This site reflects an in-progress protocol implementation and is published as a developer reference snapshot.
Verification services are live. On-chain anchoring is currently being finalized as part of an active milestone.
When this notice is removed, all protocol enforcement layers are fully implemented.
No account required to begin. Identity is optional. Attribution follows lineage. Rule versions and payout proofs are anchored on a public blockchain - no silent changes. A fixed economic rule governs distribution when real revenue occurs.
In IDDAS, attribution does not depend on who the user is. It depends on the lineage of actions. Lineage is the verifiable chain of how this happened - which object was activated, which environment it belonged to, and which upstream placements or invitations led to the outcome.
This matters because crowds and public environments cannot rely on accounts. People come and go. Lineage lets value be attributed and shared without forcing identity at the start.
When revenue occurs, payouts follow the published economic rule and the recorded lineage. The verification layer anchors rule versions and payout proofs on-chain so outcomes can be audited independently.
Most systems start by asking who you are. Then they ask you to trust the system, create an account, accept permissions, and follow a flow.IDDAS flips that order.
IDDAS starts with action in the real world - a scan, a tap, a placement, a verified event. Identity is optional. The system does not need to know who you are to begin.
Instead of trusting first and proving later, IDDAS proves outcomes through verifiable actions and lineage-based attribution. When real revenue occurs, distribution follows a fixed rule that is published in advance - not negotiated per client and not changed quietly.
This is why IDDAS works in crowds, public spaces, and shared environments where accounts and coordination add friction.
Most digital systems work the same way.
You identify yourself. You log in. You are granted access to features tied to you.
IDDAS works differently.
With IDDAS, capabilities are embedded into the object itself. Identity is optional. Sometimes it is not needed at all.
This may feel unfamiliar at first. That’s normal. Because it is not how most digital experiences are designed.
If you only read one section on this site, read this one.
Think of a physical object you already understand.
The object itself determines what can happen.
IDDAS applies this same idea to digital interactions. Instead of asking who you are first, IDDAS asks: What is this object allowed to do, right here, right now?
Those allowed actions are called capabilities.
This works well for personal software. It works poorly for shared spaces, crowds, public environments, and spontaneous moments. It also makes simple interactions feel heavy.
The same object can behave differently in different contexts, without explaining anything to the user. They simply interact.
Infrastructure is software that can change. A protocol defines rules that others can rely on.
IDDAS is a protocol because it fixes the order of operations, the economic split, and the attribution logic in advance. Even the operator cannot silently change outcomes.
IDDAS runs on infrastructure, but it is not merely infrastructure. The protocol defines what must remain true regardless of implementation.
IDDAS uses a blockchain as a verification layer - to lock rules and make outcomes auditable. It is not a token system, not a marketplace, and not a wallet-based user experience. Participants can activate and participate without touching crypto.
People do not feel processed. They feel included.
When builders extend IDDAS, they do not modify the object. They define capability layers that can be enabled, disabled, contextually activated, and shared across environments. The object stays recognizable. The experience adapts.
It is a different way of thinking about interaction.
We explain this openly because IDDAS is counterintuitive. If this model is not made clear early, people misunderstand everything that follows. Familiar assumptions get projected onto it. The simplicity gets mistaken for limitation.
Our goal is not to sound clever. Our goal is to be clear.
IDDAS is not a single app or a packaged offering. It is a rule set that governs what happens when a real, measurable outcome occurs - and only then.
If no value is created, no money moves. There is nothing to sell and nothing to persuade. The rule itself is the product - a predictable way to activate value, attribute contribution, and share revenue without negotiation, discretion, or exceptions.
IDDAS defines outcomes, not features. It defines how value moves, not how it is marketed or claimed.
IDDAS runs on normal infrastructure such as cloud services, databases, and standard software systems. It is not infrastructure itself.
Infrastructure executes the system. The protocol defines the limits of the system.
IDDAS defines the invariants - what must remain true regardless of implementation. These include activation before identity, lineage-based attribution, fixed economics, and verifiable outcomes (anchored on-chain so they can be audited independently).
Implementations can evolve. The rule cannot drift silently. The protocol is implementation-agnostic so others can build on it without changing the underlying economics or attribution logic.
IDDAS is intentionally narrow in what it defines and deliberately broad in what it enables.
It does not attempt to replace entire industries or operate them directly. It provides a rule layer that those industries can build on.
IDDAS is not:
Many multi-billion-dollar industries use these models today and many are constrained by their structure. IDDAS does not compete with those industries. It removes structural friction that prevents them from capturing value that already exists.
As systems scale, attribution becomes opaque and economics drift.
Rules change quietly. Exceptions accumulate. Trust is replaced by negotiation.
IDDAS exists to stop that drift by making the rule explicit, fixed, and verifiable.
When the rule is clear and cannot change silently:
This matters because most real-world activation is currently lost - especially in public spaces, shared environments, collective moments, and situations where identity-first systems create friction instead of value.
IDDAS is designed so others can build systems that capture that missing activation without changing the rule after adoption.
Patent applications are pending. The goal is not ownership of use cases, but durability of the rule.
Note: You may hear IDDAS described as "infrastructure" because it sits underneath many systems. The precise term is protocol - the rule layer that constrains how infrastructure behaves.
IDDAS runs on infrastructure.
But IDDAS is not infrastructure.
This distinction is important, because confusing the two leads to incorrect assumptions about flexibility, control, and trust.
Infrastructure is software that executes behavior. It includes:
Infrastructure can be changed. That flexibility is useful, but it also means outcomes depend on who controls the system.
A protocol defines rules that others can rely on. It specifies:
A protocol constrains infrastructure. It tells builders what must remain true, even as implementations evolve.
IDDAS fixes several things in advance:
These are not implementation choices. They are rules. Even IDDAS, as the operator, cannot silently change them.
Because the rules are fixed:
Infrastructure may vary. The rule does not.
IDDAS uses a blockchain only as a verification anchor. It does not require:
The blockchain is used to make rule versions and outcomes auditable. It is an audit layer, not a product feature.
Many systems start as infrastructure and later attempt to behave like protocols. That usually fails. Rules that are not fixed early become negotiable under pressure.
IDDAS is designed the opposite way. The rule comes first. Everything else adapts around it.
Infrastructure Originators - Clarifications and Confirmations
This section exists to clarify the Infrastructure Originator (IO) role and to preclude common misinterpretations.
It does not introduce new rules.
It restates how the protocol already works.
What an Infrastructure Originator is
An Infrastructure Originator (IO) is a protocol-level lineage root that authorizes and anchors one or more activation surfaces.
These surfaces may later produce verified activations.
IO status is structural.
It is not a title, partnership, designation, or program.
An IO exists only if downstream, protocol-valid activations occur through an originated surface.
If no activations occur, no IO exists.
If no value is created, no IO share exists.
What an Infrastructure Originator is not
An Infrastructure Originator is not:
Infrastructure Originators are not paid for effort, intent, access, or relationships.
They are paid only when value is structurally created and verified.
No approval, application, or permission
Infrastructure Originator status:
The protocol does not evaluate people.
It evaluates events.
Only verifiable activations determine outcomes.
Authorization without operation
Infrastructure Originators may authorize or enable deployment without physically creating, installing, operating, or managing activation surfaces themselves.
An IO may:
The protocol attributes outcomes to the root, not to operational labor.
Attribution and permanence
IO attribution is recorded at activation creation time.
It is immutable and non-retroactive.
Once an IO attribution exists:
Any use of protocol activations necessarily honors protocol attribution.
Economic certainty
The IO share:
If usage stops, payment stops.
If value resumes, payment resumes.
There are no guarantees.
There are no promises.
There is only the rule.
Why this exists
This rule exists to reward those who make infrastructure possible,
without turning infrastructure into a sales process,
and without requiring trust, contracts, identity, or enforcement.
Infrastructure Originators do not extract value.
They enable value to exist.
The protocol handles the rest.
Whenever real revenue is created through the system:
These percentages are explicit and universal. They are not negotiated per industry, client, or campaign.
Most systems begin with clear rules and change them later.
As platforms scale:
IDDAS fixes the rule so scale cannot distort it.
Because the economic split is explicit, published, and verifiable:
This model challenges a long-standing assumption popularized by large platforms: that discretion, opacity, and post-hoc adjustment are necessary at scale.
IDDAS fixes the rule first so others can build on it without fear that success will change the outcome.
What this enables
The object
The candle is not symbolic. It is a functional object with embedded rules.
When someone opens or passes a candle, they are not sending a message or starting a conversation. They are creating a verifiable activation that can later be used to form a real agreement. The candle carries the chain.
Step-by-step example
Step 1 - Initial activation
A person lights a candle. This creates the beginning of a chain. No deal exists yet. No money exists yet. But the system now knows where the opportunity started, and that information is held by the candle itself.
Step 2 - Passing the candle forward
That person shares the candle with someone else using a QR code or a link. No permissions are requested. No credit is negotiated. The candle simply moves forward, and the original activation remains recorded.
Step 3 - Continued propagation
The next holder may pass the same candle forward again. Each pass adds a new activation to the chain. No one can remove or overwrite earlier activations. The chain only grows.
Step 4 - The potential buyer receives the candle
Eventually, the candle reaches someone who can turn the opportunity into a real deal - a venue, promoter, organization, or buyer. If they want to turn the opportunity into a formal agreement, there is a specific action they must take inside the candle.
The securing action
Securing happens only after the ritual moment ends. It is intentional and cannot occur while the flame is lit.
What happens when the action is taken
When the securing action is performed, the candle changes state and new options appear that were not visible before (for example, creating a formal anchored deal or confirming the candle is being used for a real agreement).
At that moment:
Why no one can be cut out
A deal created through IDDAS can only exist through the candle that formed it. Because the candle already contains the complete chain, the buyer cannot bypass earlier contributors or selectively exclude participants.
If someone attempts to complete the deal elsewhere, the IDDAS protections do not apply, automated payouts do not occur, and verification is lost. The candle is the gate.
What this enables
IDDAS uses a fixed rule to allocate value only after a real transaction occurs.
There is no negotiation after the fact. There is no discretion. There is no “we’ll figure it out later.”
Everything that can be allocated is declared in advance.
Step 1 - The platform share (immutable)
When revenue exists, a fixed share goes to the platform.
