A security infrastructure primitive that proves a verified human owner authorised a specific action — at a specific moment, on a specific device. Not credential possession. Owner presence.
HAL is Haven's commercial infrastructure offering: an embedded software module integrated into the client's application, providing on-device biometric authentication that proves a verified human owner authorised a specific action. The architecture is the security model. The biometric template is generated, stored, and verified inside the user's device hardware-backed secure enclave and is non-exportable. Haven processes signed cryptographic attestations only.
Passwords, TOTP codes, even passkeys prove that a credential is held — not that the legitimate human owner is present and authorising the specific action displayed. As AI agents increasingly act on behalf of humans and high-value transactions migrate to digital rails, this gap is structural, not incremental.
HAL embeds in the client application. Biometric capture and verification happen exclusively in the device's hardware-backed secure enclave. Every authenticated action carries a cryptographic attestation that binds the verified owner to the specific action — replay-protected, action-bound, time-bound.
Biometric templates are non-exportable from the device's secure enclave by hardware design. Haven processes signed attestations and minimal metadata (action ID, timestamp, signature) — never biometric data, never PII, never client business data. Compliance posture is structural, verifiable, and material to enterprise vendor risk reviews.
HAL Standard (native device biometrics, full Haven protocol stack) and HAL Advanced (adds YEO Continuous Facial Recognition for deepfake-defensible high-value verification). Each tier deploys via embedded module, custom SDK, or via the Haven Wallet for federated workforce use cases.
HAL is offered in two tiers. The standard tier delivers Haven's full proprietary protocol stack on native device biometrics — independent of any third-party biometric SDK. The advanced tier layers in YEO Continuous Facial Recognition for deepfake-defensible verification of high-value or high-risk actions. Standard works without YEO. Advanced is the upsell, not the dependency.
Owner-attributed authentication on native device biometrics
Deepfake-defensible verification for high-value actions
HAL Standard removes the YEO dependency as a single point of failure. The Haven protocol stack is patent-defensible and ships on native device biometrics on day one. HAL Advanced is a premium upsell — clients with deepfake-targeted use cases pay more for the YEO CFR layer. This structure: (a) eliminates the existential platform-dependency risk, (b) creates a natural pricing ladder, (c) preserves the YEO licence as commercial value-add rather than infrastructure, and (d) materially raises the M&A floor by ensuring a working product exists independent of any single third-party agreement.
The Owner-Attributed Actions Protocol (OAAP) is the cryptographic core of HAL — and the central asset under USPTO provisional patent 64/032,300. OAAP is what differentiates HAL from every other authentication system. It is not a credential, not a signature scheme, not a session token. It is a protocol that produces a single piece of cryptographic evidence binding a verified human owner to a specific action at a specific moment.
A cryptographic protocol that binds a specific action to a verified human owner at the moment of authorisation, producing a proof that cannot be replayed, cannot be transferred, and cannot be reused for any other action.
Every existing authentication mechanism proves something happened — a credential was used, a signature was applied, a token was presented. OAAP proves who, what, and when, cryptographically inseparable. The "who" cannot be extracted from the "what" because they are mathematically bound in the same proof.
Prove: the bearer holds a secret.
Don't prove: who the bearer is, whether they're present, what they're authorising, or whether they intended to authorise it. The same secret authorises every action it's used for.
Prove: the device has been registered to the user, and the device's biometric unlock succeeded recently.
Don't prove: the verified human is present at the action moment, or that the action being signed is the action the user saw.
Prove: a private key signed a piece of data.
Don't prove: the human owner of the key was present, conscious, or aware of what was signed. Stolen keys produce indistinguishable signatures.
Proves: a verified human owner was biometrically present at the moment of authorisation, and authorised this specific action with these specific parameters. Stolen keys, replayed attestations, transferred credentials, and AI agents acting alone all fail validation.
