This site presents a reference view of an IDDAS-compatible implementation.
Outcomes shown here are computed deterministically from committed inputs and published, versioned protocol rules. No discretionary adjustments, manual overrides, simulations, or illustrative examples are used.
This reference exists to demonstrate protocol behavior, verification properties, and rule enforcement. It does not constitute a product guarantee, a commercial offer, or a statement of implementation completeness.
Protocol rules are authoritative and versioned. Implementation details may evolve without altering past outcomes.
Protocol behavior is fixed. Implementations may vary.
In other words, IDDAS enables activation with immutable attribution and independent verification.
Once an activation occurs, its lineage, attribution path, and resulting outcomes are deterministically bound and cannot be altered retroactively. Verification does not depend on platform trust, identity disclosure, or discretionary control, and may be independently recomputed from recorded inputs and published rules.
This property is protocol-level. Applications may vary. Outcomes do not.
No account is required to begin. Identity is optional. Attribution follows lineage. Rule versions and verification proofs are anchored to a public blockchain - no silent changes.
IDDAS starts with action in the real world: a scan, a tap, a placement, or a verified event. The system records intentional actions first and derives outcomes from those actions, rather than from identity, negotiation, or trust in an operator.
This allows IDDAS to function in crowds, public spaces, and shared environments where accounts, permissions, and coordination add friction.
Key properties:
• Action comes first
• Attribution follows lineage
• Outcomes are rule-based
• Results are verifiable
In IDDAS, attribution does not depend on who the user is. It depends on the lineage of actions. Lineage is the verifiable chain of how this happened - which object was activated, which environment it belonged to, and which upstream placements or invitations led to the outcome.
This matters because crowds and public environments cannot rely on accounts. People come and go. Lineage lets value be attributed and shared without forcing identity at the start.
When revenue occurs, payouts follow the published economic rule and the recorded lineage. The verification layer anchors rule versions and payout proofs on-chain so outcomes can be audited independently.
Most systems start by asking who you are. Then they ask you to trust the system, create an account, accept permissions, and follow a flow.IDDAS flips that order.
IDDAS starts with action in the real world - a scan, a tap, a placement, a verified event. Identity is optional. The system does not need to know who you are to begin.
Instead of trusting first and proving later, IDDAS proves outcomes through verifiable actions and lineage-based attribution. When real revenue occurs, distribution follows a fixed rule that is published in advance - not negotiated per client and not changed quietly.
This is why IDDAS works in crowds, public spaces, and shared environments where accounts and coordination add friction.
Most digital systems work the same way.
You identify yourself. You log in. You are granted access to features tied to your account.
IDDAS works differently.
With IDDAS, capabilities are embedded into the object itself. Identity is optional, and in many cases not required at all.
This may feel unfamiliar at first. That’s normal. It is not how most digital experiences are designed.
If you only read one section on this site, read this one.
Think of physical objects you already understand.
The object itself determines what can happen.
IDDAS applies this same idea to digital interactions. Instead of asking who you are first, IDDAS asks: What is this object allowed to do, right here, right now?
Those allowed actions are called capabilities.
This works well for personal software. It works poorly for shared spaces, crowds, public environments, and spontaneous moments. It also makes simple interactions feel heavy.
The same object can behave differently in different contexts without explanation. People simply interact.
Infrastructure is software that can change. A protocol defines rules others can rely on.
IDDAS is a protocol because it fixes the order of operations, the attribution logic, and the economic rules in advance. Even the operator cannot silently change outcomes.
IDDAS runs on infrastructure, but it is not merely infrastructure. The protocol defines what must remain true regardless of implementation.
IDDAS uses blockchain only as a verification layer - to lock rules and make outcomes auditable. It is not a token system, not a marketplace, and not a wallet-based user experience. Participants can activate and participate without touching crypto.
People do not feel processed. They feel included.
When builders extend IDDAS, they do not modify the object itself. They define capability layers that can be enabled, disabled, or contextually activated across environments. The object remains recognizable. The experience adapts.
It is a different way of thinking about interaction.
IDDAS is counterintuitive. If this model is not made clear early, familiar assumptions get projected onto it and the simplicity is mistaken for limitation.
Our goal is not to sound clever. Our goal is to be clear.
IDDAS is not a single app or a packaged offering. It is a rule set that governs what happens when a real, measurable outcome occurs - and only then.
If no value is created, no money moves. There is nothing to sell and nothing to persuade. The rule itself is the product: a predictable way to activate value, attribute contribution, and produce verifiable outcomes without negotiation, discretion, or exceptions.
IDDAS defines outcomes, not features. It defines how value moves, not how it is marketed or claimed.
IDDAS runs on standard infrastructure such as cloud services, databases, and conventional software systems. It is not infrastructure itself.
Infrastructure executes the system. The protocol defines the limits of the system.
IDDAS defines the invariants - what must remain true regardless of implementation. These include activation before identity, lineage-based attribution, fixed rule enforcement, and verifiable outcomes anchored for independent audit.
Implementations may evolve. The rule cannot drift silently. The protocol is implementation-agnostic so others can build on it without changing the underlying economics or attribution logic.
IDDAS is intentionally narrow in what it defines and deliberately broad in what it enables.
It does not attempt to replace entire industries or operate them directly. It provides a rule layer those industries can build on.
IDDAS is not:
Many large industries rely on these models today and are constrained by their structure. IDDAS does not compete with those industries. It removes structural friction that prevents them from capturing value that already exists.
As systems scale, attribution becomes opaque and economics drift.
Rules change quietly. Exceptions accumulate. Trust is replaced by negotiation.
IDDAS exists to stop that drift by making the rule explicit, fixed, and verifiable.
When the rule is clear and cannot change silently:
This matters because much real-world activation is currently lost - especially in public spaces, shared environments, collective moments, and situations where identity-first systems create friction instead of value.
IDDAS is designed so others can build systems that capture that missing activation without changing the rule after adoption.
Patent applications are pending. The goal is not ownership of use cases, but durability of the rule.
Note: IDDAS is sometimes described as "infrastructure" because it sits beneath many systems. The precise term is protocol - the rule layer that constrains how infrastructure behaves.
IDDAS runs on infrastructure.
But IDDAS is not infrastructure.
This distinction is important, because confusing the two leads to incorrect assumptions about flexibility, control, and trust.
Infrastructure is software that executes behavior. It includes:
Infrastructure can be changed. That flexibility is useful, but it also means outcomes depend on who controls the system.
A protocol defines rules that others can rely on. It specifies:
A protocol constrains infrastructure. It tells builders what must remain true, even as implementations evolve.
IDDAS fixes several things in advance:
These are not implementation choices. They are rules. Even IDDAS, as the operator, cannot silently change them.
Because the rules are fixed:
Infrastructure may vary. The rule does not.
IDDAS uses a blockchain only as a verification anchor. It does not require:
The blockchain is used to make rule versions and outcomes auditable. It is an audit layer, not a product feature.
Many systems start as infrastructure and later attempt to behave like protocols. That usually fails. Rules that are not fixed early become negotiable under pressure.
IDDAS is designed the opposite way. The rule comes first. Everything else adapts around it.
What this section does
This section explains how Infrastructure Originators (IOs) are recognized in V1 and how activation-based attribution applies to deployment roots.
It introduces no sales programs, no brokerage roles, and no off-protocol economics.
What an Infrastructure Originator is
An Infrastructure Originator (IO) is a deployment root that enables an activation surface to exist in the real world.
An activation surface may be physical or digital (for example, kiosks, screens, transit placements, venues, or other authorized locations) and may later generate verified activations.
IO status is structural, not discretionary.
An IO exists only if protocol-valid activations occur through an originated surface.
What an Infrastructure Originator is not
An Infrastructure Originator is not:
Infrastructure Originators are not compensated for effort, access, influence, persuasion, or relationships.
They are compensated only when verified activations occur.
No approval or designation
Infrastructure Originator status:
The system does not evaluate people or effort.
It evaluates activation events.
Activation-based attribution (V1)
For each verified activation that occurs through an originated surface:
This attribution is:
If one activation occurs, one deployment attribution applies.
If one million activations occur, one million deployment attributions apply.
There are no guarantees.
There are no minimums.
There is no compensation without activation.
Separation from private arrangements
Any private agreements, consulting fees, access arrangements, installation costs, or other compensation negotiated by an Infrastructure Originator outside the Protocol are entirely independent of the Protocol and the Steward.
Such arrangements:
The Protocol recognizes only verified activation events and their recorded lineage.
Attribution permanence
Infrastructure Originator attribution is recorded at activation creation time.
Once recorded:
Any use of protocol-valid activations necessarily honors recorded attribution.
Why this exists
This structure rewards those who make activation possible
without converting infrastructure enablement into sales, brokerage, or influence programs.
Infrastructure Originators do not extract value.
They enable activation to exist.
The system handles the rest.
A single rule governs the system.
Deterministic economic posture
When real revenue is created through the system, outcomes are determined by published, versioned rules.
The protocol enforces the following invariants:
The protocol does not define prices, percentages, commercial splits, or retained amounts. Those parameters, if any, are implementation- or Brand-defined and exist outside protocol logic.
What the protocol fixes is how outcomes are computed once qualifying revenue exists, not the commercial terms themselves.
Why fixed rules matter
Most systems begin with clear rules and weaken them as they scale.
As systems grow:
IDDAS prevents this by fixing the rule layer itself.
