HomeDocs-Technical WhitePaper15-EFT.WP.Methods.Falsification v1.0

Chapter 10: Compliance Templates & the Audit Trail


I. Scope & Objectives


II. Terms & Symbols

  1. Compliance cards & evidence objects
    • PreReg.card: pre-registration card containing H0/H1, thresholds, sample size, alpha/beta, the alpha-spending scheme, and AnalysisPlan.hash.
    • Evidence.bundle: minimal evidence set with fingerprint; see S52-49.
    • AuditTrail: the event chain with incremental hashes and signatures; see S52-46/47.
    • EnvLock: environment lock pinning Graph.sig, ParamCard.sig, InferPipelineCard.sig, rng.seed, rng_family, and anchor.
    • canon_json(•): canonical serialization used for replayable signing.
  2. Additional notation
    • Compliance confidence: conf_compliance = 1 - P( noncompliance | evidence ).
    • Evidence score: score_pkg (aggregate of metrics from Chapters 5/7/8/9).
    • Audit hash: h_k; signature: sig_k; key fingerprint: key_id.
    • Retention policy: T_retention; access policy: ACL; replay window: T_replay.

III. Postulates & Minimal Equations

Verification: recomputed h_k must match the archived value for any prefix k.


IV. Data & Manifest Conventions


V. Algorithms & Implementation Bindings

  1. Interface prototypes (added to I50-*)
    • I50-30 preregister(spec:dict) -> PreReg.card
    • I50-31 build_evidence(inputs:dict, env:dict) -> Evidence.bundle
    • I50-32 sign_and_lock(bundle:any, sk:any, EnvLock:any) -> {bundle_signed:any, Graph.sig, ParamCard.sig, InferPipelineCard.sig}
    • I50-33 verify_chain(bundle:any, pk:any) -> {ok:bool, broken_at:int}
    • I50-34 archive_store(bundle:any, policy:dict) -> {uri:str, ttl:float}
    • I50-35 forensic_replay(bundle:any, EnvLock:any, options:dict) -> ReproduceReport
    • I50-36 audit_export(bundle:any, format:str) -> bytes
  2. Key exceptions (extended)
    E_SIGNATURE_MISMATCH, E_AUDIT_CHAIN_BROKEN, E_RETENTION_VIOLATED, E_POLICY_DENIED, E_REPLAY_DIVERGED, E_MANIFEST_INCOMPLETE.
  3. Audit-record generation
    For every event_k, write to the AuditTrail and apply S52-46/47. I50-33 performs full or segment verification of the hash chain and signatures.

VI. Metrology Flows & Run Diagram

  1. Mx-70 Pre-registration & locking
    • preregister writes PreReg.card, computes AnalysisPlan.hash, DataSpec.hash, golden_set_hash.
    • Create the initial anchor and EnvLock; start the AuditTrail.
  2. Mx-71 Evidence construction
    • Execute the test matrix and adversarial flows; compile CoverageReport, AttackReport, power_analysis.json, multitest_correction.json.
    • Compute score_pkg, conf_compliance; produce MANIFEST.json and the fingerprint.
  3. Mx-72 Signing & publication
    • Compute hash(•) for MANIFEST.json and all artifacts; build the hash chain h_k.
    • sign_and_lock generates *.sig bound to EnvLock; publish a read-only uri.
  4. Mx-73 Archiving & forensics
    • archive_store persists the bundle with T_retention and ACL.
    • Periodically run verify_chain; on demand, run forensic_replay and compare ReproduceReport.
  5. Mx-74 Gating integration
    gate_release(evidence:dict, policy:dict) -> GateDecision per S52-44/50; log to gate_audit.log and append signature.

VII. Verification & Test Matrix

  1. Integrity & non-repudiation
    • Tamper scenario: mutate a row in decisions.parquet; verify_chain must return ok = False with broken_at = k*.
    • Key rotation: after key_id changes, legacy evidence remains verifiable.
  2. Replayability & consistency
    • Replay under the same EnvLock: require ReproduceReport.delta ≤ tau_replay.
    • Cross-site replay (Chapter 11): delta_dev ≤ tau_equiv.
  3. Statistical compliance
    • power ≥ power_min and FDR ≤ q_star; online spending satisfies Σ alpha_i ≤ alpha_total.
    • conf_compliance ≥ conf_min; on boundary sets, kill_rate ≥ tau_kill.
  4. Archival & forensics
    Randomly sample p% of bundles; Verify and Reproduce must pass; retrieval latency ≤ target T_lookup.

VIII. Cross-References & Dependencies


IX. Risks, Limitations & Open Questions


X. Deliverables & Versioning

  1. Deliverables
    PreReg.card, Evidence.bundle (with MANIFEST.json and fingerprint), AuditTrail.log, *.sig, EnvLock, ReproduceReport, Compliance.summary.
  2. Versioning policy
    • Evidence refresh without changing the analysis plan → patch.
    • Threshold or statistical-scheme changes → minor (re-registration required).
    • Environment or graph-structure changes → major (new EnvLock and full replay).
    • Any schema changes require updating Graph.sig and MANIFEST.schema.hash, and registration in Appendix C.

Copyright & License (CC BY 4.0)

Copyright: Unless otherwise noted, the copyright of “Energy Filament Theory” (text, charts, illustrations, symbols, and formulas) belongs to the author “Guanglin Tu”.
License: This work is licensed under the Creative Commons Attribution 4.0 International (CC BY 4.0). You may copy, redistribute, excerpt, adapt, and share for commercial or non‑commercial purposes with proper attribution.
Suggested attribution: Author: “Guanglin Tu”; Work: “Energy Filament Theory”; Source: energyfilament.org; License: CC BY 4.0.

First published: 2025-11-11|Current version:v5.1
License link:https://creativecommons.org/licenses/by/4.0/