This share pays for infrastructure, verification, enforcement, and long-term system stability. This step always happens first.
Step 2 - The brand-declared commission (defined at the front end)
Before any action occurs, the brand defines what portion of the transaction is available as commission. This declaration is made up front, before the candle is activated and before anyone participates.
Example
Clarifications
Everything not explicitly declared as commission remains with the brand. Once declared, the commission amount is fixed and cannot be changed later.
Step 3 - The commission pool (what IDDAS actually allocates)
Only the brand-declared commission becomes the allocation pool. In the example above, IDDAS allocates the 20% commission, not the full 70% remaining after the platform share.
If no transaction occurs, no money exists - and nothing is allocated.
IDDAS only allocates what the brand has declared allocatable.
Step 4 - Lineage distribution model (commission pool only)
From the brand-declared commission pool (example: the 20% commission), distribution is deterministic and follows lineage - the ordered chain of real actions that led to the outcome.
All percentages below are percentages of the commission pool, not of total revenue.
Standard split (all roles exist)
When there is an originator, intermediaries, and a final converter, the commission pool is split as:
Fallback rule - no intermediaries
From the same commission pool, if there are no intermediaries between the originator and final converter:
Resulting split (of the commission pool)
Special case - originator is final converter
From the commission pool, if the originator and final converter are the same participant:
Core rules (locked)
One important clarification
Adding more people to a lineage does not automatically increase the value of a deal. What it increases is reach and likelihood. More help means more chances for the outcome to occur.
If the outcome occurs, value is allocated. If it does not, nothing is owed. IDDAS allocates value only after it exists.
In short
The platform rule is fixed. The brand defines the commission in advance. IDDAS allocates only that commission. Allocation is deterministic and auditable. The rule is known before participation.
The rule is the trust.
When value is created through IDDAS, distribution is not negotiated. It is calculated.
This section exists to make that explicit. There is no interpretation layer, no discretion, and no post-hoc adjustment. The same inputs always produce the same outputs.
Let R be real revenue created through the system.
If R = 0, no allocation occurs. IDDAS does not create speculative value. It only allocates value after a measurable outcome.
The platform share is fixed.
Let α = 0.30. Then:
Platform allocation = α · R
This value is invariant across industries, partners, deployments, and time. There are no per-client economics.
Before any action occurs, the brand declares a commission rate.
Let γ be the commission rate (example: 0.20). Then:
C = γ · R
IDDAS allocates only C. The platform share and the brand’s retained revenue are not part of this pool.
Let L be the ordered lineage that led to the outcome:
L = {a1, a2, …, an}
ai represents a concrete activation eventn is the total number of contributing activationsLineage is append-only. Entries cannot be removed or overwritten.
Distribution is calculated by a published allocation function f.
For each lineage position i:
βi = f(i, n, θ)
βi is the fraction of C allocated to position iθ represents fixed, published parameters∑ βi = 1 over all i ∈ [1, n]No hidden parameters are permitted.
Each contributor receives:
Pi = βi · C
If n = 1, then P1 = C. If n > 1, distribution follows the lineage function exactly. There is no "last touch" privilege. There is no discretionary override.
α is fixedγ is declared in advancef is published and versionedL is append-onlyβi values are derived, not chosenIf the rule changes, a new version must be published. Old outcomes remain verifiable against the rule in effect at the time.
Allocation batches are committed via cryptographic hashes. Verification confirms the rule version used, the lineage set L, the computed βi values, and the resulting payouts. Trust in the operator is not required.
Summary: IDDAS replaces negotiated attribution with deterministic allocation.
If the math feels simple, that is intentional. Complexity is usually where discretion hides.
What an activation is
An activation is a verified, intentional entry into the system initiated by a person.
An activation occurs when someone deliberately scans a code, opens an activation link, or otherwise enters an activation flow in a way that creates a recorded lineage event.
An activation is not passive exposure.
It is not an impression.
It is not background traffic.
An activation requires intentional human action and the creation of persistent system state. Each activation is recorded at the moment it occurs and becomes part of an append-only lineage that cannot be retroactively altered.
If no intentional entry occurs, no activation exists.
If no activation exists, no charge occurs.
Structural integrity of activations
The system does not rely on post-hoc filtering or subjective moderation to determine valid activations.
Validity is structural.
An activation must:
Automated traffic may fire requests or load URLs, but it cannot easily:
Because of this, invalid activity does not qualify as an activation by definition. It is excluded structurally, not filtered later.
Universal activation pricing
The price per activation is fixed and universal.
$1.00 per activation
Effective floor via efficiency credits
An effective floor of $0.50 exists, but it is not a listed base price.
That floor is reached only through forward-only efficiency credits earned through real usage.
Credits are deterministic, predefined, non-retroactive, and non-negotiated. They are never discretionary.
CandleMe is one example of an activation. Other activations may involve different surfaces, rituals, or interactions, but the pricing rule remains unchanged.
Example - CandleMe economics (clarity)
CandleMe is a consumer interface that runs on the same IDDAS pricing rule. It does not replace IDDAS - it demonstrates it.
If a CandleMe activation is $1.00, then the platform share applies to that activation:
If efficiency credits later reduce the effective out-of-pocket cost toward $0.50, the economic rule does not change - the platform share still applies to the effective paid amount:
So CandleMe can be “cheap” for users over time while still generating platform revenue and preserving the same deterministic economic rule.
There are no tiers.
There are no negotiated rates.
There are no discretionary adjustments.
What is charged and what is not
Charges apply only to verified activations that actually occur.
If 100 people attend and 20 intentionally enter, only 20 activations are charged.
If no one enters, no charge occurs.
Charges are not based on impressions, views, or inferred exposure. Charges are based solely on recorded, verifiable activation events.
Subsequent actions such as saving, sharing, claiming, or converting deepen the activation and extend lineage, but they are not required for an activation to be valid.
Event and time boundaries
Activations are counted within defined events or time windows.
Unused capacity does not carry indefinitely. New events or deployments require new activation capacity.
This aligns pricing with real-world moments and prevents ambiguity in accounting, attribution, or reconciliation.
Why this model exists
Physical-world activation only scales when engagement is measured precisely and attribution is certain.
This model replaces statistical estimation with deterministic verification. Participants know the rule before they participate, and outcomes follow the rule exactly.
The result is a system designed for clarity over guesswork, verification over inference, and durability over short-term optimization.
Pricing philosophy
IDDAS charges for verified activation - and nothing else.
If an activation occurs, it is billed.
If no activation occurs, nothing is charged.
Each activation includes deterministic attribution, verifiable lineage, auditable outcomes, and independent proof of what occurred.
These are not add-ons.
They are not upgrades.
They are not metered separately.
You are paying for real entry. IDDAS provides the full truth of what that entry produced.
Fairness rule - any industry, any size, same rule
The pricing rule is universal. It does not change based on industry, company size, negotiating power, or volume.
There are no custom deals.
There are no special cases.
There are no hidden terms.
Small and large organizations operate under the exact same protocol rule.
No one is penalized for being small.
No one is favored for being large.
The economics remain clean at any scale.
Efficiency credits - forward-only convergence
IDDAS includes a predefined efficiency model that can reduce the effective price toward a $0.50 floor over time.
Efficiency is earned through cumulative, verified activations. Credits apply to future activations only.
There are no retroactive adjustments, negotiated rates, or discretionary overrides.
The floor cannot be exceeded downward.
A meaningful action creates an activation.
This can be a scan, a tap, a link open, or any defined trigger.
An activation is anonymous by default. It does not require an account, identity, or prior relationship.
The activation is the root of continuity. Everything that happens later traces back to this moment.
Identity may be attached later, but identity does not create eligibility. Only the action does.
This design allows participation to begin immediately, without permission, friction, or explanation. It is optimized for moments of mass participation, not gated access.
Participants who care about persistence, control, or long-term involvement can and typically will attach identity later. The system supports that naturally.
Activations form lineages. A lineage is the ordered chain of actions that lead to an outcome.
Each activation links to a prior activation, creating a permanent history of contribution based on actual propagation, not claims.
Lineages do not collapse into a single winner. There is no global last person and no overwrite.
Multiple lineages can exist in parallel indefinitely. Each remains independently valid.
Eligibility for downstream value is determined by position within a lineage, not by identity, reputation, or timing tricks.
Eligibility itself does not expire. However, claiming or collecting value may be subject to clearly defined time windows (for example, 12 or 24 months), which are published in advance and apply equally to all participants.
These windows do not alter lineage or reassign value. They define how long a participant has to claim what they are already eligible for.
Control comes from possession of the originating activation token, not from identity.
The first activation creates the root. That root cannot be overwritten by later actions or identities.
Identity may later anchor continuity, but it cannot rewrite origin or seize control.
If the originating token is lost, control may be lost. This is intentional. The system favors correctness and continuity over recovery by default.
In practice, participants for whom persistence matters - such as sales agents, operators, or long-term contributors - typically attach identity early. The anonymous-first model exists to remove friction for the many, not to penalize the few.
Actions must be safe to repeat without changing outcomes.
Reloading a page does not create a new activation. Refreshing does not duplicate events.
The system behaves as if the action happened once, even if it was triggered multiple times accidentally.
This prevents inflation, abuse, and accidental duplication.
All events are append-only. History can grow, but it cannot be rewritten.
CandleMe is a consumer-facing activation ritual built on IDDAS. It is intentionally calm, minimal, and universal.
CandleMe exists to demonstrate the system without explaining it. People do not need to understand IDDAS in order to use it. They simply act, and the system responds correctly.
CandleMe shows that activation can happen before identity, that value can propagate without coordination, and that meaning can exist without permanence.
It is not a demo and not a simplified version of the protocol. It is a real, functioning implementation that proves the rule holds in live environments with real people.
What CandleMe proves publicly:
CandleMe is one expression of IDDAS, not the limit of it.
As of January 3, 2026, the IDDAS verification service is deployed on Google Cloud Platform and running as a live, testable proof surface.
IDDAS is not UI-first. It is a protocol-level rule system. Proof requires that events can be recorded and verified in a way that is reproducible, auditable, and defensible.
iddas-verification repository is connected to GCP via Cloud Build and Cloud Runrule_version binding, deterministic commit logic, and replayability against a live serviceA protocol must be provable. A running verification service is the first concrete step that turns the Charter into an executable proof layer.