Because outcomes are computed from committed inputs and published rule versions:
This challenges the assumption that discretion, opacity, or post-hoc adjustment are required at scale.
IDDAS fixes the rule first so others can build on it without fear that success will change the outcome.
What this enables
The protocol provides a deterministic way to preserve lineage integrity when a deal is formed through the candle. This is a verification and auditability property - not a contract, and not a guarantee of any economic outcome.
1. Lineage forms before any deal
As a candle propagates, eligible activation events append to a lineage. Lineage is append-only: entries can be added, but valid entries are not removed or rewritten.
2. Deals formed through the candle remain verifiable
If a deal is formed through the candle, the resulting record retains lineage integrity and can be verified from committed events and published, versioned protocol rules.
3. Canonical sealing action (enterprise-enabled)
In enterprise-enabled implementations, a deal may be sealed through a single canonical gesture:
4. Post-seal behavior
After sealing, the candle enters a sealed state. The lineage remains append-only and upstream participants cannot be removed or renegotiated. Sealing is one-time and irreversible - there is no unsealing, repetition, or override.
5. If a deal occurs outside the candle
If a deal is formed outside the candle, the protocol cannot produce lineage-based verification for that deal. This means loss of protocol verification and loss of lineage-based attribution for that outcome.
6. The candle as boundary
The candle is the verification boundary: only deals formed through the candle retain lineage integrity for protocol verification.
IDDAS allocates value only after a real, qualifying transaction occurs.
There is no negotiation after the fact.
There is no discretion.
There is no “we’ll figure it out later.”
Everything that may be allocated is defined in advance, and outcomes are computed deterministically from recorded events and published rules.
Step 1 - Revenue first
Allocation begins only if real revenue exists.
If no qualifying transaction occurs, no value exists to allocate.
If no value exists, no allocation occurs.
The protocol does not create speculative value, implied credit, or future entitlement.
Step 2 - Declared allocatable portion
Before any participation occurs, the Brand or implementation defines what portion of revenue, if any, is made allocatable.
This declaration is made up front, before activation, propagation, or contribution.
The protocol does not decide:
It enforces only that whatever is declared allocatable is fixed in advance and cannot be altered after the fact.
Anything not explicitly declared allocatable remains outside protocol allocation.
Step 3 - Allocation pool boundary
IDDAS allocates only the portion of revenue that has been declared allocatable.
The protocol does not redistribute retained revenue.
It does not infer pools.
It does not expand allocation scope.
If nothing is declared allocatable, nothing is allocated - even if revenue exists.
Step 4 - Lineage-based distribution
From the declared allocation pool, distribution follows lineage.
Lineage is the ordered, append-only record of eligible activation events that led to the outcome.
Allocation:
If a role does not exist in a given lineage, no allocation is reserved for it.
If only one participant contributed, allocation resolves to that participant under the rule.
What lineage does - and does not - do
Adding more participants to a lineage does not create additional value.
What lineage increases is reach and likelihood - not entitlement.
If an outcome occurs, allocation is computed.
If it does not, nothing is owed.
IDDAS allocates value only after it exists.
In short
The rule is known before participation.
The rule does not change afterward.
The rule is the trust.
When real revenue occurs, allocation under IDDAS follows published, versioned protocol rules.
Allocation is deterministic and non-discretionary: the same committed inputs always produce the same outcomes. There is no negotiation, manual adjustment, or post-hoc override.
The protocol records eligible activation events, preserves their lineage in order, and computes outcomes only after real, settled revenue exists.
These properties ensure auditability and verification without requiring trust in any operator. Protocol rules are authoritative; implementations may vary.
What an activation is
An activation is a verified, intentional entry into the system initiated by a person.
An activation occurs when someone deliberately scans a code, opens an activation link, or otherwise enters an activation flow in a way that creates a recorded lineage event.
An activation is not passive exposure.
It is not an impression.
It is not background traffic.
An activation requires intentional human action and the creation of persistent system state. Each activation is recorded at the moment it occurs and becomes part of an append-only lineage that cannot be retroactively altered.
If no intentional entry occurs, no activation exists.
If no activation exists, no charge occurs.
Structural integrity of activations
The system does not rely on post-hoc filtering, subjective moderation, or discretionary review to determine valid activations.
Validity is structural.
An activation must:
Automated traffic may fire requests or load URLs, but it cannot reliably:
Invalid activity does not qualify as an activation by definition. It is excluded structurally, not filtered later.
Activation-based charging (non-numeric)
Charges, where applied, are based solely on verified activations that actually occur.
The protocol defines when an activation exists.
Pricing, credits, minimums, discounts, or billing structures-if any-are defined by the Brand or implementation operating within the protocol.
Pricing decisions do not affect:
What is charged and what is not
Charges apply only to verified activations that intentionally occur.
If people are present but do not intentionally enter, no activation exists and no charge occurs.
Charges are not based on impressions, views, reach, or inferred exposure. Charges are based solely on recorded, verifiable activation events.
Subsequent actions such as saving, sharing, claiming, or converting may deepen lineage, but they are not required for an activation to be valid.
Event and time boundaries
Activations are counted within defined events, deployments, or time windows as configured by the implementation.
Capacity, credits, or usage limits-if any-apply to future activity only and do not retroactively alter recorded activations or outcomes.
This aligns charging with real-world moments and preserves clear accounting, attribution, and reconciliation.
Why this model exists
Physical-world activation only scales when engagement is measured precisely and verification is deterministic.
This model replaces estimation with verification. Participants know the rule before they participate, and outcomes follow the rule exactly.
Clarity replaces guesswork. Verification replaces inference.
Pricing philosophy
IDDAS charges for verified activation - and nothing else.
If an activation occurs, it may be charged according to the implementation’s published pricing.
If no activation occurs, nothing is charged.
An activation is a verified, intentional entry that creates persistent system state.
Charges are never based on impressions, views, exposure, or inferred interest.
Each verified activation includes deterministic attribution, append-only lineage, auditable outcomes, and independent verification of what occurred.
These properties are inherent to the system.
They are not add-ons, upgrades, or optional features.
You are paying for real entry. The system provides the full, verifiable truth of what that entry produced.
Fairness rule - uniform structure, not negotiated outcomes
IDDAS enforces a uniform structural rule: what is charged, when charging occurs, and what properties are included do not vary by industry, organization size, negotiating power, or relationship.
There are no special cases.
There are no discretionary exceptions.
There are no hidden terms.
Commercial pricing amounts, if any, are defined by the implementation or Brand, not by the protocol.
The protocol fixes the structure and invariants, not the numbers.
Small and large organizations operate under the same rule structure.
No participant is favored. No participant is penalized.
Credits and efficiency (implementation-defined)
Implementations may support credits or efficiency mechanisms that apply to future activations.
Such mechanisms, if offered:
Credits affect billing only.
They do not change what an activation is, when it occurs, or how outcomes are verified.
The protocol does not define credit amounts, pricing floors, or commercial incentives.
A meaningful action creates an activation.
This can be a scan, a tap, a link open, or any defined trigger.
An activation is anonymous by default. It does not require an account, identity, or prior relationship.
The activation is the root of continuity. Everything that happens later traces back to this moment.
Identity may be attached later, but identity does not create eligibility. Only the action does.
This design allows participation to begin immediately, without permission, friction, or explanation. It is optimized for moments of mass participation, not gated access.
Participants who care about persistence, control, or long-term involvement can and typically will attach identity later. The system supports that naturally.
Activations form lineages. A lineage is the ordered chain of actions that lead to an outcome.
Each activation links to a prior activation, creating a permanent history of contribution based on actual propagation, not claims.
Lineages do not collapse into a single winner. There is no global last person and no overwrite.
Multiple lineages can exist in parallel indefinitely. Each remains independently valid.
Eligibility for downstream value is determined by position within a lineage, not by identity, reputation, or timing tricks.
Eligibility itself does not expire. However, claiming or collecting value may be subject to clearly defined time windows , which are published in advance and apply equally to all participants.
These windows do not alter lineage or reassign value. They define how long a participant has to claim what they are already eligible for.
Continuity and origin anchoring derive from possession of the originating activation token, not from identity.
The first activation creates the root. That root cannot be overwritten by later actions or identities.
Identity may later anchor continuity, but it cannot rewrite origin or seize control.
If the originating token is lost, control may be lost. This is intentional. The system favors correctness and continuity over recovery by default.
In practice, participants for whom persistence matters - such as sales agents, operators, or long-term contributors - typically attach identity early. The anonymous-first model exists to remove friction for the many, not to penalize the few.
Actions must be safe to repeat without changing outcomes.
Reloading a page does not create a new activation. Refreshing does not duplicate events.
The system behaves as if the action happened once, even if it was triggered multiple times accidentally.
This prevents inflation, abuse, and accidental duplication.
All events are append-only. History can grow, but it cannot be rewritten.
CandleMe is a consumer-facing activation ritual built on IDDAS. It is intentionally calm, minimal, and universal.
CandleMe exists to demonstrate the system without explaining it. People do not need to understand IDDAS in order to use it. They simply act, and the system responds correctly.
CandleMe shows that activation can happen before identity, that value can propagate without coordination, and that meaning can exist without permanence.
It is not a demo and not a simplified version of the protocol. It is a real, functioning implementation that proves the rule holds in live environments with real people.
