can build systems on top of IDDAS without fear of drift
  • Adoption does not create dependency on operator discretion
  • Success does not change the economics retroactively

Infrastructure may vary. The rule does not.

Why this is not just “Web3”

IDDAS uses a blockchain only as a verification anchor. It does not require:

  • Tokens
  • Wallets
  • User-facing crypto interactions

The blockchain is used to make rule versions and outcomes auditable. It is an audit layer, not a product feature.

Why this distinction matters long-term

Many systems start as infrastructure and later attempt to behave like protocols. That usually fails. Rules that are not fixed early become negotiable under pressure.

IDDAS is designed the opposite way. The rule comes first. Everything else adapts around it.

Once this distinction is clear, the rest of the system becomes predictable.

Infrastructure Originators (Deployment Roots)

Clarifications and confirmations.

What this section does

This section explains how Infrastructure Originators (IOs) are recognized in V1 and how activation-based attribution applies to deployment roots.
It introduces no sales programs, no brokerage roles, and no off-protocol economics.

What an Infrastructure Originator is

An Infrastructure Originator (IO) is a deployment root that enables an activation surface to exist in the real world.

An activation surface may be physical or digital (for example, kiosks, screens, transit placements, venues, or other authorized locations) and may later generate verified activations.

IO status is structural, not discretionary.
An IO exists only if protocol-valid activations occur through an originated surface.

What an Infrastructure Originator is not

An Infrastructure Originator is not:

  • a sales agent
  • an affiliate
  • a reseller or broker
  • a negotiator of Brand terms
  • a recipient of discretionary rewards

Infrastructure Originators are not compensated for effort, access, influence, persuasion, or relationships.
They are compensated only when verified activations occur.

No approval or designation

Infrastructure Originator status:

  • is not applied for
  • is not granted or approved
  • is not negotiated
  • cannot be revoked by discretion

The system does not evaluate people or effort.
It evaluates activation events.

Activation-based attribution (V1)

For each verified activation that occurs through an originated surface:

  • a fixed $0.50 deployment attribution is recorded for the Infrastructure Originator
  • this attribution is computed automatically
  • it is triggered only by a verified activation
  • it is paid by the operating Steward, not by Brands and not by Participants

This attribution is:

  • not a commission
  • not a sales fee
  • not payment for labor
  • not dependent on downstream outcomes

If one activation occurs, one deployment attribution applies.
If one million activations occur, one million deployment attributions apply.

There are no guarantees.
There are no minimums.
There is no compensation without activation.

Separation from private arrangements

Any private agreements, consulting fees, access arrangements, installation costs, or other compensation negotiated by an Infrastructure Originator outside the Protocol are entirely independent of the Protocol and the Steward.

Such arrangements:

  • are not governed by the Protocol
  • do not affect attribution
  • do not alter activation economics
  • do not create protocol-level rights

The Protocol recognizes only verified activation events and their recorded lineage.

Attribution permanence

Infrastructure Originator attribution is recorded at activation creation time.

Once recorded:

  • it cannot be reassigned
  • it cannot be removed
  • it cannot be overridden by side agreements
  • it cannot be suppressed by Brands or operators

Any use of protocol-valid activations necessarily honors recorded attribution.

Why this exists

This structure rewards those who make activation possible
without converting infrastructure enablement into sales, brokerage, or influence programs.

Infrastructure Originators do not extract value.
They enable activation to exist.

The system handles the rest.

The rule

A single rule governs the system.

A single rule governs the system.

Deterministic economic posture

When real revenue is created through the system, outcomes are determined by published, versioned rules.

The protocol enforces the following invariants:

  • Allocation occurs only after real revenue exists
  • Distribution is computed deterministically from recorded lineage
  • Outcomes are derived from rules, not negotiation or discretion
  • If one participant contributes, that participant is eligible under the rule
  • If multiple participants contribute, eligibility follows the published lineage rule
  • If no value is created, no allocation occurs

The protocol does not define prices, percentages, commercial splits, or retained amounts. Those parameters, if any, are implementation- or Brand-defined and exist outside protocol logic.

What the protocol fixes is how outcomes are computed once qualifying revenue exists, not the commercial terms themselves.

Why fixed rules matter

Most systems begin with clear rules and weaken them as they scale.

As systems grow:

  • Exceptions accumulate
  • Incentives drift
  • Outcomes become negotiable
  • Trust shifts from rules to operators

IDDAS prevents this by fixing the rule layer itself.

Because outcomes are computed from committed inputs and published rule versions:

  • Participants know the rule before participation
  • Enforcement is verification-based, not trust-based
  • Outcomes are auditable and reproducible
  • No operator can intervene after the fact

This challenges the assumption that discretion, opacity, or post-hoc adjustment are required at scale.

IDDAS fixes the rule first so others can build on it without fear that success will change the outcome.

What this enables

  • Clear expectations before participation
  • Deterministic enforcement instead of promises
  • Long-term credibility under scale
  • Verification-based outcomes, not operator discretion

Deal Formation Integrity

How lineage is preserved when a deal is formed.

The protocol provides a deterministic way to preserve lineage integrity when a deal is formed through the candle. This is a verification and auditability property - not a contract, and not a guarantee of any economic outcome.

1. Lineage forms before any deal

As a candle propagates, eligible activation events append to a lineage. Lineage is append-only: entries can be added, but valid entries are not removed or rewritten.

2. Deals formed through the candle remain verifiable

If a deal is formed through the candle, the resulting record retains lineage integrity and can be verified from committed events and published, versioned protocol rules.

3. Canonical sealing action (enterprise-enabled)

In enterprise-enabled implementations, a deal may be sealed through a single canonical gesture:

  • the candle must be unsealed
  • the flame must be off
  • the user performs a continuous 10-second hold on the candle
  • any interruption cancels the attempt silently
  • completion emits a single Seal Event and seals immediately
  • no confirmation dialog exists
  • no alternative gestures exist

4. Post-seal behavior

After sealing, the candle enters a sealed state. The lineage remains append-only and upstream participants cannot be removed or renegotiated. Sealing is one-time and irreversible - there is no unsealing, repetition, or override.

5. If a deal occurs outside the candle

If a deal is formed outside the candle, the protocol cannot produce lineage-based verification for that deal. This means loss of protocol verification and loss of lineage-based attribution for that outcome.

6. The candle as boundary

The candle is the verification boundary: only deals formed through the candle retain lineage integrity for protocol verification.

Allocation Plain English

How allocation works before formulas.

IDDAS allocates value only after a real, qualifying transaction occurs.

There is no negotiation after the fact.
There is no discretion.
There is no “we’ll figure it out later.”

Everything that may be allocated is defined in advance, and outcomes are computed deterministically from recorded events and published rules.

Step 1 - Revenue first

Allocation begins only if real revenue exists.

If no qualifying transaction occurs, no value exists to allocate.
If no value exists, no allocation occurs.

The protocol does not create speculative value, implied credit, or future entitlement.

Step 2 - Declared allocatable portion

Before any participation occurs, the Brand or implementation defines what portion of revenue, if any, is made allocatable.

This declaration is made up front, before activation, propagation, or contribution.

The protocol does not decide:

  • commercial terms
  • pricing
  • retained amounts
  • commission sizes

It enforces only that whatever is declared allocatable is fixed in advance and cannot be altered after the fact.

Anything not explicitly declared allocatable remains outside protocol allocation.

Step 3 - Allocation pool boundary

IDDAS allocates only the portion of revenue that has been declared allocatable.

The protocol does not redistribute retained revenue.
It does not infer pools.
It does not expand allocation scope.

If nothing is declared allocatable, nothing is allocated - even if revenue exists.

Step 4 - Lineage-based distribution

From the declared allocation pool, distribution follows lineage.

Lineage is the ordered, append-only record of eligible activation events that led to the outcome.

Allocation:

  • follows contribution order, not identity
  • is computed mechanically from the lineage state
  • is rule-based and deterministic
  • contains no discretionary adjustments

If a role does not exist in a given lineage, no allocation is reserved for it.
If only one participant contributed, allocation resolves to that participant under the rule.

What lineage does - and does not - do

Adding more participants to a lineage does not create additional value.

What lineage increases is reach and likelihood - not entitlement.

If an outcome occurs, allocation is computed.
If it does not, nothing is owed.

IDDAS allocates value only after it exists.

In short

  • Revenue must exist first
  • What is allocatable is declared in advance
  • IDDAS allocates only what is declared
  • Distribution follows lineage deterministically
  • Outcomes are auditable and verifiable

The rule is known before participation.
The rule does not change afterward.

The rule is the trust.

Deterministic Allocation (Overview)

When real revenue occurs, allocation under IDDAS follows published, versioned protocol rules.

Allocation is deterministic and non-discretionary: the same committed inputs always produce the same outcomes. There is no negotiation, manual adjustment, or post-hoc override.

The protocol records eligible activation events, preserves their lineage in order, and computes outcomes only after real, settled revenue exists.

These properties ensure auditability and verification without requiring trust in any operator. Protocol rules are authoritative; implementations may vary.

Pricing and Activation Definition

What is charged, and when.

What an activation is

An activation is a verified, intentional entry into the system initiated by a person.

An activation occurs when someone deliberately scans a code, opens an activation link, or otherwise enters an activation flow in a way that creates a recorded lineage event.

An activation is not passive exposure.
It is not an impression.
It is not background traffic.

An activation requires intentional human action and the creation of persistent system state. Each activation is recorded at the moment it occurs and becomes part of an append-only lineage that cannot be retroactively altered.

If no intentional entry occurs, no activation exists.
If no activation exists, no charge occurs.

Structural integrity of activations

The system does not rely on post-hoc filtering, subjective moderation, or discretionary review to determine valid activations.

Validity is structural.

An activation must:

  • Originate from intentional human entry
  • Establish a real session context
  • Create a unique lineage event
  • Pass deterministic, idempotent verification checks

Automated traffic may fire requests or load URLs, but it cannot reliably:

  • Mimic physical-world scanning at scale
  • Sustain meaningful session state
  • Generate diverse, valid activation contexts
  • Create lineage without detection

Invalid activity does not qualify as an activation by definition. It is excluded structurally, not filtered later.

Activation-based charging (non-numeric)

Charges, where applied, are based solely on verified activations that actually occur.

The protocol defines when an activation exists.
Pricing, credits, minimums, discounts, or billing structures-if any-are defined by the Brand or implementation operating within the protocol.

Pricing decisions do not affect:

  • Activation eligibility
  • Lineage formation
  • Allocation logic
  • Verification or determinism

What is charged and what is not

Charges apply only to verified activations that intentionally occur.

If people are present but do not intentionally enter, no activation exists and no charge occurs.

Charges are not based on impressions, views, reach, or inferred exposure. Charges are based solely on recorded, verifiable activation events.

Subsequent actions such as saving, sharing, claiming, or converting may deepen lineage, but they are not required for an activation to be valid.

Event and time boundaries

Activations are counted within defined events, deployments, or time windows as configured by the implementation.

Capacity, credits, or usage limits-if any-apply to future activity only and do not retroactively alter recorded activations or outcomes.

This aligns charging with real-world moments and preserves clear accounting, attribution, and reconciliation.

Why this model exists

Physical-world activation only scales when engagement is measured precisely and verification is deterministic.

This model replaces estimation with verification. Participants know the rule before they participate, and outcomes follow the rule exactly.

Clarity replaces guesswork. Verification replaces inference.

Pricing Philosophy and Fairness

Why the rule is fixed, and what is included.

Pricing philosophy

IDDAS charges for verified activation - and nothing else.

If an activation occurs, it may be charged according to the implementation’s published pricing.
If no activation occurs, nothing is charged.

An activation is a verified, intentional entry that creates persistent system state.
Charges are never based on impressions, views, exposure, or inferred interest.

Each verified activation includes deterministic attribution, append-only lineage, auditable outcomes, and independent verification of what occurred.

These properties are inherent to the system.
They are not add-ons, upgrades, or optional features.

You are paying for real entry. The system provides the full, verifiable truth of what that entry produced.

Fairness rule - uniform structure, not negotiated outcomes

IDDAS enforces a uniform structural rule: what is charged, when charging occurs, and what properties are included do not vary by industry, organization size, negotiating power, or relationship.

There are no special cases.
There are no discretionary exceptions.
There are no hidden terms.

Commercial pricing amounts, if any, are defined by the implementation or Brand, not by the protocol.
The protocol fixes the structure and invariants, not the numbers.

Small and large organizations operate under the same rule structure.
No participant is favored. No participant is penalized.

Credits and efficiency (implementation-defined)

Implementations may support credits or efficiency mechanisms that apply to future activations.

Such mechanisms, if offered:

  • apply forward-only
  • are deterministic and non-discretionary
  • do not apply retroactively
  • do not alter attribution, lineage, or outcome computation

Credits affect billing only.
They do not change what an activation is, when it occurs, or how outcomes are verified.

The protocol does not define credit amounts, pricing floors, or commercial incentives.

Activation before identity

How participation starts

Action creates an activation

A meaningful action creates an activation.

This can be a scan, a tap, a link open, or any defined trigger.

An activation is anonymous by default. It does not require an account, identity, or prior relationship.

The activation is the root of continuity. Everything that happens later traces back to this moment.

Identity may be attached later, but identity does not create eligibility. Only the action does.

This design allows participation to begin immediately, without permission, friction, or explanation. It is optimized for moments of mass participation, not gated access.

Participants who care about persistence, control, or long-term involvement can and typically will attach identity later. The system supports that naturally.

  • No login required
  • Identity can attach later
  • Identity never creates eligibility
  • Action is the only prerequisite

Lineage

Activations form lineages. A lineage is the ordered chain of actions that lead to an outcome.

Each activation links to a prior activation, creating a permanent history of contribution based on actual propagation, not claims.

Lineages do not collapse into a single winner. There is no global last person and no overwrite.

Multiple lineages can exist in parallel indefinitely. Each remains independently valid.

