Home Why BCCS Protocol Access Not Carbon Sovereignty BioClearing Implementation Audit Docs Buy License
BCCS/Architecture/Data Sovereignty
Architecture Specification

How BCCS interoperates with national registry systems

Every sovereign jurisdiction operating a BCCS node retains full control over the biological data generated within its territory. The protocol layer records only cryptographic attestations — not raw data. Sovereign-compliant by design.

This is the architectural principle that makes BCCS deployable across 175 jurisdictions without conflicting with any of their data-protection or critical-infrastructure regimes.


01 — The Governing Principle

Attestation crosses the chain. Evidence does not.

A verification infrastructure built on a public blockchain faces one unavoidable design choice: what actually goes on-chain, and what stays in sovereign infrastructure. BCCS answers this choice in the simplest way available. Raw biological evidence — satellite imagery, sensor telemetry, inspection records, genetic sequence data — never crosses the protocol layer. Only cryptographic anchors do.

An anchor is a fixed-length hash computed from the underlying evidence. The hash proves that specific evidence existed in a specific state at a specific time. The hash cannot be used to reconstruct the original data. Any attempt to do so is computationally infeasible under every recognised cryptographic standard in current use (SHA-256, SHA-3, BLAKE3).

This means: the protocol layer records the fact of verification. It does not record the evidence itself. The evidence stays where it was generated, under the legal regime of the jurisdiction that generated it.

Core principle. BCCS is a protocol for attesting to biological state, not a database for storing biological data. The distinction is architectural, not semantic — it is enforced by what the smart contracts will and will not accept as input.


02 — Three Layers, Two Jurisdictions

Where the data actually lives

Every BCCS deployment separates cleanly into three data layers. The first two remain in sovereign infrastructure. The third — and only the third — touches the public protocol.

Layer Contents Location
L1 — Raw Evidencesensor output, imagery, inspection
Satellite imagery, ground-based sensor telemetry, physical inspection records, laboratory analyses, genetic sequence data. Every byte generated by a verification measurement.
SOVEREIGN
INFRASTRUCTURE
L2 — Aggregated Proofshashes, Merkle roots, certificates
Cryptographic fingerprints computed from L1 evidence. Merkle tree roots summarising batches of measurements. Signed state-transition certificates from authorised oracle nodes.
SOVEREIGN
INFRASTRUCTURE
L3 — Registry EntriesBAIN ID, lifecycle state
The 21-character BAIN ID, current lifecycle state (1 of 8), timestamp, Merkle root anchor from L2, and oracle signatures. Institutional metadata only — no raw or derivative evidence.
PROTOCOL LAYER
(Base L2)

The boundary between L2 and L3 is the only point where data crosses sovereign borders. What crosses is a cryptographic proof — not evidence, not measurements, not personally or jurisdictionally sensitive content. The proof can be independently verified by any party holding the BAIN ID, but cannot be reversed into the underlying data.


03 — The SWIFT Analogy

Infrastructure that never touches the data it coordinates

SWIFT is a messaging protocol between banks. When a bank in country A sends a payment instruction to a bank in country B, the customer data never transits SWIFT — only a standardised message referencing an internal account identifier. Account-level detail, transaction history, customer identity — all of this remains in the originating bank's infrastructure, under its jurisdiction's banking and privacy law.

BCCS is structurally analogous. A sovereign node in jurisdiction A can register an attestation referring to a BAIN ID. The underlying evidence — the customer data equivalent — stays in that jurisdiction's infrastructure. What crosses the protocol is the institutional reference, not the substance.

This is why SWIFT operates across more than 200 jurisdictions with radically different regulatory regimes. Not because it harmonises them — but because it never touches the data they regulate.


04 — Five Architectural Principles

The design rules, stated plainly

Every deployment decision is tested against these five rules. A proposed feature that violates any of them does not ship.

01

Locality — data never leaves origin jurisdiction

Raw evidence generated within a jurisdiction remains physically stored on infrastructure located within that jurisdiction. Cross-border replication, backup, or caching of raw evidence is not part of the BCCS protocol.

02

Anchoring — only cryptographic proofs cross the protocol

What enters the public chain is a hash or Merkle root derived from the underlying evidence. These anchors prove that specific evidence existed in a specific state at a specific time, but cannot be used to reconstruct the evidence itself.

03

Autonomy — sovereign nodes operate independently

Every jurisdiction operates its own node under its own legal framework, its own approved cryptographic standards, and its own data-governance regime. The BCCS protocol does not mandate a specific hosting provider, a specific cloud, or a specific country of operation.