Every OAAP attestation contains four bindings, mathematically combined into a single signed proof. Removing or modifying any binding invalidates the entire attestation.
| Binding | What it cryptographically commits to | Attack it defeats |
|---|---|---|
| Owner binding | The biometric verification result was generated by the hardware-bound key associated with the enrolled owner on this device. | Stolen credentials, transferred keys, AI agents acting without human authorisation. |
| Action binding | The specific action parameters (transaction amount, recipient, reference, action type) are hashed into the attestation itself. | Replay attacks against different actions, overlay attacks that show one action but sign another, attestation reuse for any other purpose. |
| Time binding | A nonce issued by the validator and a timestamp are committed in the attestation. Validity windows are enforced server-side. | Replay attacks across time, captured-attestation reuse, race-condition exploits. |
| Device binding | The hardware-backed signing key is non-exportable and bound to the device's secure enclave. The attestation includes device-attestation evidence (App Attest / Play Integrity). | Cloned devices, emulator attacks, compromised-device attacks, key extraction attempts. |
The lifecycle of a single authorisation, from action initiation to validated attestation.
Client backend requests a verification session from the Haven validator, specifying the action context (e.g. transfer $50,000 to recipient X). Validator returns a session ID and a fresh nonce.
HAL displays the action context inside its own trusted UI surface — not relying on the client app's display. The user sees exactly what they are about to authorise. This is the basis for action-binding.
Biometric verification runs entirely inside the device's secure enclave. HAL Standard uses native biometrics (Face ID, Touch ID); HAL Advanced layers in YEO Continuous Facial Recognition for multi-frame anti-deepfake verification. Verification produces a TRUE/FALSE result — never the biometric data itself.
If verification succeeds, the four bindings (owner, action, time, device) are combined and signed using the device's hardware-bound non-exportable key. The result is the OAAP attestation — a single signed proof binding the verified owner to the specific action.
The attestation is forwarded (via the client's backend) to the Haven validator. The validator verifies signature, nonce freshness, action binding, and device attestation. A signed receipt is returned. Haven sees only the attestation — never the biometric, never the user identity.
The client backend receives the validation receipt and executes the business action (transfer funds, deploy code, sign document, authorise AI agent execution). The OAAP attestation and validator receipt together form a non-repudiable audit record.
USPTO provisional 64/032,300 (filed 8 April 2026) covers OAAP's core innovation: the structural insufficiency of credential-based authorisation, and the cryptographic protocol that resolves it through inseparable binding of owner verification to specific action context.
The patent defines owner verification functionally — as any non-transferable, non-replayable commitment mechanism. This is broader than biometrics specifically, covering any authentication primitive that satisfies the structural requirements. The protocol's defensibility does not depend on a single biometric vendor.
Explicit claims cover the application of OAAP to AI agent execution flows: real-time gating, pre-authorisation scope, and tiered threshold variants. This is the white space that the IBM/RSAC 2026 announcements and NIST AI agent identity paper (March 2026) confirm as the emerging industry need.
Cleared against Aware Inc. patents, BAID (December 2025), the IBM/Auth0/Yubico RSAC 2026 announcements, and the NIST AI agent identity concept paper. The structural-insufficiency framing of credentials is the defensible positioning that no existing patent or product currently occupies.
OAAP is the protocol; HAL is the canonical implementation. The patent covers the protocol, allowing licensing to other implementers without compromising Haven's commercial position. This separation creates an additional revenue surface beyond direct HAL deployment — protocol licensing to enterprise IDP providers, IAM vendors, and authentication platforms.
HAL is composed of four discrete components. Each has a defined location, a defined responsibility, and a defined data scope. The architectural separation is the security model — enforced by device hardware, not by Haven policy.
Sealed, compiled software component embedded inside the client's mobile or desktop application. Performs the entire biometric lifecycle on the user's device.
First-class architectural component. Handles device replacement, biometric changes (injury, aging), accessibility cases, and re-enrollment via the client's existing identity verification flow.