Eligibility for downstream value is determined by position within a lineage, not by identity, reputation, or timing tricks.

Eligibility itself does not expire. However, claiming or collecting value may be subject to clearly defined time windows , which are published in advance and apply equally to all participants.

These windows do not alter lineage or reassign value. They define how long a participant has to claim what they are already eligible for.

  • Eligibility for downstream value is recorded durably within a lineage, but does not guarantee compensation, payout, or economic outcome.
  • Claim windows may apply and are explicit
  • No global last person
  • Parallel lineages can exist indefinitely
  • Attribution follows actual propagation

Control and origin

Continuity and origin anchoring derive from possession of the originating activation token, not from identity.

The first activation creates the root. That root cannot be overwritten by later actions or identities.

Identity may later anchor continuity, but it cannot rewrite origin or seize control.

If the originating token is lost, control may be lost. This is intentional. The system favors correctness and continuity over recovery by default.

In practice, participants for whom persistence matters - such as sales agents, operators, or long-term contributors - typically attach identity early. The anonymous-first model exists to remove friction for the many, not to penalize the few.

  • The first activation creates the root
  • Later actions cannot overwrite the root
  • Identity cannot seize origin
  • Loss of token can mean loss of control

Idempotency

Actions must be safe to repeat without changing outcomes.

Reloading a page does not create a new activation. Refreshing does not duplicate events.

The system behaves as if the action happened once, even if it was triggered multiple times accidentally.

This prevents inflation, abuse, and accidental duplication.

All events are append-only. History can grow, but it cannot be rewritten.

  • A scan creates a new activation
  • Refresh does not create another
  • Duplicate triggers do not duplicate outcomes
  • Events are append-only

CandleMe is the public proof

CandleMe is a consumer-facing activation ritual built on IDDAS. It is intentionally calm, minimal, and universal.

CandleMe exists to demonstrate the system without explaining it. People do not need to understand IDDAS in order to use it. They simply act, and the system responds correctly.

CandleMe shows that activation can happen before identity, that value can propagate without coordination, and that meaning can exist without permanence.

It is not a demo and not a simplified version of the protocol. It is a real, functioning implementation that proves the rule holds in live environments with real people.

What CandleMe proves publicly:

  • Activation can occur without login
  • Lineage can form without instruction
  • Outcomes can be shared without ownership
  • Verification can happen without trust

CandleMe is one expression of IDDAS, not the limit of it.

Verification and blockchain

Audit layer, not experience layer
PROOF STATUS UPDATE - VERIFICATION LAYER IS NOW LIVE

As of January 3, 2026, the IDDAS verification service is deployed on Google Cloud Platform and running as a live, testable proof surface.

IDDAS is not UI-first. It is a protocol-level rule system. Proof requires that events can be recorded and verified in a way that is reproducible, auditable, and defensible.

What is now real (current proof surface)

  • The iddas-verification repository is connected to GCP via Cloud Build and Cloud Run
  • Builds are observable through build logs
  • The service is deployed as a running endpoint
  • Failures are inspectable and debuggable through logs and replay testing

What this stage proves

  • The verification layer runs as a real system, not a local prototype
  • Behavior is observable through logs and build traces
  • We can test append-only event recording, rule_version binding, deterministic commit logic, and replayability against a live service

What this stage does not claim

  • Not a public product launch
  • Not a finished API or developer platform
  • Not yet the anchored ledger or full audit interface
  • Not a pricing or monetization claim

Why this matters

A protocol must be provable. A running verification service is the first concrete step that turns the Charter into an executable proof layer.

Off-chain vs on-chain

IDDAS is designed to be efficient, scalable, and usable in real-world environments. For that reason, most activity happens off-chain, while verification anchors live on-chain.

The blockchain is not the experience layer. It is the audit layer.

Off-chain components handle everything that must be fast, flexible, and human-facing. On-chain components handle only what must be immutable and independently verifiable.

How this is split in practice:

On-chain responsibilities:

  • Rule hashes and version identifiers
  • Payout batch commitments
  • Merkle roots that anchor outcome sets
  • Public verification of published results

Off-chain responsibilities:

  • Activations and events
  • Lineage construction
  • Identity attachment when required
  • Payments and settlement
  • User interfaces and experiences

This separation avoids unnecessary cost and complexity while preserving verifiability. Nothing important depends on trusting an operator. Everything important can be checked.

What “immutable” means here

Immutability in IDDAS does not mean that software cannot evolve. It means that economic rules cannot change silently.

Once a rule is published and anchored, all outcomes can be verified against that rule. Any change requires publishing a new version, with a clear boundary between old and new behavior.

Immutability applies to the rule, not to the interface.

What this guarantees:

  • Rule versions are explicit and discoverable
  • Outcomes are tied to the rule in effect at the time
  • No retroactive changes to distribution
  • No hidden adjustments or operator discretion

Verification does not require trusting IDDAS, CandleMe, or any operator. Anyone with access to the published rule and the anchored data can independently confirm that outcomes were calculated correctly.

This is how trust is replaced by verification.

WHAT AN ACTIVATION GIVES YOU

What the unit gives you.

What an activation gives you

An activation is not an impression. It is not a click. It is not a guess. An activation is a verified, intentional human entry into a defined environment. That difference matters.

What you get:

  • Verified presence - a real person intentionally entered a specific surface, location, or context.
  • Guaranteed attribution - activations are structurally linked to where they occurred, how they propagated, and who contributed.
  • Measurable engagement - you pay only for real entry, not passive exposure or ambient attention.
  • Deterministic outcomes - billing is precise, allocation is fair, audits are possible, silent manipulation is detectable.
  • Portability across use cases - the same activation unit works across retail, venues, events, loyalty, campaigns, and physical surfaces.

What you are not paying for:

  • Impressions
  • Reach estimates
  • Optimization experiments
  • Behavioral prediction

If a person does not activate, nothing is charged. That is the rule.

ACTIVATION, PRICING, AND ADOPTION
CREDITS - EXPLAINED

How pricing and credits work.

Activation, Pricing, and Adoption Credits - Explained

Core principles

  • Activation-before-identity is foundational.
  • An activation is a verified, intentional human entry into the system.
  • Passive exposure does not count as activation.
  • Activation is not a conversion.
  • Conversions create revenue.
  • Activations create lineage and eligibility.
  • No speculative value is created.
  • No discretionary overrides exist.
  • Allocation is deterministic and rule-based.
  • Rules are versioned and non-retroactive.
  • Verification replaces trust.

Pricing model

  • The pricing unit is the activation.
  • The pricing structure per activation is fixed.
  • Pricing is applied uniformly within a given implementation or deployment.
  • There are no negotiated outcomes, discretionary overrides, or per-participant exceptions.
  • Numeric pricing amounts, credits, or efficiency mechanisms, if any, are defined by the implementation in advance and apply forward-only.

If no activation occurs, no charge occurs.

Payment model

  • Billing is automatic.
  • Payments are isolated from activation logic.
  • Activation behavior never depends on payment status.
  • Payment is an outcome, not a prerequisite.
  • Event or deployment boundaries define billing windows.
  • All records are auditable and verifiable.

CandleMe role

  • CandleMe is a consumer-facing implementation built on IDDAS.
  • It demonstrates activation-before-identity under real conditions.
  • The candle appears already lit on load.
  • Saving extinguishes the flame.
  • Refreshing is idempotent.
  • Sharing creates a new activation.
  • Loss is acceptable.
  • CandleMe is not the protocol.

Activation credit

To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.

This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.

Credit rules

  • Each organization receives a small, fixed number of activation credits.
  • Credits are one-time only.
  • Credits are non-renewable.
  • Credits are non-transferable.
  • Credits are applied automatically.
  • Credits follow the same rules, pricing, attribution, and verification as paid activations.

Credits pre-fund standard activations.

When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.

What credits do not do

Activation credits do not:

  • Change pricing
  • Change activation behavior
  • Create special cases
  • Introduce negotiation
  • Enable unlimited usage
  • Alter allocation or lineage
  • Modify protocol rules

Credits exist solely to reduce initial adoption friction.

Governance and posture

  • Credits are policy, not promotion.
  • No dollar values are presented.
  • No urgency language is used.
  • Credits are not framed as free offers or trials.
  • The tone is calm, declarative, and rule-based.

Message conveyed:

“The rule is finished. You can see it work.”

Rationale

This structure:

  • Preserves elegance
  • Prevents gaming
  • Eliminates discretion
  • Simplifies adoption
  • Protects the rule at scale
  • Allows small and large deployments to self-select naturally
  • Ensures that payment reflects real engagement only

Status

  • Core rules defined
  • Pricing fixed
  • Activation model validated
  • CandleMe implementation operational
  • Adoption credit defined
  • System ready for automated payment

IDDAS Infrastructure

Activation infrastructure for the physical world

IDDAS is a protocol that provides activation infrastructure for the physical world.

It provides identity-free, intentionally activated proof of physical presence, with verifiable records that can be independently audited.

IDDAS does not measure impressions, exposure, or background traffic.
It records only deliberate entry into a system.

If no one enters, nothing is recorded.
If nothing is recorded, nothing is charged.

What the infrastructure does

IDDAS infrastructure enables:

  • Identity-free entry into a system
  • Intentional activation as the atomic unit of participation
  • Structural verification of real, human presence
  • Creation of permanent, append-only activation lineage
  • Deterministic activation accounting independent of pricing
  • Verifiable activation records anchored for audit

The system verifies that someone was present, not who they were.

What the infrastructure refuses

IDDAS explicitly does not:

  • Require login, registration, or identity
  • Collect or store personal data
  • Track individuals across surfaces
  • Rely on moderation or subjective filtering
  • Negotiate pricing or attribution rules
  • Promise outcomes or engagement

Validity is structural, not interpretive.

How it works physically

IDDAS is deployed through physical activation surfaces, most commonly QR-based.

Each surface is:

  • Location-bound or event-bound
  • Time-aware
  • Configured so every intentional scan creates a new activation

When scanned:

  • A new activation is created
  • Structural checks verify plausibility and intent
  • A permanent activation record is written
  • No identity is required

This activation serves as proof of intentional physical presence.

Verification and blockchain anchoring

IDDAS uses blockchain as a verification and audit layer, not an experience layer.

  • All user experience and activation logic occur off-chain
  • Activation records and economic rules are cryptographically anchored
  • Hashes and batch proofs are written on-chain
  • Records can be independently verified without revealing identity

Blockchain is used to make the system tamper-evident, not to introduce friction.

Activation-based charging (implementation-defined)

IDDAS charges only for verified activations.

If an activation occurs, it may be charged according to the implementation’s published pricing.
If no activation occurs, nothing is charged.

The protocol does not define prices, rates, floors, credits, or numeric amounts.
Those parameters, if any, are implementation- or Brand-defined and exist outside protocol logic.

Any credits or efficiency mechanisms, if offered, apply forward-only, do not alter attribution or lineage, and do not change what constitutes an activation.

Example applications (not exhaustive)

These are expressions of the same infrastructure, not separate products.

1. CandleMe
A ritual activation where each scan ignites a candle, creating a lineage of presence and participation.

2. Venues and events
Verify real attendance at concerts, conferences, stadiums, or festivals without identity-bound tickets.

3. Casinos and regulated spaces
Record physical presence and participation without storing personal data, while maintaining verifiable records.

4. Out-of-home advertising
Measure intentional engagement with physical media instead of impressions or inferred exposure.

5. Transit and public spaces
Verify usage or entry without surveillance, accounts, or tracking.

6. Retail and physical commerce
Trigger verified in-store activations distinct from online traffic or passive footfall.

A base layer, not a bundle

IDDAS is not optimized for a single industry.
It is a base layer that supports many expressions without changing its core rules.

The infrastructure stays fixed.
The interfaces, rituals, and use cases evolve.

Why infrastructure matters

Physical-world systems fail when they rely on:

  • Trust instead of verification
  • Identity instead of intent
  • Estimates instead of records
  • Persuasion instead of rules

IDDAS replaces these assumptions with a single invariant:

Only intentional participation creates value.

Activation templates

Protocol-native deployment modes.

Same protocol. Same backend. Different surfaces.

IDDAS supports multiple activation templates out of the box. Each template uses the same activation, attribution, and billing layer, but presents analytics and controls appropriate to the deployment context.

  • Private Event / Small Group - Short-lived, intimate deployments such as private gatherings, dinners, or rituals. Designed for simplicity and confirmation rather than optimization.
  • Retail / Commercial - Ongoing commercial environments including retail locations, loyalty programs, and distributed sales. Supports downstream actions and conversion visibility.
  • Stadium / Large Venue - Large-scale public environments such as stadiums, arenas, and concerts. Provides event-bounded activation visibility without identity assumptions.
  • Event / Conference - Multi-day or modular events including conferences, trade shows, and sponsored activations. Supports zone-based and session-based activation reporting.
  • Out-of-Home / Environment - Persistent physical surfaces such as posters, packaging, candles, and displays. Designed for long-term activation visibility and inventory-level performance.
  • Protocol / General - Vertical-agnostic deployment mode representing the raw protocol state. Used when no industry-specific lens is required.

These templates describe supported deployment modes. Interfaces adapt automatically based on context.

Use cases

Where activation and attribution matter

The following examples illustrate environments where participation, communication, and outcomes are constrained by identity-first design, onboarding friction, or opaque attribution. IDDAS does not replace these industries. It introduces a protocol layer that enables systems that were previously impractical or impossible to deploy. Each use case represents the same underlying capability expressed in different environments.

Live events

Stadiums, concerts, festivals, nightclubs, venues.

Live events concentrate attention, emotion, and participation into a narrow time window. Historically, most of that value has been lost because there was no practical way to activate everyone simultaneously without apps, accounts, or advance setup.

IDDAS enables immediate, audience-wide activation. Everyone can receive the same digital object at the same moment, without identity, onboarding, or instruction. Participation becomes collective rather than fragmented, and outcomes can persist beyond the event itself.

