Dual-Source Identity Derivation: Hardware Anchors and Local State Vectors Combined Per Epoch

by Nick Clark | Published March 27, 2026 | PDF

Per-epoch identity contributions from either static hardware anchor plus volatile salt, or local state vector plus strong extractor, or hybrid combining both. Within the keyless identity system, this capability operates as a structural primitive at the identity level. It is not an optional enhancement or a configurable plugin but a mandatory architectural property that every participant encounters. The result is a system where dual-source identity derivation is enforced by construction rather than by convention, policy, or external oversight.


What It Is

Per-epoch identity contributions from either static hardware anchor plus volatile salt, or local state vector plus strong extractor, or hybrid combining both. This is a structural mechanism within the keyless identity system that operates at the identity level. It is not advisory, not configurable at the discretion of individual participants, and not dependent on external enforcement infrastructure.

Every interaction within the system encounters this mechanism as a mandatory constraint. The behavior it produces is deterministic: given the same inputs and the same system state, the outcome is identical regardless of which node evaluates it, when the evaluation occurs, or what substrate hosts the computation.

Why It Matters

Conventional identity systems address this problem through persistent cryptographic keys, certificates, or biometric databases. These approaches function adequately under controlled conditions but introduce structural fragility when keys are compromised, certificates expire, or databases are breached. The underlying assumption that stored credentials remain secure over their lifetime becomes a liability precisely when reliability matters most.

Dual-source identity derivation removes this fragility by embedding the relevant capability directly into the identity layer. There is no external dependency that can fail independently, no middleware that can be misconfigured, and no trust assumption that can be violated by a single compromised participant. The guarantee is structural.

How It Works

The mechanism operates through deterministic evaluation embedded in the keyless identity system. When a relevant operation is initiated, the system evaluates the applicable structural constraints against the current state. This evaluation consults the fields, policies, and lineage records that travel with the objects themselves rather than relying on external state that may be stale, unavailable, or compromised.

The outcome of each evaluation is recorded in an append-only lineage structure. This record is cryptographically committed, ensuring that the complete history of decisions, transitions, and state changes remains auditable and tamper-evident. No evaluation outcome can be retroactively altered without breaking the cryptographic chain.

Because the evaluation logic and the data it operates on travel together, the mechanism functions identically across network partitions, substrate migrations, and administrative boundaries. There is no central evaluation point that must be available for the system to operate correctly.

What It Enables

With dual-source identity derivation as an architectural primitive, systems built on this foundation can operate autonomously while maintaining the structural guarantees that centralized architectures achieve through oversight. The capability is not a tradeoff between autonomy and governance but a resolution of the apparent conflict between them.

This enables deployment across centralized cloud infrastructure, federated multi-party environments, fully decentralized networks, and edge installations with intermittent connectivity. The structural guarantees hold regardless of deployment topology because they are properties of the objects and protocols themselves, not properties of the infrastructure that hosts them.

Nick Clark Invented by Nick Clark Founding Investors: Devin Wilkie