P181 — AIEP — Evidence Embargo and Timed Release Protocol
Publication Date: 2026-03-27 Status: Open Source Prior Art Disclosure Licence: Apache License 2.0 Author/Organisation: Phatfella Ltd Schema: AIEP_OS_SPEC_TEMPLATE v1.0.1 — https://aiep.dev/schemas/aiep-os-spec-template/v1.0.1
Framework Context
[0001] This disclosure operates within an Architected Instruction and Evidence Protocol (AIEP) environment as defined in United Kingdom patent application number GB2519711.2, filed 20 November 2025, the entire contents of which are incorporated herein by reference.
[0002] The present disclosure defines a protocol for managing evidence artefacts that are ingested into the AIEP corpus but held under Embargo — made available only to authorised parties — until a specified release trigger activates, at which point the artefact transitions to full corpus access according to its normal access control permissions (P166).
Field of the Disclosure
[0003] This disclosure relates to timed-release and embargo management protocols for evidence artefacts in governed artificial intelligence evidence systems.
[0004] More particularly, the disclosure concerns: an EmbargoRecord schema attached to an evidence artefact at ingestion; embargo status transitions; release trigger types; conditional release mechanisms; embargo access exceptions for authorised pre-release consumers; embargo expiry without release (automatic withdrawal); and integration with the access control protocol (P166), the archival protocol (P167), and the annotation protocol (P176).
Background
[0005] Many evidence sources carry pre-publication embargoes: scientific papers embargoed until journal publication date; regulatory documents embargoed until formal gazette publication; government statistics embargoed until official release time. An evidence corpus that ingests artefacts ahead of their public release date must manage access restrictions that are time-bounded and conditional on external trigger events.
[0006] Embargo management must be cryptographically verified and audit-logged to prevent premature release compromising the embargo agreement. The system must also handle embargo expiry — the case where an embargo period passes without the triggering release event occurring, indicating the artefact should be withdrawn rather than released.
[0007] Authorised pre-release access is also required: certain parties (e.g. fact-checkers, regulatory reviewers) may hold advance access rights to embargoed artefacts. The embargo protocol governs these exceptions without exposing embargoed content to unauthorised reasoning chains.
Summary of the Disclosure
[0008] EmbargoRecord Schema: An EmbargoRecord is attached to an evidence artefact at the time of ingestion:
embargo_id— SHA-256 of canonical serialisation of all other fieldssubject_deid— DEID (P162) of the embargoed artefactembargo_status—ACTIVE,RELEASED,EXPIRED,WITHDRAWNrelease_trigger_type— one of:DATETIME(release at specified UTC datetime),EXTERNAL_EVENT(release on receipt of a signed ReleaseSignal from a designated external authority),GOVERNANCE_APPROVAL(release on approval by a designated governance node per P89),MANUAL(release only on explicit operator action)release_trigger_value— the specific UTC datetime, authority fingerprint, governance node ID, ornullforMANUALlift_window— forDATETIMEtriggers: a permitted early/late window in seconds (default: ±60 seconds) within which automatic lift is acceptablepre_release_access_tokens— list of access token identifiers (P166) that have advance READ access to the embargoed artefactembargo_note— free-text description of the embargo basis (not surfaced outside the embargo system)embargo_expires_at— optional; if the embargo is not lifted by this time, the artefact transitions toEXPIREDstatus and is automatically withdrawn from the corpuscreated_by— node fingerprint (P46) of the embargo-registering nodecreated_at— ISO 8601 timestampreleased_at— ISO 8601 timestamp populated whenembargo_statustransitions toRELEASEDembargo_signature— cryptographic signature by the creating node
[0009] Embargo Status Transitions:
ACTIVE → RELEASED— triggered by elapsedDATETIME, verifiedEXTERNAL_EVENTsignal,GOVERNANCE_APPROVAL, orMANUALoperator actionACTIVE → EXPIRED— triggered by elapsedembargo_expires_atwithout a release event having occurred; the artefact is automatically moved toWITHDRAWNaccess statusACTIVE → WITHDRAWN— explicit early withdrawal by the corpus operator (e.g. embargo agreement terminated)- All transitions are recorded to the dual-ledger (P80) and AuditLog (P171)
[0010] Release Signal Verification: For EXTERNAL_EVENT trigger type, the designated external authority submits a signed ReleaseSignal:
signal_id— SHA-256 of canonical serialisationembargo_id— the embargo being liftedsignalled_at— ISO 8601 timestampsignal_signature— cryptographic signature by the designated external authority The corpus system verifiessignal_signatureagainst therelease_trigger_value(authority fingerprint) before executing the release transition. An invalid signal is rejected and aReleaseSignalRejectionRecordis logged.