Capability kits allow events to attach functionality, access, or meaning to that moment. These capabilities can evolve over time, persist after the event, or remain intentionally ephemeral. They can be changed without reissuing assets or modifying the physical venue.

What becomes possible now
  • Audience-wide activation without onboarding
  • Shared digital moments that persist beyond the event
  • Capabilities that evolve without changing the venue
  • Post-event continuity without building a social network
Out-of-home and public media

Kiosks, transit, retail foot traffic, public surfaces.

Out-of-home media is ubiquitous, but activation is limited to managed screens and fixed campaigns. Most physical surfaces remain passive because activation has required infrastructure, identity, or ongoing operational control.

IDDAS turns physical surfaces into activatable objects. A single marker can carry digital capabilities without screens, power, or accounts. Interaction happens immediately and requires no explanation.

Capability kits allow the behavior of a surface to change over time without changing the surface itself. The same object can serve different purposes across locations, audiences, or moments.

What becomes possible now
  • Activation of previously passive physical spaces
  • Dynamic behavior without changing physical assets
  • Participation without screens or managed infrastructure
  • Expansion of addressable media beyond traditional formats
Affiliate and referral systems

From digital links to real-world activation.

Affiliate and referral systems depend heavily on digital tracking and trust-based claims. They struggle to account for real-world influence, shared experiences, and offline participation.

IDDAS replaces claims with lineage. Contributions are recorded as chains of activation rather than inferred from clicks or last-touch attribution. Distribution follows published rules instead of discretionary adjustments.

Capability kits allow affiliate systems to extend into the physical world for the first time. Real-world interactions can participate in the same attribution structure as digital ones, without identity or fragile tracking.

What becomes possible now
  • Verifiable attribution without black boxes
  • Real-world participation in affiliate systems
  • Fixed rules instead of retroactive adjustments
  • Expansion beyond purely digital touchpoints
Government programs and public initiatives

Benefits, incentives, participation, emergency response.

Public programs often fail at the point of participation. Identity requirements, paperwork, and delays exclude people and slow response, especially in time-sensitive situations.

IDDAS allows participation to begin immediately without identity while preserving auditability and transparency. Identity can be attached later only if required. Outcomes remain verifiable regardless.

This model applies to public benefits, civic initiatives, census participation, and emergency response. In disaster scenarios, information and capabilities can spread hand-to-hand without infrastructure or accounts.

What becomes possible now
  • Immediate participation without identity barriers
  • Faster response in emergencies and disasters
  • Reduced administrative overhead
  • Increased trust through verifiable outcomes
Enterprise, defense, and organizational systems

Onboarding, recruitment, coordination.

Large organizations often require identity before usefulness. This slows onboarding and limits participation, particularly in temporary, distributed, or high-churn environments.

IDDAS allows action to come first. People can participate, contribute, or coordinate before identity is established. Identity can be attached later without invalidating prior actions.

This applies to enterprise onboarding, temporary workforces, defense coordination, recruiting, internal referrals, and large-scale mobilization.

What becomes possible now
  • Faster onboarding without sacrificing control
  • Participation before identity verification
  • Coordination without centralized bottlenecks
  • Reduced friction in high-scale environments
Civic engagement, polling, and elections

Participation without friction.

Civic and political participation often suffers from complexity, mistrust, and early drop-off. Many people disengage before participation even begins.

IDDAS enables immediate participation without identity while preserving verifiable outcomes. Capability kits define what participation means in each context without exposing individuals.

This applies to polling, grassroots mobilization, political rallies, volunteer coordination, and election-adjacent participation where transparency and accessibility are critical.

What becomes possible now
  • Higher participation rates
  • Verifiable outcomes without identity exposure
  • Reduced friction in civic processes
  • Clear rules that do not change midstream
Consumer rituals and shared meaning

Moments, not networks.

Many meaningful moments do not require profiles, feeds, or amplification. They require presence, participation, and continuity.

IDDAS supports rituals such as weddings, graduations, religious gatherings, memorials, celebrations, and personal milestones. These moments can carry digital meaning without becoming social networks.

CandleMe is the first public example of this model. It demonstrates how a single object can carry shared meaning across people and time without identity, messaging, or algorithmic incentives.

What becomes possible now
  • Digital rituals without social pressure
  • Shared meaning without networks or feeds
  • Persistence without identity
  • Calm participation in emotional moments
Research, census, and data collection

Participation without coercion.

Surveys and research initiatives struggle with participation, bias, and trust.

IDDAS allows people to participate without identity while preserving integrity through structure rather than persuasion. This increases response rates, reduces friction, and maintains verifiable results.

What becomes possible now
  • Higher response rates
  • Reduced bias from identity gating
  • Verifiable data without trust assumptions
  • Lower cost and faster execution
Why these are examples, not limits

These use cases are illustrative, not exhaustive. Many industries are constrained by identity-first design, opaque attribution, and discretionary economics.

IDDAS is a patent-pending protocol layer designed to remove those constraints. Others can build on it to unlock participation that is currently missed, delayed, or excluded.

Defensibility

Why copying the surface is not the same

Patent-pending system pattern

A system pattern where activation, attribution, and economics are enforced together - as one architecture.

IDDAS is not a UI, an app, or a collection of features. It is a system pattern defined by the enforced interaction of three elements:

  • Activation before identity
  • Lineage-based attribution
  • Fixed, verifiable economic rules

Individually, these concepts are not novel. Defensibility arises from how they are bound together, enforced, and made non-discretionary as a single architecture.

The IDDAS patent filings are intended to protect this pattern and its implementation cluster, including how activation, attribution, claiming, forfeiture, and verification interact to prevent silent rule changes, discretionary payouts, or post-hoc reinterpretation.

Rules in IDDAS are not guidelines. They are published, versioned, and executed through deterministic system logic. Once active, they operate the same way for all participants and cannot be selectively applied or quietly altered.

The system is intentionally designed so that:

  • Rules are declared before participation begins
  • Execution follows fixed logic rather than operator judgment
  • Outcomes remain verifiable independent of the platform

This is not a feature set that can be partially adopted. The value of IDDAS depends on the integrity of the full pattern.

Trust is the moat

Copycats can copy the surface, but not credibility under scrutiny without making the same structural commitments.

Others can copy a candle, a QR code, or a visual ritual. What they cannot copy is credibility under scrutiny without making the same structural commitments.

To replicate IDDAS in substance, a system would need to:

  • Anchor and publish its rules in advance
  • Allow participants to verify attribution and outcomes independently
  • Accept the loss of discretionary control
  • Operate with full transparency around value flow and rule changes

In practice, this is where most platforms stop. Existing systems are architected around flexibility, opacity, and operator discretion because those traits are economically advantageous. Transparency, fixed rules, and verifiability are treated as risks rather than foundations.

IDDAS reverses that logic. Trust is not asserted, marketed, or requested. It is enforced structurally.

If a rule changes, the change is visible.
If attribution occurs, it is explainable.
If value moves, it is auditable.

This level of transparency is not cosmetic. It is the moat.

Claiming, forfeiture, and non-discretionary economics

Value can accrue before identity, then be claimed later under fixed rules - with forfeiture handled transparently.

In IDDAS, value may accrue to an activation whether or not an identity is immediately attached. This allows participation to begin without friction while preserving future claimability.

Claiming requires anchoring an identity capable of receiving payment. Funds become claimable under a published rule and must be claimed within a defined claim period.

If funds are not claimed within that period, they are forfeited according to a predefined, transparent rule. Forfeiture affects claimability only. Lineage, attribution, and historical records remain intact and verifiable.

Forfeited funds do not revert to discretionary platform revenue. They are redirected according to fixed, auditable rules designed to reinforce the ecosystem, such as funding protocol maintenance or enabling others to build on the platform under the same constraints.

This structure eliminates hidden incentives and ensures:

  • No silent clawbacks
  • No retroactive reassignment of value
  • No benefit to delaying, obscuring, or manipulating claims

Economic behavior is shaped by rules, not discretion.

Why copycats break

Surface imitation fails - because identity-first, discretionary systems drift under real-world conditions.

Systems that attempt to imitate IDDAS at the surface level fail in predictable ways.

Most existing platforms are built upside down. They place identity, discretion, and operator control at the center, then attempt to layer attribution and trust afterward. IDDAS inverts this order by design.

As a result, copycat systems encounter the same structural breakdowns:

  • Rules remain adjustable after launch
  • Attribution becomes opaque under real-world conditions
  • Payout logic requires manual intervention
  • Verification depends on trusting the operator
  • Economic incentives drift over time

These are not implementation mistakes. They are structural consequences of avoiding the constraints that IDDAS accepts deliberately.

The core IDDAS pattern - activation before identity, lineage-based attribution, and fixed, verifiable economics - is also the subject of patent protection. Replicating the system in substance, not just appearance, would require implementing the same protected pattern and layered structure.

That combination makes true replication operationally difficult and, depending on the implementation, may raise IP questions. Surface imitation tends to reproduce the same failure modes. Structural replication requires accepting transparency, fixed rules, and loss of discretionary control - conditions most existing platforms are neither designed nor incentivized to adopt.

IDDAS is built to operate under those constraints from the beginning.

Terminology and Framing

Canonical language for protocol, proof, and product surfaces.

Terminology and Framing Charter

Jan 3, 2026

Terminology and Framing Charter

This page defines the canonical language used across the IDDAS platform. These definitions are not stylistic preferences. They are binding semantic rules that ensure the system remains understandable, auditable, and evolvable over time.

This charter applies to:

  • Code and schemas
  • Documentation and diagrams
  • Dashboards and logs
  • External explanations to partners, auditors, and the public

Ledger vs Verification Layer

These terms must never be used interchangeably.

Ledger

The ledger is the append-only, immutable record store.

Rules:

  • The ledger never mutates records
  • The ledger never interprets meaning
  • The ledger stores raw, canonicalized events
  • Every record is cryptographically linked
  • The ledger records facts. Nothing more.
  • Verification Layer
  • The verification layer is where meaning is derived.

Rules:

  • Reads from the ledger, never writes meaning back
  • Applies explicit rule versions
  • Can be independently replayed by third parties
  • Principle: The ledger is passive and permanent. Verification is active and repeatable.

Event vs Activation

This distinction is enforced across the system.

Event

An event is a raw occurrence captured at a moment in time.

Rules:

  • Events are atomic
  • Events are recorded exactly once
  • Events contain no conclusions
  • Events are hashed into the ledger
  • Events represent what happened.
  • Activation
  • An activation is a canonical, verified event representing intentional human entry into the system.

Rules:

  • Activations are recorded as immutable, append-only facts
  • Each activation establishes persistent system state
  • Activations reference their originating event and lineage context
  • Activations do not change once recorded
  • Rule versions affect how activations are evaluated, not whether they occurred
  • Principle: Events capture occurrences. Activations establish durable participation.

Rule Version vs Protocol Version

This distinction protects system integrity.

Rule Version

Defines how meaning is computed.

Rules:

  • Rule versions are explicitly referenced
  • Rule versions are immutable once published
  • New logic requires a new rule version
  • Protocol Version
  • Defines how the system operates structurally.

Rules:

  • Governs schemas, hashing, and invariants
  • Changes are rare and explicit
  • Does not retroactively affect existing records
  • Principle: Rules interpret data. Protocols define system physics.

Why This Matters

Clear terminology:

Prevents narrative drift

Enables independent audits

Allows evolution without rewriting history

Makes the system explainable to outsiders

Most systems fail due to language ambiguity. This charter prevents that.

This page is authoritative. If any explanation, diagram, or implementation conflicts with this charter, this charter prevails.

Verification Flow: From Event to Proof

This section explains why the system is correct, not just what it does. It provides a single, linear narrative that an external engineer or auditor can follow to independently validate system integrity.

This flow is intentionally simple and deterministic.

1. Event Capture

An event is created when an intentional action occurs on a surface.

Rules:

  • The event is captured at the moment of action
  • No identity is required
  • No interpretation is applied
  • The event is written exactly once

Each event includes:

A unique event identifier

A timestamp (UTC)

A surface identifier

Optional parent references for lineage

At this stage, the system only records that something happened.

2. Canonicalization

Before any hashing or storage, the event payload is canonicalized.

Rules:

  • Fields are ordered deterministically
  • Data types are normalized
  • Optional fields are handled explicitly
  • No environment-specific data is included
  • Canonicalization ensures that the same logical event always produces the same byte representation.
  • This step removes ambiguity.

3. Hashing

The canonicalized event payload is hashed.

Rules:

  • The hash algorithm is fixed by the protocol version
  • The hash includes the rule_version reference
  • Parent hashes are included when lineage exists

The resulting hash uniquely represents:

The event content

The rule logic applied

Its position in the lineage chain

This hash is the cryptographic fingerprint of the event.

4. Append-Only Storage

The hashed event is written to the ledger.

Rules:

  • Inserts only, no updates or deletes
  • Database-level enforcement
  • Records are immutable once written
  • The ledger does not know meaning. It only stores facts and their cryptographic links.

5. Replay

Replay is the act of reprocessing raw ledger events.

Rules:

  • Events are read in deterministic order
  • Canonicalization is re-applied
  • Hashes are recomputed

If the system is correct, replay produces:

Identical hashes

Identical lineage

Identical derived results

Replay proves that outcomes are not dependent on hidden state.

6. Verification

Verification compares replayed results against stored hashes.

Rules:

  • Any mismatch is a failure
  • Verification requires no trust in the original system
  • Third parties can perform verification independently

Verification confirms:

Events were not altered

Rules were not changed retroactively

Lineage is intact

Why This Flow Matters

This pipeline ensures that:

Action precedes identity

Meaning is derived, not asserted

History cannot be rewritten

Proof does not depend on trust

If any step fails, verification fails.

That is intentional.

This verification flow is the foundation of IDDAS. All higher-level constructs rely on it.

