PoV is enforced at the protocol level so bad claims never enter state.

  • Source: devices/registries/systems emit data → one evidenceHash.
  • Verify: independent attestors (operators, auditors, registries) sign the same hash; KPIs & revocations tracked.
  • Gate: on-chain PoV Gate checks quorum • equality • one-claim; rejects mismatched or revoked evidence.
  • Mint: on pass, the chain admits the claim and mints the proof/token (or issues an EMT); the One-Claim Ledger finalizes it.

Result: only verified claims mint; everything else is blocked by code