Manifest‑Governed AI + Scenario Risk
Every AI call runs under a signed Universal AI Processing Key (UAPK) manifest. QIRE delivers scenario bands — not guesses — for policy‑aligned, auditable decisions.
🚀 Request a Pilot LOIWhat this is
UAPK — a signed, content‑addressed manifest that enforces policy, provenance, and audit for AI workflows.
QIRE — a quantum‑inspired risk engine that outputs multi‑scenario predictions (p10 / p50 / p90) in one pass.
Capability checks · Post‑quantum signature · Immutable logs
Request → Policy → Service → Log CID
p10/p50/p90 with actionable levers
Why UAPK + QIRE¶
- Compliance‑first AI — Executions are bound to manifest policy and risk guardrails.
- Reproducible & Portable — Identical inputs ⇒ identical outcomes; deployable across cloud/on‑prem/edge.
- Provable Audit Trail — Each call logs a content‑addressed CID for forensics and reporting.
- Actionable Risk, not Point Estimates — QIRE returns scenario bands with levers to change outcomes.
Looking for 3 design partners (banking, insurance, BigLaw) for focused 4–8 week pilots.
Pilot Program (4–8 weeks, API‑only)¶
Format: JSON‑in/JSON‑out endpoints under a UAPK manifest (signature, capability checks, immutable log CID).
No dashboards. No custom builds. Fixed scope, fixed KPIs.
1) RegExplain¶
Basel/CRA/MiFID pass/fail + clause citations.
KPIs: ≥ 60% manual review time saved · ≥ 90% citation accuracy.
2) AlertRank¶
AML alert clustering + policy‑gated auto‑close.
KPIs: ≥ 40% false positives auto‑closed at < 1% FN (audited).
3) Bellsfall (QIRE demo)¶
Scenario bands for people/things (entertainment/education).
KPIs: Demonstrate p10/p50/p90 + levers; privacy & governance validated.
➡️ Start: Request a Pilot LOI
How It Works (at a glance)¶
- Request enters with a minimal payload.
- UAPK manifest enforces capabilities (what’s allowed) and policy (how it must run).
- Service executes (retrieval, reasoning, generation) inside the manifest’s guardrails.
- Immutable log writes a CID (content hash) for the call + explanations.
Bring your own stack
Manifests reference your connectors, corpora, models, and policies by content hash. No need to move data or retrain.
Governance Pillars¶
- Signed Manifests — Ed25519/post‑quantum‑ready signatures bind identity to the content hash.
- Capability Gating — Only permitted tools/endpoints can run for a given role.
- No‑PII Default — Zero‑retention unless policy explicitly allows storage.
- Provenance — Every call writes an auditable CID; rollups feed reports and regulators.
QIRE: Scenario Risk Bands¶
Instead of a single guess, QIRE returns multiple scenarios:
```json { "subject": "entity-id", "scenarios": [ { "name": "p10", "score": 0.12, "explain": ["factor:A↓", "factor:B↑"] }, { "name": "p50", "score": 0.34, "explain": ["factor:A≈", "factor:C↑"] }, { "name": "p90", "score": 0.71, "explain": ["factor:B↑↑", "factor:D↓"] } ], "levers": [{"name": "KYC.depth", "direction": "+", "delta": 0.08}] }