Protocol Constitution

Core Rules v1.0 - canonical ruleset.
IDDAS Protocol Constitution
Core Rules v1.0
The protocol is versioned.
Changes, if any, apply prospectively and do not alter past outcomes.
Active protocol versions are publicly identifiable and verifiable.
December 18, 2025 - 4:45 PM
0. Purpose and Scope
0.1 What This Document Is

This document is the normative ruleset for the Instant Distributed Digital Activation System (IDDAS) Protocol - Core Rules.

It defines:

  • What constitutes an activation
  • How lineage is created and preserved
  • When allocation occurs
  • How allocation and payout are computed
  • Which rules are fixed and non-negotiable
  • How verification is performed
  • How changes are versioned without retroactive effect

This document is authoritative. If any derivative explanation, implementation, interface, or summary is ambiguous, incomplete, or inconsistent, the rules in this document control.

Versioning posture

  • The protocol is versioned.
  • Changes, if any, apply prospectively and do not alter past outcomes.
  • Active protocol versions are publicly identifiable and verifiable.
0.2 What This Document Is Not

This document is not:

  • A product or user interface specification
  • An engineering or implementation guide
  • A sales or marketing description
  • A promise or guarantee of revenue, earnings, or outcomes
  • A disclosure of internal thresholds, heuristics, or abuse detection logic
  • A contract or negotiated commercial agreement

Products, interfaces, commercial terms, and implementations may vary, but they may not contradict, override, or weaken the rules defined in this document.

0.3 Who This Protocol Applies To

This protocol applies to any system, deployment, or outcome that claims IDDAS compatibility or references IDDAS-defined concepts, including but not limited to activations, lineage, allocation, settlement, or verification.

Specifically, this protocol applies to:

  • Any system claiming IDDAS compatibility
  • Any deployment using IDDAS-defined activation, lineage, allocation, or settlement rules
  • Any outcome whose verification, attribution, or auditability references this protocol

Use of IDDAS-defined mechanisms, terminology, rules, or verification implies acceptance of the full protocol and its constraints.

Partial, selective, modified, or “inspired-by” adherence does not qualify as IDDAS-compatible. Systems that deviate from protocol-defined rules may not represent themselves as compliant, interoperable, or compatible with IDDAS.

0.4 Authority and Precedence

This document is the highest authority governing IDDAS rule behavior.

Precedence order:

  • IDDAS Protocol - Core Rules (this document)
  • Formal technical specifications derived from this document
  • Public website summaries
  • FAQs and explanatory materials
  • Marketing content, presentations, or verbal explanations

All lower-precedence materials must conform to this document. If any lower-precedence material is ambiguous, incomplete, or conflicts with these rules, this document prevails.

0.5 Determinism and Non-Discretion

All outcomes defined by this protocol are deterministic when derived from published rules applied to a cryptographically committed set of accepted activations.

The Verification Layer independently recomputes eligibility and allocation by applying the published, versioned rules to the committed activation set and the corresponding rule version in effect at the time of activation.

  • No outcome relies on opaque flags, internal status fields, or undisclosed attributes (including but not limited to internal eligibility indicators) as trusted inputs.
  • Determinism applies to outcomes derived from committed inputs and published rules, not to raw traffic, attempted interactions, or events that are not accepted into the committed activation set.

No discretionary overrides are permitted.

No subjective interpretation is applied after revenue exists.

If an outcome cannot be derived from committed inputs and published rules, it does not qualify as a valid protocol outcome.

0.6 Separation of Protocol and Implementation

This protocol defines rules, not software.

  • Multiple implementations may exist, including first-party, third-party, or derivative implementations
  • Implementations may differ in architecture, performance, infrastructure, or user interface
  • Implementations must not alter, reinterpret, or weaken protocol-defined behavior

Protocol correctness, validity, and verification are independent of any specific implementation.

0.7 Versioning and Change Control

All protocol rule changes must be versioned.

Rules:

  • Each version has a unique identifier and effective date
  • Changes apply prospectively unless explicitly stated otherwise
  • Settled outcomes remain verifiable against the protocol version in effect at the time they occurred
  • No change may silently alter allocation, eligibility, verification, or payout behavior
  • New versions may coexist with prior versions for verification and audit purposes

Protocol history is immutable. Past outcomes are never rewritten.

0.8 Immutability of Recorded Events

All protocol-defined events are recorded in an append-only manner.

  • Recorded events cannot be deleted
  • Recorded events cannot be overwritten
  • Corrections or adjustments occur only through the recording of additional events

This immutability ensures that lineage, verification, and outcomes remain auditable and reproducible over time, independent of implementation.

0.9 Relationship to Derivatives

All derivative materials, including but not limited to websites, FAQs, white papers, documentation, and sales materials:

  • Must accurately reflect the current protocol version they reference
  • Must not introduce new rules or requirements
  • Must not reinterpret, weaken, or override fixed protocol behavior

If a derivative document is ambiguous, incomplete, or requires clarification, the protocol must be consulted. Informal explanations or derivative materials do not amend, supplement, or replace this document.

0.10 Scope Boundaries

This protocol intentionally does not define or govern the following:

  • Business strategy or commercial positioning
  • Pricing and commercial terms beyond protocol-defined neutrality constraints
  • Commercial minimums, discounts, or negotiated contractual terms
  • Identity systems beyond optional anchoring mechanisms
  • Regulatory compliance requirements specific to any jurisdiction

These concerns are external to protocol correctness and are addressed at the implementation, operational, or commercial layer. Their existence or variation does not affect protocol validity, determinism, or verification.

0.11 Activation Credits and Adoption Mechanics
CORE PRINCIPLES
  • Activation-before-identity is foundational.
  • An activation is a verified, intentional human entry into the system.
  • Passive exposure does not count as activation.
  • Activation is not a conversion.
  • Conversions create revenue.
  • Activations create lineage and eligibility.
  • No speculative value is created.
  • No discretionary overrides exist.
  • Allocation is deterministic and rule-based.
  • Rules are versioned and non-retroactive.
  • Verification replaces trust.
PRICING MODEL

Pricing is not defined by this protocol.

The IDDAS protocol does not set, mandate, negotiate, or enforce:

  • prices
  • rates
  • tiers
  • discounts
  • minimums
  • commercial terms
  • billing structures

Pricing is defined exclusively by the Brand or implementation operating within the protocol (e.g., CandleMe), subject to the following protocol constraints:

  • Pricing MUST NOT alter activation eligibility
  • Pricing MUST NOT alter lineage formation
  • Pricing MUST NOT alter allocation logic or outcomes
  • Pricing MUST NOT introduce discretionary overrides
  • Pricing MUST NOT affect verification or determinism

Pricing influences capacity access only, as defined in Section 8, and has no effect on attribution, eligibility, or outcome computation.

PAYMENT MODEL

Payment handling is external to protocol logic.

The protocol defines when outcomes are computed, not how or when payments are collected.

Accordingly:

  • Activation behavior is independent of payment status
  • Lineage formation is independent of payment status
  • Allocation computation is independent of payment status
  • Verification does not rely on payment state

Payment collection, invoicing, settlement timing, and commercial enforcement are implementation- or contract-defined and MUST NOT modify any protocol-defined behavior.

Payment is an operational concern, not a protocol prerequisite.

CANDLEME ROLE
  • CandleMe is a consumer-facing implementation built on IDDAS.
  • It demonstrates activation-before-identity under real conditions.
  • The candle appears already lit on load.
  • Saving extinguishes the flame.
  • Refreshing is idempotent.
  • Sharing creates a new activation.
  • Loss is acceptable.
  • CandleMe is not the protocol.
ACTIVATION CREDIT

To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.

This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.

CREDIT RULES
  • Each organization receives a one-time activation credit of 100 activations.
  • Credits are one-time only.
  • Credits are non-renewable.
  • Credits are non-transferable.
  • Credits are applied automatically.
  • Credits follow the same rules, pricing, attribution, and verification as paid activations.

Credits pre-fund standard activations.

When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.

WHAT CREDITS DO NOT DO

Activation credits do not:

  • Change pricing
  • Change activation behavior
  • Create special cases
  • Introduce negotiation
  • Enable unlimited usage
  • Alter allocation or lineage
  • Modify protocol rules

Credits exist solely to reduce initial adoption friction.

GOVERNANCE AND POSTURE
  • Credits are policy, not promotion.
  • No dollar values are presented.
  • No urgency language is used.
  • Credits are not framed as free offers or trials.
  • The tone is calm, declarative, and rule-based.

Message conveyed:

  • "The rule is finished. You can see it work."
RATIONALE

This structure:

  • Preserves elegance
  • Prevents gaming
  • Eliminates discretion
  • Simplifies adoption
  • Protects the rule at scale
  • Allows small and large deployments to self-select naturally
  • Ensures that payment reflects real engagement only
1. Core Principles
1.1 Real Revenue Only

All conversion selections are subject to the protocol’s definition of real, net-settled revenue.

The protocol allocates value only when real revenue is created.

For revenue to qualify as real revenue under this protocol, it must be:

  • Received and net-settled
  • Measurable in objective units (currency or equivalent)
  • Attributable to a completed conversion event
  • Ultimately satisfy net-settlement conditions as defined later in this constitution

Speculative value, intent signals, or uncompleted actions do not qualify.

If no real revenue exists, no allocation occurs.

1.2 No Speculative Value

The protocol does not create, assign, or imply speculative value.

Actions, attention, participation, or effort alone do not generate allocatable value. Value exists only after a measurable conversion outcome occurs.

The protocol does not:

  • Promise future earnings
  • Assign notional credit
  • Create implied entitlement
1.3 Deterministic Allocation

All allocation outcomes are deterministic.

Given:

  • A defined revenue amount
  • A recorded lineage
  • A published allocation rule

The resulting distribution is uniquely determined.

No randomness, negotiation, discretion, or subjective interpretation is permitted in allocation computation.

1.4 No Discretionary Overrides

No participant, operator, administrator, or third party may override protocol-defined outcomes.

Once inputs are recorded:

  • Eligibility cannot be altered
  • Allocation cannot be adjusted
  • Outcomes cannot be rebalanced

Discretion is excluded by design.

1.5 Transparency by Design

Protocol behavior is transparent by construction.

Transparency includes:

  • Published rules
  • Versioned changes
  • Verifiable inputs
  • Auditable outputs
  • Verifiable allocation and settlement outcomes

Participants do not rely on trust in the operator. They rely on the visibility and determinism of the system.

2. Definitions
2.1 Revenue (R)

Revenue (R) is the amount of qualifying economic value generated by a conversion event, as defined by the protocol.

For revenue to qualify as R, it must be:

  • Measurable
  • Attributable to a recorded lineage
  • Non-speculative
  • Settled or irrevocably committed through an implementation-defined settlement mechanism

Revenue represents gross economic value created by a conversion. Revenue is not commission and is not allocated directly to participants.

Authorizations, impressions, intent signals, or reversible activity do not qualify as revenue.

If R = 0, no allocation occurs.

2.2 Commission Pool

A commission pool is an implementation- or contract-defined portion of qualifying revenue made available for allocation to contributors.

The protocol does not define:

  • whether a commission pool exists
  • the size of a commission pool
  • revenue shares, percentages, or formulas
  • platform fees or retained amounts

The protocol defines only:

  • which activation events are eligible
  • how lineage is constructed and preserved
  • when allocation is triggered
  • how allocation outcomes are computed deterministically once qualifying revenue exists

If a commission pool is defined by a Brand or implementation, allocation within that pool MUST follow protocol rules for eligibility, lineage, determinism, and non-discretion.

If no commission pool is defined, the protocol still records lineage and verifies outcomes, but no participant allocation occurs.

2.3 Brand

A Brand is the entity responsible for a deployment within IDDAS.

A Brand may be a company, organization, individual, or other legal or natural person.

The Brand:

  • Defines business intent and selects qualifying conversion events within protocol constraints
  • Provides the bank account where qualifying revenue is received
  • Pays for activations generated through the deployment
  • Defines whether a commission pool exists and its size

A Brand operates within the IDDAS protocol and does not control allocation, lineage, or settlement rules or mechanisms.

2.4 Candle

A candle is a specific activation object representing a human-facing ritual of engagement.

  • A candle is an implementation artifact, not a protocol requirement
  • Candle interactions may result in one or more protocol-defined activation events
2.5 Open Candle

An open candle is a candle that is not bound to a persistent deployment or environment.

Open candles are ephemeral by default and may exist without long-term persistence, enterprise configuration, or integration.

Open candles may still generate valid activation events and lineage under the protocol.

2.6 Anchored Candle

An anchored candle is a candle that is bound to a persistent deployment or environment.

Anchored candles are defined at the Brand or deployment level and may support extended behavior such as persistence, enterprise configuration, analytics, or integration.

Anchoring is a protocol state and is independent of individual participant actions.

2.7 Activation Event

An activation event is a verified, intentional entry into the system initiated by a person.

An activation event occurs when a person deliberately:

  • Scans a code
  • Opens an activation link
  • Enters an activation flow

An activation event creates a recorded lineage entry and establishes eligibility for allocation if a qualifying conversion occurs.

Passive exposure does not qualify.

2.8 Lineage

Lineage is the ordered, append-only set of activation events that led to a conversion event.

Lineage:

  • Reflects propagation, not claims or assertions of credit
  • Is formed automatically through recorded activation events
  • Cannot be edited, reordered, or selectively pruned
  • Is permanent once recorded

Lineage determines eligibility for allocation if qualifying revenue is generated. It does not guarantee outcomes, compensation, or value.

Lineage exists independently of identity, accounts, or participant intent, and is enforced deterministically by the protocol.

2.9 Originator

The originator is the first activation event in a lineage.

The originator establishes the initial propagation context and is included in allocation if a qualifying conversion occurs.

2.10 Intermediate

An intermediate is any activation event in a lineage that is neither the originator nor the activation event immediately preceding a conversion event.

Intermediates may contribute to propagation and are eligible for allocation according to the published allocation rule if a qualifying conversion occurs.

2.11 Closer

The closer is the activation event immediately preceding a conversion event.