IDDAS is designed to be efficient, scalable, and usable in real-world environments. For that reason, most activity happens off-chain, while verification anchors live on-chain.
The blockchain is not the experience layer. It is the audit layer.
Off-chain components handle everything that must be fast, flexible, and human-facing. On-chain components handle only what must be immutable and independently verifiable.
How this is split in practice:
On-chain responsibilities:
Off-chain responsibilities:
This separation avoids unnecessary cost and complexity while preserving verifiability. Nothing important depends on trusting an operator. Everything important can be checked.
Immutability in IDDAS does not mean that software cannot evolve. It means that economic rules cannot change silently.
Once a rule is published and anchored, all outcomes can be verified against that rule. Any change requires publishing a new version, with a clear boundary between old and new behavior.
Immutability applies to the rule, not to the interface.
What this guarantees:
Verification does not require trusting IDDAS, CandleMe, or any operator. Anyone with access to the published rule and the anchored data can independently confirm that outcomes were calculated correctly.
This is how trust is replaced by verification.
An activation is not an impression. It is not a click. It is not a guess. An activation is a verified, intentional human entry into a defined environment. That difference matters.
What you get:
What you are not paying for:
If a person does not activate, nothing is charged. That is the rule.
If no activation occurs, no charge occurs.
To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.
This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.
Credits pre-fund standard activations.
When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.
Activation credits do not:
Credits exist solely to reduce initial adoption friction.
Message conveyed:
“The rule is finished. You can see it work.”
This structure:
IDDAS is activation infrastructure for the physical world.
It provides identity-free, intentionally activated proof of physical presence, with verifiable records that can be independently audited.
IDDAS does not measure impressions, exposure, or background traffic.
It records only deliberate entry into a system.
If no one enters, nothing is recorded.
If nothing is recorded, nothing is charged.
What the infrastructure does
IDDAS infrastructure enables:
The system verifies that someone was present, not who they were.
What the infrastructure refuses
IDDAS explicitly does not:
Validity is structural, not interpretive.
How it works physically
IDDAS is deployed through physical activation surfaces, most commonly QR-based.
Each surface is:
When scanned:
This activation serves as proof of intentional physical presence.
Verification and blockchain anchoring
IDDAS uses blockchain as a verification and audit layer, not an experience layer.
Blockchain is used to make the system tamper-evident, not to introduce friction.
Universal activation pricing
IDDAS uses a fixed, universal pricing rule:
A portion of value may return as system credits usable for future activations, without altering the pricing rule.
Example applications (not exhaustive)
These are expressions of the same infrastructure, not separate products.
1. CandleMe
A ritual activation where each scan ignites a candle, creating a lineage of presence and participation.
2. Venues and events
Verify real attendance at concerts, conferences, stadiums, or festivals without identity-bound tickets.
3. Casinos and regulated spaces
Record physical presence and participation without storing personal data, while maintaining verifiable records.
4. Out-of-home advertising
Measure intentional engagement with physical media instead of impressions or inferred exposure.
5. Transit and public spaces
Verify usage or entry without surveillance, accounts, or tracking.
6. Retail and physical commerce
Trigger verified in-store activations distinct from online traffic or passive footfall.
A base layer, not a bundle
IDDAS is not optimized for a single industry.
It is a base layer that supports many expressions without changing its core rules.
The infrastructure stays fixed.
The interfaces, rituals, and use cases evolve.
Why infrastructure matters
Physical-world systems fail when they rely on:
IDDAS replaces these assumptions with a single invariant:
Only intentional participation creates value.
Same protocol. Same backend. Different surfaces.
IDDAS supports multiple activation templates out of the box. Each template uses the same activation, attribution, and billing layer, but presents analytics and controls appropriate to the deployment context.
These templates describe supported deployment modes. Interfaces adapt automatically based on context.
The following examples illustrate environments where participation, communication, and outcomes are constrained by identity-first design, onboarding friction, or opaque attribution. IDDAS does not replace these industries. It introduces a protocol layer that enables systems that were previously impractical or impossible to deploy. Each use case represents the same underlying capability expressed in different environments.
Stadiums, concerts, festivals, nightclubs, venues.
Live events concentrate attention, emotion, and participation into a narrow time window. Historically, most of that value has been lost because there was no practical way to activate everyone simultaneously without apps, accounts, or advance setup.
IDDAS enables immediate, audience-wide activation. Everyone can receive the same digital object at the same moment, without identity, onboarding, or instruction. Participation becomes collective rather than fragmented, and outcomes can persist beyond the event itself.
Capability kits allow events to attach functionality, access, or meaning to that moment. These capabilities can evolve over time, persist after the event, or remain intentionally ephemeral. They can be changed without reissuing assets or modifying the physical venue.
Kiosks, transit, retail foot traffic, public surfaces.
Out-of-home media is ubiquitous, but activation is limited to managed screens and fixed campaigns. Most physical surfaces remain passive because activation has required infrastructure, identity, or ongoing operational control.
IDDAS turns physical surfaces into activatable objects. A single marker can carry digital capabilities without screens, power, or accounts. Interaction happens immediately and requires no explanation.
Capability kits allow the behavior of a surface to change over time without changing the surface itself. The same object can serve different purposes across locations, audiences, or moments.
From digital links to real-world activation.
Affiliate and referral systems depend heavily on digital tracking and trust-based claims. They struggle to account for real-world influence, shared experiences, and offline participation.
IDDAS replaces claims with lineage. Contributions are recorded as chains of activation rather than inferred from clicks or last-touch attribution. Distribution follows published rules instead of discretionary adjustments.
Capability kits allow affiliate systems to extend into the physical world for the first time. Real-world interactions can participate in the same attribution structure as digital ones, without identity or fragile tracking.
Benefits, incentives, participation, emergency response.
Public programs often fail at the point of participation. Identity requirements, paperwork, and delays exclude people and slow response, especially in time-sensitive situations.
IDDAS allows participation to begin immediately without identity while preserving auditability and transparency. Identity can be attached later only if required. Outcomes remain verifiable regardless.
This model applies to public benefits, civic initiatives, census participation, and emergency response. In disaster scenarios, information and capabilities can spread hand-to-hand without infrastructure or accounts.
Onboarding, recruitment, coordination.
Large organizations often require identity before usefulness. This slows onboarding and limits participation, particularly in temporary, distributed, or high-churn environments.
IDDAS allows action to come first. People can participate, contribute, or coordinate before identity is established. Identity can be attached later without invalidating prior actions.
This applies to enterprise onboarding, temporary workforces, defense coordination, recruiting, internal referrals, and large-scale mobilization.
Participation without friction.
Civic and political participation often suffers from complexity, mistrust, and early drop-off. Many people disengage before participation even begins.
IDDAS enables immediate participation without identity while preserving verifiable outcomes. Capability kits define what participation means in each context without exposing individuals.
This applies to polling, grassroots mobilization, political rallies, volunteer coordination, and election-adjacent participation where transparency and accessibility are critical.
Moments, not networks.
Many meaningful moments do not require profiles, feeds, or amplification. They require presence, participation, and continuity.
IDDAS supports rituals such as weddings, graduations, religious gatherings, memorials, celebrations, and personal milestones. These moments can carry digital meaning without becoming social networks.
CandleMe is the first public example of this model. It demonstrates how a single object can carry shared meaning across people and time without identity, messaging, or algorithmic incentives.
Participation without coercion.
Surveys and research initiatives struggle with participation, bias, and trust.
IDDAS allows people to participate without identity while preserving integrity through structure rather than persuasion. This increases response rates, reduces friction, and maintains verifiable results.
These use cases are illustrative, not exhaustive. Many industries are constrained by identity-first design, opaque attribution, and discretionary economics.
IDDAS is a patent-pending protocol layer designed to remove those constraints. Others can build on it to unlock participation that is currently missed, delayed, or excluded.
A system pattern where activation, attribution, and economics are enforced together - as one architecture.
IDDAS is not a UI, an app, or a collection of features. It is a system pattern defined by the enforced interaction of three elements:
Individually, these concepts are not novel. Defensibility arises from how they are bound together, enforced, and made non-discretionary as a single architecture.
The IDDAS patent filings are intended to protect this pattern and its implementation cluster, including how activation, attribution, claiming, forfeiture, and verification interact to prevent silent rule changes, discretionary payouts, or post-hoc reinterpretation.
Rules in IDDAS are not guidelines. They are published, versioned, and executed through deterministic system logic. Once active, they operate the same way for all participants and cannot be selectively applied or quietly altered.
The system is intentionally designed so that:
This is not a feature set that can be partially adopted. The value of IDDAS depends on the integrity of the full pattern.
Copycats can copy the surface, but not credibility under scrutiny without making the same structural commitments.
Others can copy a candle, a QR code, or a visual ritual. What they cannot copy is credibility under scrutiny without making the same structural commitments.
To replicate IDDAS in substance, a system would need to:
In practice, this is where most platforms stop. Existing systems are architected around flexibility, opacity, and operator discretion because those traits are economically advantageous. Transparency, fixed rules, and verifiability are treated as risks rather than foundations.
IDDAS reverses that logic. Trust is not asserted, marketed, or requested. It is enforced structurally.
If a rule changes, the change is visible.
If attribution occurs, it is explainable.
If value moves, it is auditable.
This level of transparency is not cosmetic. It is the moat.
Value can accrue before identity, then be claimed later under fixed rules - with forfeiture handled transparently.
In IDDAS, value may accrue to an activation whether or not an identity is immediately attached. This allows participation to begin without friction while preserving future claimability.
Claiming requires anchoring an identity capable of receiving payment. Funds become claimable under a published rule and must be claimed within a defined claim period.
If funds are not claimed within that period, they are forfeited according to a predefined, transparent rule. Forfeiture affects claimability only. Lineage, attribution, and historical records remain intact and verifiable.
Forfeited funds do not revert to discretionary platform revenue. They are redirected according to fixed, auditable rules designed to reinforce the ecosystem, such as funding protocol maintenance or enabling others to build on the platform under the same constraints.
This structure eliminates hidden incentives and ensures:
Economic behavior is shaped by rules, not discretion.
Surface imitation fails - because identity-first, discretionary systems drift under real-world conditions.
Systems that attempt to imitate IDDAS at the surface level fail in predictable ways.
