Introduction

S.I.G.N. is sovereign-grade digital infrastructure for national systems of money, identity, and capital. Sign Protocol provides the shared evidence layer used across deployments.

S.I.G.N. is a sovereign-grade architecture for building and operating national digital infrastructure across three foundational systems:

  • New Money System: CBDC and regulated stablecoins operating across public and private rails with policy-grade controls and supervisory visibility

  • New ID System: verifiable credentials and national identity primitives enabling privacy-preserving verification at scale

  • New Capital System: programmatic allocation and distribution for grants, benefits, incentives, and compliant capital programs

S.I.G.N. is not a product container. It is a system-level blueprint for deployments that must remain governable, auditable, and operable under national concurrency.

Across these systems, one requirement repeats: inspection-ready evidence. In many deployments, that evidence layer is implemented using Sign Protocol, an omni-chain attestation protocol for creating, retrieving, and verifying structured records.

This documentation includes:

  • system architecture and deployment guidance for S.I.G.N.

  • use case blueprints for Money, ID, and Capital

  • documentation for Sign products, including Sign Protocol, TokenTable, and EthSign

  • full developer documentation for Sign Protocol (smart contracts, SDKs, APIs, advanced topics)

If you came here for Sign Protocol developer docs, you are in the right place. The framing has expanded: S.I.G.N. describes the sovereign system architecture, and Sign Protocol is the evidence layer used across sovereign and institutional workloads. TokenTable and EthSign are standalone products that use the same core primitives and can be integrated into S.I.G.N. deployments when appropriate.


Trust, but verify at sovereign scale

Every day, systems depend on claims:

  • a person claims eligibility for a program

  • a business claims compliance

  • an institution claims approval

  • a system claims a payment was executed

  • a registry claims an asset record is accurate

Historically, these claims were accepted based on relationships and institutional trust. In digital systems that operate across agencies, vendors, and networks, trust assumptions become fragile. Verification must be repeatable, attributable, and compatible with oversight.

S.I.G.N. exists to make verification reliable, repeatable, and operable at national scale.


Attestations as a modern solution to authenticity

Attestations are portable, verifiable proofs that can travel across systems and time. They encode a statement, bind it to an issuer, and make it verifiable later.

In consumer life, a person might need a notarized document to prove a claim. In a sovereign context, the same pattern scales to system-critical actions:

  • eligibility for benefits and public programs

  • compliance gates for regulated services

  • approvals for high-impact actions (distributions, conversions, registry updates)

  • proof that a distribution occurred under an approved ruleset version

  • proof that a registry update was authorized and traceable

S.I.G.N. treats attestations as operational infrastructure, not as an abstract primitive.


What is S.I.G.N.?

S.I.G.N. is a layered stack that unifies:

  • execution: money movement and program logic

  • identity: credentials and verification

  • evidence: cryptographic records of what happened, when, and under which authority

Sovereign deployments must satisfy constraints that typical consumer systems do not:

  • privacy by default for sensitive payloads

  • lawful auditability and inspection readiness

  • strict operational control (keys, upgrades, emergency actions)

  • interoperability across agencies, vendors, and networks

  • performance and availability under national concurrency

S.I.G.N. is designed so that policy and oversight remain under sovereign governance while the technical substrate stays verifiable.

Start here:


The three systems

New Money System

A sovereign digital money rail supporting CBDC and regulated stablecoins across public and private rails.

Common requirements:

  • real-time settlement and deterministic finality targets

  • policy controls (limits, approvals, emergency controls)

  • supervisory visibility and reporting

  • optional confidentiality for retail flows

  • interoperability across rails and networks

Read: New Money System

New ID System

A national identity and credential layer supporting reusable verification without central "query my identity" APIs.

Common requirements:

  • W3C Verifiable Credentials (VC) and Decentralized Identifiers (DID)

  • selective disclosure and privacy-preserving proofs

  • trust registry and issuer accreditation

  • revocation and status checks

  • offline presentation patterns where required (QR, NFC)

Read: New ID System

New Capital System

A programmatic capital and distribution layer for benefits, grants, incentives, and compliant capital programs.