Validates OAAP cryptographic proofs. Sees only signed attestations — never biometric data, never PII, never client business data. Multi-region edge deployment with documented SLA.
What each party sees, holds, and processes. The architectural separation is enforced by device hardware, not by Haven policy.
| Data Element | End-User Device | Client App | Client Backend | Haven Backend |
|---|---|---|---|---|
| Raw biometric (camera feed) | ● Transient, in-memory only | ○ Never | ○ Never | ○ Never |
| Encrypted biometric template | ● Hardware secure enclave | ○ Never | ○ Never | ○ Never |
| Verification result (T/F) | ● Generated | ● Returned | ● Forwarded | ○ Never (validates proof only) |
| OAAP attestation (signed proof) | ● Generated | ● Passed through | ● Forwarded | ● Validated |
| Audit log metadata | ○ No | ○ No | ● Receipt only | ● Session ID, action ref, timestamp |
| User account / transaction data | ● Yes | ● Yes | ● Yes | ○ Never |
| User identity (PII, session→user mapping) | ● Yes | ● Yes | ● Yes | ○ Never (Haven cannot re-identify) |
HAL does not force the strongest verification on every action. Verification policy is risk-tiered and configurable by the client, balancing security against UX friction and battery impact.
| Action Risk Tier | Verification Method (Standard) | Verification Method (Advanced) | Typical Use Case |
|---|---|---|---|
| Low | Native single biometric check | Native single biometric check | Login, view balance, view settings |
| Medium | Native biometric + action display | YEO single-frame liveness | Standard transactions, AI agent low-stakes actions, settings change |
| High | Native biometric + multi-frame | YEO multi-frame CFR + liveness | High-value transfer, admin actions, AI agent significant actions |
| Critical | Multi-frame + dual biometric (security circle) | Continuous CFR + dual biometric + DASR | Wire transfer over threshold, AI agent high-stakes execution, custodial actions |
A common and legitimate critique of biometric authentication: proving the legitimate human is present is not the same as proving they intended to authorise the specific action displayed. HAL addresses this gap explicitly through action-binding, contextual display, and dual-biometric authorisation — but the gap is real and worth describing honestly.
Biometric verification proves identity and presence. It does not, on its own, prove informed voluntary intent. A user could be coerced, socially engineered, fatigued by approval spam, or shown one transaction in the client UI while a different transaction is actually being signed. These are real attack surfaces that affect every authentication system, including Face ID, passkeys, and hardware tokens.
Every OAAP attestation is cryptographically bound to the specific action being authorised. Stealing or replaying an attestation against a different action fails validation. An overlay attack that shows the user one action while signing another cannot succeed — the action displayed and the action signed must match, and the match is verified server-side.
The HAL Verification Module displays the action context (amount, recipient, reference) inside its own trusted UI surface during verification — not relying on the client app's display. This narrows the surface for screen-injection and accessibility-abuse attacks that depend on client UI compromise.
Configurable rate limiting, cooldown periods, and dual-biometric requirements (Security Circle co-sign) for high-value or anomalous actions. Approval-spam fatigue attacks become structurally harder when high-value actions require co-signing rather than rapid solo approval.
For high-risk actions, HAL requires co-authorisation from a second pre-enrolled owner from the user's Security Circle. Each co-signer biometrically authorises via their own HAL instance. The OAAP attestation carries two owner-bindings; validation requires both. This converts coercion, social engineering, and fatigue from "single-point compromise" attacks to "two-party-collusion" attacks — a structurally harder problem.