Most existing platforms are built upside down. They place identity, discretion, and operator control at the center, then attempt to layer attribution and trust afterward. IDDAS inverts this order by design.
As a result, copycat systems encounter the same structural breakdowns:
These are not implementation mistakes. They are structural consequences of avoiding the constraints that IDDAS accepts deliberately.
The core IDDAS pattern - activation before identity, lineage-based attribution, and fixed, verifiable economics - is also the subject of patent protection. Replicating the system in substance, not just appearance, would require implementing the same protected pattern and layered structure.
That combination makes true replication operationally difficult and, depending on the implementation, may raise IP questions. Surface imitation tends to reproduce the same failure modes. Structural replication requires accepting transparency, fixed rules, and loss of discretionary control - conditions most existing platforms are neither designed nor incentivized to adopt.
IDDAS is built to operate under those constraints from the beginning.
Terminology and Framing Charter
Jan 3, 2026
Terminology and Framing Charter
This page defines the canonical language used across the IDDAS platform. These definitions are not stylistic preferences. They are binding semantic rules that ensure the system remains understandable, auditable, and evolvable over time.
This charter applies to:
Ledger vs Verification Layer
These terms must never be used interchangeably.
Ledger
The ledger is the append-only, immutable record store.
Rules:
Rules:
Event vs Activation
This distinction is enforced across the system.
Event
An event is a raw occurrence captured at a moment in time.
Rules:
Rules:
Rule Version vs Protocol Version
This distinction protects system integrity.
Rule Version
Defines how meaning is computed.
Rules:
Rules:
Why This Matters
Clear terminology:
Prevents narrative drift
Enables independent audits
Allows evolution without rewriting history
Makes the system explainable to outsiders
Most systems fail due to language ambiguity. This charter prevents that.
This page is authoritative. If any explanation, diagram, or implementation conflicts with this charter, this charter prevails.
Verification Flow: From Event to Proof
This section explains why the system is correct, not just what it does. It provides a single, linear narrative that an external engineer or auditor can follow to independently validate system integrity.
This flow is intentionally simple and deterministic.
1. Event Capture
An event is created when an intentional action occurs on a surface.
Rules:
Each event includes:
A unique event identifier
A timestamp (UTC)
A surface identifier
Optional parent references for lineage
At this stage, the system only records that something happened.
2. Canonicalization
Before any hashing or storage, the event payload is canonicalized.
Rules:
3. Hashing
The canonicalized event payload is hashed.
Rules:
The resulting hash uniquely represents:
The event content
The rule logic applied
Its position in the lineage chain
This hash is the cryptographic fingerprint of the event.
4. Append-Only Storage
The hashed event is written to the ledger.
Rules:
5. Replay
Replay is the act of reprocessing raw ledger events.
Rules:
If the system is correct, replay produces:
Identical hashes
Identical lineage
Identical derived results
Replay proves that outcomes are not dependent on hidden state.
6. Verification
Verification compares replayed results against stored hashes.
Rules:
Verification confirms:
Events were not altered
Rules were not changed retroactively
Lineage is intact
Why This Flow Matters
This pipeline ensures that:
Action precedes identity
Meaning is derived, not asserted
History cannot be rewritten
Proof does not depend on trust
If any step fails, verification fails.
That is intentional.
This verification flow is the foundation of IDDAS. All higher-level constructs rely on it.
This document is the normative ruleset for the Instant Distributed Digital Activation System (IDDAS) Protocol - Core Rules.
It defines:
This document is authoritative. If any derivative explanation, implementation, interface, or summary is ambiguous, incomplete, or inconsistent, the rules in this document control.
Versioning posture
This document is not:
Products, interfaces, commercial terms, and implementations may vary, but they may not contradict, override, or weaken the rules defined in this document.
This protocol applies to any system, deployment, or outcome that claims IDDAS compatibility or references IDDAS-defined concepts, including but not limited to activations, lineage, allocation, settlement, or verification.
Specifically, this protocol applies to:
Use of IDDAS-defined mechanisms, terminology, rules, or verification implies acceptance of the full protocol and its constraints.
Partial, selective, modified, or “inspired-by” adherence does not qualify as IDDAS-compatible. Systems that deviate from protocol-defined rules may not represent themselves as compliant, interoperable, or compatible with IDDAS.
This document is the highest authority governing IDDAS rule behavior.
Precedence order:
All lower-precedence materials must conform to this document. If any lower-precedence material is ambiguous, incomplete, or conflicts with these rules, this document prevails.
All outcomes defined by this protocol are deterministic when derived from published rules applied to a cryptographically committed set of accepted activations.
The Verification Layer independently recomputes eligibility and allocation by applying the published, versioned rules to the committed activation set and the corresponding rule version in effect at the time of activation.
No discretionary overrides are permitted.
No subjective interpretation is applied after revenue exists.
If an outcome cannot be derived from committed inputs and published rules, it does not qualify as a valid protocol outcome.
This protocol defines rules, not software.
Protocol correctness, validity, and verification are independent of any specific implementation.
All protocol rule changes must be versioned.
Rules:
Protocol history is immutable. Past outcomes are never rewritten.
All protocol-defined events are recorded in an append-only manner.
This immutability ensures that lineage, verification, and outcomes remain auditable and reproducible over time, independent of implementation.
All derivative materials, including but not limited to websites, FAQs, white papers, documentation, and sales materials:
If a derivative document is ambiguous, incomplete, or requires clarification, the protocol must be consulted. Informal explanations or derivative materials do not amend, supplement, or replace this document.
This protocol intentionally does not define or govern the following:
These concerns are external to protocol correctness and are addressed at the implementation, operational, or commercial layer. Their existence or variation does not affect protocol validity, determinism, or verification.
If no activation occurs, no charge occurs.
To reduce adoption friction while preserving rule integrity, the system provides a one-time activation credit.
This credit exists to allow organizations to observe the system in real conditions without procurement overhead or sales negotiation.
Credits pre-fund standard activations.
When the credit is exhausted, standard billing begins automatically. Pricing and rules do not change.
Activation credits do not:
Credits exist solely to reduce initial adoption friction.
Message conveyed:
This structure:
All conversion selections are subject to the protocol’s definition of real, net-settled revenue.
The protocol allocates value only when real revenue is created.
For revenue to qualify as real revenue under this protocol, it must be:
Speculative value, intent signals, or uncompleted actions do not qualify.
If no real revenue exists, no allocation occurs.
The protocol does not create, assign, or imply speculative value.
Actions, attention, participation, or effort alone do not generate allocatable value. Value exists only after a measurable conversion outcome occurs.
The protocol does not:
All allocation outcomes are deterministic.
Given:
The resulting distribution is uniquely determined.
No randomness, negotiation, discretion, or subjective interpretation is permitted in allocation computation.
No participant, operator, administrator, or third party may override protocol-defined outcomes.
Once inputs are recorded:
Discretion is excluded by design.
Protocol behavior is transparent by construction.
Transparency includes:
Participants do not rely on trust in the operator. They rely on the visibility and determinism of the system.
Revenue (R) is the amount of qualifying economic value generated by a conversion event, as defined by the protocol.
For revenue to qualify as R, it must be:
Revenue represents gross economic value created by a conversion. Revenue is not commission and is not allocated directly to participants.
Authorizations, impressions, intent signals, or reversible activity do not qualify as revenue.
If R = 0, no allocation occurs.
The platform share (α) is the fixed portion of qualifying revenue retained by IDDAS.
α is defined by the protocol and is invariant across deployments, Brands, and time.
The distribution pool (D) is the portion of qualifying revenue made available for participant allocation.
D is computed mechanically as:
If R does not qualify as revenue under the protocol, D does not exist.
A commission pool is a business-defined portion of the distribution pool.
The existence and size of a commission pool are defined by the Brand, subject to protocol constraints.
A commission pool:
If no commission pool is defined, the distribution pool may be allocated according to Brand business logic, provided protocol constraints on lineage, determinism, and non-discretion are not violated.
A Brand is the entity responsible for a deployment within IDDAS.
A Brand may be a company, organization, individual, or other legal or natural person.
The Brand:
A Brand operates within the IDDAS protocol and does not control allocation, lineage, settlement rules, or payment rails.
A candle is a specific activation object representing a human-facing ritual of engagement.
An open candle is a candle that is not bound to a persistent deployment or environment.
Open candles are ephemeral by default and may exist without long-term persistence, enterprise configuration, or integration.
Open candles may still generate valid activation events and lineage under the protocol.
An anchored candle is a candle that is bound to a persistent deployment or environment.
Anchored candles are defined at the Brand or deployment level and may support extended behavior such as persistence, enterprise configuration, analytics, or integration.
Anchoring is a protocol state and is independent of individual participant actions.
An activation event is a verified, intentional entry into the system initiated by a person.
An activation event occurs when a person deliberately:
An activation event creates a recorded lineage entry and establishes eligibility for allocation if a qualifying conversion occurs.
Passive exposure does not qualify.
Lineage is the ordered, append-only set of activation events that led to a conversion event.
Lineage:
Lineage determines eligibility for allocation if qualifying revenue is generated. It does not guarantee outcomes, compensation, or value.
Lineage exists independently of identity, accounts, or participant intent, and is enforced deterministically by the protocol.
The originator is the first activation event in a lineage.
The originator establishes the initial propagation context and is included in allocation if a qualifying conversion occurs.
An intermediate is any activation event in a lineage that is neither the originator nor the activation event immediately preceding a conversion event.
Intermediates may contribute to propagation and are eligible for allocation according to the published allocation rule if a qualifying conversion occurs.
The closer is the activation event immediately preceding a conversion event.
The closer does not receive preferential treatment unless explicitly defined by the published allocation rule.
A conversion event is a completed action that generates real revenue (R).
Examples include:
Conversion events trigger allocation when qualifying revenue exists.
Activation events alone do not.
An environment is the physical, digital, or operational context within which activations occur.
An environment may represent:
Environments bind activations to a specific deployment and may define configuration, behavior, pricing, persistence, or integration settings applicable to that context.
Environments provide attribution and operational context but do not alter lineage formation, allocation logic, or protocol-defined settlement rules.
A candle is an activation instrument within the IDDAS protocol that represents a bounded context for activation, propagation, and allocation.
A candle is not:
A candle represents a specific context under which activation events may occur and lineage may form.
