Closed-Room Demonstration
KeyIdentity conducts closed-room demonstrations for qualified institutional counterparties evaluating sovereign authorization infrastructure. Each demonstration is conducted in an isolated sandbox environment under strict confidentiality controls with full audit trail visibility.
What Is Demonstrated
The closed-room demonstration presents a complete operational cycle of the KeyIdentity Federation Protocol — from identity enrollment through transaction authorization to cross-jurisdictional federation — in a controlled sandbox environment.
Live Authorization Flow
End-to-end transaction authorization: FIK issuance, RSAT generation with ephemeral key pair, cryptographic verification, and authorization decision — completed within the 120-second token lifetime.
Edge Appliance Verification
Simulated biometric verification on certified hardware. Demonstrates that no biometric data enters the network — the secure enclave has no network stack. Hardware-enforced isolation.
Sovereign Node Operation
National gateway operation under sovereign policy enforcement. Demonstrates jurisdiction-scoped authorization, policy application, and revocation authority over all identities within the node.
Cross-Jurisdictional Federation
Federated Identity Assertion (FIA) exchange between two sovereign nodes under bilateral agreement. Demonstrates non-linkable, 60-second cross-border authorization with no identity leakage.
Audit Trail Integrity
Real-time audit trail demonstration. Every state-mutating operation recorded in append-only storage with operation type, actor, timestamp, and affected resources. No UPDATE or DELETE grants on audit tables.
Key Rotation and Revocation
Live key rotation with zero-downtime transition. Previous verification key retained for in-flight tokens. Revocation cascade from Root Authority through Sovereign Node to individual credentials.
What Artifacts Prove
Each demonstration produces verifiable artifacts that confirm the structural properties claimed in the protocol specification. These are not policy assertions — they are observable, auditable system behaviors.
Biometric Non-Persistence
Network traffic capture during demonstration confirms zero biometric data transmission. The Edge Appliance secure enclave processes biometric matching locally — the hardware provides no exfiltration path.
Ephemeral Token Lifecycle
Authorization tokens are cryptographically bound to a single transaction with a maximum 120-second TTL. Post-expiry verification requests are rejected regardless of signature validity. No master key exists at the edge.
Sovereign Autonomy
Each Sovereign Node operates independently. Demonstration includes deliberate disconnection of one node to verify that remaining nodes continue autonomous operation without degradation.
Complete Audit Coverage
Automated reconciliation confirms every mutating operation has a corresponding audit entry. Audit trail integrity is a Day 30 verification gate in the sandbox evaluation framework.
Non-Capture Enforcement
Structural separation between Protocol Constitutional Domain and Commercial Operating Domain is demonstrated through governance simulation. Foundation and Custodian operate independently of commercial entity state.
Protocol Survivability
Simulated commercial entity failure demonstrates that the protocol persists. Root keys remain under Guardian custody. Sovereign Nodes continue to function. The protocol survives the company.
Operational Constraints
All closed-room demonstrations operate under the following constraints. These are non-negotiable conditions that apply to every demonstration regardless of institutional category or engagement level.
Demonstration conducted in a physically isolated sandbox environment with no connection to production systems or live data
All participants execute a non-disclosure agreement prior to receiving access credentials or briefing materials
No production data, real identities, or actual biometric templates are used — all demonstration data is synthetic
The sandbox environment self-destructs cryptographic material after the evaluation period expires
No recording, screen capture, or transmission of demonstration content without prior written authorization from KeyIdentity
Briefing materials, architecture documents, and economic models shared during the demonstration remain confidential
Demonstration environment operates under the same security controls as production — network zone isolation, RBAC, and audit logging are active
Access is limited to authorized institutional representatives identified in the engagement agreement
Sandbox Evaluation Framework
The closed-room demonstration is the first stage of a structured 90-day sandbox evaluation. Institutions that proceed beyond the demonstration enter a three-phase evaluation timeline:
Bring-Up
Sovereign Node deployment in isolated environment. Hardware Security Module initialization. Role-based access configuration. Network zone isolation verification.
Controlled Validation
End-to-end authorization flows under institutional observation. Performance benchmarking. Security boundary testing. Federation protocol verification between nodes.
Audit and Governance Review
Full audit trail reconciliation. Governance simulation. Regulatory compliance assessment. Decision gate for production deployment authorization.
Prerequisites
Closed-room demonstrations are available exclusively to institutions that have completed the initial qualification stage of the engagement process. Prerequisites include:
- Institutional eligibility confirmed through the engagement form
- Authorized representative identified with institutional email verification
- Non-disclosure agreement executed by all participating representatives
- Institutional category and evaluation scope defined in writing
To initiate the qualification process, submit an institutional inquiry through the engagement form.