The Security Circle is not a recovery mechanism alone — it is the answer to coercion, fatigue, and social-engineering attacks at the Critical risk tier. When a high-risk action is initiated, HAL routes the authorisation request to a pre-enrolled co-signer on a separate device. The co-signer biometrically authorises via their own HAL instance. The resulting OAAP attestation is multi-party: it cryptographically binds two verified human owners to the same action. The attack surfaces this closes:
| Attack vector | Single-auth (HAL alone) | Dual-auth (HAL + Security Circle) |
|---|---|---|
| Coercion (forced authentication) | Defeats HAL — biometric is real | Coercer must compromise a second remote person, on a separate device, in real-time |
| Social engineering ("just approve this") | Defeats HAL — user is genuinely authorising | Second party provides external sanity check — unmanipulated by the social context |
| Approval fatigue (spam approvals) | Defeats HAL — rapid taps may bypass attention | Each high-value action requires a second human, breaking the rapid-tap pattern |
| Single-device insider compromise | Defeats HAL — device is the trusted boundary | Requires compromise of two separate devices and two separate users |
| Deepfake of one user (Advanced tier) | Already mitigated by CFR multi-frame | Compounded — deepfake must succeed against two enrolled users on two devices |
Coercion is not solved by any biometric or cryptographic system in isolation — it requires duress detection, behavioural signals, or human review. But dual-biometric authorisation converts coercion from a single-point attack into a two-party-collusion attack. This is the same structural defence used by bank-grade payment authorisation flows (dual-control, four-eyes principle), implemented cryptographically rather than procedurally.
A standard weakness of dual-control systems is that they leak transaction context to the co-signer. For regulated industries (healthcare, legal, government, financial advisory) this is often non-compliant. HAL implements a three-tier consent model that lets the user — or, where institutional policy requires, the institution — control what the co-signer sees.
Co-signer sees: nothing about the action.
Co-signer attests: "yes, this is the verified user" — biometric proof bound to a session ID and timestamp only.
Best for: personal banking, healthcare, legal, government, and any context where transaction confidentiality matters more than co-signer informed consent.
Co-signer sees: full action context (chosen by the user).
Co-signer attests: the specific action with informed knowledge.
Best for: crypto transfers, B2B transactions, family financial decisions, where the user wants the co-signer to verify what they're approving.
Co-signer sees: full action context (mandated by institutional policy, not user choice).
Co-signer attests: the specific action with informed knowledge.
Best for: wire transfers above threshold, AI agent execution, custodial actions, regulated high-value transactions where the institution carries the risk and requires informed dual-control for liability allocation.
In identity-only mode, the OAAP attestation cryptographically binds the co-signer's identity verification to the action without the co-signer ever seeing the action context. The institution sees both attestations bound to the same action; the co-signer sees only that they verified the user. This selective-disclosure dual-attestation mechanism does not exist in current identity stacks (FIDO, WebAuthn, passkeys) and is a candidate for additional patent claims in the OAAP non-provisional conversion.
An authorised action passes through six discrete stages across three trust boundaries. Biometric data never crosses the device boundary.
Two simulated client integrations demonstrating how HAL applies risk-tiered verification policy. The first shows a low-risk action (an AI agent making a flight reservation) requiring single biometric authorisation. The second shows a high-risk action (a $50,000 wire transfer) crossing the institutional threshold and triggering dual-biometric authorisation via the Security Circle.
An AI travel-booking agent requests authorisation to book a flight on the user's behalf. Action falls below the dual-auth threshold. Single biometric verification required. Demonstrates the OAAP AI-agent biometric sign-off use case — the most strategically important emerging application of HAL.
A $50,000 wire transfer crosses the institutional risk threshold. Dual-authentication is triggered automatically. The user authenticates first, then the action is routed to a pre-enrolled co-signer in the user's Security Circle (institution-mandated action disclosure mode for liability allocation). The OAAP attestation carries two owner-bindings.
A single product (in two tiers), three integration depths. The Embedded Verification Module is the primary delivery mode and is co-branded by default — the "Powered by Haven" or "Secured by Haven" mark is a non-negotiable contractual term, ensuring brand visibility flows through every authentication event.