What CandleMe proves publicly:
CandleMe is one expression of IDDAS, not the limit of it.
As of January 3, 2026, the IDDAS verification service is deployed on Google Cloud Platform and running as a live, testable proof surface.
IDDAS is not UI-first. It is a protocol-level rule system. Proof requires that events can be recorded and verified in a way that is reproducible, auditable, and defensible.
iddas-verification repository is connected to GCP via Cloud Build and Cloud Runrule_version binding, deterministic commit logic, and replayability against a live serviceA protocol must be provable. A running verification service is the first concrete step that turns the Charter into an executable proof layer.
IDDAS is designed to be efficient, scalable, and usable in real-world environments. For that reason, most activity happens off-chain, while verification anchors live on-chain.
The blockchain is not the experience layer. It is the audit layer.
Off-chain components handle everything that must be fast, flexible, and human-facing. On-chain components handle only what must be immutable and independently verifiable.
How this is split in practice:
On-chain responsibilities:
Off-chain responsibilities:
This separation avoids unnecessary cost and complexity while preserving verifiability. Nothing important depends on trusting an operator. Everything important can be checked.
Immutability in IDDAS does not mean that software cannot evolve. It means that economic rules cannot change silently.
Once a rule is published and anchored, all outcomes can be verified against that rule. Any change requires publishing a new version, with a clear boundary between old and new behavior.
Immutability applies to the rule, not to the interface.
What this guarantees:
Verification does not require trusting IDDAS, CandleMe, or any operator. Anyone with access to the published rule and the anchored data can independently confirm that outcomes were calculated correctly.
This is how trust is replaced by verification.
An activation is not an impression. It is not a click. It is not a guess. An activation is a verified, intentional human entry into a defined environment. That difference matters.
What you get:
What you are not paying for:
If a person does not activate, nothing is charged. That is the rule.
If no activation occurs, no charge occurs.
To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.
This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.
Credits pre-fund standard activations.
When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.
Activation credits do not:
Credits exist solely to reduce initial adoption friction.
Message conveyed:
“The rule is finished. You can see it work.”
This structure:
IDDAS is a protocol that provides activation infrastructure for the physical world.
It provides identity-free, intentionally activated proof of physical presence, with verifiable records that can be independently audited.
IDDAS does not measure impressions, exposure, or background traffic.
It records only deliberate entry into a system.
If no one enters, nothing is recorded.
If nothing is recorded, nothing is charged.
What the infrastructure does
IDDAS infrastructure enables:
The system verifies that someone was present, not who they were.
What the infrastructure refuses
IDDAS explicitly does not:
Validity is structural, not interpretive.
How it works physically
IDDAS is deployed through physical activation surfaces, most commonly QR-based.
Each surface is:
When scanned:
This activation serves as proof of intentional physical presence.
Verification and blockchain anchoring
IDDAS uses blockchain as a verification and audit layer, not an experience layer.
Blockchain is used to make the system tamper-evident, not to introduce friction.
Activation-based charging (implementation-defined)
IDDAS charges only for verified activations.
If an activation occurs, it may be charged according to the implementation’s published pricing.
If no activation occurs, nothing is charged.
The protocol does not define prices, rates, floors, credits, or numeric amounts.
Those parameters, if any, are implementation- or Brand-defined and exist outside protocol logic.
Any credits or efficiency mechanisms, if offered, apply forward-only, do not alter attribution or lineage, and do not change what constitutes an activation.
Example applications (not exhaustive)
These are expressions of the same infrastructure, not separate products.
1. CandleMe
A ritual activation where each scan ignites a candle, creating a lineage of presence and participation.
2. Venues and events
Verify real attendance at concerts, conferences, stadiums, or festivals without identity-bound tickets.
3. Casinos and regulated spaces
Record physical presence and participation without storing personal data, while maintaining verifiable records.
4. Out-of-home advertising
Measure intentional engagement with physical media instead of impressions or inferred exposure.
5. Transit and public spaces
Verify usage or entry without surveillance, accounts, or tracking.
6. Retail and physical commerce
Trigger verified in-store activations distinct from online traffic or passive footfall.
A base layer, not a bundle
IDDAS is not optimized for a single industry.
It is a base layer that supports many expressions without changing its core rules.
The infrastructure stays fixed.
The interfaces, rituals, and use cases evolve.
Why infrastructure matters
Physical-world systems fail when they rely on:
IDDAS replaces these assumptions with a single invariant:
Only intentional participation creates value.
Same protocol. Same backend. Different surfaces.
IDDAS supports multiple activation templates out of the box. Each template uses the same activation, attribution, and billing layer, but presents analytics and controls appropriate to the deployment context.
These templates describe supported deployment modes. Interfaces adapt automatically based on context.
The following examples illustrate environments where participation, communication, and outcomes are constrained by identity-first design, onboarding friction, or opaque attribution. IDDAS does not replace these industries. It introduces a protocol layer that enables systems that were previously impractical or impossible to deploy. Each use case represents the same underlying capability expressed in different environments.
Stadiums, concerts, festivals, nightclubs, venues.
Live events concentrate attention, emotion, and participation into a narrow time window. Historically, most of that value has been lost because there was no practical way to activate everyone simultaneously without apps, accounts, or advance setup.
IDDAS enables immediate, audience-wide activation. Everyone can receive the same digital object at the same moment, without identity, onboarding, or instruction. Participation becomes collective rather than fragmented, and outcomes can persist beyond the event itself.
Capability kits allow events to attach functionality, access, or meaning to that moment. These capabilities can evolve over time, persist after the event, or remain intentionally ephemeral. They can be changed without reissuing assets or modifying the physical venue.
Kiosks, transit, retail foot traffic, public surfaces.
Out-of-home media is ubiquitous, but activation is limited to managed screens and fixed campaigns. Most physical surfaces remain passive because activation has required infrastructure, identity, or ongoing operational control.
IDDAS turns physical surfaces into activatable objects. A single marker can carry digital capabilities without screens, power, or accounts. Interaction happens immediately and requires no explanation.
Capability kits allow the behavior of a surface to change over time without changing the surface itself. The same object can serve different purposes across locations, audiences, or moments.
From digital links to real-world activation.
Affiliate and referral systems depend heavily on digital tracking and trust-based claims. They struggle to account for real-world influence, shared experiences, and offline participation.
IDDAS replaces claims with lineage. Contributions are recorded as chains of activation rather than inferred from clicks or last-touch attribution. Distribution follows published rules instead of discretionary adjustments.
Capability kits allow affiliate systems to extend into the physical world for the first time. Real-world interactions can participate in the same attribution structure as digital ones, without identity or fragile tracking.
Benefits, incentives, participation, emergency response.
Public programs often fail at the point of participation. Identity requirements, paperwork, and delays exclude people and slow response, especially in time-sensitive situations.
IDDAS allows participation to begin immediately without identity while preserving auditability and transparency. Identity can be attached later only if required. Outcomes remain verifiable regardless.
This model applies to public benefits, civic initiatives, census participation, and emergency response. In disaster scenarios, information and capabilities can spread hand-to-hand without infrastructure or accounts.
Onboarding, recruitment, coordination.
Large organizations often require identity before usefulness. This slows onboarding and limits participation, particularly in temporary, distributed, or high-churn environments.
IDDAS allows action to come first. People can participate, contribute, or coordinate before identity is established. Identity can be attached later without invalidating prior actions.
This applies to enterprise onboarding, temporary workforces, defense coordination, recruiting, internal referrals, and large-scale mobilization.
Participation without friction.
Civic and political participation often suffers from complexity, mistrust, and early drop-off. Many people disengage before participation even begins.
IDDAS enables immediate participation without identity while preserving verifiable outcomes. Capability kits define what participation means in each context without exposing individuals.
This applies to polling, grassroots mobilization, political rallies, volunteer coordination, and election-adjacent participation where transparency and accessibility are critical.
Moments, not networks.
Many meaningful moments do not require profiles, feeds, or amplification. They require presence, participation, and continuity.
IDDAS supports rituals such as weddings, graduations, religious gatherings, memorials, celebrations, and personal milestones. These moments can carry digital meaning without becoming social networks.
CandleMe is the first public example of this model. It demonstrates how a single object can carry shared meaning across people and time without identity, messaging, or algorithmic incentives.
Participation without coercion.
Surveys and research initiatives struggle with participation, bias, and trust.
IDDAS allows people to participate without identity while preserving integrity through structure rather than persuasion. This increases response rates, reduces friction, and maintains verifiable results.
These use cases are illustrative, not exhaustive. Many industries are constrained by identity-first design, opaque attribution, and discretionary economics.
IDDAS is a patent-pending protocol layer designed to remove those constraints. Others can build on it to unlock participation that is currently missed, delayed, or excluded.
A system pattern where activation, attribution, and economics are enforced together - as one architecture.
IDDAS is not a UI, an app, or a collection of features. It is a system pattern defined by the enforced interaction of three elements:
Individually, these concepts are not novel. Defensibility arises from how they are bound together, enforced, and made non-discretionary as a single architecture.
The IDDAS patent filings are intended to protect this pattern and its implementation cluster, including how activation, attribution, claiming, forfeiture, and verification interact to prevent silent rule changes, discretionary payouts, or post-hoc reinterpretation.
Rules in IDDAS are not guidelines. They are published, versioned, and executed through deterministic system logic. Once active, they operate the same way for all participants and cannot be selectively applied or quietly altered.