[0011] Embargo Access Enforcement: During ACTIVE embargo status, the access control system (P166) enforces restricted access: any access request for the embargoed artefact’s DEID is denied unless the requestor’s access token appears in pre_release_access_tokens. Denied requests are logged without surfacing the existence of the artefact (embargo-aware silence: the access denial does not reveal that an embargoed artefact exists at the requested DEID).
[0012] Annotation During Embargo: A GOVERNANCE_WARNING annotation (P176) of subtype EMBARGO_ACTIVE is attached to the artefact’s internal record during ACTIVE embargo status, visible only to governance nodes (access_level: GOVERNED_NODE). On release, the annotation transitions to EMBARGO_LIFTED type and is retained for the audit record. Pre-release access holders see a EMBARGO_ACTIVE annotation when accessing the artefact.
[0013] Batch Embargo Release: For time-coordinated releases (e.g. a statistical release of many datasets at the same UTC time), the EmbargoReleaseScheduler processes all DATETIME-triggered EmbargoRecords with a release_trigger_value within the lift_window of the current time in a single atomic batch operation, ensuring all coordinated artefacts become available simultaneously.
ASCII Architecture
Ingestion ──▶ EmbargoRecord created (ACTIVE)
│
├── DATETIME trigger
│ └── EmbargoReleaseScheduler checks periodically
│
├── EXTERNAL_EVENT trigger
│ └── ReleaseSignal received ──▶ verify signature
│
├── GOVERNANCE_APPROVAL trigger
│ └── Governance Node (P89) approves
│
└── MANUAL trigger
└── Operator action
Embargo Status Transitions:
ACTIVE ──▶ RELEASED (trigger fires, access opens)
ACTIVE ──▶ EXPIRED (embargo_expires_at passes, artefact withdrawn)
ACTIVE ──▶ WITHDRAWN (early withdrawal)
Access Control (P166) during ACTIVE:
pre_release_access_tokens ──▶ READ granted
all other requestors ──▶ denied (embargo-aware silence)
On RELEASED ──▶ normal P166 access permissions apply
──▶ ARTEFACT_RELEASED event ──▶ Watch (P180) subscribers
──▶ dual-ledger (P80) record
Operational Detail
[0014] Embargo-Aware Silence: The principle that access denial for an embargoed artefact does not reveal the existence of the artefact to unauthorised parties prevents information leakage about forthcoming releases. This applies both to direct DEID lookups (GET /evidence/{deid}) and to taxonomy-scope queries (GET /evidence?taxonomy=...) — embargoed DEIDs are excluded from query results for non-pre-release-access requestors without indicating that any results have been excluded.
[0015] Release Notification: On RELEASED transition, a ARTEFACT_RELEASED_FROM_EMBARGO event is published to the Watch Protocol (P180) for subscribers watching the affected DEID or taxonomy domain. The event does not expose the pre-release access history of the artefact.
[0016] Embargo Audit Trail: The full embargo lifecycle — creation, any access by pre-release holders, release trigger event, and release execution — is recorded to the AuditLog (P171) with a 7-year retention requirement. This supports post-publication audit of whether embargoed content was accessed by unauthorised parties prior to release.
Claims-Exclusion Notice
This specification is published as open-source prior art. No patent claims are asserted by the author in respect of the mechanisms described. Any third party seeking to patent mechanisms substantially equivalent to those described herein is placed on notice of this prior art disclosure.