Execution Eligibility Indicator: Dynamic Computation From Policy, Memory, and Lineage

by Nick Clark | Published March 27, 2026 | PDF

An eligibility indicator is a derived, machine-readable state advertised on the substrate of a governed object that signals, at the moment of inquiry, whether instantiation of an execution context bound to that object is permitted. The indicator is computed dynamically from policy bindings, memory state, mutation descriptors, lineage, and verified authority, and is published in a tamper-evident form so that any consumer with the public verification material may interrogate it directly without contacting an issuer, an authority service, or any intermediating policy decision point.


Mechanism

The eligibility indicator is realized as a structured field, or set of fields, materialized on the substrate of a governed object and refreshed whenever any input that contributes to the computation changes. Its purpose is to externalize, in advertised form, a determination that would otherwise require a consumer to reconstruct the full evaluation context. By publishing the determination with the object, the framework collapses what would conventionally be a multi-round protocol — request, lookup, evaluation, response — into a single read of substrate-resident state combined with verification of the cryptographic commitments that bind that state to the object.

The computation that produces the indicator takes as inputs the current policy binding attached to the object, the object's memory state including any rollover, decay, or accumulation counters, the most recent mutation descriptor that records the last permitted state transition, the lineage chain that records the complete history of authorized transitions, and the verified authority record that establishes which keys are presently entitled to act on the object. These inputs are reduced through a deterministic evaluation function whose output is a value, or a small tuple of values, expressing the eligibility state. Typical encodings include a permitted/denied bit, a class of permitted operations, a quantitative budget remaining, and a freshness timestamp beyond which the indicator must be recomputed before it can be relied upon.

Because the indicator is computed locally to the substrate that hosts the object, and because the inputs to that computation are themselves cryptographically committed to the lineage chain, the indicator is reproducible by any party that holds the same inputs. A consumer that observes the advertised indicator may, if it wishes, recompute the indicator from the underlying inputs and confirm the published value. This re-derivability is a structural property of the construction: the indicator is not an assertion by an authority but a function of inputs that are themselves verifiable.

Tamper-evidence is achieved by binding the indicator into the same cryptographic commitment scheme that protects the lineage. Any modification to the indicator that is not accompanied by a valid mutation descriptor — a descriptor signed by an entitled authority, referencing the prior lineage tip, and committing to the new state — produces a chain that fails verification. A consumer reading a tampered indicator will detect the inconsistency at the moment of verification, regardless of whether the tampering occurred at rest, in transit, or on a compromised host.

The advertisement of the indicator on the object's substrate is what distinguishes this mechanism from conventional capability tokens or signed assertions. A capability token is a static artifact that must be presented and verified at each use; a signed assertion is a point-in-time statement whose freshness is bounded only by an embedded expiration. The eligibility indicator, by contrast, is a continuously maintained state on the object itself, recomputed in response to each input change, and consulted by reading the object rather than by querying an external service. The consumer's interaction model is therefore symmetric: the same read that retrieves the object's data also retrieves the determination of whether the consumer may act on that data.

Operating Parameters

The indicator carries a freshness window expressed either as a wall-clock interval or as a count of permitted reads, beyond which a consumer must trigger recomputation before acting. The freshness window is a policy parameter and may be tightened for high-risk operation classes or relaxed for read-only classes whose risk profile tolerates staler determinations. A common configuration places the freshness window between one and sixty seconds for state-modifying operations and between one minute and one hour for inspection operations.

The indicator's encoding is parameterized to accommodate operation taxonomies of varying granularity. In the simplest configuration the indicator is a single bit; in richer configurations it is a bitmap over an enumerated operation set, or a set of quantitative budgets each tagged with an operation class. The taxonomy is established by the policy binding and is itself part of the lineage, so that a consumer that reads the indicator also reads the schema by which the indicator should be interpreted.

The verification material required to validate the indicator is published as part of the object's public face and includes the public keys of the authorities that may sign mutation descriptors, the current lineage tip, and any auxiliary commitments required to verify the chain. A consumer that holds this material may verify the indicator without contacting any issuing service. The material itself is rotated through ordinary lineage transitions, so that key compromise can be remediated without abandoning the object.

Computation cost is dominated by the verification of the lineage chain rather than by the evaluation function that produces the indicator. The evaluation function is typically constant-time in the size of the policy and linear in the number of memory inputs; the lineage verification is logarithmic in the length of the chain when the chain is structured as a Merkle accumulator and linear when it is structured as a flat append-only log. For workloads that perform many reads against a slowly changing object, consumers may cache the verified lineage tip and re-verify only the delta since the last read.

Failure modes are explicit. If any input to the computation is missing, stale beyond its own freshness bound, or fails its own verification, the indicator resolves to a denying value rather than to an absent value. The construction does not permit the indicator to be silently skipped: a consumer that reads the object necessarily reads the indicator, and a consumer that cannot verify the indicator necessarily refuses to act. This bias toward explicit denial is a structural property of the design and is not configurable.

Alternative Embodiments

In a first alternative embodiment the indicator is realized as a single scalar value advertised in a fixed field of the object's substrate, and the operation taxonomy is collapsed to permit/deny. This embodiment is suitable for objects whose lifecycle admits only one class of consuming operation and whose policy is uniform across consumers.