The system is intentionally designed so that:
This is not a feature set that can be partially adopted. The value of IDDAS depends on the integrity of the full pattern.
Copycats can copy the surface, but not credibility under scrutiny without making the same structural commitments.
Others can copy a candle, a QR code, or a visual ritual. What they cannot copy is credibility under scrutiny without making the same structural commitments.
To replicate IDDAS in substance, a system would need to:
In practice, this is where most platforms stop. Existing systems are architected around flexibility, opacity, and operator discretion because those traits are economically advantageous. Transparency, fixed rules, and verifiability are treated as risks rather than foundations.
IDDAS reverses that logic. Trust is not asserted, marketed, or requested. It is enforced structurally.
If a rule changes, the change is visible.
If attribution occurs, it is explainable.
If value moves, it is auditable.
This level of transparency is not cosmetic. It is the moat.
Value can accrue before identity, then be claimed later under fixed rules - with forfeiture handled transparently.
In IDDAS, value may accrue to an activation whether or not an identity is immediately attached. This allows participation to begin without friction while preserving future claimability.
Claiming requires anchoring an identity capable of receiving payment. Funds become claimable under a published rule and must be claimed within a defined claim period.
If funds are not claimed within that period, they are forfeited according to a predefined, transparent rule. Forfeiture affects claimability only. Lineage, attribution, and historical records remain intact and verifiable.
Forfeited funds do not revert to discretionary platform revenue. They are redirected according to fixed, auditable rules designed to reinforce the ecosystem, such as funding protocol maintenance or enabling others to build on the platform under the same constraints.
This structure eliminates hidden incentives and ensures:
Economic behavior is shaped by rules, not discretion.
Surface imitation fails - because identity-first, discretionary systems drift under real-world conditions.
Systems that attempt to imitate IDDAS at the surface level fail in predictable ways.
Most existing platforms are built upside down. They place identity, discretion, and operator control at the center, then attempt to layer attribution and trust afterward. IDDAS inverts this order by design.
As a result, copycat systems encounter the same structural breakdowns:
These are not implementation mistakes. They are structural consequences of avoiding the constraints that IDDAS accepts deliberately.
The core IDDAS pattern - activation before identity, lineage-based attribution, and fixed, verifiable economics - is also the subject of patent protection. Replicating the system in substance, not just appearance, would require implementing the same protected pattern and layered structure.
That combination makes true replication operationally difficult and, depending on the implementation, may raise IP questions. Surface imitation tends to reproduce the same failure modes. Structural replication requires accepting transparency, fixed rules, and loss of discretionary control - conditions most existing platforms are neither designed nor incentivized to adopt.
IDDAS is built to operate under those constraints from the beginning.
Terminology and Framing Charter
Jan 3, 2026
Terminology and Framing Charter
This page defines the canonical language used across the IDDAS platform. These definitions are not stylistic preferences. They are binding semantic rules that ensure the system remains understandable, auditable, and evolvable over time.
This charter applies to:
Ledger vs Verification Layer
These terms must never be used interchangeably.
Ledger
The ledger is the append-only, immutable record store.
Rules:
Rules:
Event vs Activation
This distinction is enforced across the system.
Event
An event is a raw occurrence captured at a moment in time.
Rules:
Rules:
Rule Version vs Protocol Version
This distinction protects system integrity.
Rule Version
Defines how meaning is computed.
Rules:
Rules:
Why This Matters
Clear terminology:
Prevents narrative drift
Enables independent audits
Allows evolution without rewriting history
Makes the system explainable to outsiders
Most systems fail due to language ambiguity. This charter prevents that.
This page is authoritative. If any explanation, diagram, or implementation conflicts with this charter, this charter prevails.
Verification Flow: From Event to Proof
This section explains why the system is correct, not just what it does. It provides a single, linear narrative that an external engineer or auditor can follow to independently validate system integrity.
This flow is intentionally simple and deterministic.
1. Event Capture
An event is created when an intentional action occurs on a surface.
Rules:
Each event includes:
A unique event identifier
A timestamp (UTC)
A surface identifier
Optional parent references for lineage
At this stage, the system only records that something happened.
2. Canonicalization
Before any hashing or storage, the event payload is canonicalized.
Rules:
3. Hashing
The canonicalized event payload is hashed.
Rules:
The resulting hash uniquely represents:
The event content
The rule logic applied
Its position in the lineage chain
This hash is the cryptographic fingerprint of the event.
4. Append-Only Storage
The hashed event is written to the ledger.
Rules:
5. Replay
Replay is the act of reprocessing raw ledger events.
Rules:
If the system is correct, replay produces:
Identical hashes
Identical lineage
Identical derived results
Replay proves that outcomes are not dependent on hidden state.
6. Verification
Verification compares replayed results against stored hashes.
Rules:
Verification confirms:
Events were not altered
Rules were not changed retroactively
Lineage is intact
Why This Flow Matters
This pipeline ensures that:
Action precedes identity
Meaning is derived, not asserted
History cannot be rewritten
Proof does not depend on trust
If any step fails, verification fails.
That is intentional.
This verification flow is the foundation of IDDAS. All higher-level constructs rely on it.
This document is the normative ruleset for the Instant Distributed Digital Activation System (IDDAS) Protocol - Core Rules.
It defines:
This document is authoritative. If any derivative explanation, implementation, interface, or summary is ambiguous, incomplete, or inconsistent, the rules in this document control.
Versioning posture
This document is not:
Products, interfaces, commercial terms, and implementations may vary, but they may not contradict, override, or weaken the rules defined in this document.
This protocol applies to any system, deployment, or outcome that claims IDDAS compatibility or references IDDAS-defined concepts, including but not limited to activations, lineage, allocation, settlement, or verification.
Specifically, this protocol applies to:
Use of IDDAS-defined mechanisms, terminology, rules, or verification implies acceptance of the full protocol and its constraints.
Partial, selective, modified, or “inspired-by” adherence does not qualify as IDDAS-compatible. Systems that deviate from protocol-defined rules may not represent themselves as compliant, interoperable, or compatible with IDDAS.
This document is the highest authority governing IDDAS rule behavior.
Precedence order:
All lower-precedence materials must conform to this document. If any lower-precedence material is ambiguous, incomplete, or conflicts with these rules, this document prevails.
All outcomes defined by this protocol are deterministic when derived from published rules applied to a cryptographically committed set of accepted activations.
The Verification Layer independently recomputes eligibility and allocation by applying the published, versioned rules to the committed activation set and the corresponding rule version in effect at the time of activation.
No discretionary overrides are permitted.
No subjective interpretation is applied after revenue exists.
If an outcome cannot be derived from committed inputs and published rules, it does not qualify as a valid protocol outcome.
This protocol defines rules, not software.
Protocol correctness, validity, and verification are independent of any specific implementation.
All protocol rule changes must be versioned.
Rules:
Protocol history is immutable. Past outcomes are never rewritten.
All protocol-defined events are recorded in an append-only manner.
This immutability ensures that lineage, verification, and outcomes remain auditable and reproducible over time, independent of implementation.
All derivative materials, including but not limited to websites, FAQs, white papers, documentation, and sales materials:
If a derivative document is ambiguous, incomplete, or requires clarification, the protocol must be consulted. Informal explanations or derivative materials do not amend, supplement, or replace this document.
This protocol intentionally does not define or govern the following:
These concerns are external to protocol correctness and are addressed at the implementation, operational, or commercial layer. Their existence or variation does not affect protocol validity, determinism, or verification.
Pricing is not defined by this protocol.
The IDDAS protocol does not set, mandate, negotiate, or enforce:
Pricing is defined exclusively by the Brand or implementation operating within the protocol (e.g., CandleMe), subject to the following protocol constraints:
Pricing influences capacity access only, as defined in Section 8, and has no effect on attribution, eligibility, or outcome computation.
Payment handling is external to protocol logic.
The protocol defines when outcomes are computed, not how or when payments are collected.
Accordingly:
Payment collection, invoicing, settlement timing, and commercial enforcement are implementation- or contract-defined and MUST NOT modify any protocol-defined behavior.
Payment is an operational concern, not a protocol prerequisite.
To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.
This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.
Credits pre-fund standard activations.
When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.
Activation credits do not:
Credits exist solely to reduce initial adoption friction.
Message conveyed:
This structure:
All conversion selections are subject to the protocol’s definition of real, net-settled revenue.
The protocol allocates value only when real revenue is created.
For revenue to qualify as real revenue under this protocol, it must be:
Speculative value, intent signals, or uncompleted actions do not qualify.
If no real revenue exists, no allocation occurs.
The protocol does not create, assign, or imply speculative value.
Actions, attention, participation, or effort alone do not generate allocatable value. Value exists only after a measurable conversion outcome occurs.
The protocol does not:
All allocation outcomes are deterministic.
Given:
The resulting distribution is uniquely determined.
No randomness, negotiation, discretion, or subjective interpretation is permitted in allocation computation.
No participant, operator, administrator, or third party may override protocol-defined outcomes.
Once inputs are recorded:
Discretion is excluded by design.
Protocol behavior is transparent by construction.
Transparency includes:
Participants do not rely on trust in the operator. They rely on the visibility and determinism of the system.
Revenue (R) is the amount of qualifying economic value generated by a conversion event, as defined by the protocol.
For revenue to qualify as R, it must be:
Revenue represents gross economic value created by a conversion. Revenue is not commission and is not allocated directly to participants.