Sealed binary · Pre-built UI · Co-branded
Drop-in module integrated into the client's mobile or desktop application. Pre-built verification UI with co-branded "Powered by Haven" surface. Lowest engineering cost on the client side. The default and recommended deployment.
Verification primitives · Custom UI
Programmatic access to the verification engine without the pre-built UI. The client builds bespoke verification screens around Haven's primitives. Maximum design flexibility while preserving the security model and patent-protected protocols.
Federated · Push-based · No new app
Leverages the existing Haven Wallet app as the authentication device. Users who already have Haven installed receive authorisation requests from any Haven-integrated enterprise client via push notification. No second Haven app required — the wallet becomes the federated authentication endpoint.
A common diligence question: how is HAL different from passkeys (FIDO2/WebAuthn) plus Face ID, which already provide on-device biometric authentication? The honest answer: passkeys solve a different problem. They prove the device is authorised; HAL proves the registered human is present and authorising the specific action.
| Capability | Passkeys + Face ID | Native Authenticator Apps | Haven HAL |
|---|---|---|---|
| What it proves | Device is authorised for this user | Code-bearer has access to the seed | Verified human owner is present and authorising this specific action |
| Action-binding | Binds to login/session, not to specific actions | Time-based code, not action-bound | Cryptographically binds to the specific transaction or action |
| Continuous presence | Single point-in-time check | Single point-in-time check | Continuous verification during transaction window (Advanced) |
| AI agent execution | Credential delegable to agent → no human required | Token shareable → no human required | Requires human at execution moment — patent-pending |
| Deepfake resistance | Relies on OS-level liveness | N/A (no biometric) | YEO CFR multi-frame anti-deepfake (Advanced tier) |
| Trusted action display | Client app controls display surface | Client app controls display surface | HAL trusted UI displays action context independently |
| Underlying protocol IP | Open standard (FIDO Alliance) | RFC 6238 (open) | Proprietary protocol stack · USPTO 64/032,300 (provisional) + 4 granted CFR patents (Advanced) |
Passkeys are a credential. HAL is an action-authorisation protocol. The two can — and in many deployments will — coexist: passkeys for low-friction login, HAL for high-value action authorisation. HAL does not compete with passkeys at the login layer; it operates at a layer above, where credentials are structurally insufficient. The relevant prior art for HAL is not WebAuthn — it is the gap between credential possession and action authorisation that the AI agent era has made structurally critical.
A serious diligence question: what happens if Apple, Google, or the FIDO Alliance extend their existing platforms to support per-action biometric attestation? The honest answer is that this is a real risk worth addressing directly — not a hypothetical to dismiss. The mitigation is structural, not promotional.
Apple's App Attest, Google's Play Integrity, and the FIDO Alliance's WebAuthn standard could in principle be extended to support per-action biometric attestation. If this happened, it would commoditise the basic mechanism of HAL Standard. This is the single most important strategic risk to Haven's long-term defensibility and we treat it as such — not as an objection to deflect, but as the central question OAAP's patent strategy is designed to answer.
Apple App Attest and Play Integrity are device-level primitives. OAAP is a cross-platform protocol that defines how attestations are constructed, bound to actions, validated, and used in multi-party flows. Even if Apple ships per-action attestation tomorrow, OAAP's protocol layer remains separately patentable and operationally distinct — it is what makes the same attestation usable across iOS, Android, Windows, and any future platform.
OAAP's USPTO claims (provisional, 64/032,300) cover the cryptographic binding of owner verification to specific action context, the AI-agent biometric sign-off variants, and the structural insufficiency framing of credentials. Apple extending App Attest does not in itself satisfy these claims. A platform implementation that triggered the protected mechanism would face enforceability — assuming non-provisional conversion and grant.
