Product

Bridge Kernel

Reduce reconciliation from weeks to days. Sign every reading at the edge with Ed25519, chain it into cryptographic proofs, and deliver audit-ready evidence — before disputes start.

Proof Lifecycle
CANONICALIZEINGESTSIGNVERIFYSHA-256 HashRaw TelemetryEd25519 + Proof MetadataReview Ready

Signatthesource.Provebeforeitmoves.Governbeforeitpersists.ThatistheBridgeKernelguarantee.

How It Works

From source telemetry to reviewable evidence

01

Capture at the edge

Receive structured telemetry and operational events at the source — DLMS meters, OCPP chargers, Modbus devices — through protocol-native adapters.

02

Produce deterministic proof

Canonicalize the record, hash it, sign it with Ed25519, and attach the metadata required for later independent review.

03

Apply policy before persistence

Run policy checks before records hit the ledger so stale, malformed, or risky events are quarantined instead of silently accepted.

04

Store and prepare evidence

Persist verified records locally first, then use controlled sync and evidence-pack flows for broader operational use.

Protocol Adapters

Protocol adapters for every energy source

Current

Webhook / REST

HTTP-based telemetry and system integrations

Current

File ingest

Controlled imports and deterministic replayable input

Current

Scanner and edge inputs

Operational event capture at the edge

Current

GPS / NMEA

Location-aware field event trails

Current

Modbus RTU/TCP

Industrial energy meter telemetry

Current

DLMS / IEC 62056

Smart meter data capture and normalization

Current

OCPP 1.6/2.0

EV charging session verification

Roadmap

IEC 61850

Substation and grid event capture

Program

Custom adapters

Protocol-specific work scoped through pilots

Proof System

How Bridge Kernel generates tamper-evident proof

Verification Monitor
Live
Events Verified
0
All time · cumulative
Proof Latency
0ms
p99 · last 24 h
Signature Health
0%
Key rotation OK
Uptime
0%
Rolling 90 days
Verification Throughput97.4%
CaptureProveGovernlast updated · just now
joulebridge · proof engine
Ed25519SHA-256ISO 50001

1. Canonicalize

Sort keys, normalize text, and produce a deterministic representation of the event payload.

2. Hash

Compute a SHA-256 digest so later systems can identify whether the content changed.

3. Sign

Use Ed25519 to attach identity and integrity metadata to the digest.

4. Envelope

Wrap the event, signature, and verification metadata into a proof object that downstream systems can inspect.

proof-envelope.json
{
  "event": {
    "current_a": 12.4,
    "power_kw": 3.1,
    "voltage_v": 230.5
  },
  "key_id": "site-gw-01",
  "key_version": 3,
  "signature_context": "bridge-kernel-v1",
  "signatures": [
    {
      "algorithm": "Ed25519",
      "value": "b7e2f1c3d8a9..."
    }
  ],
  "proof_metadata": {
    "hash_algorithm": "SHA-256",
    "digest": "8af3c2b1e9d4f7a2...",
    "timestamp": "2026-03-07T10:15:00Z",
    "verified": true
  }
}
Deployment

Deploy where the evidence needs to begin

Edge Gateway

ARM or x86 gateway close to the data source for edge-first verification.

On-Premise Server

Linux or Windows host inside an operator-controlled environment.

Containerized Runtime

Container-based deployment where local operational controls already exist.

Cloud-Adjacent Instance

Useful for controlled integrations, demos, and platform-adjacent workflows.

Security

Security controls that sit inside the runtime itself

Ed25519 signing on every event at the edge
Replay protection with configurable time windows
Idempotency via event_id deduplication across ingestion
Policy bundle stage, promote, and rollback control flow
Hardware-backed signing and key custody (roadmap)
Structured logs and runtime snapshots for operational review
Operating View

Built for the teams that have to defend what happened

Bridge Kernel is the edge runtime — it signs, verifies, and governs telemetry where the data is born. Cloud control, dashboards, and settlement layers build on top.

The result: operators, auditors, and counterparties get a cryptographically verifiable record of what happened — not a spreadsheet someone assembled after the fact.

Bridge Kernel Architecture
Trusted flow from energy source to settlement surface
Operational baseline
OCPPINGESTIONMODBUSINGESTIONREST APIINGESTIONMESH, P2P,WEBHOOKSEXISTING ENERGY INFRASTRUCTUREBRIDGE KERNEL PIPELINEBRIDGE KERNEL SETTLEMENTENERGY SOURCE(S)ADAPTER GATEWAYPOLICY ENGINEPEER SYNCINGESTNORMALIZEPROVELEDGERRECONCILESETTLE