Authorizations, impressions, intent signals, or reversible activity do not qualify as revenue.
If R = 0, no allocation occurs.
A commission pool is an implementation- or contract-defined portion of qualifying revenue made available for allocation to contributors.
The protocol does not define:
The protocol defines only:
If a commission pool is defined by a Brand or implementation, allocation within that pool MUST follow protocol rules for eligibility, lineage, determinism, and non-discretion.
If no commission pool is defined, the protocol still records lineage and verifies outcomes, but no participant allocation occurs.
A Brand is the entity responsible for a deployment within IDDAS.
A Brand may be a company, organization, individual, or other legal or natural person.
The Brand:
A Brand operates within the IDDAS protocol and does not control allocation, lineage, or settlement rules or mechanisms.
A candle is a specific activation object representing a human-facing ritual of engagement.
An open candle is a candle that is not bound to a persistent deployment or environment.
Open candles are ephemeral by default and may exist without long-term persistence, enterprise configuration, or integration.
Open candles may still generate valid activation events and lineage under the protocol.
An anchored candle is a candle that is bound to a persistent deployment or environment.
Anchored candles are defined at the Brand or deployment level and may support extended behavior such as persistence, enterprise configuration, analytics, or integration.
Anchoring is a protocol state and is independent of individual participant actions.
An activation event is a verified, intentional entry into the system initiated by a person.
An activation event occurs when a person deliberately:
An activation event creates a recorded lineage entry and establishes eligibility for allocation if a qualifying conversion occurs.
Passive exposure does not qualify.
Lineage is the ordered, append-only set of activation events that led to a conversion event.
Lineage:
Lineage determines eligibility for allocation if qualifying revenue is generated. It does not guarantee outcomes, compensation, or value.
Lineage exists independently of identity, accounts, or participant intent, and is enforced deterministically by the protocol.
The originator is the first activation event in a lineage.
The originator establishes the initial propagation context and is included in allocation if a qualifying conversion occurs.
An intermediate is any activation event in a lineage that is neither the originator nor the activation event immediately preceding a conversion event.
Intermediates may contribute to propagation and are eligible for allocation according to the published allocation rule if a qualifying conversion occurs.
The closer is the activation event immediately preceding a conversion event.
The closer does not receive preferential treatment unless explicitly defined by the published allocation rule.
A conversion event is a completed action that generates real revenue (R).
Examples include:
Conversion events trigger allocation when qualifying revenue exists.
Activation events alone do not.
An environment is the physical, digital, or operational context within which activations occur.
An environment may represent:
Environments bind activations to a specific deployment and may define configuration, behavior, pricing, persistence, or integration settings applicable to that context.
Environments provide attribution and operational context but do not alter lineage formation, allocation logic, or protocol-defined settlement rules.
A candle is an activation instrument within the IDDAS protocol that represents a bounded context for activation, propagation, and allocation.
A candle is not:
A candle represents a specific context under which activation events may occur and lineage may form.
That context may include, but is not limited to:
Each candle operates independently and participates in lineage formation and allocation strictly according to the rules of this protocol.
Candles are intentionally non-scarce.
The protocol does not impose a limit on the number of candles that may be created or anchored by any individual or entity.
This design choice is intentional and foundational:
Scarcity is enforced at the level of verified activation events and conversion events, not at the level of candle creation or anchoring.
Any individual or entity may anchor multiple candles simultaneously.
There is no restriction preventing:
This enables real-world representation patterns, including affiliates, agents, promoters, and delegated representatives.
Each candle maintains its own independent lineage and does not share attribution or eligibility with other candles unless explicitly connected through valid activation events.
Anchoring a candle establishes its origin point for lineage construction.
The anchor:
Anchoring a candle does not, by itself, create value, eligibility, or entitlement.
Value allocation occurs only after a qualifying conversion event, as defined elsewhere in this protocol.
Candles may propagate through eligible activation events.
Propagation:
Propagation order reflects contribution sequence, not time of claim, assertion, or identity.
Only eligible activation events may create lineage entries. Eligibility requirements are enforced deterministically by the implementation.
Each candle is independent.
Rules of independence include:
Actions taken on one candle have no effect on:
This isolation ensures deterministic attribution, prevents cross-contamination of allocation logic, and preserves protocol correctness under scale.
A lineage is the ordered, append-only sequence of eligible activation events associated with a specific candle.
For a given candle, the lineage is represented as:
L = {a1, a2, …, an}
Where:
Lineage order reflects propagation sequence, not time of claim, attribution assertion, identity, or payout request.
Lineage is strictly append-only.
Once an entry is added to a lineage:
There are no discretionary overrides, manual edits, or post-hoc adjustments to lineage state.
This property is essential to deterministic allocation, verification, and auditability.
Lineage entries are created only by eligible activation events.
An eligible activation event is an implementation-recognized action that:
Examples of eligible activation events may include, but are not limited to:
Eligibility criteria and verification methods are enforced deterministically by the implementation and may evolve through versioned protocol changes.
The protocol does not require public disclosure of implementation details for eligibility enforcement, provided enforcement remains deterministic and non-discretionary.
The following behaviors are explicitly prohibited and produce no lineage entries:
Any attempted activation that does not meet eligibility criteria is ignored for lineage purposes and has no effect on allocation.
A lineage is evaluated for allocation at the moment a conversion event occurs.
Only lineage entries present at the time of conversion are eligible for allocation from that conversion event.
Entries appended after a conversion event:
Each conversion event is evaluated independently and produces its own allocation outcome.
Lineage is scoped to a single candle and a single environment.
Rules:
This ensures isolation, prevents attribution leakage, and maintains deterministic allocation and verification outcomes.
The system may expose lineage position to participants.
Participants may be able to see:
However:
Visibility does not confer rights, priority, or entitlement.
Allocation occurs only after a verified conversion event produces real, net-settled revenue.
The protocol does not create speculative value. Allocation is strictly downstream of measurable outcomes.
IDDAS defines and enforces the core rules of the system. These rules are fixed, versioned, and applied uniformly across deployments.
IDDAS does not negotiate outcomes, adjust distributions, or intervene on a case-by-case basis. Once protocol-defined inputs are recorded, outcomes follow the rules exactly.
A Brand is the organization, entity, or individual running a deployment on IDDAS.
Brand discretion exists only before revenue is created and only within protocol-defined constraints.
Brands cannot:
This protocol defines eligibility, lineage, and deterministic outcome computation. It does not define pricing, revenue sharing, fees, commission structures, payout thresholds, or settlement mechanisms. Such terms, if any, are implementation- or contract-defined and do not alter protocol validity.
CandleMe is one implementation built on top of IDDAS.
CandleMe may define its own business terms, select qualifying conversion events, and provide its own bank account like any other Brand.
CandleMe has no special privileges within the protocol and is subject to the same rules, constraints, and enforcement as all deployments.
Allocation outcomes are deterministic when defined by published rules applied to the recorded lineage and qualifying events.
For any conversion event:
For each conversion event:
Payout ledger entries are provisional until the associated revenue is confirmed as net-settled.
If revenue fails to settle, is reversed, or is invalidated prior to settlement finality:
Settlement status affects payout finality only. It does not modify lineage, eligibility, or recorded activation events.
The timing of payout recording or disbursement does not affect:
Allocation is computed at the moment a qualifying conversion occurs. Payout execution may occur later without altering any protocol-defined outcome.
No participant, operator, or implementation may:
All payout handling must reflect the deterministic allocation results produced by the protocol.
The protocol supports self-serve operation by default, and introduces objective, capacity-based gating only when enterprise-scale throughput is requested.
The protocol supports self-serve operation by default.
Self-serve operation includes:
Self-serve operation does not require:
Self-serve operation remains available until enterprise-scale capacity is requested.
Scale is determined by requested capacity, not by participant identity.
The protocol does not classify participants as enterprise or non-enterprise.
Scale gating is triggered only when a participant requests capacity, throughput, or features that exceed self-serve limits.
Scale is governed structurally, not reactively. Certain capabilities require predefined capacity and are only available when sufficient activation credits or prepaid balances exist.
These capabilities may include:
No monitoring, classification, detection, or discretionary escalation occurs. Availability is determined solely by declared capacity and deterministic rules. When prepaid credits are exhausted, enterprise-scale capabilities may be gated, while standard usage may continue under metered billing as defined in Sections 7.6 and 8.6.
Certain environment types inherently require enterprise-scale capacity.
Examples include:
When such an environment type is requested, enterprise-scale capacity requirements apply before activation may proceed.
No manual classification or subjective approval is performed.
Enterprise-scale capacity may require a minimum upfront commitment.
The protocol does not define the amount of any minimum commitment.
Where a minimum exists, it:
Prepaid credits are consumed by:
Credits are consumed automatically as usage occurs.
When prepaid credits are exhausted, usage continues under metered billing and additional charges are applied automatically.
Minimum commitments are not refundable.
Credits represent prepaid capacity, not a membership fee, license, or deposit.
This rule eliminates discretionary refund handling and ensures continuity of operation.
Scale requirements are disclosed progressively.
Participants encounter scale gating only when:
The protocol imposes no upfront friction on experimentation, evaluation, or early adoption.
Pricing, where applied by an implementation, is defined to support capacity provisioning without influencing economic outcomes.
The pricing model is designed to:
Pricing does not alter lineage, allocation rules, or payout mechanics.