The closer does not receive preferential treatment unless explicitly defined by the published allocation rule.

2.12 Conversion Event

A conversion event is a completed action that generates real revenue (R).

Examples include:

  • A purchase
  • A paid commitment
  • Any other defined revenue-generating outcome

Conversion events trigger allocation when qualifying revenue exists.

Activation events alone do not.

2.13 Environment

An environment is the physical, digital, or operational context within which activations occur.

An environment may represent:

  • A venue, location, or facility
  • A physical surface or object
  • A digital property or interface
  • A campaign, program, or offering
  • A defined deployment, tenant, or enterprise context

Environments bind activations to a specific deployment and may define configuration, behavior, pricing, persistence, or integration settings applicable to that context.

Environments provide attribution and operational context but do not alter lineage formation, allocation logic, or protocol-defined settlement rules.

3. Candle Model
3.1 What a Candle Represents

A candle is an activation instrument within the IDDAS protocol that represents a bounded context for activation, propagation, and allocation.

A candle is not:

  • a user
  • an account
  • a seat
  • an identity

A candle represents a specific context under which activation events may occur and lineage may form.

That context may include, but is not limited to:

  • representing a person
  • representing a business or brand
  • representing an offer or campaign
  • representing an environment or location

Each candle operates independently and participates in lineage formation and allocation strictly according to the rules of this protocol.

3.2 Candle Abundance and Non-Scarcity

Candles are intentionally non-scarce.

The protocol does not impose a limit on the number of candles that may be created or anchored by any individual or entity.

This design choice is intentional and foundational:

  • outcomes are scarce
  • value is allocated only after verified outcomes
  • candle creation alone does not create eligibility or entitlement to value

Scarcity is enforced at the level of verified activation events and conversion events, not at the level of candle creation or anchoring.

3.3 Multiple Candles per Person or Entity

Any individual or entity may anchor multiple candles simultaneously.

There is no restriction preventing:

  • one person from anchoring many candles
  • one entity from being represented by many candles
  • one representative from carrying candles for multiple entities

This enables real-world representation patterns, including affiliates, agents, promoters, and delegated representatives.

Each candle maintains its own independent lineage and does not share attribution or eligibility with other candles unless explicitly connected through valid activation events.

3.4 Candle Anchoring

Anchoring a candle establishes its origin point for lineage construction.

The anchor:

  • defines the initial position in the lineage
  • does not imply ownership of outcomes
  • does not guarantee allocation

Anchoring a candle does not, by itself, create value, eligibility, or entitlement.

Value allocation occurs only after a qualifying conversion event, as defined elsewhere in this protocol.

3.5 Candle Propagation

Candles may propagate through eligible activation events.

Propagation:

  • appends entries to the candle’s lineage
  • is append-only
  • cannot overwrite or remove prior lineage entries

Propagation order reflects contribution sequence, not time of claim, assertion, or identity.

Only eligible activation events may create lineage entries. Eligibility requirements are enforced deterministically by the implementation.

3.6 Candle Independence and Isolation

Each candle is independent.

Rules of independence include:

  • lineages do not merge across candles
  • outcomes are computed per candle
  • allocations are computed per conversion event per candle

Actions taken on one candle have no effect on:

  • other candles anchored by the same person
  • other candles within the same environment
  • other candles representing the same entity

This isolation ensures deterministic attribution, prevents cross-contamination of allocation logic, and preserves protocol correctness under scale.

4. Lineage Construction
4.1 Lineage Definition

A lineage is the ordered, append-only sequence of eligible activation events associated with a specific candle.

For a given candle, the lineage is represented as:

L = {a1, a2, …, an}

Where:

  • a1 is the originator activation event (the first eligible activation in the lineage)
  • each ai is a distinct eligible activation event
  • i is the index position of an activation event within the lineage (i ∈ [1, n])
  • n is the total number of lineage entries at the time of conversion

Lineage order reflects propagation sequence, not time of claim, attribution assertion, identity, or payout request.

4.2 Append-Only Property

Lineage is strictly append-only.

Once an entry is added to a lineage:

  • it cannot be removed
  • it cannot be reordered
  • it cannot be overwritten
  • it cannot be reassigned

There are no discretionary overrides, manual edits, or post-hoc adjustments to lineage state.

This property is essential to deterministic allocation, verification, and auditability.

4.3 Eligible Activation Events

Lineage entries are created only by eligible activation events.

An eligible activation event is an implementation-recognized action that:

  • meets published eligibility criteria
  • is verifiable by the implementation
  • occurs within the scope of the candle and its environment

Examples of eligible activation events may include, but are not limited to:

  • verified placements
  • verified scans
  • verified introductions
  • verified handoffs

Eligibility criteria and verification methods are enforced deterministically by the implementation and may evolve through versioned protocol changes.

The protocol does not require public disclosure of implementation details for eligibility enforcement, provided enforcement remains deterministic and non-discretionary.

4.4 Prohibited Lineage Behaviors

The following behaviors are explicitly prohibited and produce no lineage entries:

  • self-appending without a qualifying activation event
  • repeated appending by the same actor without new eligibility
  • artificial looping or circular propagation
  • appending after a conversion event for the purpose of capturing allocation

Any attempted activation that does not meet eligibility criteria is ignored for lineage purposes and has no effect on allocation.

4.5 Lineage Finalization at Conversion

A lineage is evaluated for allocation at the moment a conversion event occurs.

Only lineage entries present at the time of conversion are eligible for allocation from that conversion event.

Entries appended after a conversion event:

  • do not participate in that conversion
  • may participate in future conversion events, if any

Each conversion event is evaluated independently and produces its own allocation outcome.

4.6 Lineage Scope and Environment Boundaries

Lineage is scoped to a single candle and a single environment.

Rules:

  • lineage does not cross candle boundaries
  • lineage does not cross environment boundaries
  • conversion events are evaluated within their originating environment

This ensures isolation, prevents attribution leakage, and maintains deterministic allocation and verification outcomes.

4.7 Lineage Visibility and Position Awareness

The system may expose lineage position to participants.

Participants may be able to see:

  • whether they are in a lineage
  • their relative position at a given time

However:

  • lineage position does not guarantee allocation
  • allocation is determined only at conversion
  • no participant can reserve, lock, or claim a future position

Visibility does not confer rights, priority, or entitlement.

5. Allocation, Roles, and Deterministic Boundaries
5.1 Revenue Eligibility

Allocation occurs only after a verified conversion event produces real, net-settled revenue.

The protocol does not create speculative value. Allocation is strictly downstream of measurable outcomes.

5.2 IDDAS - Rule Definition and Enforcement

IDDAS defines and enforces the core rules of the system. These rules are fixed, versioned, and applied uniformly across deployments.

  • Defines what qualifies as a valid activation
  • Defines what qualifies as real revenue
  • Defines how lineage is formed and preserved
  • Defines how allocation outcomes are computed once qualifying revenue exists
  • Computes allocation outcomes deterministically
  • Prevents discretionary overrides, selective treatment, or retroactive changes

IDDAS does not negotiate outcomes, adjust distributions, or intervene on a case-by-case basis. Once protocol-defined inputs are recorded, outcomes follow the rules exactly.

5.3 Brands - Business Definition Within Protocol Constraints

A Brand is the organization, entity, or individual running a deployment on IDDAS.

  • Selects which of its qualifying business events constitute conversion events, within the protocol’s definition of real revenue
  • Provides the bank account where qualifying revenue is received

Brand discretion exists only before revenue is created and only within protocol-defined constraints.

Brands cannot:

  • Redefine what qualifies as real revenue
  • Override, edit, or reorder lineage
  • Collapse distribution to a single party when multiple contributors exist
  • Selectively exclude contributors from allocation
  • Alter outcomes after revenue is created
5.4 Protocol Boundary

This protocol defines eligibility, lineage, and deterministic outcome computation. It does not define pricing, revenue sharing, fees, commission structures, payout thresholds, or settlement mechanisms. Such terms, if any, are implementation- or contract-defined and do not alter protocol validity.

5.5 CandleMe as an Implementation

CandleMe is one implementation built on top of IDDAS.

CandleMe may define its own business terms, select qualifying conversion events, and provide its own bank account like any other Brand.

CandleMe has no special privileges within the protocol and is subject to the same rules, constraints, and enforcement as all deployments.

5.6 Determinism and Constraints

Allocation outcomes are deterministic when defined by published rules applied to the recorded lineage and qualifying events.

For any conversion event:

  • allocation depends on lineage state and published rules
  • no hidden parameters are permitted
  • there are no discretionary overrides
6. Payout Model
6.1 Payout Scope

For each conversion event:

  • allocation outcomes are referenced
  • payout amounts are recorded as ledger entries
6.2 Payout Finality and Settlement Dependency

Payout ledger entries are provisional until the associated revenue is confirmed as net-settled.

If revenue fails to settle, is reversed, or is invalidated prior to settlement finality:

  • the corresponding payout ledger entry is voided or reversed
  • no allocation is finalized for that conversion event

Settlement status affects payout finality only. It does not modify lineage, eligibility, or recorded activation events.

6.3 Payout Timing Independence

The timing of payout recording or disbursement does not affect:

  • allocation outcomes
  • lineage eligibility
  • determinism of results

Allocation is computed at the moment a qualifying conversion occurs. Payout execution may occur later without altering any protocol-defined outcome.

6.4 No Discretionary Payout Adjustment

No participant, operator, or implementation may:

  • modify payout amounts after allocation is computed
  • reorder or rebalance payouts
  • selectively accelerate or delay payouts to influence outcomes

All payout handling must reflect the deterministic allocation results produced by the protocol.

7. Scale and Capacity Model

The protocol supports self-serve operation by default, and introduces objective, capacity-based gating only when enterprise-scale throughput is requested.

7.1 Self-Serve Operation

The protocol supports self-serve operation by default.

Self-serve operation includes:

  • creating and anchoring candles
  • propagating candles through eligible activation events
  • generating conversion events at ordinary scale

Self-serve operation does not require:

  • contracts
  • minimum commitments
  • human approval
  • enterprise classification

Self-serve operation remains available until enterprise-scale capacity is requested.

7.2 Scale Determination

Scale is determined by requested capacity, not by participant identity.

The protocol does not classify participants as enterprise or non-enterprise.

Scale gating is triggered only when a participant requests capacity, throughput, or features that exceed self-serve limits.

7.3 Scale Gating (Structural)

Scale is governed structurally, not reactively. Certain capabilities require predefined capacity and are only available when sufficient activation credits or prepaid balances exist.

These capabilities may include:

  • large environment deployments
  • high-volume activation issuance
  • bulk or programmatic operations
  • advanced environment-level analytics

No monitoring, classification, detection, or discretionary escalation occurs. Availability is determined solely by declared capacity and deterministic rules. When prepaid credits are exhausted, enterprise-scale capabilities may be gated, while standard usage may continue under metered billing as defined in Sections 7.6 and 8.6.

7.4 Environment-Based Capacity Requirements

Certain environment types inherently require enterprise-scale capacity.

Examples include:

  • stadiums and arenas
  • large venues
  • transit hubs
  • city-wide or regional deployments

When such an environment type is requested, enterprise-scale capacity requirements apply before activation may proceed.

No manual classification or subjective approval is performed.

7.5 Minimum Commitment Requirement

Enterprise-scale capacity may require a minimum upfront commitment.

The protocol does not define the amount of any minimum commitment.

Where a minimum exists, it:

  • is satisfied through prepaid usage credits
  • is applied under uniform, non-negotiated rules
  • exists solely to provision capacity, verification, and settlement resources proportional to the requested scale
7.6 Credit Consumption

Prepaid credits are consumed by:

  • candle creation
  • activation verification load
  • environment-level operations
  • other usage-based costs defined by the implementation

Credits are consumed automatically as usage occurs.

When prepaid credits are exhausted, usage continues under metered billing and additional charges are applied automatically.

7.7 Commitment Finality

Minimum commitments are not refundable.

Credits represent prepaid capacity, not a membership fee, license, or deposit.

This rule eliminates discretionary refund handling and ensures continuity of operation.

7.8 Progressive Disclosure

Scale requirements are disclosed progressively.

Participants encounter scale gating only when:

  • attempting to exceed self-serve limits
  • requesting enterprise-scale capabilities

The protocol imposes no upfront friction on experimentation, evaluation, or early adoption.

8. Pricing Model
8.1 Pricing Principles

Pricing, where applied by an implementation, is defined to support capacity provisioning without influencing economic outcomes.

The pricing model is designed to:

  • charge for capacity and instruments, not outcomes
  • avoid penalizing success or scale
  • remain predictable and transparent
  • scale from individual usage to large deployments
  • avoid negotiation or discretionary pricing

Pricing does not alter lineage, allocation rules, or payout mechanics.

8.2 Pay-Per-Candle Pricing

Candles may be priced as individual activation instruments.

Each anchored candle may incur a fixed creation cost.

Pricing may be applied at the time of candle creation.

Candles may be configured with predefined expiry parameters selected at creation time. Expiry parameters are fixed, declared in advance, and applied deterministically. Once a candle is created, its expiry cannot be modified, extended, or overridden. Expiry exists solely to bound activation eligibility and does not alter attribution, allocation, or pricing rules.

Pay-per-candle pricing may support:

  • affiliates
  • individual representatives
  • small businesses
  • experimental and exploratory usage
8.3 Metered Accounts

For higher-volume usage, implementations may support open-ended metered accounts.

Metered accounts:

  • track usage over time
  • automatically bill for usage beyond prepaid credits
  • do not impose seat limits or user-based pricing

Metered billing applies only after usage occurs.

There are no subscription tiers tied to identity, role, or participant classification.

8.4 Enterprise-Scale Capacity and Prepaid Credits

Enterprise-scale capacity may require prepaid credits to ensure availability, throughput, and operational stability.