04

Graceful degradation — national registries function without the protocol

If the public protocol layer becomes unavailable to a jurisdiction — for any technical, political, or regulatory reason — that jurisdiction's national registry continues to operate autonomously. Protocol-layer attestations are additive to sovereign infrastructure, not substitutive.

05

Verifiability — proofs are independently auditable

Any party holding a BAIN ID can verify that the on-chain attestation matches a claimed evidence set, provided the evidence is disclosed to them under the terms set by the originating jurisdiction. The protocol does not grant access — it confirms integrity.


05 — Jurisdictional Compatibility

Compatible with every major data-protection regime

The data-locality architecture is compatible with every major data-protection and critical-infrastructure regime currently in force. The list below is illustrative, not exhaustive. Every jurisdiction operating a BCCS sovereign node applies its own framework; the protocol does not impose a harmonised standard.

EU · GDPR

General Data Protection Regulation

Personal data remains under the controllership of the sovereign node operator. Cross-border data transfer provisions (Chapter V) do not apply to cryptographic anchors, which do not constitute personal data.

Singapore · PDPA

Personal Data Protection Act

Consistent with the sovereign-infrastructure principle. Data localisation handled at the node operator level; anchors are not personal data within the meaning of the Act.

Brazil · LGPD

Lei Geral de Proteção de Dados

Evidence remains under ANPD jurisdiction. International transfer rules (Chapter V) are satisfied because the protocol layer handles only non-personal cryptographic metadata.

Japan · APPI

Act on the Protection of Personal Information

Compatible with Japan's adequacy framework. Anchors do not trigger the extraterritorial provisions of the APPI, as they contain no identifiable personal information.

China · PIPL

Personal Information Protection Law

Important data classification handled at the node operator level. The architecture does not require cross-border transfer of any information classified as important or sensitive under the PIPL.

Global · Critical Infrastructure

Sectoral critical-information regimes

Every major jurisdiction operates some form of critical-information-infrastructure regime. Because BCCS never ingests classified data into the protocol layer, such regimes do not constrain protocol participation.

Design intent. BCCS was designed to be deployable in every jurisdiction that operates a modern data-protection regime — and to remain deployable if any of those regimes tightens further. The architecture treats strict data localisation as the default, not the exception.


06 — What BCCS Explicitly Does Not Do

Clarity about non-features

Clarity about non-features is as important as clarity about features. The following are outside the scope of the BCCS protocol and are not enabled by node participation.

−01

No cross-border data export

The protocol does not transfer raw biological evidence across jurisdictional boundaries. Any party requiring access to evidence must obtain it through the legal channels of the originating jurisdiction.

−02

No harmonised regulation

BCCS is not a regulatory instrument. It does not impose common data standards, common disclosure rules, or common sanctions frameworks. Regulatory decisions remain entirely with the sovereign node operator.

−03

No centralised data repository

There is no central BCCS database of biological evidence. There is no backup copy, no mirror, no aggregated archive. What exists is a distributed set of sovereign node operators, each holding only the evidence generated within their own jurisdiction.

−04

No compelled disclosure

No provision of the protocol allows any external party — including the protocol developers — to compel disclosure of evidence from a sovereign node. Access requests follow the laws of the jurisdiction holding the data, not protocol rules.


07 — Summary

Why this architecture can be deployed everywhere

BCCS is verification infrastructure, not a data platform. What crosses the protocol layer is the attestation — the cryptographic proof that a specific biological state has been verified by a qualified oracle under a defined methodology. The evidence supporting that attestation remains in sovereign infrastructure, under sovereign law, accessible only through sovereign process.

This is not a workaround or a compromise. It is the architecture that makes global participation technically coherent and legally deployable. A protocol that required jurisdictions to export their biological evidence would have no universal path to adoption; a protocol that records only cryptographic facts about that evidence can operate everywhere.

BCCS does not ask sovereigns to export their biology.
It offers sovereigns the missing verification layer — neutral, queryable, cryptographically auditable — without asking them to give up the data itself.

That is the architecture. That is what deploys. That is why it works in every jurisdiction that operates a modern data-protection regime.

Note on this document. This is a public architectural specification, not a legal opinion. Specific compliance assessments for a given jurisdiction, asset class, or deployment configuration should be conducted by qualified counsel. KRYONIS Sovereign Systems Limited provides this document as a description of protocol design intent and technical behaviour.

Continue

Read the protocol architecture

The verification layer, the clearing registry, the category positioning, and the full implementation blueprint.

BCCS Protocol → Not a Carbon Project BioClearing Architecture Implementation