That context may include, but is not limited to:
Each candle operates independently and participates in lineage formation and allocation strictly according to the rules of this protocol.
Candles are intentionally non-scarce.
The protocol does not impose a limit on the number of candles that may be created or anchored by any individual or entity.
This design choice is intentional and foundational:
Scarcity is enforced at the level of verified activation events and conversion events, not at the level of candle creation or anchoring.
Any individual or entity may anchor multiple candles simultaneously.
There is no restriction preventing:
This enables real-world representation patterns, including affiliates, agents, promoters, and delegated representatives.
Each candle maintains its own independent lineage and does not share attribution or eligibility with other candles unless explicitly connected through valid activation events.
Anchoring a candle establishes its origin point for lineage construction.
The anchor:
Anchoring a candle does not, by itself, create value, eligibility, or entitlement.
Value allocation occurs only after a qualifying conversion event, as defined elsewhere in this protocol.
Candles may propagate through eligible activation events.
Propagation:
Propagation order reflects contribution sequence, not time of claim, assertion, or identity.
Only eligible activation events may create lineage entries. Eligibility requirements are enforced deterministically by the system.
Each candle is independent.
Rules of independence include:
Actions taken on one candle have no effect on:
This isolation ensures deterministic attribution, prevents cross-contamination of allocation logic, and preserves protocol correctness under scale.
A lineage is the ordered, append-only sequence of eligible activation events associated with a specific candle.
For a given candle, the lineage is represented as:
L = {a1, a2, …, an}
Where:
Lineage order reflects propagation sequence, not time of claim, attribution assertion, identity, or payout request.
Lineage is strictly append-only.
Once an entry is added to a lineage:
There are no discretionary overrides, manual edits, or post-hoc adjustments to lineage state.
This property is essential to deterministic allocation, verification, and auditability.
Lineage entries are created only by eligible activation events.
An eligible activation event is a system-recognized action that:
Examples of eligible activation events may include, but are not limited to:
Eligibility criteria and verification methods are enforced deterministically by the system and may evolve through versioned protocol changes.
The protocol does not require public disclosure of implementation details for eligibility enforcement, provided enforcement remains deterministic and non-discretionary.
The following behaviors are explicitly prohibited and produce no lineage entries:
Any attempted activation that does not meet eligibility criteria is ignored for lineage purposes and has no effect on allocation.
A lineage is evaluated for allocation at the moment a conversion event occurs.
Only lineage entries present at the time of conversion are eligible for allocation from that conversion event.
Entries appended after a conversion event:
Each conversion event is evaluated independently and produces its own allocation outcome.
Lineage is scoped to a single candle and a single environment.
Rules:
This ensures isolation, prevents attribution leakage, and maintains deterministic allocation and verification outcomes.
The system may expose lineage position to participants.
Participants may be able to see:
However:
Visibility does not confer rights, priority, or entitlement.
Allocation occurs only after a verified conversion event produces real, net-settled revenue.
Let:
If R = 0, no allocation occurs.
The protocol does not create speculative value. Allocation is strictly downstream of measurable outcomes.
The platform fee is fixed.
Let:
Platform allocation:
Platform fee = α · R
This percentage is invariant across:
There are no negotiated or per-client platform economics.
After the platform fee is applied, the remaining revenue is:
N = (1 − α) · R
Therefore:
N = 0.70 · R
This remainder represents revenue retained by the brand after the platform fee. It is not automatically distributed and is not acted upon by the protocol unless the brand explicitly defines a commission pool.
The brand may define a commission pool as a percentage of the post-platform remainder.
Let:
The commission pool is:
C = c · N
Important clarifications:
The protocol does not allocate, restrict, or otherwise act upon this remainder. Its sole role is to deterministically allocate the brand-defined commission pool, if any, according to lineage.
For a given conversion event, lineage entries are classified as follows:
Only lineage entries present at the moment of conversion are considered.
The allocation model applies only to the commission pool C.
Unless otherwise specified by a collapse rule:
There is no last-touch discretion.
The closer is determined solely by the system-recorded conversion trigger.
The originator allocation is fixed and does not dilute based on lineage length.
If intermediates exist between the originator and the closer, a fixed intermediate pool is allocated and divided equally among those intermediates.
Let the lineage for a conversion be:
L = {a1, a2, ..., ak}
Where:
Let:
m = k - 2, the number of intermediates (excluding originator and closer)
The total intermediate pool is fixed at:
0.15 · C
Each intermediate receives:
(0.15 · C) / m
Intermediates do not receive weighting based on position, timing, or identity.
Originator and closer allocations are defined separately and are not part of the intermediate pool.
If m = 0 (no intermediates), the intermediate pool is reassigned as defined in the no-intermediate scenario.
Single-participant case
If the originator is also the closer:
The originator receives 100 percent of C.
No-intermediate case
If the lineage contains an originator and a closer with no intermediates:
Originator receives 0.30 · C
Closer receives 0.70 · C
The unused intermediate pool is reassigned to the originator in this case.
The allocation function is deterministic and published.
For any conversion event:
Assume:
Real revenue from a conversion is: R = $100
Platform share is fixed at: α = 0.30
Brand-defined commission rate is: c = 0.20
Step 1: Platform share
Platform allocation = α · R = 0.30 · $100 = $30
Step 2: Commission pool (brand-defined)
The commission rate applies to revenue R:
C = c · R = 0.20 · $100 = $20
Step 3: Lineage-based allocation of the commission pool
The protocol allocates only C according to the lineage allocation model:
The remainder of revenue after platform share and commission is retained by the brand and is not allocated by the protocol.
Note: This example is illustrative only. The protocol’s allocation math operates deterministically on the declared values of R and c, and on the lineage L at the time of conversion.
IDDAS is a rule-defined activation and allocation system. It separates business discretion from protocol enforcement to ensure outcomes remain fair, deterministic, and verifiable at scale.
This section defines the roles within IDDAS and the boundaries that govern them.
IDDAS defines and enforces the core rules of the system. These rules are fixed, versioned, and applied uniformly across all deployments.
IDDAS does not negotiate outcomes, adjust distributions, or intervene on a case-by-case basis. Once protocol-defined inputs are recorded, outcomes follow the rules exactly.
A Brand is the organization, entity, or individual running a deployment on IDDAS.
Brand discretion exists only before revenue is created and only within protocol-defined constraints.
Brands cannot:
Once a commission pool is declared and qualifying revenue exists, allocation is enforced by the protocol without discretion.
Commission pools are defined by the Brand as a percentage of qualifying revenue derived from the protocol-defined distribution pool.
Allocation within any commission pool is defined exclusively by the protocol.
If a single contributor exists in a lineage, that contributor receives the full distribution pool.
If multiple contributors exist, the pool is allocated deterministically according to the protocol’s published allocation rules.
Brands do not assign individual payout percentages to participants. Distribution is computed solely from lineage and fixed parameters.
IDDAS defines the payment and settlement rails.
These rails are fixed, standardized, and identical across deployments.
Brands do not select, customize, bypass, or intervene in settlement mechanisms.
Once a Brand deploys on IDDAS, revenue settlement, platform fees, allocation, and payouts follow the protocol-defined rails exactly.
This structure removes discretion, prevents intervention, and ensures outcomes remain auditable and verifiable over time.
CandleMe is one Brand and one implementation built on top of IDDAS.
CandleMe defines its own business terms, selects qualifying conversion events, provides its own bank account, and pays for activations like any other Brand.
CandleMe has no special privileges within the protocol and is subject to the same rules, constraints, and enforcement as all other deployments.
Definition
An Infrastructure Originator (IO) is a protocol-level lineage root that authorizes and anchors one or more activation surfaces under this protocol, where such surfaces later produce verified activations.
Infrastructure Originator status is not granted, claimed, negotiated, or approved. It emerges solely through downstream protocol-valid activations attributable to activation surfaces anchored under the originator’s lineage root.
Infrastructure Originators may authorize or enable deployment without physically creating, installing, operating, or managing the activation surfaces themselves. Physical deployment and operational execution may be performed by third parties, organizations, operators, integrators, or internal teams acting under the authorized deployment root.
Origination is structural, not behavioral. Attribution follows lineage, not labor.
Creating an activation surface alone confers no status and no entitlement. Only verified downstream activations trigger Infrastructure Originator attribution and allocation.
Definition - Activation Surface
An activation surface is any protocol-issued entry mechanism that enables intentional activation by one or more independent participants, regardless of medium.
Activation surfaces may exist in physical, digital, or hybrid environments and may be deployed wherever intentional human entry can occur.
Activation surfaces include, but are not limited to:
An activation surface is defined by function, not form.
The protocol does not distinguish between physical and digital surfaces.
Any surface that produces intentional, protocol-valid activation qualifies equally.
Relationship to Lineage Originators
The protocol defines an “originator” as the first activation in a lineage for a given conversion context.
An Infrastructure Originator (IO) is a separate and orthogonal role.
Lineage originators are determined by activation order within a lineage.
IOs are determined by activation-surface origination metadata bound at activation creation time.
A single participant may simultaneously act as:
These roles are independent and evaluated separately.
Eligibility and Origination
Any participant controlling an activation lineage root may originate infrastructure.
Infrastructure origination occurs when:
Creating an activation surface alone confers no status and no entitlement.
Only downstream verified activations trigger IO attribution.
Attribution Mechanics (Non-Chain)
For each activation:
If an activation is created from:
Sharing a candle does not constitute infrastructure origination.
IO Share (Economic Rule)
The platform share is fixed at 30 percent of qualifying net-settled revenue.
The Infrastructure Originator share is defined as:
IO share rate γ = 5 percent
The IO share is allocated from the platform share, not from the distribution pool.
For qualifying revenue amount R:
If no valid io_activation_id exists, IO share is zero and the platform retains the full 30 percent.
Determination of IO Recipient
For a conversion event attributed to lineage L, rooted at activation a₁:
This determination is deterministic, auditable, and non-discretionary.
Durability and Non-Circumvention
IO attribution is permanent once recorded:
Brands, deployers, or partners may not deploy private side agreements, shadow attribution systems, or off-protocol mechanisms that attempt to replicate, suppress, or bypass IO share while using protocol-generated activations.
Any attempt to bypass protocol attribution:
Prohibited Conduct and Terms
IDDAS is activation infrastructure and is content-agnostic.