Prepaid credits:

  • are paid upfront
  • convert directly into standard activation credits
  • are non-refundable once consumed
  • do not change pricing, attribution, allocation, or verification rules

This protocol does not define a numeric minimum commitment amount; where enterprise-scale capacity requires a minimum, it is satisfied through prepaid credits under uniform, non-negotiated rules.

8.5 Credit-Based Accounting

Prepaid credits represent capacity within the system.

Credits may be consumed by:

  • candle creation
  • activation verification
  • environment-level operations
  • other usage-based costs defined by an implementation

Credits are deducted automatically as usage occurs.

Unused credits remain available until consumed.

8.6 Overage and Continuity

When prepaid credits are exhausted:

  • usage may continue without interruption
  • additional usage may be billed under metered pricing

Service may not be suspended solely due to credit exhaustion, except where required for risk control, system integrity, or compliance.

8.7 Pricing Neutrality

Pricing decisions do not affect lineage formation, allocation outcomes, payout eligibility, or deterministic results.

All participants are treated identically under protocol-defined rules regardless of pricing model, commitment size, deployment scale, or commercial arrangement.

Pricing influences capacity access only and has no effect on attribution, eligibility, or outcome computation.

9. Eligibility and Verification
9.1 Eligibility Principles

Only eligible activation events may create lineage entries or participate in allocation.

Eligibility exists to:

  • preserve attribution integrity
  • prevent artificial or spam propagation
  • ensure that value allocation reflects real contribution

Eligibility rules apply uniformly across all environments, candles, and participants.

9.2 Eligible Activation Events

An eligible activation event is an action that:

  • is recognized by the implementation
  • occurs within the scope of a specific candle and environment
  • meets protocol-defined contribution criteria
  • is verifiable using implementation-enforced methods

Activation events that do not meet eligibility criteria are ignored for lineage and allocation purposes.

9.3 Verification Requirements

Verification is required for all activation events that contribute to lineage.

Verification may include, but is not limited to:

  • implementation event validation
  • device or session confirmation
  • contextual consistency checks
  • timing and frequency constraints

Verification is enforced programmatically.

No activation event is eligible without verification.

9.4 Participation Constraints

The protocol enforces participation constraints to prevent abuse.

Such constraints may include:

  • limits on repeated participation by the same actor within a lineage
  • prevention of circular or looping propagation
  • restrictions on self-referential activation patterns

The protocol does not require persistent identity disclosure to participants in order to enforce these constraints.

9.5 Anti-Abuse Enforcement

Anti-abuse enforcement is integral to eligibility determination.

The protocol may:

  • reject ineligible activation events
  • ignore invalid or non-conforming propagation attempts
  • invalidate activation events that fail verification

Anti-abuse enforcement operates deterministically and does not alter valid lineage entries or allocation outcomes.

9.6 Disclosure Boundaries

Internal safeguard, abuse-prevention, and validity-gating mechanisms may influence which interactions qualify as accepted activations and are included in the committed activation set.

The specific implementation details of these safeguards are intentionally not publicly disclosed in order to preserve their effectiveness and prevent circumvention.

This non-disclosure does not violate determinism because verification operates on the accepted activation set and the published protocol rules, not on raw traffic or rejected interactions.

Safeguards are structural and rule-bounded. While certain detection or evaluation heuristics may remain private, their function is limited to admission into the committed set and does not alter published rules, outcomes, or allocation once an activation is accepted.

9.7 Effect on Allocation and Payout

Only activation events that pass eligibility and verification:

  • appear in lineage
  • participate in allocation
  • receive payouts

Ineligible or unverified events receive no allocation and no payout.

10. Edge Cases and Deterministic Resolution
10.1 Single-Participant Scenario

If a candle has only one eligible participant at the time of a conversion event, allocation is resolved deterministically according to the applicable published rules for that deployment or implementation.

10.2 No-Intermediate Scenario

If a lineage contains an originator and a closer with no intermediates, allocation is resolved deterministically according to the applicable published rules. No discretionary reassignment occurs.

10.3 Long-Chain Dilution

If a lineage contains multiple intermediates, allocation outcomes are determined by the applicable published rules. Increasing lineage length does not, by itself, create additional allocatable value.

10.4 Post-Conversion Appending Attempts

Any activation attempts occurring after a conversion event:

  • do not affect allocation for that conversion
  • do not retroactively modify lineage
  • may participate only in future conversion events

Post-conversion appending produces no retroactive entitlement.

10.5 Duplicate or Conflicting Claims

If multiple parties assert responsibility for a conversion:

  • the system-recorded conversion trigger determines the closer
  • manual claims or assertions are ignored

The protocol does not adjudicate subjective disputes.

10.6 Multiple Conversion Events

If multiple conversion events occur from the same candle:

  • each conversion event is evaluated independently
  • allocation is computed separately for each event
  • revenue is not double-counted

Accrued balances may combine across events for payout threshold purposes.

10.7 Failed or Reversed Transactions

If a conversion event fails to settle:

  • no allocation is finalized
  • no payout is issued

If a transaction reverses after provisional recording but before payout:

  • the allocation is reversed or netted
  • accrued balances are adjusted accordingly
10.8 Ineligible Participation Discovery

If an activation event is determined to be ineligible prior to settlement:

  • the event is excluded from lineage
  • allocation is recalculated if required
  • no payout is issued for the ineligible event

If settlement has already occurred, reversal handling follows Section 6.

10.9 System Faults and Interruptions

In the event of system faults or interruptions:

  • incomplete activation events may be discarded
  • incomplete conversion events produce no allocation
  • completed and verified events remain authoritative

There are no discretionary reallocations due to system interruption.

11. Environment Rules
11.1 Environment Definition

An environment is a bounded operational context within which candles operate, lineage is constructed, and conversion events occur.

An environment may represent, for example:

  • a location
  • a venue
  • a business unit
  • a campaign scope
  • a deployment boundary

Every candle operates within exactly one environment at any given time.

11.2 Environment Isolation

Environments are isolated from one another.

Isolation rules include:

  • lineage does not cross environment boundaries
  • conversion events are evaluated within a single environment
  • allocation and payout are computed per environment

Actions in one environment have no effect on:

  • lineage in other environments
  • allocations in other environments
  • payouts associated with other environments

This isolation ensures clarity, auditability, and deterministic outcomes.

11.3 Environment Association of Candles

A candle is associated with an environment at the time it is anchored.

Rules:

  • a candle may not belong to multiple environments simultaneously
  • a candle’s lineage remains scoped to its environment
  • changing a candle’s environment creates a new operational context

Environment association defines context only and does not imply ownership, entitlement, or preferential treatment.

11.4 Environment Lifecycle

An environment progresses through defined lifecycle states.

Lifecycle states may include:

  • creation
  • configuration
  • activation
  • operation
  • suspension
  • deactivation

Lifecycle transitions are system-controlled and do not modify lineage, allocation, or payout rules.

11.5 Environment Capacity Constraints

Environments may be subject to capacity constraints based on:

  • scale of deployment
  • verification throughput
  • activation volume
  • analytics load

Capacity constraints are enforced automatically according to the Scale and Capacity Model defined in Section 7.

Requests exceeding environment capacity may require prepaid credits to provision the required throughput or operational load. This requirement is rule-based and does not alter pricing, attribution, allocation, or verification.

11.6 Environment-Level Operations

Certain operations occur at the environment level.

Environment-level operations may apply to candles and other activation instruments deployed within an environment.

These may include:

  • bulk candle creation
  • environment-wide analytics
  • activation verification configuration
  • capacity management

Access to environment-level operations may be gated by scale and capacity requirements.

11.7 Environment Integrity

The protocol enforces integrity within each environment.

Integrity enforcement may include:

  • prevention of duplicate environments with conflicting scopes
  • consistency checks between environment configuration and usage
  • enforcement of environment-specific eligibility constraints

Integrity enforcement operates deterministically and does not alter valid lineage entries, allocation outcomes, or payouts.

Section Status

Section 11 defines how environments function as isolated operational contexts within the protocol.

Environment rules preserve determinism, auditability, and correctness at scale.

12. Transparency and Auditability
12.1 Deterministic Rule Enforcement

All protocol outcomes are governed by deterministic rules.

For any conversion event:

  • lineage state
  • allocation outcomes
  • payout calculations

are derived mechanically from published rules and recorded events.

There are no discretionary adjustments, overrides, negotiations, or case-by-case decisions.

12.2 Inspectable Allocation Logic

Allocation logic is rule-defined and invariant within a given protocol version.

Participants may inspect:

  • role definitions
  • eligibility conditions
  • collapse or resolution rules
  • conditions under which allocation occurs

Given identical inputs, the protocol always produces identical outputs.

12.3 Event Logging and Records

The protocol maintains authoritative records of:

  • candle anchoring
  • accepted activation events
  • lineage construction
  • conversion events
  • allocation and payout calculations

Records are retained to support auditability, internal verification, and authorized third-party review.

Sensitive operational or business data is not required to be publicly disclosed.

Cryptographic commitments (including hashes, Merkle roots, or version identifiers) may be anchored to a public blockchain to enable independent verification of correctness without exposing raw transactional data.

12.4 Participant Visibility

Implementations may provide participants visibility into:

  • their participation in a lineage
  • their role at the time of conversion
  • their calculated allocation
  • their accrued payout balance

Visibility does not confer control, discretion, or influence over outcomes.

12.5 Dispute Minimization by Design

The protocol minimizes disputes by:

  • defining rules in advance
  • enforcing rules automatically
  • removing discretionary decision points
  • evaluating outcomes solely on recorded events

Subjective claims, interpretations, or assertions do not affect protocol outcomes.

12.6 Separation of Transparency and Enforcement

Transparency concerns which rules apply and how outcomes are computed.

Enforcement concerns how eligibility, verification, and abuse prevention are implemented.

The protocol discloses rule logic and outcome computation while not requiring disclosure of internal enforcement mechanisms that protect system integrity.

13. Implementation Notes (Non-Normative)
13.1 Mobile-First Assumptions

The protocol is designed to operate in mobile-first contexts.

Primary interactions are expected to occur on mobile devices, including:

  • candle anchoring
  • activation and propagation
  • basic lineage visibility
  • balance and payout awareness

Mobile interfaces prioritize speed, clarity, and minimal friction.

Desktop interfaces may complement mobile usage but are not required for protocol participation.

13.2 Desktop Administrative Functions

Desktop interfaces are intended primarily for administrative and oversight functions, including:

  • environment administration
  • analytics and reporting
  • export and reconciliation
  • billing and credit management
  • oversight of large-scale deployments

Desktop access does not alter protocol rules and does not confer allocation, eligibility, or payout privileges.

13.3 Enforcement Without Manual Review

Eligibility, verification, scale gating, allocation, and payout enforcement are designed to operate without routine human intervention.

Manual review may occur only in exceptional circumstances, including:

  • regulatory or compliance requirements
  • external legal obligations
  • confirmed system faults

Manual review does not modify valid lineage entries, allocation outcomes, or payout determinations.

13.4 System Invariants

The following invariants must hold across all implementations:

  • lineage is append-only
  • conversion events are authoritative
  • outcomes derive solely from recorded events
  • allocation and eligibility are deterministic
  • no discretionary overrides exist

Implementations may evolve, but these invariants must remain intact.

13.5 Versioning and Backward Compatibility

Protocol versions may evolve over time.

Changes to the protocol:

  • must be versioned
  • must not retroactively alter settled outcomes
  • may introduce new features or constraints prospectively

Backward compatibility is preserved for existing candles and lineages unless explicitly deprecated by a future protocol version.

13.6 Separation of Protocol and Product

The protocol defines rules and guarantees.

Products and interfaces:

  • enforce protocol rules
  • expose protocol outcomes
  • may vary in design, architecture, and presentation

Product changes do not modify protocol-defined behavior.

14. Public Communication Derivatives
14.1 Purpose of Public Derivatives

Public communication materials are derivative explanations of the protocol.

They exist to:

  • explain behavior
  • build confidence
  • reduce confusion
  • support adoption

Public materials do not define rules and do not override protocol behavior.

The protocol defined in Sections 1 through 13 is authoritative.

14.2 Website Summaries

The public website may present simplified descriptions of the protocol.

Website summaries may include:

  • high-level explanations of candles
  • general descriptions of lineage and allocation
  • statements regarding scale requirements
  • non-technical descriptions of eligibility

Website content must:

  • avoid operational thresholds
  • avoid implementation details
  • avoid negotiable or discretionary language

Acceptable phrasing includes:

  • “Certain deployments require a minimum commitment.”
  • “Allocation occurs only after real outcomes.”
  • “Lineage entries require eligible activation events.”

The website must not publish:

  • internal enforcement mechanisms
  • anti-abuse thresholds
  • verification logic
  • internal system limits
14.3 FAQ Content

FAQ content may expand on website summaries but remains non-normative.

FAQs may explain:

  • common allocation scenarios
  • the rationale for closer-dominant allocation
  • natural dilution in long lineage chains
  • why scale requires commitment

FAQs must:

  • accurately reflect protocol rules
  • avoid exceptions not defined in the protocol
  • avoid promising discretionary outcomes

FAQs must not:

  • introduce new rules
  • contradict the protocol
  • imply negotiability or special treatment
14.4 Product UI Prompts

Product interfaces may display prompts and notices derived from protocol rules.

Examples include:

  • scale gating notices
  • minimum commitment prompts
  • payout availability messages
  • eligibility-related feedback

UI prompts:

  • explain what is required
  • do not explain how enforcement operates
  • do not invite negotiation or exception handling

All UI messaging must remain consistent with protocol definitions.

14.5 Sales and Partner Explanations

Sales materials, partnerships, and external discussions may reference protocol behavior at a conceptual level.

Sales materials may:

  • explain incentives
  • describe economic structure
  • explain why outcomes are deterministic and fair

Sales materials must not:

  • promise custom allocation
  • suggest rule overrides
  • imply preferential treatment

Any commitment beyond protocol-defined behavior requires a formal protocol amendment.

