Ontic Labs
  1. Home /
  2. Control Plane /
  3. Ledger

Layers 1–4

Ledger

Layers 1-4: claim-level uncertainty quantification and deterministic gate enforcement.

Claim Ledger decomposes every response into atomic claims, verifies each claim against authoritative sources, scores uncertainty across up to four layers, and enforces a deterministic emission gate.


Without it

Without claim-level decomposition, you’re scoring responses as monoliths. One backed claim hides three fabricated ones. You can’t tell auditors which specific assertion failed or why.


Position in the platform

  • Oracle Foundry (Foundation): Supplies authoritative chunks with provenance, tiering, and SIRE boundaries
  • SIRE Crosswalk (Post-Foundry): Provides global authority routing and conflict context for cross-oracle claims
  • Prompt Compiler (L0): Optimizes prompt structure before generation
  • Claim Ledger (L1-L4): Scores per-claim confidence, entailment, stability, and representation uncertainty
  • Process Control System (Cross-layer): Tracks drift and process capability over governed output
  • Forensics Lab (L5): Runs root-cause diagnostics on failed governed responses

Five-stage runtime pipeline

  • Stage 1 — Claim extraction: Splits model output into atomic factual assertions with claim IDs and claim types.
  • Stage 2 — L1 calibrated confidence: Converts token logprobs into calibrated correctness probabilities, with separate scoring for critical tokens.
  • Stage 3 — L2 source entailment: Scores each claim against oracle chunks using embedding similarity + NLI, then applies tier-weighted aggregation.
  • Stage 4 — L3 stability: Uses multi-draw regeneration and semantic clustering to identify reproducible claims vs stochastic artifacts.
  • Stage 5 — L4 representation uncertainty: Applies hidden-state probes to detect internal volatility not visible in token confidence.

Deterministic gate logic

  • Authority boundary check (SIRE exclusions and out-of-scope concepts)
  • License boundary check for output constraints on licensed material
  • Worst-claim entailment gate using min(best_score) across all claims
  • Contradiction detection (numeric predicates, polarity, and NLI where required)
  • Mode-dependent confidence, stability, and representation uncertainty checks

Governance envelope output

  • Per-claim audit trail with source attribution, layer scores, and gate reason codes
  • Complete request provenance: model, oracle, embedding, calibration, and compiler versions
  • Structured artifact consumed by Process Control System and Forensics Lab for closed-loop remediation