BenchmarksStack Ranking
APIsPricingDocsWhite PaperTokenBlogAboutSecurity Demo
Log InGet API Key
Security · 5 min read

Trust Score Engine:
Real-Time Risk Assessment in 20.8µs

How H33's trust score engine evaluates risk in 20.8 microseconds. Behavioral analysis, anomaly detection, and risk classification at wire speed.

~42µs
Auth Latency
2.17M/s
Throughput
128-bit
Security
Zero
Plaintext

Authentication is binary. Trust is continuous. A simple "authenticated" or "not authenticated" answer ignores crucial context: Is this user behaving normally? Is this device recognized? Is this location expected? Is the request pattern suspicious?

H33's Trust Score Engine answers these questions in 20.8 microseconds -- fast enough to run on every request without impacting latency. Integrated directly into the full-stack authentication pipeline that delivers 1.595 million authentications per second, the trust score adds continuous risk intelligence without adding meaningful overhead to the ~42µs per-auth budget.

20.8µs
Full Trust Score
130.5ns
Risk Evaluation
73.9ns
Anomaly Detection
3.1M/sec
Throughput

Why Binary Auth Falls Short

Traditional authentication systems return a boolean: pass or fail. This model worked when threats were simpler, but modern attack surfaces demand richer signal processing. A credential that was legitimate five minutes ago might be compromised now. A device that was trusted last week could be jailbroken today. A login from New York at 9 AM is expected; the same credential from Lagos 30 seconds later is not.

Continuous trust scoring bridges this gap. Instead of a one-time gate, every request carries a confidence value between 0.0 and 1.0 that reflects the probability the request is legitimate. Downstream services consume this score to make granular authorization decisions: full access, read-only, step-up MFA, or outright denial.

A trust score is not a replacement for authentication. It is a continuous enrichment layer that turns a binary gate into a risk-aware policy engine.

The Trust Score Pipeline

Every authentication request flows through a five-stage pipeline that evaluates multiple risk signals:

Risk Eval
130.5ns
Behavioral
271ps
Classifier
271ps
Anomaly
73.9ns
Score
20.8µs

The pipeline is designed for zero-copy data flow. Each stage operates on the same memory buffer, avoiding allocation overhead. The behavioral model and risk classifier both complete in sub-nanosecond time because they execute as lightweight lookup operations against pre-computed decision boundaries cached in the in-process DashMap -- the same 0.085µs-lookup store that powers H33's ZKP cache layer.

What Gets Evaluated

The trust score incorporates multiple signal categories, each contributing a weighted component to the final composite score:

Benchmark Results

January 2026 benchmarks show each component running well under target:

Component Measured Target Status
Risk Evaluation 130.5 ns <1 ms 7,663x under
Behavioral Model 271 ps <250 µs 922,509x under
Risk Classifier 271 ps <200 µs 738,007x under
Anomaly Detector 73.9 ns <250 µs 3,383x under
Full Trust Score 20.8 µs <2 ms 96x under

3.1 Million Trust Scores Per Second

On a 64-core c8g.metal-48xl, the trust score engine can evaluate 3.1 million requests per second — see our full benchmarks for methodology. That's enough capacity to protect the largest applications in real-time.

How Trust Scoring Fits the Full-Stack Pipeline

The trust score engine does not run in isolation. It is embedded directly into H33's single-API-call authentication pipeline, which chains BFV fully homomorphic encryption, STARK-based ZKP verification, and Dilithium post-quantum attestation into one ~42µs operation. The trust score runs in parallel with the ZKP lookup stage, so it adds zero latency to the critical path.

Pipeline Stage Latency PQ-Secure
FHE Batch (32 users, BFV) ~1,109 µs Yes (lattice)
ZKP + Trust Score (parallel) ~20.8 µs Yes (SHA3-256)
Dilithium Attestation ~244 µs Yes (ML-DSA)
Total (32-user batch) ~1,356 µs Full PQ

Because the trust score runs concurrently with the DashMap-backed ZKP cache lookup (0.085µs per query), it is entirely hidden behind the FHE batch computation. The result: you get continuous risk assessment with every authentication call at zero additional latency cost.

Using Trust Scores

Trust scores enable adaptive security policies. Rather than hard-coding access rules, your application can respond proportionally to risk level:

const result = await h33.auth.fullStack({
  userId: 'user_123',
  biometric: faceData,
  mode: 'turbo'
});

// Trust score: 0.0 (suspicious) to 1.0 (trusted)
if (result.trustScore < 0.5) {
  // Require step-up authentication
  await requireMFA(user);
} else if (result.trustScore < 0.8) {
  // Log for review, allow access
  auditLog.flag(result);
} else {
  // High trust, proceed normally
}

Score Thresholds and Policy Tiers

We recommend a four-tier policy model that maps trust scores to concrete actions:

Implementation Note

Trust score thresholds are fully configurable per tenant. Financial services customers typically set the step-up threshold at 0.85, while consumer applications use 0.6. The engine returns the raw score -- your policy layer decides what to do with it.

Privacy-Preserving Design

Trust scoring runs entirely on encrypted data using FHE. This is not a marketing claim -- it is an architectural requirement. The behavioral feature vectors that feed the trust score are encrypted under BFV before they leave the client. The server performs inner-product comparisons, deviation calculations, and anomaly detection entirely in the ciphertext domain. At no point does H33's infrastructure see raw behavioral signals.

Even H33 can't see the signals that produce your trust score -- we only see the encrypted computation results. The Dilithium post-quantum signature on the attestation ensures that neither a classical nor a quantum adversary can forge the trust score output after the fact.

Privacy and performance are not tradeoffs. BFV FHE gives us both: encrypted computation at ~42µs per authentication, with trust scoring included at zero marginal latency.

Why 20.8 Microseconds Matters

Most risk engines operate asynchronously -- evaluating trust in the background and updating scores minutes or hours after the authentication event. By that time, a compromised credential has already been used. H33's approach is fundamentally different: the trust score is computed synchronously, inline with the authentication request, and returned in the same API response. At 20.8 microseconds, the trust engine adds less than half the latency of a single Dilithium signature verification.

This speed comes from three architectural decisions: zero-copy pipeline stages that avoid memory allocation in the hot path, in-process DashMap lookups at 0.085µs for pre-computed baselines, and branch-free scoring logic that eliminates pipeline stalls on modern ARM cores. On the production c8g.metal-48xl with 96 Graviton4 workers, the trust engine scales linearly to 3.1 million scores per second.

Add Trust Scoring to Your Auth

Trust scores are included with every Full Stack Auth call at no extra cost.

Get Started

Build With Post-Quantum Security

Enterprise-grade FHE, ZKP, and post-quantum cryptography. One API call. Sub-millisecond latency.

Get Free API Key → Read the Docs
Free tier · 10,000 API calls/month · No credit card required
Verify It Yourself