Candles may be priced as individual activation instruments.
Each anchored candle may incur a fixed creation cost.
Pricing may be applied at the time of candle creation.
Candles may be configured with predefined expiry parameters selected at creation time. Expiry parameters are fixed, declared in advance, and applied deterministically. Once a candle is created, its expiry cannot be modified, extended, or overridden. Expiry exists solely to bound activation eligibility and does not alter attribution, allocation, or pricing rules.
Pay-per-candle pricing may support:
For higher-volume usage, implementations may support open-ended metered accounts.
Metered accounts:
Metered billing applies only after usage occurs.
There are no subscription tiers tied to identity, role, or participant classification.
Enterprise-scale capacity may require prepaid credits to ensure availability, throughput, and operational stability.
Prepaid credits:
This protocol does not define a numeric minimum commitment amount; where enterprise-scale capacity requires a minimum, it is satisfied through prepaid credits under uniform, non-negotiated rules.
Prepaid credits represent capacity within the system.
Credits may be consumed by:
Credits are deducted automatically as usage occurs.
Unused credits remain available until consumed.
When prepaid credits are exhausted:
Service may not be suspended solely due to credit exhaustion, except where required for risk control, system integrity, or compliance.
Pricing decisions do not affect lineage formation, allocation outcomes, payout eligibility, or deterministic results.
All participants are treated identically under protocol-defined rules regardless of pricing model, commitment size, deployment scale, or commercial arrangement.
Pricing influences capacity access only and has no effect on attribution, eligibility, or outcome computation.
Only eligible activation events may create lineage entries or participate in allocation.
Eligibility exists to:
Eligibility rules apply uniformly across all environments, candles, and participants.
An eligible activation event is an action that:
Activation events that do not meet eligibility criteria are ignored for lineage and allocation purposes.
Verification is required for all activation events that contribute to lineage.
Verification may include, but is not limited to:
Verification is enforced programmatically.
No activation event is eligible without verification.
The protocol enforces participation constraints to prevent abuse.
Such constraints may include:
The protocol does not require persistent identity disclosure to participants in order to enforce these constraints.
Anti-abuse enforcement is integral to eligibility determination.
The protocol may:
Anti-abuse enforcement operates deterministically and does not alter valid lineage entries or allocation outcomes.
Internal safeguard, abuse-prevention, and validity-gating mechanisms may influence which interactions qualify as accepted activations and are included in the committed activation set.
The specific implementation details of these safeguards are intentionally not publicly disclosed in order to preserve their effectiveness and prevent circumvention.
This non-disclosure does not violate determinism because verification operates on the accepted activation set and the published protocol rules, not on raw traffic or rejected interactions.
Safeguards are structural and rule-bounded. While certain detection or evaluation heuristics may remain private, their function is limited to admission into the committed set and does not alter published rules, outcomes, or allocation once an activation is accepted.
Only activation events that pass eligibility and verification:
Ineligible or unverified events receive no allocation and no payout.
If a candle has only one eligible participant at the time of a conversion event, allocation is resolved deterministically according to the applicable published rules for that deployment or implementation.
If a lineage contains an originator and a closer with no intermediates, allocation is resolved deterministically according to the applicable published rules. No discretionary reassignment occurs.
If a lineage contains multiple intermediates, allocation outcomes are determined by the applicable published rules. Increasing lineage length does not, by itself, create additional allocatable value.
Any activation attempts occurring after a conversion event:
Post-conversion appending produces no retroactive entitlement.
If multiple parties assert responsibility for a conversion:
The protocol does not adjudicate subjective disputes.
If multiple conversion events occur from the same candle:
Accrued balances may combine across events for payout threshold purposes.
If a conversion event fails to settle:
If a transaction reverses after provisional recording but before payout:
If an activation event is determined to be ineligible prior to settlement:
If settlement has already occurred, reversal handling follows Section 6.
In the event of system faults or interruptions:
There are no discretionary reallocations due to system interruption.
An environment is a bounded operational context within which candles operate, lineage is constructed, and conversion events occur.
An environment may represent, for example:
Every candle operates within exactly one environment at any given time.
Environments are isolated from one another.
Isolation rules include:
Actions in one environment have no effect on:
This isolation ensures clarity, auditability, and deterministic outcomes.
A candle is associated with an environment at the time it is anchored.
Rules:
Environment association defines context only and does not imply ownership, entitlement, or preferential treatment.
An environment progresses through defined lifecycle states.
Lifecycle states may include:
Lifecycle transitions are system-controlled and do not modify lineage, allocation, or payout rules.
Environments may be subject to capacity constraints based on:
Capacity constraints are enforced automatically according to the Scale and Capacity Model defined in Section 7.
Requests exceeding environment capacity may require prepaid credits to provision the required throughput or operational load. This requirement is rule-based and does not alter pricing, attribution, allocation, or verification.
Certain operations occur at the environment level.
Environment-level operations may apply to candles and other activation instruments deployed within an environment.
These may include:
Access to environment-level operations may be gated by scale and capacity requirements.
The protocol enforces integrity within each environment.
Integrity enforcement may include:
Integrity enforcement operates deterministically and does not alter valid lineage entries, allocation outcomes, or payouts.
Section Status
Section 11 defines how environments function as isolated operational contexts within the protocol.
Environment rules preserve determinism, auditability, and correctness at scale.
All protocol outcomes are governed by deterministic rules.
For any conversion event:
are derived mechanically from published rules and recorded events.
There are no discretionary adjustments, overrides, negotiations, or case-by-case decisions.
Allocation logic is rule-defined and invariant within a given protocol version.
Participants may inspect:
Given identical inputs, the protocol always produces identical outputs.
The protocol maintains authoritative records of:
Records are retained to support auditability, internal verification, and authorized third-party review.
Sensitive operational or business data is not required to be publicly disclosed.
Cryptographic commitments (including hashes, Merkle roots, or version identifiers) may be anchored to a public blockchain to enable independent verification of correctness without exposing raw transactional data.
Implementations may provide participants visibility into:
Visibility does not confer control, discretion, or influence over outcomes.
The protocol minimizes disputes by:
Subjective claims, interpretations, or assertions do not affect protocol outcomes.
Transparency concerns which rules apply and how outcomes are computed.
Enforcement concerns how eligibility, verification, and abuse prevention are implemented.
The protocol discloses rule logic and outcome computation while not requiring disclosure of internal enforcement mechanisms that protect system integrity.
The protocol is designed to operate in mobile-first contexts.
Primary interactions are expected to occur on mobile devices, including:
Mobile interfaces prioritize speed, clarity, and minimal friction.
Desktop interfaces may complement mobile usage but are not required for protocol participation.
Desktop interfaces are intended primarily for administrative and oversight functions, including:
Desktop access does not alter protocol rules and does not confer allocation, eligibility, or payout privileges.
Eligibility, verification, scale gating, allocation, and payout enforcement are designed to operate without routine human intervention.
Manual review may occur only in exceptional circumstances, including:
Manual review does not modify valid lineage entries, allocation outcomes, or payout determinations.
The following invariants must hold across all implementations:
Implementations may evolve, but these invariants must remain intact.
Protocol versions may evolve over time.
Changes to the protocol:
Backward compatibility is preserved for existing candles and lineages unless explicitly deprecated by a future protocol version.
The protocol defines rules and guarantees.
Products and interfaces:
Product changes do not modify protocol-defined behavior.
Public communication materials are derivative explanations of the protocol.
They exist to:
Public materials do not define rules and do not override protocol behavior.
The protocol defined in Sections 1 through 13 is authoritative.
The public website may present simplified descriptions of the protocol.
Website summaries may include:
Website content must:
Acceptable phrasing includes:
The website must not publish:
FAQ content may expand on website summaries but remains non-normative.
FAQs may explain:
FAQs must:
FAQs must not:
Product interfaces may display prompts and notices derived from protocol rules.
Examples include:
UI prompts:
All UI messaging must remain consistent with protocol definitions.
Sales materials, partnerships, and external discussions may reference protocol behavior at a conceptual level.
Sales materials may:
Sales materials must not:
Any commitment beyond protocol-defined behavior requires a formal protocol amendment.
In the event of conflicting explanations, the following precedence applies:
No derivative material may supersede or reinterpret the protocol.
Amendments to this protocol may be proposed only by the protocol steward.
No participant, partner, Brand, or deployment has the authority to alter protocol rules unilaterally.
All protocol changes must be versioned.
Each protocol version:
Historical versions remain authoritative for outcomes settled under those versions.
Protocol amendments do not retroactively alter:
Once revenue has settled and allocation has been recorded, outcomes are final under the protocol version in effect at the time of conversion.
Future protocol versions may introduce:
Such changes must:
The following invariants must be preserved across all protocol versions:
Features, environments, or behaviors may be deprecated in future versions.
Deprecation:
Deprecated features may continue to operate for a defined transition period.
In rare circumstances involving:
Temporary emergency changes may be applied.
Such changes:
Emergency changes do not establish precedent and do not modify core protocol invariants.
Section Status
Section 15 defines how the protocol evolves while preserving determinism, fairness, and auditability.
Protocol authority is explicit, changes are controlled, and history is never rewritten.