Activations, IO attribution, and IO share apply only to qualifying net-settled revenue as defined by this protocol and governed by the Terms and Conditions.
Deployments intended to facilitate illegal goods, illegal services, or prohibited conduct:
The existence of IO attribution does not create entitlement to payment from non-qualifying or prohibited revenue.
Implementation Note (Non-Normative)
Implementations may expose a single optional control labeled “Deploy Activation Surface”, accessible from a controlled activation context.
The protocol mandates structural outcomes only:
Interface design is implementation-specific.
This separation is intentional. It ensures fairness does not depend on trust, scale does not distort outcomes, and success does not rewrite the rule.
Payouts are derived from allocation outcomes computed under the Allocation Model defined in Section 5.
For each conversion event:
Payout calculation does not imply immediate disbursement and does not alter allocation outcomes.
Payouts are based exclusively on net-settled revenue.
Net-settled revenue is revenue that:
If revenue does not settle, no payout is finalized.
This requirement applies uniformly across all environments, Brands, and deployments.
Payouts become available for disbursement only after all of the following conditions are satisfied:
The protocol may batch disbursements on a scheduled basis.
Disbursement timing does not affect allocation, eligibility, or recorded outcomes.
A minimum payout threshold applies to each recipient.
Let:
T is defined as:
If a calculated payout is below T:
Minimum payout thresholds affect only disbursement timing and do not alter allocation or eligibility.
Accrued balances:
Accrual affects only when disbursement occurs and does not modify allocation calculations.
A single candle may produce multiple conversion events over time.
For each conversion event:
Revenue from different conversion events is not combined for allocation purposes.
Accrued balances from multiple conversion events may combine to satisfy the minimum payout threshold.
This preserves the distinction between allocation per event and payout per recipient.
Each unit of net-settled revenue is associated with a single conversion event and is allocated exactly once.
The protocol does not permit duplicate payouts for the same revenue.
If multiple conversion events occur, each must correspond to distinct net-settled revenue.
If a conversion event fails to settle:
If a transaction is invalidated after provisional recording but before disbursement:
These corrections reflect the absence of real, net-settled revenue.
They do not imply a refund policy, user-initiated reversal, or discretionary adjustment.
Pay-per-candle pricing supports:
The protocol supports self-serve operation by default, and introduces objective, capacity-based gating only when enterprise-scale throughput is requested.
The protocol supports self-serve operation by default.
Self-serve operation includes:
Self-serve operation does not require:
Self-serve operation remains available until enterprise-scale capacity is requested.
Scale is determined by requested capacity, not by participant identity.
The protocol does not classify participants as enterprise or non-enterprise.
Scale gating is triggered only when a participant requests capacity, throughput, or features that exceed self-serve limits.
Scale is governed structurally, not reactively. Certain capabilities require predefined capacity and are only available when sufficient activation credits or prepaid balances exist.
These capabilities may include:
No monitoring, classification, detection, or discretionary escalation occurs. Availability is determined solely by declared capacity and deterministic rules. When capacity is exhausted, usage naturally halts until additional credits or prepayment are applied.
Certain environment types inherently require enterprise-scale capacity.
Examples include:
When such an environment type is requested, enterprise-scale capacity requirements apply before activation may proceed.
No manual classification or subjective approval is performed.
Enterprise-scale deployments require a minimum upfront commitment.
The minimum commitment:
Minimum commitments exist solely to provision capacity, verification, and settlement resources proportional to the requested scale.
Prepaid credits are consumed by:
Credits are consumed automatically as usage occurs.
When prepaid credits are exhausted, usage continues under metered billing and additional charges are applied automatically.
Minimum commitments are not refundable.
Credits represent prepaid capacity, not a membership fee, license, or deposit.
This rule eliminates discretionary refund handling and ensures continuity of operation.
Scale requirements are disclosed progressively.
Participants encounter scale gating only when:
The protocol imposes no upfront friction on experimentation, evaluation, or early adoption.
Pricing is defined to support capacity provisioning without influencing economic outcomes.
The pricing model is designed to:
Pricing does not alter lineage, allocation rules, or payout mechanics.
Candles are priced as individual activation instruments.
Each anchored candle incurs a fixed creation cost.
Pricing is applied at the time of candle creation.
Candles may be configured with predefined expiry parameters selected at creation time. Expiry parameters are fixed, declared in advance, and applied deterministically. Once a candle is created, its expiry cannot be modified, extended, or overridden. Expiry exists solely to bound activation eligibility and does not alter attribution, allocation, or pricing rules.
Pay-per-candle pricing supports:
For higher-volume usage, the protocol supports open-ended metered accounts.
Metered accounts:
Metered billing applies only after usage occurs.
There are no subscription tiers tied to identity, role, or participant classification.
Enterprise-scale capacity may require prepaid credits to ensure availability, throughput, and operational stability.
Prepaid credits:
There is no negotiated minimum commitment inside the protocol. Capacity gating is satisfied through prepaid credits when required.
Prepaid credits represent capacity within the system.
Credits may be consumed by:
Credits are deducted automatically as usage occurs.
Unused credits remain available until consumed.
When prepaid credits are exhausted:
Service is not suspended solely due to credit exhaustion, except where required for risk control, system integrity, or compliance.
Pricing decisions:
All participants are treated identically under allocation rules regardless of pricing tier, commitment size, or deployment scale.
The pricing model applies universally across all deployments, environments, and scales. Scale is not gated by pricing tiers or negotiated thresholds. Capacity is governed exclusively by activation credits, prepaid balances, and activation burn rate.
Only eligible activation events may create lineage entries or participate in allocation.
Eligibility exists to:
Eligibility rules apply uniformly across all environments, candles, and participants.
An eligible activation event is an action that:
Activation events that do not meet eligibility criteria are ignored for lineage and allocation purposes.
Verification is required for all activation events that contribute to lineage.
Verification may include, but is not limited to:
Verification is enforced programmatically.
No activation event is eligible without verification.
The protocol enforces participation constraints to prevent abuse.
Such constraints may include:
The protocol does not require persistent identity disclosure to participants in order to enforce these constraints.
Anti-abuse enforcement is integral to eligibility determination.
The protocol may:
Anti-abuse enforcement operates deterministically and does not alter valid lineage entries or allocation outcomes.
Internal safeguard, abuse-prevention, and validity-gating mechanisms may influence which interactions qualify as accepted activations and are included in the committed activation set.
The specific implementation details of these safeguards are intentionally not publicly disclosed in order to preserve their effectiveness and prevent circumvention.
This non-disclosure does not violate determinism because verification operates on the accepted activation set and the published protocol rules, not on raw traffic or rejected interactions.
Safeguards are structural and rule-bounded. While certain detection or evaluation heuristics may remain private, their function is limited to admission into the committed set and does not alter published rules, outcomes, or allocation once an activation is accepted.
Only activation events that pass eligibility and verification:
Ineligible or unverified events receive no allocation and no payout.
If a candle has only one eligible participant and that participant is both the originator and the closer for the conversion event:
If a lineage contains an originator and a closer with no intermediates between them:
In this case, the fixed intermediate pool (0.15 · C) is reassigned to the originator.
This reassignment is deterministic and does not constitute a discretionary adjustment.
If a lineage contains multiple intermediates:
Increasing lineage length does not increase the total allocation to intermediates.
This behavior is intentional and reflects diminishing contribution as distance from conversion increases.
Any activation attempts occurring after a conversion event:
Post-conversion appending produces no retroactive entitlement.
If multiple parties assert responsibility for a conversion:
The protocol does not adjudicate subjective disputes.
If multiple conversion events occur from the same candle:
Accrued balances may combine across events for payout threshold purposes.
If a conversion event fails to settle:
If a transaction reverses after provisional recording but before payout:
If an activation event is determined to be ineligible prior to settlement:
If settlement has already occurred, reversal handling follows Section 6.
In the event of system faults or interruptions:
There are no discretionary reallocations due to system interruption.
An environment is a bounded operational context within which candles operate, lineage is constructed, and conversion events occur.
An environment may represent, for example:
Every candle operates within exactly one environment at any given time.
Environments are isolated from one another.
Isolation rules include:
Actions in one environment have no effect on:
This isolation ensures clarity, auditability, and deterministic outcomes.
A candle is associated with an environment at the time it is anchored.
Rules:
Environment association defines context only and does not imply ownership, entitlement, or preferential treatment.
An environment progresses through defined lifecycle states.
Lifecycle states may include:
Lifecycle transitions are system-controlled and do not modify lineage, allocation, or payout rules.
Environments may be subject to capacity constraints based on:
Capacity constraints are enforced automatically according to the Scale and Capacity Model defined in Section 7.
Requests exceeding environment capacity Requests exceeding environment capacity may require prepaid credits to provision the required throughput or operational load. This requirement is rule-based and does not alter pricing, attribution, allocation, or verification.
Certain operations occur at the environment level.
Environment-level operations may apply to candles and other activation instruments deployed within an environment.
These may include:
Access to environment-level operations may be gated by scale and capacity requirements.
The protocol enforces integrity within each environment.
Integrity enforcement may include:
Integrity enforcement operates deterministically and does not alter valid lineage entries, allocation outcomes, or payouts.
Section Status
Section 11 defines how environments function as isolated operational contexts within the protocol.
Environment rules preserve determinism, auditability, and correctness at scale.
All protocol outcomes are governed by deterministic rules.
For any conversion event:
are derived mechanically from published rules and recorded events.
There are no discretionary adjustments, overrides, or negotiated outcomes.
The allocation model is published and invariant.
Participants may inspect:
Given identical inputs, the protocol always produces identical outputs.
The protocol maintains authoritative records of:
Official records must be maintained in full to support auditability and internal verification, and to support third-party review when authorized.
Sensitive operational and business data, including but not limited to revenue amounts, volumes, and partner performance, is not required to be publicly disclosed.
The public blockchain is used to anchor cryptographic commitments such as hashes, Merkle roots, and protocol rule version identifiers sufficient to enable independent verification.
Independent verification is achieved through mathematical proof of correctness against committed data and published rules, not through public exposure of raw transactional or business data.
Participants may be provided visibility into:
Visibility does not confer control, discretion, or influence over outcomes.
The protocol minimizes disputes by:
Subjective claims, assertions, or interpretations do not affect protocol outcomes.
Transparency concerns what rules apply and how outcomes are computed.
