PricingDemo
Log InGet API Key

Not just authentication.
Provable authority.

Every H33 key answers: what is this key allowed to prove, compute, delegate, or trigger — under what governance state, at what time?

H33 keys no longer just answer “is this key valid?” They answer “what is this key allowed to prove, compute, delegate, or trigger — under what governance state, at what time?”

What Q-Key Carries

Six properties. Every key.

Not metadata. Cryptographically bound authority context that travels with the key and constrains every operation.

01

Time Window

Keys are valid for a declared period. Expired keys fail immediately. No grace period.

02

Computation Class

Keys are scoped to specific operations: attest, encrypt, sign, verify, scan. A scan key cannot attest. An attest key cannot sign governance.

03

Delegation Chain

Every key traces back to a human authorization. Agent keys carry their delegation lineage. Sub-delegated keys inherit parent scope constraints.

04

Risk Tier

Keys carry risk classification: sandbox, production, or sovereign. Risk tier determines what the key can touch — sandbox keys cannot produce production attestations.

05

Governance State Binding

Keys bind to the governance state at issuance. If governance changes — policy update, role revocation — keys issued under the old state can be invalidated.

06

Negative Authority Proofs

Prove this key COULD NOT have authorized a specific action. Prove the action was impossible under the key's constraints.

Prove not only what happened.
Prove what was impossible.

Not "we found no record." Proof the action was impossible under the governance state at that moment.

Given a key, timestamp, and action, H33 can prove whether the action was impossible due to creation time, revocation, expiration, authority window, scope, computation class, or recorded denial.

Insurers
Prove a claimed action was not authorized
Auditors
Prove controls prevented access
Banks
Prove a wire or signing action was impossible
AI Governance
Prove an agent lacked authority
Regulators
Verify policy enforcement after the fact
Fraud Defense
Prove insider action was outside scope

This is not API key management. This is verifiable authority infrastructure.

How Q-Key Fits the Trust Stack

Authority is the missing layer.

Code integrity without authority integrity is incomplete. Q-Key closes the gap between who deployed it and what it's allowed to do.

HICS = code integrity
Q-Key = authority integrity New
OIS = operational integrity
CRV = insurance risk integrity
H33-74 = proof export
HATS = continuous governance framework

Q-Key feeds OIS. Unauthorized or over-scoped keys lower operational integrity. Time-scoped, delegated, computation-bound keys improve it.

Roadmap

Three phases. Ship what matters first.

Authority integrity is not a single feature. It's a system that builds on itself.

Phase 1 — Live

Scoped Authority

  • Time-scoped keys
  • Computation class binding
  • Risk tier enforcement
Phase 2 — Building

Delegation & Governance

  • Delegation chains
  • Governance state binding
  • Key lineage DAG
Phase 3 — Coming

Negative Proofs

  • Negative authority proofs
  • Cross-organization delegation
  • Key provenance attestation

Keys that carry authority, not just identity.

See how Q-Key fits into your trust architecture.

Schedule a Demo Explore Standards Architecture