Common requirements:

  • identity-linked targeting and duplicate prevention

  • schedule-based distributions (one-time, recurring, vesting)

  • deterministic reconciliation and budget traceability

  • evidence manifests for audits and disputes

Read: New Capital System


The evidence layer

All three systems rely on a shared trust and evidence layer to answer questions like:

  • who approved what

  • under which authority

  • when the action occurred

  • what ruleset version applied

  • what evidence supports eligibility and compliance

  • what settlement references prove execution

In the Sign ecosystem, this evidence layer is implemented by Sign Protocol using two primitives:

  • Schemas: templates defining how structured data is represented

  • Attestations: signed, verifiable records conforming to schemas

Sign Protocol supports multiple data placement models:

  • fully on-chain attestations

  • fully off-chain payloads with verifiable anchors (for large or sensitive data)

  • hybrid models combining on-chain references and off-chain payloads

  • privacy-enhanced modes including private and ZK attestations where applicable

SignScan provides unified querying across supported chains and storage:

  • REST and GraphQL APIs

  • SDK-based access patterns

  • explorer and dataset visibility for non-programmers

Product overview: Sign Protocol Developer entrypoint: Getting Started


Sign products and how they relate to S.I.G.N.

S.I.G.N. is the sovereign system architecture. Sign products are deployable offerings that can be used independently and are often combined in sovereign and regulated deployments.

  • Sign Protocol: schemas, attestations, privacy modes, indexing and querying

  • TokenTable: allocation, vesting, and large-scale distribution for capital programs

  • EthSign: agreement and signature workflows producing verifiable proof of execution

These products share core primitives, but they are not defined as "subsystems of S.I.G.N.". They are components that can support S.I.G.N. deployments when the program requires their specific capabilities.

Products overview: Products Overview


Technical snapshot (standards and interfaces)

This is a reference snapshot of standards commonly used in S.I.G.N. deployments.

Identity:

  • W3C Verifiable Credentials (VC) and W3C DIDs

  • issuance via OpenID for Verifiable Credential Issuance (OIDC4VCI)

  • presentation via OpenID for Verifiable Presentations (OIDC4VP)

  • revocation via W3C Bitstring Status List

  • offline presentation patterns (QR, NFC) where required

  • compatibility targets for mobile drivers license patterns (ISO/IEC 18013-5/7) when relevant

Evidence:

  • schema-driven structured data models

  • cryptographic signatures (ECDSA, EdDSA, RSA depending on deployment)

  • privacy-preserving proofs (selective disclosure, ZK systems where applicable)

  • indexing and query layers for operational reporting and audits

Money rails (deployment-dependent):

  • public mode via L1 smart contracts or sovereign L2 deployments

  • private mode via permissioned CBDC rails for confidentiality-first requirements

  • controlled interoperability via bridging or messaging gateways


Deployment modes (public, private, hybrid)

S.I.G.N. is designed for deployment realities, not ideology.

Public mode:

  • optimized for transparency-first programs, public verification, and broad accessibility

  • governance is expressed via chain parameters (L2) or contract governance (L1)

Private mode:

  • optimized for confidentiality-first programs and regulated domestic payment flows

  • governance is enforced through permissioning, membership controls, and audit access policy

Hybrid mode:

  • combines public verification and private execution where required

  • interoperability must be treated as critical infrastructure with explicit trust assumptions


How to read these docs

If you are exploring S.I.G.N. (systems, architecture, governance)

Start with:

Then:

If you are building (developers, integrators)

Start with:

Then go deeper:

If you are evaluating products

Start with:


Tenets that guide S.I.G.N. (and Sign)

Keep it simple, Signer.

Sovereign systems are already complex (policy, compliance, privacy, interoperability). Infrastructure should reduce complexity, not add it. The goal is to make verifiable systems intuitive to integrate and difficult to misuse.

Improvise. Adapt. Excel.

The path to real infrastructure is never linear. Deployments evolve with policy, adoption, interoperability constraints, and emerging threats while remaining governable and auditable.

An open stack

Verification is most valuable when it is portable. S.I.G.N. embraces open standards and interoperable primitives so systems can evolve without locking policy into one vendor or one network.

Evidence maketh governance

Identity primitives establish representation. Evidence establishes history. Attestations are the bedrock of accountability: who approved what, under which authority, when, and according to which rules.


Where to go next

Last updated

Was this helpful?