Enforcement concerns how eligibility and verification are implemented.
The protocol discloses rule logic and outcome computation while not requiring disclosure of enforcement mechanisms that protect system integrity.
The protocol is designed to operate in mobile-first contexts.
Primary interactions are expected to occur on mobile devices, including:
Mobile interfaces prioritize speed, clarity, and minimal friction.
Desktop interfaces may complement mobile usage but are not required for protocol participation.
Desktop interfaces are intended primarily for administrative and oversight functions, including:
Desktop access does not alter protocol rules and does not confer allocation, eligibility, or payout privileges.
Eligibility, verification, scale gating, allocation, and payout enforcement are designed to operate without routine human intervention.
Manual review may occur only in exceptional circumstances, including:
Manual review does not modify valid lineage entries, allocation outcomes, or payout determinations.
The following invariants must hold across all implementations:
Implementations may evolve, but these invariants must remain intact.
Protocol versions may evolve over time.
Changes to the protocol:
Backward compatibility is preserved for existing candles and lineages unless explicitly deprecated by a future protocol version.
The protocol defines rules and guarantees.
Products and interfaces:
Product changes do not modify protocol-defined behavior.
Public communication materials are derivative explanations of the protocol.
They exist to:
Public materials do not define rules and do not override protocol behavior.
The protocol defined in Sections 1 through 13 is authoritative.
The public website may present simplified descriptions of the protocol.
Website summaries may include:
Website content must:
Acceptable phrasing includes:
The website must not publish:
FAQ content may expand on website summaries but remains non-normative.
FAQs may explain:
FAQs must:
FAQs must not:
Product interfaces may display prompts and notices derived from protocol rules.
Examples include:
UI prompts:
All UI messaging must remain consistent with protocol definitions.
Sales materials, partnerships, and external discussions may reference protocol behavior at a conceptual level.
Sales materials may:
Sales materials must not:
Any commitment beyond protocol-defined behavior requires a formal protocol amendment.
In the event of conflicting explanations, the following precedence applies:
No derivative material may supersede or reinterpret the protocol.
Amendments to this protocol may be proposed only by the protocol steward.
No participant, partner, Brand, or deployment has the authority to alter protocol rules unilaterally.
All protocol changes must be versioned.
Each protocol version:
Historical versions remain authoritative for outcomes settled under those versions.
Protocol amendments do not retroactively alter:
Once revenue has settled and allocation has been recorded, outcomes are final under the protocol version in effect at the time of conversion.
Future protocol versions may introduce:
Such changes must:
The following invariants must be preserved across all protocol versions:
Any amendment that violates these invariants constitutes a new protocol rather than a modification of this one.
Features, environments, or behaviors may be deprecated in future versions.
Deprecation:
Deprecated features may continue to operate for a defined transition period.
In rare circumstances involving:
Temporary emergency changes may be applied.
Such changes:
Emergency changes do not establish precedent and do not modify core protocol invariants.
Section Status
Section 15 defines how the protocol evolves while preserving determinism, fairness, and auditability.
Protocol authority is explicit, changes are controlled, and history is never rewritten.
Final Constitutional Summary
CANDLE SEALING SPEC v1.0
IDDAS Protocol - Canonical Commitment Event
The Candle Seal is the irreversible commitment action that converts a candle-based opportunity into a secured, verifiable deal object within IDDAS. This spec defines:
This spec is protocol law. UI, animation, and implementation must conform to it.
The only valid sealing path is:
With the flame off, six rapid taps anywhere open enterprise access. Sealing happens only from that enterprise path.
There are:
This action is universal across contexts, devices, and environments.
A candle may be sealed only if all of the following are true:
Notes:
Duration
Feedback during hold
If the user releases early:
When the 5-second hold completes:
There is no confirmation dialog. Completion of the hold is the commitment.
Once sealed:
This irreversibility is intentional and required. Sealing is equivalent to signing a contract, sealing a letter, or committing a transaction.
The candle remains:
Sealing is a moment, not a mode switch. After sealing:
Upon successful sealing, the system MUST generate a single immutable Seal Event containing:
This event is immutable, verifiable, and is the authoritative record of commitment.
Any post-seal steps occur outside the candle and outside this specification. This spec governs only the sealing action, its prerequisites, its irreversibility, and the resulting Seal Event.
The Candle Seal is not:
There is one candle. There is one seal.
This spec governs UI design, animation, engineering implementation, documentation, and website language. If an implementation conflicts with this spec, the spec wins.
Status
CANDLE SEALING SPEC v1.0 - LOCKED
The IDDAS Protocol distinguishes between event truth and derivative services.
Activation events are free to exist. Event truth, sequence validity, and lineage integrity are never gated by payment, balance, or account state.
The protocol reserves the right to introduce economic systems that operate strictly downstream of raw event generation. Such systems may include:
No economic mechanism may:
Event truth is neutral and permanent. Derivative certainty, services, and guarantees may be priced.
This separation is a permanent invariant of the protocol.
The IDDAS Protocol is action-first and identity-optional.
All activation events - including ignite, seal, save, share, and lineage extension - must be recordable, verifiable, and replayable without requiring identity, payment, balance, or account state.
Event truth, sequence validity, and lineage integrity shall never be defined, altered, suppressed, or invalidated by any economic mechanism.
The protocol explicitly reserves the right to introduce secondary economic systems that operate downstream of raw event generation. These may include:
Such secondary systems must not precondition, gate, or modify the creation of activation events.
No fee, payment, credit, or economic requirement may be imposed as a prerequisite for an activation event to exist, be recorded, or be considered valid.
Economic mechanisms may only apply to derivative services, post-event processing, or optional capabilities that do not affect event truth.
This separation is a permanent invariant of the protocol.
The IDDAS Protocol is governed by fixed, published rules that define event truth, sequence validity, lineage, and verification.
Governance mechanisms may evolve over time, including councils, stewards, validators, auditors, or institutional oversight structures.
No governance mechanism may:
Governance exists to steward operation, compliance, and evolution - not to redefine truth.
The protocol may be instantiated within different legal, regulatory, or sovereign contexts, including national or jurisdictional deployments, provided core protocol invariants remain unchanged.
Localized policy overlays may exist, but they must not modify:
No single governance body, jurisdiction, or authority defines protocol truth.
Protocol integrity is independent of governance structure.
IDDAS is an activation-before-identity protocol. It records real engagement, creates lineage from participation, and allocates outcomes using deterministic rules instead of negotiated attribution.
An activation is a verified, intentional entry into the system initiated by a person.
This typically occurs when someone deliberately scans a code or opens an activation link and enters the activation flow. Passive exposure does not count.
No.
An activation is an entry event. A purchase or conversion is a separate outcome that may or may not occur later.
Activations create eligibility and lineage. Conversions create revenue.
Charges occur only when a verified activation happens.
If no one activates, no charge occurs.
Charges are not based on impressions, views, or passive exposure.
Then no revenue is created and no allocation occurs.
The system does not create speculative value or implied entitlement.
Because impressions are passive and probabilistic.
IDDAS charges only for intentional engagement that creates a verifiable activation event. This removes guesswork, disputes, and retroactive attribution.
No.
Saving, sharing, or completing additional actions deepens lineage, but an activation exists as soon as intentional entry occurs.
A fixed price prevents negotiation, exceptions, and discretionary outcomes.
Everyone knows the rule in advance, regardless of size, industry, or use case. This preserves fairness and predictability at scale.
Rules can change only through explicit versioning.
Changes apply prospectively. Past outcomes remain verifiable against the rules in effect at the time they occurred.
There are no silent changes and no retroactive adjustments.
Allocation follows a published, deterministic rule.
No participant, operator, or administrator can manually override outcomes after the fact.
Activations require intentional human entry and the creation of valid session state.
Automated traffic may load URLs, but it cannot easily generate valid activation contexts or undetectable lineage at scale. Invalid activity does not qualify as an activation by definition.
No.
You are charged only for people who activate. Attendance alone does not create a charge.
Yes.
Deployment scope, event boundaries, and minimums can be defined. Pricing per activation remains fixed.
Sharing creates new activations linked by lineage.
Attribution follows recorded lineage rather than last-touch claims.
No.
Loyalty programs can be built on top of IDDAS, but activation does not require enrollment, accounts, or identity.
No.
CandleMe is one implementation built on top of the protocol. The protocol itself is independent of any specific product or interface.
Protocols create durability.
By fixing the rules first and making outcomes verifiable, IDDAS allows others to build without fear that success will later change the outcome. Trust comes from rules, not discretion.
It replaces:
No.
Participants in IDDAS, including Infrastructure Originators, deployers, brands, and end users, do not act as agents, contractors, brokers, representatives, or affiliates of IDDAS or of each other.
Participation creates no authority, obligation, or representation relationship of any kind.
All actions are performed independently under the same published protocol rules.
IDDAS does not sell access, exposure, outcomes, leads, or personal data.
Charges apply only to verified activation events as defined by the protocol.
An activation is a recorded, intentional entry event. It does not guarantee engagement, conversion, revenue, or results.
Payment is for the occurrence of the event itself, not for performance.
No.
Participation in IDDAS creates no obligation to perform, promote, convert, or deliver outcomes.
The protocol does not guarantee results, revenue, engagement, or success for any participant.
Outcomes follow rules. Effort, intent, or expectation does not create entitlement.
An Infrastructure Originator is a protocol-level lineage root that authorizes and anchors one or more activation surfaces that later produce verified activations.
Infrastructure Originator status is not granted, approved, or claimed. It emerges only if downstream, protocol-valid activations occur.
An activation surface is any protocol-issued entry mechanism that enables intentional activation.
Surfaces may be physical, digital, or hybrid. Function matters, not form.
If intentional entry occurs and produces a valid activation, the surface qualifies.
No.
Infrastructure Originators may authorize or enable deployment without physically creating, installing, or operating the activation surfaces themselves.
The protocol records origination structurally, not operational effort.
No.
Infrastructure Origination is not a sales role, affiliate program, referral scheme, or commission for introductions.
Infrastructure Originators are compensated only when protocol-valid activations occur through originated surfaces.
If a valid infrastructure origin exists, a fixed Infrastructure Originator share is allocated automatically according to the protocol rule.
If no qualifying activations occur, no allocation occurs.
The Infrastructure Originator share is allocated from the platform share.
