Closed-Room Demo

Closed-Room Demonstration

KeyIdentity conducts closed-room demonstrations for qualified institutional counterparties evaluating sovereign authorization infrastructure. Each demonstration is conducted in an isolated sandbox environment under strict confidentiality controls with full audit trail visibility.

What Is Demonstrated

The closed-room demonstration presents a complete operational cycle of the KeyIdentity Federation Protocol — from identity enrollment through transaction authorization to cross-jurisdictional federation — in a controlled sandbox environment.

Live Authorization Flow

End-to-end transaction authorization: FIK issuance, RSAT generation with ephemeral key pair, cryptographic verification, and authorization decision — completed within the 120-second token lifetime.

Edge Appliance Verification

Simulated biometric verification on certified hardware. Demonstrates that no biometric data enters the network — the secure enclave has no network stack. Hardware-enforced isolation.

Sovereign Node Operation

National gateway operation under sovereign policy enforcement. Demonstrates jurisdiction-scoped authorization, policy application, and revocation authority over all identities within the node.

Cross-Jurisdictional Federation

Federated Identity Assertion (FIA) exchange between two sovereign nodes under bilateral agreement. Demonstrates non-linkable, 60-second cross-border authorization with no identity leakage.

Audit Trail Integrity

Real-time audit trail demonstration. Every state-mutating operation recorded in append-only storage with operation type, actor, timestamp, and affected resources. No UPDATE or DELETE grants on audit tables.

Key Rotation and Revocation

Live key rotation with zero-downtime transition. Previous verification key retained for in-flight tokens. Revocation cascade from Root Authority through Sovereign Node to individual credentials.

What Artifacts Prove

Each demonstration produces verifiable artifacts that confirm the structural properties claimed in the protocol specification. These are not policy assertions — they are observable, auditable system behaviors.

Biometric Non-Persistence

Network traffic capture during demonstration confirms zero biometric data transmission. The Edge Appliance secure enclave processes biometric matching locally — the hardware provides no exfiltration path.

Ephemeral Token Lifecycle

Authorization tokens are cryptographically bound to a single transaction with a maximum 120-second TTL. Post-expiry verification requests are rejected regardless of signature validity. No master key exists at the edge.

Sovereign Autonomy

Each Sovereign Node operates independently. Demonstration includes deliberate disconnection of one node to verify that remaining nodes continue autonomous operation without degradation.

Complete Audit Coverage

Automated reconciliation confirms every mutating operation has a corresponding audit entry. Audit trail integrity is a Day 30 verification gate in the sandbox evaluation framework.

Non-Capture Enforcement

Structural separation between Protocol Constitutional Domain and Commercial Operating Domain is demonstrated through governance simulation. Foundation and Custodian operate independently of commercial entity state.

Protocol Survivability

Simulated commercial entity failure demonstrates that the protocol persists. Root keys remain under Guardian custody. Sovereign Nodes continue to function. The protocol survives the company.

Operational Constraints

All closed-room demonstrations operate under the following constraints. These are non-negotiable conditions that apply to every demonstration regardless of institutional category or engagement level.

1

Demonstration conducted in a physically isolated sandbox environment with no connection to production systems or live data

2

All participants execute a non-disclosure agreement prior to receiving access credentials or briefing materials

3

No production data, real identities, or actual biometric templates are used — all demonstration data is synthetic

4

The sandbox environment self-destructs cryptographic material after the evaluation period expires

5

No recording, screen capture, or transmission of demonstration content without prior written authorization from KeyIdentity

6

Briefing materials, architecture documents, and economic models shared during the demonstration remain confidential

7

Demonstration environment operates under the same security controls as production — network zone isolation, RBAC, and audit logging are active

8

Access is limited to authorized institutional representatives identified in the engagement agreement

Sandbox Evaluation Framework

The closed-room demonstration is the first stage of a structured 90-day sandbox evaluation. Institutions that proceed beyond the demonstration enter a three-phase evaluation timeline:

Phase I

Bring-Up

Sovereign Node deployment in isolated environment. Hardware Security Module initialization. Role-based access configuration. Network zone isolation verification.

Phase II

Controlled Validation

End-to-end authorization flows under institutional observation. Performance benchmarking. Security boundary testing. Federation protocol verification between nodes.

Phase III

Audit and Governance Review

Full audit trail reconciliation. Governance simulation. Regulatory compliance assessment. Decision gate for production deployment authorization.

Prerequisites

Closed-room demonstrations are available exclusively to institutions that have completed the initial qualification stage of the engagement process. Prerequisites include:

  • Institutional eligibility confirmed through the engagement form
  • Authorized representative identified with institutional email verification
  • Non-disclosure agreement executed by all participating representatives
  • Institutional category and evaluation scope defined in writing

To initiate the qualification process, submit an institutional inquiry through the engagement form.