Enterprise clients deploy across iOS, Android, Windows, macOS, and web. Even if Apple shipped per-action attestation natively, enterprise applications would still need a unified protocol to handle the same attestation across ecosystems. OAAP is platform-neutral; per-platform primitives are not. This is the same reason FIDO/WebAuthn won — the standards layer survived platform-specific implementations.
The OAAP claims around AI agent biometric sign-off (real-time gating, pre-authorisation scope, tiered threshold) were filed before any major platform announced AI-agent-specific authentication features. The IBM/RSAC 2026 announcements (April 2026) and the NIST AI agent identity concept paper (March 2026) confirm this is the emerging standard need. Apple/Google/FIDO would need to design around the OAAP claims to operate in this space.
| Scenario | Impact on HAL Standard | OAAP Position |
|---|---|---|
| Apple ships per-action Face ID attestation in iOS | HAL Standard's iOS implementation could leverage the new primitive — accelerating, not displacing | OAAP protocol layer still required for cross-platform; patent claims still apply to action-binding mechanism |
| FIDO Alliance ships WebAuthn extension for action-binding | Lowers integration cost; commoditises basic action-binding mechanism | Patent claims around AI-agent sign-off and structural insufficiency framing remain defensible. Standard adoption may accelerate Haven's market education. |
| Google adds per-action attestation to Play Integrity | Android coverage improves; enterprise integration complexity reduces | Cross-platform requirement persists; OAAP remains the unifying protocol layer |
| Major IDP (Okta, Ping) builds proprietary action-binding | Direct competitor at the protocol layer | Most likely acquirer scenario — competitive convergence in this category resolves through acquisition rather than greenfield build |
The market education work — convincing enterprises that credentials are structurally insufficient for AI-agent authorisation — is being done by the largest infrastructure vendors in the world. IBM (RSAC 2026), NIST (March 2026 AI agent identity paper), Auth0/Okta, Yubico, and the broader FIDO ecosystem are all signalling that per-action human-presence authorisation is the next layer. Haven does not have to evangelise a new category — the category is being created by external industry forces, with OAAP positioned as the protocol-level answer that pre-dates the major announcements.
External assessment of HAL has identified five maturity domains required to graduate from "advanced cryptographic concept" to "infrastructure product": protocol formalisation, productisation, operational assurance, ecosystem integration, and governance. The honest framing: of these five domains, only one is meaningfully Haven's pre-exit responsibility. The other four are the natural integration path for an acquirer.
Haven's strategic position is M&A exit, not greenfield enterprise infrastructure build-out. Building SOC 2 certification, IAM connectors, transparency logs, and standards-body engagement pre-exit would consume 12–18 months of runway and $5–15M for no valuation lift — because the acquirer (Cisco, Okta, Microsoft, Ping, ForgeRock) brings these capabilities natively. The maturity roadmap below is the acquirer's natural integration path, with Haven's responsibility focused on protocol-layer defensibility and IP integrity. This converts the AI-feedback's maturity-gap critique from a weakness ("Haven hasn't done these things") to a strategic-fit signal ("Haven supplies the protocol; the acquirer supplies the distribution layer").
Formal RFC-style specification, reference implementation, third-party cryptanalysis, cross-platform key-attestation policy.
Cross-platform SDKs, trusted-UI security spec, dev simulator, signed binary distribution, telemetry.
SLA monitoring, SOC 2 Type II / ISO 27001, validator transparency, HSM key custody, sovereign deployment.
FIDO Alliance engagement, IAM connectors (Okta, Ping, Azure AD), policy templates for regulated frameworks.
Patent grants, threat model, advisory board, licensing clarity, signed changelogs.
The on-device architecture is a commercial asset, not just a security model. It removes the client's biometric compliance burden, eliminates Haven's exposure to centralised-breach risk, and materially simplifies enterprise vendor risk reviews.
Material risks identified during architectural design, including those that will be raised in any serious diligence process. Each is paired with a defined mitigation. The YEO redistribution gate has been resolved at the product level by tier separation.