It does not reduce participant distributions and does not alter lineage-based allocations.
An Infrastructure Originator is not an employee, contractor, sales agent, or reseller.
It is a protocol-defined attribution role that emerges only when originated activation surfaces produce verified activations.
Infrastructure Originator attribution does not imply approval, endorsement, exclusivity, or responsibility.
Payment occurs only if qualifying revenue exists and only according to the published rule.
No.
Infrastructure Originator attribution is written at activation creation time and cannot be edited, reassigned, or removed retroactively.
Off-protocol agreements do not alter protocol outcomes.
Protocol attribution is structural and deterministic.
Attempts to replicate, suppress, or bypass Infrastructure Originator allocation while using protocol-generated activations do not affect on-protocol results and may violate access terms.
No.
Infrastructure Origination does not require identity, registration, or approval.
Identity may be required later only to claim funds, according to protocol rules.
No.
Infrastructure Origination creates eligibility, not entitlement.
Payment occurs only if qualifying activations and qualifying revenue occur.
Activations associated with prohibited or illegal activity do not produce qualifying revenue.
No allocation or payout occurs for non-qualifying revenue, regardless of attribution.
Use of IDDAS remains subject to the platform’s Terms and Conditions and applicable law.
Protocol attribution does not override enforcement, compliance, or legal requirements.
Because infrastructure contribution is structural, not discretionary.
Encoding origination as a rule prevents disputes, renegotiation, and retroactive exclusion as systems scale.
Because these are structural questions, not marketing claims.
The FAQ exists to eliminate ambiguity before it becomes conflict.
These are intentionally direct - and intentionally separated - so the standard FAQ stays clean.
No.
QR codes, links, and attribution already exist. IDDAS is not about inventing those primitives. What is new is the order of operations and the governance model.
IDDAS enforces that activation happens before identity, attribution follows lineage instead of accounts, and economic outcomes follow a published rule that cannot be silently changed. Most systems do the opposite - they start with identity, infer attribution later, and negotiate economics case by case.
That combination is the difference.
There are competitors to parts of IDDAS.
There are attribution tools, referral platforms, ad-tech systems, IoT platforms, and blockchain protocols. None of them combine identity-free activation, object-based capabilities, lineage-based attribution, fixed economics, and independent verification in a single system.
So we don’t claim there are no competitors. We claim there are no direct protocol peers.
IDDAS does not rely on identity to prevent fraud.
It relies on verifiable actions, environment constraints, and lineage. Activations are bound to specific objects or environments with defined capabilities. Patterns, limits, and verification anchors detect abuse without forcing identity at the start.
Identity can be introduced later if required, but it is not foundational. This is why IDDAS works in crowds, public spaces, and shared environments.
In the short term, it reduces flexibility. In the long term, it creates trust.
Protocols publish rules in advance so participants can rely on outcomes. IDDAS separates infrastructure from governance. Clients pay for activations. Distribution follows a published rule. No silent changes. No per-client exceptions.
That constraint is intentional.
Blockchain is not used for user interaction, payments, or identity.
It is used only as a neutral verification layer to anchor rule versions and payout proofs so outcomes cannot be rewritten after the fact. No wallets are required. No tokens are required. No participant needs crypto knowledge.
If a better neutral verification layer existed, IDDAS could use that instead. The goal is verifiability, not crypto.
SaaS can change rules quietly. Protocols cannot.
IDDAS publishes the order of operations, attribution logic, and economic rules in advance. Even the operator is bound by them. That constraint is what makes it a protocol rather than a configurable product.
Interfaces can be copied. Features can be copied.
What cannot be easily copied is credibility earned through consistency. Protocols win by being first, clear, and stable. Once participants rely on a rule, switching costs are not technical - they are trust-based.
IDDAS also has patent protection, but more importantly, it has protocol legitimacy.
Because it requires giving up short-term control.
Most companies want pricing flexibility, bespoke deals, and the ability to change rules quietly. Protocols require deciding hard constraints early - what never changes, what cannot be customized, and what even the operator is not allowed to do.
Most teams avoid that. IDDAS didn’t.
No.
CandleMe is a carrier, not a fork. It proves that IDDAS works at the object level, not just in apps or accounts. Stadiums, out-of-home advertising, events, transit, and physical products all use the same activation logic.
CandleMe demonstrates generality, not limitation.
A real competitor would need to start with activation before identity, bind capabilities to objects or environments, use lineage-based attribution, enforce fixed and published economic rules, provide independent verification, and work across industries without rewriting core logic.
No existing system does all of this today.
IDDAS is not special because it is clever. It is special because it is constrained.
The system deliberately limits what the operator can do so others can rely on outcomes. That is why it behaves like a protocol, not a product.
IDDAS is operated by an entity, but governed by published rules.
Operational control (infrastructure, uptime, integrations) remains with the operator. Outcome control (attribution, economics, verification) is constrained by the protocol. The operator cannot silently rewrite attribution logic, retroactively alter payouts, or change economic splits without publishing a new rule version.
This separation is deliberate. It limits operator power so participants can rely on outcomes.
The protocol rules and verification anchors remain valid regardless of company changes.
Because rule versions and payout proofs are independently verifiable, historical outcomes do not depend on ongoing trust in the operator. A new operator must honor existing rules going forward or publish a new version that applies only to future activations.
This is one of the reasons IDDAS behaves like a protocol rather than a traditional SaaS vendor.
Yes, by design.
IDDAS does not optimize for bespoke enterprise deals. It optimizes for predictable, repeatable outcomes. Enterprises still configure deployments, environments, and campaigns, but the core rules are not negotiated per client.
This is the same tradeoff every successful protocol makes: less short-term flexibility in exchange for long-term reliability.
Identity is not a scaling primitive. Verification is.
IDDAS scales by anchoring actions to environments, objects, and capabilities rather than user accounts. Rate limits, context constraints, environment capacity, and lineage validation scale far better in crowds than identity-based systems.
Identity can be layered in selectively where required, but it is never the bottleneck.
IDDAS is compatible with identity requirements without being dependent on them.
Identity, consent, and compliance layers can be introduced at the edge when required by law or policy. The protocol itself does not prevent identity usage - it simply does not require it to begin.
This allows IDDAS to operate across jurisdictions with different regulatory expectations.
At first, yes. Over time, it becomes simpler than account-based attribution.
Lineage answers a clearer question: how did this happen? Customers do not need to understand every internal detail. They only need to know that attribution follows a verifiable chain of actions rather than opaque platform decisions.
Most users never see lineage directly. They benefit from its fairness indirectly.
Protocols do not prevent innovation. They constrain where it happens.
IDDAS allows innovation at the object level, environment level, campaign level, and content level. What does not change is how value is attributed and distributed once outcomes occur.
This creates a stable foundation on top of which innovation can safely happen.
Then IDDAS is likely not the right system for that use case.
IDDAS is designed for environments where predictability, neutrality, and verifiability matter more than bespoke terms. That constraint is intentional and helps maintain trust across participants.
Not every system should be a protocol. IDDAS chooses to be one.
Often, yes.
Protocols typically grow more slowly at first because they refuse shortcuts. Over time, they tend to become deeply embedded because switching away means losing predictability and trust, not just features.
IDDAS is built for durability, not velocity at all costs.
The biggest risk is breaking its own rules.
If IDDAS were ever to undermine its published constraints, it would stop being a protocol and become just another platform. That risk is taken seriously, which is why verification and rule versioning are core, not optional.
Trust is not claimed. It is enforced.
IDDAS is intentionally opinionated. It does not try to serve every business model. It exists to make real-world activation, attribution, and value distribution reliable in environments where identity-first systems fail.
That tradeoff is the point.
IDDAS is rigid where trust matters and flexible where innovation matters.
The protocol fixes the order of operations, attribution logic, and economic rules. Everything else - environments, objects, campaigns, interfaces, integrations, and content - can evolve freely.
This separation allows IDDAS to adapt to new markets without undermining past outcomes.
The protocol itself.
Because rules are published in advance and outcomes are verifiable, IDDAS cannot quietly privilege one participant over another. The operator provides infrastructure, not discretionary authority over attribution or payouts.
Gatekeeping requires opacity. IDDAS is designed to remove it.
Then the answer is no.
IDDAS cannot change rules retroactively or privately. Any change must be published as a new rule version and applies only to future activations. If a customer requires bespoke economics or exceptions, IDDAS is likely not the correct system for that use case.
This constraint protects everyone else.
Only operationally, not economically.
Infrastructure decisions can change. The protocol rules that govern attribution and distribution are constrained by publication, versioning, and verification. Any attempt to undermine those constraints would be visible and would invalidate trust.
Protocols survive leadership changes because their legitimacy is rule-based, not personality-based.
It would be, if identity were the only safety tool.
IDDAS uses environment constraints, capability limits, rate controls, and lineage validation to maintain safety. Identity is available when required, but it is not the default control mechanism.
This mirrors how physical systems work: tickets, doors, meters, and tools do not ask who you are first. They enforce rules through design.
Not all activations are billable.
IDDAS distinguishes between raw triggers, qualified activations, and billable outcomes. Qualification thresholds, environment constraints, and pattern analysis prevent noise from becoming value.
Billing is tied to verified, intent-qualified activations, not volume alone.
Less, not more.
Traditional platforms require trust that rules won’t change quietly. IDDAS reduces that trust requirement by making rules explicit and outcomes verifiable. Participants do not need to trust intentions. They can verify behavior.
That shift is fundamental.
Sometimes, yes.
Not every use case needs a protocol. IDDAS is designed for environments where scale, neutrality, and attribution fairness matter. For simple, closed systems, lighter tools may be sufficient.
IDDAS does not try to replace everything. It exists for cases where failure modes are expensive.
That trust should be enforced by structure, not promised by brand.
IDDAS assumes that real-world activation systems will increasingly operate in shared spaces, crowds, and environments where identity-first models break down. In those contexts, rules must be clear, fixed, and verifiable.
That belief shapes every design decision.
If IDDAS ever allowed silent rule changes, retroactive outcome manipulation, or discretionary attribution, it would stop being a protocol.
That is the line that is not crossed. Everything else is negotiable.
IDDAS is not trying to be everything to everyone. It is intentionally opinionated. Its strength comes from choosing constraints early and living with them.
That is why it behaves like a protocol instead of a platform.