In a second alternative embodiment the indicator is realized as a bitmap whose positions are interpreted according to a schema embedded in the policy binding. Consumers that hold the schema may read individual bits to determine eligibility for individual operation classes. This embodiment supports finer-grained access control without requiring multiple objects.

In a third alternative embodiment the indicator is supplemented with a short proof object that allows a consumer to verify the determination without re-executing the full evaluation function. The proof is generated by the substrate that maintains the object and is committed to the lineage. This embodiment reduces consumer-side computation at the cost of a larger advertised payload.

In a fourth alternative embodiment the indicator is published over a side channel — for example, as a record in a directory keyed by the object's identifier — rather than as a field on the object's substrate. The cryptographic binding to the object is preserved through inclusion of the object identifier and the lineage tip in the advertised record. This embodiment is suitable for environments in which the object's substrate cannot be extended to carry the indicator natively.

In a fifth alternative embodiment the indicator is computed lazily on read, rather than eagerly on input change, and the substrate caches the most recent computation along with a hash of the inputs that produced it. A consumer that reads the indicator may verify, by comparing input hashes, whether the cached value remains current.

Composition

The eligibility indicator composes with the lineage chain that records authorized transitions on the object: each recomputation is itself a lineage event, and the chain therefore preserves a complete audit of how the indicator evolved over the object's lifetime. The indicator composes with the policy binding in that the policy supplies the evaluation function and the operation taxonomy; a change in policy is itself a lineage event and produces a corresponding change in the indicator at the moment the policy takes effect.

The indicator composes with mutation descriptors in that a mutation descriptor that alters any input to the evaluation function necessarily produces a new indicator value, and the descriptor and the new indicator are committed together. The indicator composes with verified authority in that the set of keys entitled to alter the indicator is precisely the set of keys entitled to sign mutation descriptors against the object, and rotations of that set are themselves lineage events.

At a higher level, the indicator composes with downstream consumers that rely on it as an input to their own decisions: a consumer that writes its own state in response to a read of the indicator records, in its own lineage, the indicator value it observed and the lineage tip at which it observed it. This produces a transitive audit in which the consumer's actions can be reconciled, after the fact, against the indicator state that authorized them.

Distinction Over Prior Art

Conventional access control mechanisms — including access control lists, role-based access control, attribute-based access control, and capability-based systems — locate the determination of eligibility in an enforcement point that is logically separate from the resource being protected. The consumer of the resource must contact the enforcement point, present credentials, and receive a determination before acting. This construction places the determination at a point that may be unavailable, stale, or compromised, and that may not have visibility into the resource's current state.

The eligibility indicator differs in that the determination is co-located with the resource, computed from inputs that are themselves committed to the resource's lineage, and advertised in a form that any consumer may verify directly. There is no enforcement point to contact, no credential to present, and no determination to receive: the consumer reads the resource and reads the indicator in the same operation.

Conventional capability tokens and signed assertions advertise authorization but not eligibility: they assert that a holder has been granted certain rights but do not reflect the current state of the resource against which those rights are exercised. A capability token issued against a resource that has since exhausted its budget, been placed under quarantine, or had its policy tightened remains nominally valid until expiry and does not signal the resource's changed state. The eligibility indicator differs in that it reflects the resource's current state and is recomputed in response to each input change.

Conventional revocation mechanisms — certificate revocation lists, online certificate status protocol responses, short-lived credentials — address the staleness of authorization assertions but do so by adding additional protocols and additional points of failure. The eligibility indicator differs in that it does not require a separate revocation mechanism: a change that would conventionally trigger revocation is reflected directly in the indicator at the moment the change is committed.

Disclosure Scope

The disclosure encompasses any derived state advertised on a governed object's substrate that signals eligibility for instantiation of an execution context, where the state is computed from policy, memory, mutation descriptors, lineage, and verified authority, and where the state is bound to the object through a cryptographic commitment scheme that renders unauthorized modification detectable. The encoding of the state, the granularity of the operation taxonomy, the freshness window, and the channel by which the state is advertised are matters of configuration and do not depart from the disclosed mechanism.

The disclosure is not limited to any particular cryptographic primitive, hash construction, signature scheme, or substrate technology. Implementations using elliptic curve signatures, post-quantum signatures, hash-based accumulators, or threshold schemes fall within the scope so long as the binding between the indicator and the object's lineage is preserved. Substrates including in-memory data structures, on-disk records, distributed ledgers, and content-addressed stores are within scope so long as the indicator is advertised with the object and verifiable from the object's public material.

The disclosure extends to systems in which the indicator is consumed by automated agents, by human operators, by downstream policy engines, or by any combination thereof, and to systems in which the indicator is advertised publicly, advertised within a closed federation, or advertised only to authenticated consumers. The structural properties of the indicator — co-location with the object, derivation from committed inputs, tamper-evidence, and direct consumer verification — are preserved across these configurations.

Nick Clark Invented by Nick Clark Founding Investors:
Anonymous, Devin Wilkie
72 28 14 36 01