The complete engineering blueprint for the BCCS verification network. From satellite observation to on-chain attestation — every layer, every component, every data flow.
BCCS operates as a five-layer stack. Raw physical observations enter at the bottom. Cryptographically attested biological state exits at the top. No single layer can be compromised without detection by adjacent layers.
The first tier of the PoPS consensus mechanism. Satellite-derived spectral data provides continuous, tamper-resistant observation of biological assets at continental scale.
European Space Agency constellation. Two satellites (2A/2B) providing global coverage every 5 days. 13 spectral bands, 10m spatial resolution in visible/NIR. Open access, zero cost.
Key indices derived: NDVI (vegetation health), NDWI (water content), NBR (burn severity), EVI (enhanced vegetation), LAI (leaf area index).
30m resolution, 16-day revisit cycle. Thermal infrared bands critical for permafrost surface temperature monitoring. 40+ year archive enables long-term baseline comparison. Open access, zero cost.
Daily global imaging at 3–5m resolution. Sub-meter tasking available via SkySat. Used for targeted verification of specific assets when Tier 3 inspection is pending or disputed. Commercial API — licensed per area of interest.
Raw satellite imagery is processed through a standardized pipeline:
Tools: Google Earth Engine, Sentinel Hub API, STAC (SpatioTemporal Asset Catalog), rasterio, GDAL.
Each observation produces a cryptographically signed JSON attestation containing: BAIN ID reference, observation timestamp (UTC), satellite source ID, spectral index values, confidence score (0.0–1.0), SHA-256 hash of source imagery, and deviation flag (boolean).
Attestation is submitted to the Oracle Consensus layer. A single Tier 1 observation cannot trigger a BAIN ID state transition alone — requires corroboration from Tier 2 or Tier 3.
The second tier operates at ground level. Sensors measure physical parameters that satellites cannot observe: subsurface temperature, soil chemistry, gas flux, microbial activity. Each sensor node is GPS-tagged, tamper-evident, and transmits encrypted data to the ingestion layer.
Sensor deployment is asset-class-specific. A permafrost monitoring installation uses different instruments than a tropical forest canopy station. The BCCS sensor taxonomy defines required and optional sensors per BAIN ID asset class.
Each ground station operates as an autonomous edge computing unit:
Sensor readings follow a standardized ingestion protocol:
Aggregated sensor data produces a Tier 2 attestation: BAIN ID reference, time window (UTC start/end), sensor node IDs contributing, parameter readings (mean, min, max, std dev), device health score, data completeness percentage, SHA-256 hash of raw dataset, and deviation flag.
The third tier is the hardest to fake. Accredited inspectors physically visit the biological asset, collect evidence, and submit GPS-stamped, timestamped documentation. This tier resolves disputes between Tier 1 and Tier 2 and provides the highest confidence attestation.
Inspector evidence produces the highest-weight attestation: BAIN ID reference, inspection date/time (UTC), inspector credential ID (anonymized in public record), GPS boundary confirmation, evidence file hashes, field measurements, condition assessment (structured rubric), confidence score, and inspector stake amount.
The consensus engine receives attestation objects from all three tiers, evaluates agreement, computes a composite confidence score, and determines whether a BAIN ID state transition is warranted. This is the core of the protocol.
A BAIN ID state transition requires attestation agreement from at least two of three tiers. No single data source — regardless of confidence — can unilaterally change biological state on-chain. This is the fundamental security property of PoPS.
Each tier attestation carries a confidence score (0.0–1.0). The Oracle Engine computes a weighted composite:
C = (w1 × T1) + (w2 × T2) + (w3 × T3)
Default weights: w1=0.30 (satellite), w2=0.30 (IoT), w3=0.40 (inspection). Weights are adjustable per asset class — permafrost assets may weight Tier 2 (subsurface temperature) higher; forest assets may weight Tier 1 (canopy spectral analysis) higher.
State transition requires C ≥ 0.70. Scores below threshold are flagged for additional evidence collection.
Node operators and inspectors who submit attestations that are later contradicted by multi-tier consensus face economic penalties:
Slashed tokens are permanently burned — reducing total circulating supply. This creates a direct economic link between network integrity and token scarcity.
Every component of the BCCS verification network is built on open, auditable, and composable infrastructure.
Every BAIN ID is queryable via REST and WebSocket interfaces. AI agents, smart contracts, institutional dashboards, and regulatory systems consume verified biological state through a unified API.
GET /v1/bain/{id}/state — current verified state of a BAIN IDGET /v1/bain/{id}/history — full state transition history with attestationsGET /v1/bain/{id}/attestations — all tier attestations for a BAIN IDPOST /v1/bain/{id}/verify — submit new attestation (node operators only)GET /v1/bain/search — query by region, asset class, state, confidence thresholdGET /v1/stats/network — active nodes, total BAIN IDs, verification volumews://api.bccs.bio/v1/stream
Subscribe to real-time state transition events. Filter by region, asset class, or specific BAIN IDs. Used by AI agents monitoring portfolio exposure, insurance parametric triggers, and regulatory compliance dashboards.
Public read access for basic state queries (rate-limited). Authenticated access via API key for institutional consumers. Node operators authenticate via wallet signature (EIP-4361 / Sign-In with Ethereum). All queries priced in $BCCS — creating protocol-native demand proportional to verification consumption.
The Founding Oracle is the first sovereign-scale deployment of BCCS verification infrastructure. A national government or institutional partner deploys PoPS against a defined biological asset class — producing the protocol's first verified case study.
Define target biological asset class (e.g. permafrost zone, national forest reserve, marine protected area). Execute cooperation agreement between sovereign entity and KRYONIS. Establish BAIN ID taxonomy for selected asset class. Define verification parameters and success criteria.
Deploy IoT sensor stations across pilot area. Configure Sentinel-2 and Landsat observation windows. Establish Planet Labs commercial tasking for high-resolution verification. Connect sensor network to BCCS ingestion layer. Register pilot area BAIN IDs on Base.
Collect 60–90 days of continuous multi-tier data. Establish baseline state for each BAIN ID. Calibrate confidence scoring weights for asset class. Train and accredit local Tier 3 inspectors. Validate PoPS consensus against known ground truth.
Activate live verification cycle. First on-chain state transitions recorded. API serving verified biological state. Dashboard operational for sovereign partner. Node operators earning $BCCS for verification work.
Produce published case study with sovereign partner co-authorship. Present results at international forums. Define expansion roadmap — additional asset classes, additional regions. Establish pathway to permanent national verification infrastructure.
1. Scientific credibility — a published, peer-reviewable case study proving PoPS verification works at sovereign scale.
2. Institutional reference — a named sovereign partner whose participation de-risks the protocol for subsequent adopters.
3. Live infrastructure — a permanent, operational verification network that continues generating verified biological state data beyond the pilot period.
BCCS is designed under the assumption that any individual data source, sensor, inspector, or node operator may be compromised. The protocol's security derives from multi-source consensus, economic penalties, and cryptographic verification — not from trusting any single actor.
All contracts built on audited OpenZeppelin libraries. Ownership held by Safe multisig (multi-signature wallet requiring multiple authorized signers). Pausable in emergency. Internal security review completed April 15, 2026 — no critical or high severity issues found. Full report →