Final Constitutional Summary
CANDLE SEALING SPEC v1.0
IDDAS Protocol - Canonical Commitment Event
The Candle Seal is the irreversible commitment action that converts a candle-based opportunity into a secured, verifiable deal object within IDDAS. This sealing specification applies only to enterprise-enabled implementations, and IDDAS compatibility does not require exposing Candle Sealing. This spec defines:
This spec is protocol law. UI, animation, and implementation must conform to it.
The only valid sealing action is:
In an enterprise-enabled context, the user performs a continuous 10-second hold on an unsealed candle with the flame off. Any interruption cancels the attempt silently, and completion seals immediately with no confirmation dialog.
There are:
This action is canonical across enterprise-enabled implementations, devices, and environments.
A candle may be sealed only if all of the following are true:
Notes:
Duration
Feedback during hold
If the user releases early:
When the 10-second hold completes:
There is no confirmation dialog. Completion of the hold is the commitment.
Once sealed:
This irreversibility is intentional and required. Sealing is equivalent to signing a contract, sealing a letter, or committing a transaction.
The candle remains:
Sealing is a moment, not a mode switch. After sealing:
Upon successful sealing, the system MUST generate a single immutable Seal Event containing:
This event is immutable, verifiable, and is the authoritative record of commitment.
Any post-seal steps occur outside the candle and outside this specification. This spec governs only the sealing action, its prerequisites, its irreversibility, and the resulting Seal Event.
The Candle Seal is not:
There is one candle. There is one seal.
This spec governs UI design, animation, engineering implementation, documentation, and website language. If an implementation conflicts with this spec, the spec wins.
Status
CANDLE SEALING SPEC v1.0 - LOCKED
The IDDAS Protocol distinguishes between event truth and derivative services.
Activation events are free to exist. Event truth, sequence validity, and lineage integrity are never gated by payment, balance, or account state.
The protocol reserves the right to introduce economic systems that operate strictly downstream of raw event generation. Such systems may include:
No economic mechanism may:
Event truth is neutral and permanent. Derivative certainty, services, and guarantees may be priced.
This separation is a permanent invariant of the protocol.
The IDDAS Protocol is action-first and identity-optional.
All activation events - including ignite, seal, save, share, and lineage extension - must be recordable, verifiable, and replayable without requiring identity, payment, balance, or account state.
Event truth, sequence validity, and lineage integrity shall never be defined, altered, suppressed, or invalidated by any economic mechanism.
The protocol explicitly reserves the right to introduce secondary economic systems that operate downstream of raw event generation. These may include:
Such secondary systems must not precondition, gate, or modify the creation of activation events.
No fee, payment, credit, or economic requirement may be imposed as a prerequisite for an activation event to exist, be recorded, or be considered valid.
Economic mechanisms may only apply to derivative services, post-event processing, or optional capabilities that do not affect event truth.
This separation is a permanent invariant of the protocol.
The IDDAS Protocol is governed by fixed, published rules that define event truth, sequence validity, lineage, and verification.
Governance mechanisms may evolve over time, including councils, stewards, validators, auditors, or institutional oversight structures.
No governance mechanism may:
Governance exists to steward operation, compliance, and evolution - not to redefine truth.
The protocol may be instantiated within different legal, regulatory, or sovereign contexts, including national or jurisdictional deployments, provided core protocol invariants remain unchanged.
Localized policy overlays may exist, but they must not modify:
No single governance body, jurisdiction, or authority defines protocol truth.
Protocol integrity is independent of governance structure.
IDDAS is an activation-before-identity protocol. It records real engagement, creates lineage from participation, and allocates outcomes using deterministic rules instead of negotiated attribution.
An activation is a verified, intentional entry into the system initiated by a person.
This typically occurs when someone deliberately scans a code or opens an activation link and enters the activation flow. Passive exposure does not count.
No.
An activation is an entry event. A purchase or conversion is a separate outcome that may or may not occur later.
Activations create eligibility and lineage. Conversions create revenue.
Charges occur only when a verified activation happens.
If no one activates, no charge occurs.
Charges are not based on impressions, views, or passive exposure.
Then no revenue is created and no allocation occurs.
The system does not create speculative value or implied entitlement.
Because impressions are passive and probabilistic.
IDDAS charges only for intentional engagement that creates a verifiable activation event. This removes guesswork, disputes, and retroactive attribution.
No.
Saving, sharing, or completing additional actions deepens lineage, but an activation exists as soon as intentional entry occurs.
The protocol fixes the charging structure, not the numeric price.
IDDAS defines what is charged (verified activations), when charging occurs (only when activation happens), and what properties are included (verification, lineage, auditability).
Numeric pricing amounts are defined by the implementation or Brand and may vary by deployment. The protocol does not define prices, rates, or dollar values.
What remains fixed is that pricing is applied uniformly within a deployment, without discretionary exceptions, retroactive changes, or negotiated outcomes after activation occurs.
Rules can change only through explicit versioning.
Changes apply prospectively. Past outcomes remain verifiable against the rules in effect at the time they occurred.
There are no silent changes and no retroactive adjustments.
Allocation follows a published, deterministic rule.
No participant, operator, or administrator can manually override outcomes after the fact.
Activations require intentional human entry and the creation of valid session state.
Automated traffic may load URLs, but it cannot easily generate valid activation contexts or undetectable lineage at scale. Invalid activity does not qualify as an activation by definition.
No.
You are charged only for people who activate. Attendance alone does not create a charge.
Yes.
Deployment scope, event boundaries, and minimums can be defined. Pricing per activation remains fixed.
Sharing creates new activations linked by lineage.
Attribution follows recorded lineage rather than last-touch claims.
No.
Loyalty programs can be built on top of IDDAS, but activation does not require enrollment, accounts, or identity.
No.
CandleMe is one implementation built on top of the protocol. The protocol itself is independent of any specific product or interface.
Protocols create durability.
By fixing the rules first and making outcomes verifiable, IDDAS allows others to build without fear that success will later change the outcome. Trust comes from rules, not discretion.
It replaces:
No.
Participants in IDDAS, including Infrastructure Originators, deployers, brands, and end users, do not act as agents, contractors, brokers, representatives, or affiliates of IDDAS or of each other.
Participation creates no authority, obligation, or representation relationship of any kind.
All actions are performed independently under the same published protocol rules.
IDDAS does not sell access, exposure, outcomes, leads, or personal data.
Charges apply only to verified activation events as defined by the protocol.
An activation is a recorded, intentional entry event. It does not guarantee engagement, conversion, revenue, or results.
Payment is for the occurrence of the event itself, not for performance.
No.
Participation in IDDAS creates no obligation to perform, promote, convert, or deliver outcomes.
The protocol does not guarantee results, revenue, engagement, or success for any participant.
Outcomes follow rules. Effort, intent, or expectation does not create entitlement.
An Infrastructure Originator is a protocol-level lineage root that authorizes and anchors one or more activation surfaces that later produce verified activations.
Infrastructure Originator status is not granted, approved, or claimed. It emerges only if downstream, protocol-valid activations occur.
An activation surface is any protocol-issued entry mechanism that enables intentional activation.
Surfaces may be physical, digital, or hybrid. Function matters, not form.
If intentional entry occurs and produces a valid activation, the surface qualifies.
No.
Infrastructure Originators may authorize or enable deployment without physically creating, installing, or operating the activation surfaces themselves.
The protocol records origination structurally, not operational effort.
No.
Infrastructure Origination is not a sales role, affiliate program, referral scheme, or commission for introductions.
Infrastructure Originators are compensated only when protocol-valid activations occur through originated surfaces.
Infrastructure Originators participate only in activation-based economics.
When verified activations occur through originated activation surfaces, a fixed portion of the activation fee is attributed to the Infrastructure Originator according to the implementation’s published rules.
Infrastructure Originator compensation:
• is computed automatically
• is proportional to activation volume
• is independent of downstream revenue, deals, or conversions
• does not depend on negotiation, discretion, or approval
If no qualifying activations occur, no compensation occurs.
The Infrastructure Originator share is derived from activation fees.
It is not taken from participant allocations, downstream revenue distribution, or lineage-based outcomes.
Infrastructure Originator compensation exists entirely at the activation layer and does not alter attribution, lineage, or allocation of revenue created later through conversions.
This separation ensures that infrastructure enablement is rewarded without interfering with outcome-based distribution.
An Infrastructure Originator is not an employee, contractor, sales agent, or reseller.
It is a protocol-defined attribution role that emerges only when originated activation surfaces produce verified activations.
Infrastructure Originator attribution does not imply approval, endorsement, exclusivity, or responsibility.
Payment occurs only if qualifying revenue exists and only according to the published rule.
No.
Infrastructure Originator attribution is written at activation creation time and cannot be edited, reassigned, or removed retroactively.
Off-protocol agreements do not alter protocol outcomes.
Protocol attribution is structural and deterministic.
Attempts to replicate, suppress, or bypass Infrastructure Originator allocation while using protocol-generated activations do not affect on-protocol results and may violate access terms.
No.
Infrastructure Origination does not require identity, registration, or approval.
Identity may be required later only to claim funds, according to protocol rules.
No.
Infrastructure Origination creates eligibility for activation-based compensation only if verified activations occur.
There are no guarantees, minimums, or promises. If activation volume is zero, compensation is zero. If activation volume increases, compensation increases proportionally.
Participation creates no entitlement beyond what the recorded activations produce.
Activations associated with prohibited or illegal activity do not produce qualifying revenue.
No allocation or payout occurs for non-qualifying revenue, regardless of attribution.
