The problem
A product's memory is fractured across the databases of its raw material suppliers, manufacturers, freight forwarders, customs brokers, and retailers. Reconstructing its history for a dispute, a regulator, or a concerned customer is a forensic nightmare.
Internal quality systems (PAT, QbD, Continuous Quality Verification) produce valuable data — but it's siloed, operator-controlled, and unverifiable by external parties. A manufacturer can say "the cold chain was maintained." Today, no one can prove it without trusting the manufacturer's own records.
How the five gates map to supply chain
| Gate | Supply chain application | Example |
|---|---|---|
| G1 Semantic Validity | Temperature, humidity, vibration data within statistical control limits (H ≥ 0.40) | Vaccine batch: temp readings within 2–8°C with bootstrap CI confirming conformance |
| G2 Financial Validity | A deviation is linked to a specific event, not a systemic failure (C ≥ 0.40) | Temperature spike attributed to a specific door-opening event at warehouse B, not cold chain breakdown |
| G3 Operational Validity | The deviation didn't compromise the product's critical quality attributes (E ≤ 0.60) | Spike duration (47 seconds) within the product's validated design space — no CQA regression |
| G4 Policy Admission | Data is from instrumented, tamper-evident sensors — not self-reported | HOOKED evidence: temperature logger with sealed hardware attestation certificate |
| G5 Cryptographic Finalization | A designated quality manager approved the release, committed to Merkle log | Biometric sign-off on Sovereign Authority device — unforgeable, legally binding under EU GMP |
How the validator quorum maps
The release of a batch isn't a single decision. It requires 3-of-4 quorum:
| Validator | Role | What they verify |
|---|---|---|
| Manufacturer's system | Customer | Process data within specification |
| Logistics provider's system | Auditor | Handling and transport conditions met |
| Independent quality auditor | Independent | Evidence integrity and statistical validity |
| Regulatory node | Regulator | Compliance with EU GMP / FDA requirements |
Transparency log as chain of custody
Every event in the product's lifecycle — raw material sourcing, each manufacturing step (CQV data), transport handoffs, storage conditions, repair/return events — becomes a canonical leaf. The log is a cryptographic chain of custody more reliable than any paper trail or siloed database.
Monitors: customs, insurers, customers
Customs authorities, insurance companies, and end customers run monitors that continuously verify the log's consistency. They can prove a specific batch is authentic and was handled correctly without accessing the manufacturer's internal systems.
Deterministic settlement
The verified passage of goods through the final gate (acceptance by recipient, confirmed by inclusion proof) automatically triggers payment to the logistics provider. Months of invoicing and dispute resolution replaced by deterministic settlement against the log.
Replay as audit
A logistics provider can replay every handoff authorization for a specific shipment. No interviews, no document requests — just replay the exact chain of custody decisions, gate by gate, from origin to destination. Each replay is a permalink.
Closed loop in action
A vaccine batch is authorized for release at 2–8°C. During transport, the execution trace records a temperature spike to 9°C for 3 minutes.
The next authorization cycle's observables reflect the drift — tightening governance for the following shipment.
If the spike had exceeded the design space: classification: BREACH, omega_breach: true — visible to every monitor watching the log, without the monitor needing access to the manufacturer's systems.
Regulatory alignment
Real Time Release Testing — AGTS provides the cryptographic evidence infrastructure for RTRT gate decisions.
Process Analytical Technology — AGTS records PAT measurement decisions as canonical leaves.
Serialization and verification — AGTS provides an independently verifiable proof chain per batch.
Supply chain security management — AGTS produces the cryptographic audit trail ISO 28000 requires.