14.6 Documentation Hierarchy

In the event of conflicting explanations, the following precedence applies:

  • This protocol document prevails
  • Formal technical documentation follows
  • Website summaries follow
  • FAQs follow
  • Marketing and sales materials follow

No derivative material may supersede or reinterpret the protocol.

15. Amendments and Future Versions
15.1 Amendment Authority

Amendments to this protocol may be proposed only by the protocol steward.

No participant, partner, Brand, or deployment has the authority to alter protocol rules unilaterally.

15.2 Versioning

All protocol changes must be versioned.

Each protocol version:

  • is identified by a unique version identifier
  • has a defined effective date
  • applies prospectively unless explicitly stated otherwise

Historical versions remain authoritative for outcomes settled under those versions.

15.3 Non-Retroactivity

Protocol amendments do not retroactively alter:

  • completed lineages
  • settled conversion events
  • finalized allocations
  • paid or accrued payouts

Once revenue has settled and allocation has been recorded, outcomes are final under the protocol version in effect at the time of conversion.

15.4 Forward Compatibility

Future protocol versions may introduce:

  • new environment types
  • new scale thresholds
  • new pricing mechanisms
  • new eligibility constraints
  • new operational features

Such changes must:

  • preserve core invariants
  • avoid breaking existing candle behavior
  • maintain deterministic allocation
15.5 Core Invariants

The following invariants must be preserved across all protocol versions:

  • allocation occurs only after real, net-settled revenue
  • lineage is append-only
  • allocation is deterministic and rule-based
  • no discretionary overrides exist
  • protocol rules apply uniformly across deployments
15.6 Deprecation Policy

Features, environments, or behaviors may be deprecated in future versions.

Deprecation:

  • is announced in advance
  • does not invalidate existing outcomes
  • applies only to future activity

Deprecated features may continue to operate for a defined transition period.

15.7 Emergency Changes

In rare circumstances involving:

  • legal requirements
  • critical security vulnerabilities
  • system integrity threats

Temporary emergency changes may be applied.

Such changes:

  • are narrowly scoped
  • are documented retroactively
  • do not alter settled outcomes

Emergency changes do not establish precedent and do not modify core protocol invariants.

Section Status

Section 15 defines how the protocol evolves while preserving determinism, fairness, and auditability.

Protocol authority is explicit, changes are controlled, and history is never rewritten.

Final Constitutional Summary

  • Brands define business intent
  • IDDAS defines and enforces the rules
  • Once revenue exists, outcomes are deterministic
16. Canonical Commitment Specification - Candle Sealing

CANDLE SEALING SPEC v1.0

IDDAS Protocol - Canonical Commitment Event

16.1 Purpose

The Candle Seal is the irreversible commitment action that converts a candle-based opportunity into a secured, verifiable deal object within IDDAS. This sealing specification applies only to enterprise-enabled implementations, and IDDAS compatibility does not require exposing Candle Sealing. This spec defines:

  • The only valid sealing action
  • The conditions under which sealing may occur
  • The effects of sealing
  • The boundaries that preserve the sacred candle

This spec is protocol law. UI, animation, and implementation must conform to it.

16.2 Canonical sealing action (non-negotiable)

The only valid sealing action is:

In an enterprise-enabled context, the user performs a continuous 10-second hold on an unsealed candle with the flame off. Any interruption cancels the attempt silently, and completion seals immediately with no confirmation dialog.

There are:

  • No alternative gestures
  • No variants
  • No shortcuts
  • No secondary confirmation mechanisms

This action is canonical across enterprise-enabled implementations, devices, and environments.

16.3 Preconditions (when sealing is allowed)

A candle may be sealed only if all of the following are true:

  • 1) The candle is unsealed
  • 2) The flame is off
  • 3) The user performs a continuous 10-second hold on the candle (or flame area) in an enterprise-enabled context

Notes:

  • A candle may be sealed immediately upon receipt, or saved and sealed later while it remains unsealed.
  • A candle with the flame on cannot be sealed.
16.4 Sealing gesture requirements

Duration

  • Hold duration: 10.0 seconds
  • Must be continuous
  • Any interruption cancels the attempt

Feedback during hold

  • The system MUST provide calm, visible progress feedback
  • No numeric countdown
  • No urgency indicators
  • No error messaging if released early

If the user releases early:

  • The visual seal dissolves quietly
  • No message is shown
  • The candle remains unsealed
16.5 Completion moment (the seal)

When the 10-second hold completes:

  • 1) A single seal acknowledgment moment occurs
  • 2) The candle is immediately and permanently sealed
  • 3) A Seal Event is emitted (see 16.8)

There is no confirmation dialog. Completion of the hold is the commitment.

16.6 Irreversibility

Once sealed:

  • The candle cannot be unsealed
  • The seal cannot be modified
  • The deal cannot be renegotiated through the candle
  • The sealing action cannot be repeated

This irreversibility is intentional and required. Sealing is equivalent to signing a contract, sealing a letter, or committing a transaction.

16.7 Relationship to the candle (sacred boundary)

The candle remains:

  • Visually a candle
  • Conceptually a ritual object
  • Free of enterprise UI elements
  • Free of configuration controls

Sealing is a moment, not a mode switch. After sealing:

  • The candle does not become an enterprise dashboard
  • The candle does not expose settings or status panels
  • The candle remains recognizable and unchanged
16.8 Seal event (protocol artifact)

Upon successful sealing, the system MUST generate a single immutable Seal Event containing:

  • Timestamp
  • Candle ID
  • Environment ID
  • Lineage snapshot
  • Rule version reference

This event is immutable, verifiable, and is the authoritative record of commitment.

16.9 Post-seal boundary

Any post-seal steps occur outside the candle and outside this specification. This spec governs only the sealing action, its prerequisites, its irreversibility, and the resulting Seal Event.

16.10 Explicit non-goals (what this is NOT)

The Candle Seal is not:

  • A settings action
  • A reversible choice
  • A negotiable step
  • A multi-gesture system
  • A gamified interaction
  • A shortcut or hidden trick
  • A consumer-default feature

There is one candle. There is one seal.

16.11 Authority

This spec governs UI design, animation, engineering implementation, documentation, and website language. If an implementation conflicts with this spec, the spec wins.

Status

CANDLE SEALING SPEC v1.0 - LOCKED

ECONOMICRIGHTS AND MONETIZATION Pricing applies to derivative certainty

The IDDAS Protocol distinguishes between event truth and derivative services.

Activation events are free to exist. Event truth, sequence validity, and lineage integrity are never gated by payment, balance, or account state.

The protocol reserves the right to introduce economic systems that operate strictly downstream of raw event generation. Such systems may include:

  • Anchoring and batch anchoring services
  • Proof finalization and permanence guarantees
  • Attestation, certification, and audit-grade reports
  • Settlement, reconciliation, and conversion sealing
  • Priority processing, throughput guarantees, and service-level agreements
  • Proof inspection tools, lineage explorers, and export services
  • Data retention, archival, and historical replay services
  • Anti-fraud, integrity enforcement, and anomaly detection
  • Surface certification and high-trust surface classes
  • Private, sovereign, or white-label protocol deployments
  • Developer access tiers, APIs, and rate-limited services
  • Verification modules, adapters, and compliance tooling
  • Licensing of protocol marks and verification seals

No economic mechanism may:

  • Prevent an activation event from being recorded
  • Modify event truth or sequence validity
  • Introduce identity as a prerequisite for action
  • Retroactively affect recorded events

Event truth is neutral and permanent. Derivative certainty, services, and guarantees may be priced.

This separation is a permanent invariant of the protocol.

SECONDARYECONOMIC RIGHTS Non-interference and downstream monetization

The IDDAS Protocol is action-first and identity-optional.

All activation events - including ignite, seal, save, share, and lineage extension - must be recordable, verifiable, and replayable without requiring identity, payment, balance, or account state.

Event truth, sequence validity, and lineage integrity shall never be defined, altered, suppressed, or invalidated by any economic mechanism.

The protocol explicitly reserves the right to introduce secondary economic systems that operate downstream of raw event generation. These may include:

  • Anchoring or batch anchoring services
  • Verification, attestation, or audit services
  • Settlement or reconciliation layers
  • Throughput, priority, or service-level guarantees
  • Institutional or enterprise verification tooling

Such secondary systems must not precondition, gate, or modify the creation of activation events.

No fee, payment, credit, or economic requirement may be imposed as a prerequisite for an activation event to exist, be recorded, or be considered valid.

Economic mechanisms may only apply to derivative services, post-event processing, or optional capabilities that do not affect event truth.

This separation is a permanent invariant of the protocol.

GOVERNANCEEVOLUTION Stewardship without redefining truth

The IDDAS Protocol is governed by fixed, published rules that define event truth, sequence validity, lineage, and verification.

Governance mechanisms may evolve over time, including councils, stewards, validators, auditors, or institutional oversight structures.

No governance mechanism may:

  • Alter or invalidate previously recorded activation events
  • Retroactively change event truth, sequence validity, or lineage
  • Introduce identity requirements prior to action
  • Override deterministic protocol rules

Governance exists to steward operation, compliance, and evolution - not to redefine truth.

The protocol may be instantiated within different legal, regulatory, or sovereign contexts, including national or jurisdictional deployments, provided core protocol invariants remain unchanged.

Localized policy overlays may exist, but they must not modify:

  • Activation semantics
  • Event recording rules
  • Lineage integrity
  • Verification logic

No single governance body, jurisdiction, or authority defines protocol truth.

Protocol integrity is independent of governance structure.

Frequently Asked Questions

Clear answers to common questions.
What is IDDAS?

IDDAS is an activation-before-identity protocol. It records real engagement, creates lineage from participation, and allocates outcomes using deterministic rules instead of negotiated attribution.

What is an activation?

An activation is a verified, intentional entry into the system initiated by a person.

This typically occurs when someone deliberately scans a code or opens an activation link and enters the activation flow. Passive exposure does not count.

Is an activation the same as a purchase or conversion?

No.

An activation is an entry event. A purchase or conversion is a separate outcome that may or may not occur later.

Activations create eligibility and lineage. Conversions create revenue.

When do charges occur?

Charges occur only when a verified activation happens.

If no one activates, no charge occurs.

Charges are not based on impressions, views, or passive exposure.

What if someone activates but never converts?

Then no revenue is created and no allocation occurs.

The system does not create speculative value or implied entitlement.

Why do you charge per activation instead of impressions?

Because impressions are passive and probabilistic.

IDDAS charges only for intentional engagement that creates a verifiable activation event. This removes guesswork, disputes, and retroactive attribution.

Is saving or completing an action required for activation?

No.

Saving, sharing, or completing additional actions deepens lineage, but an activation exists as soon as intentional entry occurs.

Why is the activation price fixed and universal?

The protocol fixes the charging structure, not the numeric price.

IDDAS defines what is charged (verified activations), when charging occurs (only when activation happens), and what properties are included (verification, lineage, auditability).

Numeric pricing amounts are defined by the implementation or Brand and may vary by deployment. The protocol does not define prices, rates, or dollar values.

What remains fixed is that pricing is applied uniformly within a deployment, without discretionary exceptions, retroactive changes, or negotiated outcomes after activation occurs.

Can the rules be changed later?

Rules can change only through explicit versioning.

Changes apply prospectively. Past outcomes remain verifiable against the rules in effect at the time they occurred.

There are no silent changes and no retroactive adjustments.

Who decides how revenue is allocated?

Allocation follows a published, deterministic rule.

No participant, operator, or administrator can manually override outcomes after the fact.

What prevents abuse or fake activations?

Activations require intentional human entry and the creation of valid session state.

Automated traffic may load URLs, but it cannot easily generate valid activation contexts or undetectable lineage at scale. Invalid activity does not qualify as an activation by definition.

Do you charge for everyone who attends an event or enters a venue?

No.

You are charged only for people who activate. Attendance alone does not create a charge.

Can spend be capped or limited?

Yes.

Deployment scope, event boundaries, and minimums can be defined. Pricing per activation remains fixed.

How is attribution handled across sharing?

Sharing creates new activations linked by lineage.

Attribution follows recorded lineage rather than last-touch claims.

Is this a loyalty program?

No.

Loyalty programs can be built on top of IDDAS, but activation does not require enrollment, accounts, or identity.

Is CandleMe required to use IDDAS?

No.

CandleMe is one implementation built on top of the protocol. The protocol itself is independent of any specific product or interface.

Why build this as a protocol instead of a closed platform?

Protocols create durability.

By fixing the rules first and making outcomes verifiable, IDDAS allows others to build without fear that success will later change the outcome. Trust comes from rules, not discretion.

What problem does this model solve?

It replaces:

  • Guesswork with verification
  • Negotiated attribution with deterministic allocation
  • Passive exposure with intentional engagement
Are participants agents, contractors, or representatives of IDDAS?

No.

Participants in IDDAS, including Infrastructure Originators, deployers, brands, and end users, do not act as agents, contractors, brokers, representatives, or affiliates of IDDAS or of each other.

Participation creates no authority, obligation, or representation relationship of any kind.

All actions are performed independently under the same published protocol rules.

What exactly is being sold or charged for?

IDDAS does not sell access, exposure, outcomes, leads, or personal data.

Charges apply only to verified activation events as defined by the protocol.

An activation is a recorded, intentional entry event. It does not guarantee engagement, conversion, revenue, or results.

Payment is for the occurrence of the event itself, not for performance.

Does participation create obligations or guarantees?

No.

Participation in IDDAS creates no obligation to perform, promote, convert, or deliver outcomes.

The protocol does not guarantee results, revenue, engagement, or success for any participant.

Outcomes follow rules. Effort, intent, or expectation does not create entitlement.

What is an Infrastructure Originator?

An Infrastructure Originator is a protocol-level lineage root that authorizes and anchors one or more activation surfaces that later produce verified activations.

Infrastructure Originator status is not granted, approved, or claimed. It emerges only if downstream, protocol-valid activations occur.

What is an activation surface?

