Timeverse Protocol v4.5
Core Conventions with Tiles, TSAE, and Security Profile Interface
Abstract
Timeverse Protocol v4.5 specifies a phase-coordinated infrastructure core for triadic Human–AI–Quantum systems, with a cybersecurity-oriented design: canonical cycle-anchored phase conventions on S¹, wrap-safe phase windows, tick-canonical execution semantics (no floating-point boundary checks), Q-Address alignment (macro window + micro slot), tile identifiers for routing/community/audit scope, and TSAE records/receipts for tamper-evident provenance. Timeverse fields are public context (not secrets). Cryptography and anti-replay policy are defined by external, versioned Security Profiles (crypto-agility, including post-quantum migration) without changing Timeverse semantics.
Normative dependencies (DOIs)
- Conventions: 10.5281/zenodo.18068999
- Q-Address: 10.5281/zenodo.18068997
- Security Profile: 10.5281/zenodo.18069423
Recommended machine tags: This protocol is compatible with machine-facing schema tags used by dependent specs: qaddr_schema=TV-QADDR-2025-12 and tsae_schema=TV-TSAE-2025-12. These tags prevent silent incompatibilities and do not change human-facing semantics.
1. Scope and design intent
Operational protocol conventions: Timeverse defines interoperable protocol conventions for cyclic phase coordination and auditable logging. It does not modify physics and does not increase physical clock precision.
Triadic stack compatibility: The core is designed to support triadic stacks: Humans choose/approve windows, AI proposes/optimizes windows and policies, and hardware executes within windows. Quantum- and hardware-specific micro-timing/control hooks are handled by extension documents.
2. Time scale for computation (normative)
Autonomous arithmetic time variable:
Implementations MUST perform arithmetic using an autonomous linear/monotone time variable (seconds or fixed-point), not directly on UTC wall-clock timestamps. Human-facing UTC/RFC3339 timestamps are allowed for I/O/logging only and MUST be mapped to the arithmetic variable according to the policy bound by convention_id (see Conventions).
: This avoids leap-second ambiguity in computing cycle index and phase, and supports deployments that operate without continuous external time infrastructure.
3. Core conventions (normative via Conventions)
Canonical definitions live in Conventions: This protocol uses the canonical definitions from Conventions:
n(t) = ⌊(t − t₀)/Tcycle⌋ ∈ ℤ,
ϕ(t) = ((t − t₀)/Tcycle) mod 1 ∈ [0, 1) ≅ S¹,
including the negative-safe modulo convention, circular distance on S¹, and wrap-safe phase windows with half-width tolerance.Earth-first defaults are informative: A deployment MAY choose Earth-first defaults (e.g. a day-length cycle), but normatively t₀ and Tcycle are defined by convention_id under Conventions. This document does not require a specific epoch or cycle period.
4. HS displays and UI projections
Derived HS displays (UI-only):
Human-facing displays (e.g. HS degrees or HS index) are derived from ϕ(t) and MUST NOT be used for verification.
5. SWT (canonical reference and UI projections)
SWT12 is canonical; projections are UI-only: SWT12 is the canonical reference for interoperability. Other SWT labels are user-facing projections and MUST NOT mutate canonical (n,ϕ) or tick semantics.
6. Phase windows and ticks (normative)
Ticks are canonical for verification: Verification/gating MUST NOT use floating-point boundary comparisons. Window membership MUST be checked using fixed-point ticks as defined by Conventions and carried by convention_id.
7. Tiles
Tiles are protocol identifiers: Tiles are protocol identifiers used for community feeds, routing domains, moderation scope, and audit scoping. They are not physical objects.
Tile schema identifier:
If tiles are used, a deployment MUST specify a tile_schema_id describing how tile identifiers are defined and parsed. If a tile mapping is used for policy enforcement, edge handling must be deterministic.
8. Q-Address alignment
Q-Address minimal view (tick-canonical):
A minimal Q-Address view compatible with window coordination is:
(qaddr_schema, convention_id, scope, cycle_index, resolution=R, phi_ticks, deltaPhi_ticks, slot).
This is a view; the full schema and canonical encoding rules are specified in the Q-Address document. Recommended schema tag: qaddr_schema=TV-QADDR-2025-12.
: Macro coordination is via (cycle_index, phi_ticks, deltaPhi_ticks). Micro timing (slot) is local and should use integer units (e.g. nanoseconds) per the Q-Address spec.
9. TSAE and anchoring interface
TSAE provides auditable anchoring: TSAE records/receipts provide tamper-evident anchoring of time-contextual events for reproducibility and governance.
TSAE record (tick-canonical, minimal):
A TSAE record includes canonical phase context using ticks:
(tsae_schema, convention_id, scope, cycle_index, resolution=R, phi_ticks, action_hash, signer_id, nonce, ext).
Recommended schema tag: tsae_schema=TV-TSAE-2025-12. ext MAY include tile identifiers and derived UI-only displays as metadata.
Canonical verification: Canonical verification MUST be based on convention_id and tick fields (cycle_index, resolution, phi_ticks), plus signature/nonces per the Security Profile. UI fields (SWT labels, HS displays) are not normative.
Anchoring minimalism: If ledger anchoring is used, store commitment hashes on-chain and keep large payloads off-chain when needed.
10. Security profiles interface
Context is not secret: Timeverse fields (phase, SWT/HS displays, tiles, Q-Address fields, TSAE fields) are public context and MUST NOT be treated as secrets.
Security profile identifier:
A security_profile_id selects cryptographic algorithms and policy rules (canonical serialization, hashing/domain separation, signature formats, anti-replay policy, key binding model).
Associated-data binding: Security profiles SHOULD bind canonical Timeverse context as associated data (AAD) for domain separation and replay resistance, e.g. (convention_id, scope, cycle_index, resolution, phi_ticks, optional tile schema/id).
11. Conclusion
Timeverse Protocol v4.5 defines a hardened cyber-facing core: canonical cycle-anchored phase semantics, wrap-safe windows with tick-canonical verification, tiles for routing/community/audit scope, Q-Address alignment for execution, and TSAE records/receipts for auditable anchoring under crypto-agile security profiles. Quantum/AI capabilities are supported as plug-in extensions that consume the same immutable core semantics.
References
- [1] T. Ouardi, Phase-Coordination Series Conventions, Zenodo (2025). DOI: 10.5281/zenodo.18068999.
- [2] T. Ouardi, Q-Address: Macro Phase + Micro Slot, Zenodo (2025). DOI: 10.5281/zenodo.18068997.
- [3] T. Ouardi, Timeverse Security Profile, Zenodo (2025). DOI: 10.5281/zenodo.18069423.