Use of IDDAS remains subject to the platform’s Terms and Conditions and applicable law.
Protocol attribution does not override enforcement, compliance, or legal requirements.
Because infrastructure contribution is structural, not discretionary.
Encoding origination as a rule prevents disputes, renegotiation, and retroactive exclusion as systems scale.
Because these are structural questions, not marketing claims.
The FAQ exists to eliminate ambiguity before it becomes conflict.
These are intentionally direct - and intentionally separated - so the standard FAQ stays clean.
No.
QR codes, links, and attribution already exist. IDDAS is not about inventing those primitives. What is new is the order of operations and the governance model.
IDDAS enforces that activation happens before identity, attribution follows lineage instead of accounts, and outcome computation rules follow a published rule that cannot be silently changed. Most systems do the opposite - they start with identity, infer attribution later, and negotiate economics case by case.
That combination is the difference.
There are competitors to parts of IDDAS.
There are attribution tools, referral platforms, ad-tech systems, IoT platforms, and blockchain protocols. None of them combine identity-free activation, object-based capabilities, lineage-based attribution, fixed economics, and independent verification in a single system.
So we don’t claim there are no competitors. We claim there are no direct protocol peers.
IDDAS does not rely on identity to prevent fraud.
It relies on verifiable actions, environment constraints, and lineage. Activations are bound to specific objects or environments with defined capabilities. Patterns, limits, and verification anchors detect abuse without forcing identity at the start.
Identity can be introduced later if required, but it is not foundational. This is why IDDAS works in crowds, public spaces, and shared environments.
IDDAS fixes the rule structure, not numeric economics.
The protocol locks the order of operations, attribution logic, and non-discretionary computation of outcomes. Pricing amounts, fees, and commercial terms are defined outside the protocol by implementations or Brands.
This separation allows markets, pricing, and business models to evolve freely without undermining trust in how outcomes are computed once qualifying events occur.
Blockchain is not used for user interaction, payments, or identity.
It is used only as a neutral verification layer to anchor rule versions and payout proofs so outcomes cannot be rewritten after the fact. No wallets are required. No tokens are required. No participant needs crypto knowledge.
If a better neutral verification layer existed, IDDAS could use that instead. The goal is verifiability, not crypto.
SaaS can change rules quietly. Protocols cannot.
IDDAS publishes the order of operations, attribution logic, and economic rules in advance. Even the operator is bound by them. That constraint is what makes it a protocol rather than a configurable product.
Interfaces can be copied. Features can be copied.
What cannot be easily copied is credibility earned through consistency. Protocols win by being first, clear, and stable. Once participants rely on a rule, switching costs are not technical - they are trust-based.
IDDAS also has patent protection, but more importantly, it has protocol legitimacy.
Because it requires giving up short-term control.
Most companies want pricing flexibility, bespoke deals, and the ability to change rules quietly. Protocols require deciding hard constraints early - what never changes, what cannot be customized, and what even the operator is not allowed to do.
Most teams avoid that. IDDAS didn’t.
No.
CandleMe is a carrier, not a fork. It proves that IDDAS works at the object level, not just in apps or accounts. Stadiums, out-of-home advertising, events, transit, and physical products all use the same activation logic.
CandleMe demonstrates generality, not limitation.
A real competitor would need to start with activation before identity, bind capabilities to objects or environments, use lineage-based attribution, enforce fixed and published economic rules, provide independent verification, and work across industries without rewriting core logic.
No existing system does all of this today.
IDDAS is not special because it is clever. It is special because it is constrained.
The system deliberately limits what the operator can do so others can rely on outcomes. That is why it behaves like a protocol, not a product.
IDDAS is operated by an entity, but governed by published rules.
Operational control (infrastructure, uptime, integrations) remains with the operator. Outcome control (attribution, economics, verification) is constrained by the protocol. The operator cannot silently rewrite attribution logic, retroactively alter payouts, or change economic splits without publishing a new rule version.
This separation is deliberate. It limits operator power so participants can rely on outcomes.
The protocol rules and verification anchors remain valid regardless of company changes.
Because rule versions and payout proofs are independently verifiable, historical outcomes do not depend on ongoing trust in the operator. A new operator must honor existing rules going forward or publish a new version that applies only to future activations.
This is one of the reasons IDDAS behaves like a protocol rather than a traditional SaaS vendor.
Yes, by design.
IDDAS does not optimize for bespoke enterprise deals. It optimizes for predictable, repeatable outcomes. Enterprises still configure deployments, environments, and campaigns, but the core rules are not negotiated per client.
This is the same tradeoff every successful protocol makes: less short-term flexibility in exchange for long-term reliability.
Identity is not a scaling primitive. Verification is.
IDDAS scales by anchoring actions to environments, objects, and capabilities rather than user accounts. Rate limits, context constraints, environment capacity, and lineage validation scale far better in crowds than identity-based systems.
Identity can be layered in selectively where required, but it is never the bottleneck.
IDDAS is compatible with identity requirements without being dependent on them.
Identity, consent, and compliance layers can be introduced at the edge when required by law or policy. The protocol itself does not prevent identity usage - it simply does not require it to begin.
This allows IDDAS to operate across jurisdictions with different regulatory expectations.
At first, yes. Over time, it becomes simpler than account-based attribution.
Lineage answers a clearer question: how did this happen? Customers do not need to understand every internal detail. They only need to know that attribution follows a verifiable chain of actions rather than opaque platform decisions.
Most users never see lineage directly. They benefit from its fairness indirectly.
Protocols do not prevent innovation. They constrain where it happens.
IDDAS allows innovation at the object level, environment level, campaign level, and content level. What does not change is how value is attributed and distributed once outcomes occur.
This creates a stable foundation on top of which innovation can safely happen.
IDDAS governs how outcomes are computed once qualifying events occur. It does not govern pricing amounts, commercial terms, or business strategy.
If a use case requires discretionary attribution, retroactive changes, or negotiated outcome overrides, IDDAS is likely not the appropriate system.
IDDAS is designed for environments where predictability, neutrality, and verification matter more than bespoke outcome negotiation.
Often, yes.
Protocols typically grow more slowly at first because they refuse shortcuts. Over time, they tend to become deeply embedded because switching away means losing predictability and trust, not just features.
IDDAS is built for durability, not velocity at all costs.
The biggest risk is breaking its own rules.
If IDDAS were ever to undermine its published constraints, it would stop being a protocol and become just another platform. That risk is taken seriously, which is why verification and rule versioning are core, not optional.
Trust is not claimed. It is enforced.
IDDAS is intentionally opinionated. It does not try to serve every business model. It exists to make real-world activation, attribution, and value distribution reliable in environments where identity-first systems fail.
That tradeoff is the point.
IDDAS is rigid where trust matters and flexible where innovation matters.
The protocol fixes the order of operations, attribution logic, and economic rules. Everything else - environments, objects, campaigns, interfaces, integrations, and content - can evolve freely.
This separation allows IDDAS to adapt to new markets without undermining past outcomes.
The protocol itself.
Because rules are published in advance and outcomes are verifiable, IDDAS cannot quietly privilege one participant over another. The operator provides infrastructure, not discretionary authority over attribution or payouts.
Gatekeeping requires opacity. IDDAS is designed to remove it.
Then the answer is no.
IDDAS cannot change rules retroactively or privately. Any change must be published as a new rule version and applies only to future activations. If a customer requires bespoke economics or exceptions, IDDAS is likely not the correct system for that use case.
This constraint protects everyone else.
Only operationally, not economically.
Infrastructure decisions can change. The protocol rules that govern attribution and distribution are constrained by publication, versioning, and verification. Any attempt to undermine those constraints would be visible and would invalidate trust.
Protocols survive leadership changes because their legitimacy is rule-based, not personality-based.
It would be, if identity were the only safety tool.
IDDAS uses environment constraints, capability limits, rate controls, and lineage validation to maintain safety. Identity is available when required, but it is not the default control mechanism.
This mirrors how physical systems work: tickets, doors, meters, and tools do not ask who you are first. They enforce rules through design.
Not all activations are billable.
IDDAS distinguishes between raw triggers, qualified activations, and billable outcomes. Qualification thresholds, environment constraints, and pattern analysis prevent noise from becoming value.
Billing is tied to verified, intent-qualified activations, not volume alone.
Less, not more.
Traditional platforms require trust that rules won’t change quietly. IDDAS reduces that trust requirement by making rules explicit and outcomes verifiable. Participants do not need to trust intentions. They can verify behavior.
That shift is fundamental.
Sometimes, yes.
Not every use case needs a protocol. IDDAS is designed for environments where scale, neutrality, and attribution fairness matter. For simple, closed systems, lighter tools may be sufficient.
IDDAS does not try to replace everything. It exists for cases where failure modes are expensive.
That trust should be enforced by structure, not promised by brand.
IDDAS assumes that real-world activation systems will increasingly operate in shared spaces, crowds, and environments where identity-first models break down. In those contexts, rules must be clear, fixed, and verifiable.
That belief shapes every design decision.
If IDDAS ever allowed silent rule changes, retroactive outcome manipulation, or discretionary attribution, it would stop being a protocol.
That is the line that is not crossed. Everything else is negotiable.
IDDAS is not trying to be everything to everyone. It is intentionally opinionated. Its strength comes from choosing constraints early and living with them.
That is why it behaves like a protocol instead of a platform.