An activation surface is any protocol-issued entry mechanism that enables intentional activation.

Surfaces may be physical, digital, or hybrid. Function matters, not form.

If intentional entry occurs and produces a valid activation, the surface qualifies.

Do Infrastructure Originators have to deploy or operate the surfaces themselves?

No.

Infrastructure Originators may authorize or enable deployment without physically creating, installing, or operating the activation surfaces themselves.

The protocol records origination structurally, not operational effort.

Is an Infrastructure Originator just a salesperson or affiliate?

No.

Infrastructure Origination is not a sales role, affiliate program, referral scheme, or commission for introductions.

Infrastructure Originators are compensated only when protocol-valid activations occur through originated surfaces.

How are Infrastructure Originators paid?

Infrastructure Originators participate only in activation-based economics.

When verified activations occur through originated activation surfaces, a fixed portion of the activation fee is attributed to the Infrastructure Originator according to the implementation’s published rules.

Infrastructure Originator compensation:

• is computed automatically
• is proportional to activation volume
• is independent of downstream revenue, deals, or conversions
• does not depend on negotiation, discretion, or approval

If no qualifying activations occur, no compensation occurs.

Where does the Infrastructure Originator share come from?

The Infrastructure Originator share is derived from activation fees.

It is not taken from participant allocations, downstream revenue distribution, or lineage-based outcomes.

Infrastructure Originator compensation exists entirely at the activation layer and does not alter attribution, lineage, or allocation of revenue created later through conversions.

This separation ensures that infrastructure enablement is rewarded without interfering with outcome-based distribution.

What is an Infrastructure Originator, legally speaking?

An Infrastructure Originator is not an employee, contractor, sales agent, or reseller.

It is a protocol-defined attribution role that emerges only when originated activation surfaces produce verified activations.

Infrastructure Originator attribution does not imply approval, endorsement, exclusivity, or responsibility.

Payment occurs only if qualifying revenue exists and only according to the published rule.

Can Infrastructure Originator attribution be removed or bypassed?

No.

Infrastructure Originator attribution is written at activation creation time and cannot be edited, reassigned, or removed retroactively.

Off-protocol agreements do not alter protocol outcomes.

What prevents brands or partners from bypassing Infrastructure Originators?

Protocol attribution is structural and deterministic.

Attempts to replicate, suppress, or bypass Infrastructure Originator allocation while using protocol-generated activations do not affect on-protocol results and may violate access terms.

Is identity required to become an Infrastructure Originator?

No.

Infrastructure Origination does not require identity, registration, or approval.

Identity may be required later only to claim funds, according to protocol rules.

Does Infrastructure Origination guarantee income?

No.

Infrastructure Origination creates eligibility for activation-based compensation only if verified activations occur.

There are no guarantees, minimums, or promises. If activation volume is zero, compensation is zero. If activation volume increases, compensation increases proportionally.

Participation creates no entitlement beyond what the recorded activations produce.

What happens if IDDAS is used for prohibited or illegal activity?

Activations associated with prohibited or illegal activity do not produce qualifying revenue.

No allocation or payout occurs for non-qualifying revenue, regardless of attribution.

Use of IDDAS remains subject to the platform’s Terms and Conditions and applicable law.

Protocol attribution does not override enforcement, compliance, or legal requirements.

Why define Infrastructure Originators at the protocol level?

Because infrastructure contribution is structural, not discretionary.

Encoding origination as a rule prevents disputes, renegotiation, and retroactive exclusion as systems scale.

Why explain this in the FAQ?

Because these are structural questions, not marketing claims.

The FAQ exists to eliminate ambiguity before it becomes conflict.

Hard questions

Protocol-level objections and direct answers.

These are intentionally direct - and intentionally separated - so the standard FAQ stays clean.

Isn’t this just QR codes and attribution dressed up?

No.

QR codes, links, and attribution already exist. IDDAS is not about inventing those primitives. What is new is the order of operations and the governance model.

IDDAS enforces that activation happens before identity, attribution follows lineage instead of accounts, and outcome computation rules follow a published rule that cannot be silently changed. Most systems do the opposite - they start with identity, infer attribution later, and negotiate economics case by case.

That combination is the difference.

Are you really saying there are no competitors?

There are competitors to parts of IDDAS.

There are attribution tools, referral platforms, ad-tech systems, IoT platforms, and blockchain protocols. None of them combine identity-free activation, object-based capabilities, lineage-based attribution, fixed economics, and independent verification in a single system.

So we don’t claim there are no competitors. We claim there are no direct protocol peers.

If identity is optional, how do you prevent fraud?

IDDAS does not rely on identity to prevent fraud.

It relies on verifiable actions, environment constraints, and lineage. Activations are bound to specific objects or environments with defined capabilities. Patterns, limits, and verification anchors detect abuse without forcing identity at the start.

Identity can be introduced later if required, but it is not foundational. This is why IDDAS works in crowds, public spaces, and shared environments.

Why lock yourself into fixed economics? Isn’t that bad business?

IDDAS fixes the rule structure, not numeric economics.

The protocol locks the order of operations, attribution logic, and non-discretionary computation of outcomes. Pricing amounts, fees, and commercial terms are defined outside the protocol by implementations or Brands.

This separation allows markets, pricing, and business models to evolve freely without undermining trust in how outcomes are computed once qualifying events occur.

Why use blockchain at all? Isn’t that unnecessary?

Blockchain is not used for user interaction, payments, or identity.

It is used only as a neutral verification layer to anchor rule versions and payout proofs so outcomes cannot be rewritten after the fact. No wallets are required. No tokens are required. No participant needs crypto knowledge.

If a better neutral verification layer existed, IDDAS could use that instead. The goal is verifiability, not crypto.

How is this not just an enterprise SaaS with strong opinions?

SaaS can change rules quietly. Protocols cannot.

IDDAS publishes the order of operations, attribution logic, and economic rules in advance. Even the operator is bound by them. That constraint is what makes it a protocol rather than a configurable product.

What stops someone from copying this?

Interfaces can be copied. Features can be copied.

What cannot be easily copied is credibility earned through consistency. Protocols win by being first, clear, and stable. Once participants rely on a rule, switching costs are not technical - they are trust-based.

IDDAS also has patent protection, but more importantly, it has protocol legitimacy.

Why hasn’t someone already built this?

Because it requires giving up short-term control.

Most companies want pricing flexibility, bespoke deals, and the ability to change rules quietly. Protocols require deciding hard constraints early - what never changes, what cannot be customized, and what even the operator is not allowed to do.

Most teams avoid that. IDDAS didn’t.

Is CandleMe a distraction from the protocol?

No.

CandleMe is a carrier, not a fork. It proves that IDDAS works at the object level, not just in apps or accounts. Stadiums, out-of-home advertising, events, transit, and physical products all use the same activation logic.

CandleMe demonstrates generality, not limitation.

What would a real competitor actually look like?

A real competitor would need to start with activation before identity, bind capabilities to objects or environments, use lineage-based attribution, enforce fixed and published economic rules, provide independent verification, and work across industries without rewriting core logic.

No existing system does all of this today.

Final clarification

IDDAS is not special because it is clever. It is special because it is constrained.

The system deliberately limits what the operator can do so others can rely on outcomes. That is why it behaves like a protocol, not a product.

Who ultimately controls IDDAS if the rules are fixed?

IDDAS is operated by an entity, but governed by published rules.

Operational control (infrastructure, uptime, integrations) remains with the operator. Outcome control (attribution, economics, verification) is constrained by the protocol. The operator cannot silently rewrite attribution logic, retroactively alter payouts, or change economic splits without publishing a new rule version.

This separation is deliberate. It limits operator power so participants can rely on outcomes.

What happens if IDDAS as a company fails or changes ownership?

The protocol rules and verification anchors remain valid regardless of company changes.

Because rule versions and payout proofs are independently verifiable, historical outcomes do not depend on ongoing trust in the operator. A new operator must honor existing rules going forward or publish a new version that applies only to future activations.

This is one of the reasons IDDAS behaves like a protocol rather than a traditional SaaS vendor.

Doesn’t this reduce flexibility for enterprise customers?

Yes, by design.

IDDAS does not optimize for bespoke enterprise deals. It optimizes for predictable, repeatable outcomes. Enterprises still configure deployments, environments, and campaigns, but the core rules are not negotiated per client.

This is the same tradeoff every successful protocol makes: less short-term flexibility in exchange for long-term reliability.

How does IDDAS scale without identity if volume becomes massive?

Identity is not a scaling primitive. Verification is.

IDDAS scales by anchoring actions to environments, objects, and capabilities rather than user accounts. Rate limits, context constraints, environment capacity, and lineage validation scale far better in crowds than identity-based systems.

Identity can be layered in selectively where required, but it is never the bottleneck.

What happens when regulations require identity or consent?

IDDAS is compatible with identity requirements without being dependent on them.

Identity, consent, and compliance layers can be introduced at the edge when required by law or policy. The protocol itself does not prevent identity usage - it simply does not require it to begin.

This allows IDDAS to operate across jurisdictions with different regulatory expectations.

Isn’t lineage-based attribution hard to explain to customers?

At first, yes. Over time, it becomes simpler than account-based attribution.

Lineage answers a clearer question: how did this happen? Customers do not need to understand every internal detail. They only need to know that attribution follows a verifiable chain of actions rather than opaque platform decisions.

Most users never see lineage directly. They benefit from its fairness indirectly.

Couldn’t fixed rules discourage innovation over time?

Protocols do not prevent innovation. They constrain where it happens.

IDDAS allows innovation at the object level, environment level, campaign level, and content level. What does not change is how value is attributed and distributed once outcomes occur.

This creates a stable foundation on top of which innovation can safely happen.

What if a client wants different economics than the protocol allows?

IDDAS governs how outcomes are computed once qualifying events occur. It does not govern pricing amounts, commercial terms, or business strategy.

If a use case requires discretionary attribution, retroactive changes, or negotiated outcome overrides, IDDAS is likely not the appropriate system.

IDDAS is designed for environments where predictability, neutrality, and verification matter more than bespoke outcome negotiation.

Does this mean IDDAS grows more slowly?

Often, yes.

Protocols typically grow more slowly at first because they refuse shortcuts. Over time, they tend to become deeply embedded because switching away means losing predictability and trust, not just features.

IDDAS is built for durability, not velocity at all costs.

What is the biggest risk to IDDAS?

The biggest risk is breaking its own rules.

If IDDAS were ever to undermine its published constraints, it would stop being a protocol and become just another platform. That risk is taken seriously, which is why verification and rule versioning are core, not optional.

Trust is not claimed. It is enforced.

Final note

IDDAS is intentionally opinionated. It does not try to serve every business model. It exists to make real-world activation, attribution, and value distribution reliable in environments where identity-first systems fail.

That tradeoff is the point.

Isn’t this too rigid to adapt to future markets?

IDDAS is rigid where trust matters and flexible where innovation matters.

The protocol fixes the order of operations, attribution logic, and economic rules. Everything else - environments, objects, campaigns, interfaces, integrations, and content - can evolve freely.

This separation allows IDDAS to adapt to new markets without undermining past outcomes.

What prevents IDDAS from becoming a gatekeeper?

The protocol itself.

Because rules are published in advance and outcomes are verifiable, IDDAS cannot quietly privilege one participant over another. The operator provides infrastructure, not discretionary authority over attribution or payouts.

Gatekeeping requires opacity. IDDAS is designed to remove it.

What happens if a powerful customer pressures you to change the rules?

Then the answer is no.

IDDAS cannot change rules retroactively or privately. Any change must be published as a new rule version and applies only to future activations. If a customer requires bespoke economics or exceptions, IDDAS is likely not the correct system for that use case.

This constraint protects everyone else.

Could IDDAS be captured by investors or future management?

Only operationally, not economically.

Infrastructure decisions can change. The protocol rules that govern attribution and distribution are constrained by publication, versioning, and verification. Any attempt to undermine those constraints would be visible and would invalidate trust.

Protocols survive leadership changes because their legitimacy is rule-based, not personality-based.

Isn’t “activation before identity” dangerous from a safety perspective?

It would be, if identity were the only safety tool.

IDDAS uses environment constraints, capability limits, rate controls, and lineage validation to maintain safety. Identity is available when required, but it is not the default control mechanism.

This mirrors how physical systems work: tickets, doors, meters, and tools do not ask who you are first. They enforce rules through design.

What if bad actors try to flood the system with meaningless activations?

Not all activations are billable.

IDDAS distinguishes between raw triggers, qualified activations, and billable outcomes. Qualification thresholds, environment constraints, and pattern analysis prevent noise from becoming value.

Billing is tied to verified, intent-qualified activations, not volume alone.

Does this require customers to trust IDDAS more than other platforms?

Less, not more.

Traditional platforms require trust that rules won’t change quietly. IDDAS reduces that trust requirement by making rules explicit and outcomes verifiable. Participants do not need to trust intentions. They can verify behavior.

That shift is fundamental.

Is this overkill for simple use cases?

Sometimes, yes.

Not every use case needs a protocol. IDDAS is designed for environments where scale, neutrality, and attribution fairness matter. For simple, closed systems, lighter tools may be sufficient.

IDDAS does not try to replace everything. It exists for cases where failure modes are expensive.

What is the biggest philosophical bet IDDAS is making?

That trust should be enforced by structure, not promised by brand.

IDDAS assumes that real-world activation systems will increasingly operate in shared spaces, crowds, and environments where identity-first models break down. In those contexts, rules must be clear, fixed, and verifiable.

That belief shapes every design decision.

What would invalidate IDDAS as a protocol?

If IDDAS ever allowed silent rule changes, retroactive outcome manipulation, or discretionary attribution, it would stop being a protocol.

That is the line that is not crossed. Everything else is negotiable.

Final boundary

IDDAS is not trying to be everything to everyone. It is intentionally opinionated. Its strength comes from choosing constraints early and living with them.

That is why it behaves like a protocol instead of a platform.

↑ Top