WCF-1 COMPLIANCE API Wireless Communications Fix One — Governance Interface (Public Spec, Logic Sealed)

WCF-1 COMPLIANCE API

Wireless Communications Fix One — Governance Interface (Public Spec, Logic Sealed)

This defines the public interaction surface for operators to integrate with the WCF-1 governance layer. All equilibrium, PHM, Sentinel, NashMark, BCE/EEE logic remains sealed inside the service. The API returns decisions and scores only never internal parameters.


1. General

Base URL (conceptual):

https://wcf1.truthfarian.net/api/v1/

Auth:

  • Mutual TLS and/or OAuth2 bearer token (implementation-specific).
  • All requests must be authenticated and traceable to a licensed operator and registered site.

Core IDs:

  • operator_id – licensed entity
  • site_id – physical site (tower, rooftop, mast)
  • node_id – specific radio/antenna node
  • beam_id – logical RF channel (optional)

Core enums:

{
  "service_class": [
    "emergency",
    "medical",
    "environment",
    "civic_essential",
    "general",
    "discretionary"
  ],
  "decision": [
    "permit",
    "shape",
    "reduce",
    "deny"
  ],
  "system_state": [
    "normal",
    "constrained",
    "restricted",
    "critical",
    "locked"
  ]
}
        

2. /sentinel/event

POST /sentinel/event

Submit ecological + field sensing for a beam/node; receive updated state + constraints.

Request

{
  "timestamp": "2025-12-03T16:05:00Z",
  "operator_id": "OPR-00123",
  "site_id": "SITE-ALBION-001",
  "node_id": "NODE-SEC-01",
  "beam_id": "BEAM-01",
  "sensors": {
    "avian_density": 0.42,
    "insect_density": 0.88,
    "field_drift_index": 0.15,
    "environment_disruption_index": 0.33,
    "exposure_density": 0.72
  },
  "context": {
    "local_time": "2025-12-03T16:05:00+00:00",
    "season_code": "WINTER",
    "weather_code": "CLOUDY",
    "migration_phase": "ACTIVE"
  }
}
        

Response

{
  "system_state": "constrained",
  "recommendation": {
    "decision": "shape",
    "max_duty_cycle": 0.35,
    "max_exposure_density": 0.50
  },
  "breach_flags": {
    "wildlife_proximity": true,
    "exposure_limit": false,
    "phm_harm": false
  },
  "audit_id": "AUD-20251203-0001"
}
        

3. /transmission/permission

POST /transmission/permission

Request

{
  "timestamp": "2025-12-03T16:05:05Z",
  "operator_id": "OPR-00123",
  "site_id": "SITE-ALBION-001",
  "node_id": "NODE-SEC-01",
  "beam_id": "BEAM-01",
  "service_class": "general",
  "rf_profile": {
    "frequency_mhz": 3500,
    "bandwidth_mhz": 40,
    "tx_power_dbm": 40,
    "antenna_gain_dbi": 18,
    "beam_elevation_deg": 5,
    "beam_azimuth_deg": 120
  },
  "traffic_profile": {
    "requested_throughput_mbps": 120,
    "expected_duration_s": 60,
    "user_count": 43
  }
}
        

Response

{
  "decision": "reduce",
  "constraints": {
    "max_tx_power_dbm": 32,
    "max_throughput_mbps": 60,
    "max_duty_cycle": 0.5
  },
  "system_state": "constrained",
  "harm_score": {
    "delta_omega": 0.27,
    "delta_c": 0.39,
    "equilibrium_ok": true
  },
  "notes": [
    "wildlife_proximity_elevated",
    "service_class_below_emergency"
  ],
  "audit_id": "AUD-20251203-0002"
}
        

4. /exposure/check

POST /exposure/check

Request

{
  "operator_id": "OPR-00123",
  "site_id": "SITE-ALBION-001",
  "scenarios": [
    {
      "scenario_id": "SCN-001",
      "rf_profile": { "...": "..." },
      "geometry": {
        "height_m": 35,
        "terrain_code": "URBAN",
        "nearby_habitats": ["wetland", "hedgerow"]
      }
    }
  ]
}
        

Response

{
  "results": [
    {
      "scenario_id": "SCN-001",
      "max_exposure_density": 0.81,
      "equilibrium_ok": false,
      "recommended_adjustments": {
        "max_tx_power_dbm": 30,
        "max_beam_elevation_deg": 3
      }
    }
  ]
}
        

5. /harm/score

POST /harm/score

Request

{
  "timestamp_start": "2025-12-03T16:00:00Z",
  "timestamp_end": "2025-12-03T16:05:00Z",
  "operator_id": "OPR-00123",
  "site_id": "SITE-ALBION-001",
  "node_id": "NODE-SEC-01",
  "beam_id": "BEAM-01",
  "summary": {
    "average_tx_power_dbm": 36,
    "average_exposure_density": 0.64,
    "average_loss_factor": 0.22,
    "material_footprint_index": 0.10
  }
}
        

Response

{
  "delta_omega": 0.31,
  "delta_c": 0.42,
  "equilibrium_ok": true,
  "phm_class": "low_to_moderate",
  "audit_id": "AUD-20251203-0003"
}
        

$ \Delta\Omega_t = \alpha L_t + \gamma X_t + \zeta M_t,\quad \Delta c_t - \Delta\Omega_t \ge 0 \Rightarrow \text{equilibrium\_ok} = \text{true} $


6. /state/transition

POST /state/transition

Request

{
  "timestamp": "2025-12-03T16:05:10Z",
  "operator_id": "OPR-00123",
  "site_id": "SITE-ALBION-001",
  "node_id": "NODE-SEC-01",
  "requested_state": "normal"
}
        

Response

{
  "enforced_state": "restricted",
  "reason": [
    "recent_breach_events",
    "elevated_wildlife_proximity"
  ],
  "unlock_time": "2025-12-03T16:25:10Z",
  "audit_id": "AUD-20251203-0004"
}
        

7. /equilibrium/status

GET /equilibrium/status

Response

{
  "operator_id": "OPR-00123",
  "site_id": "SITE-ALBION-001",
  "current_state": "constrained",
  "equilibrium_ok": true,
  "rolling_window": {
    "window_s": 3600,
    "aggregate_delta_omega": 3.21,
    "aggregate_delta_c": 4.02
  },
  "recent_breaches": [
    {
      "timestamp": "2025-12-03T15:32:11Z",
      "type": "wildlife_proximity",
      "resolved": true
    }
  ]
}
        

$ \text{Eq}(\mathcal{S}) = \Sigma_{t \in W}(\Delta c_t - \Delta\Omega_t) $


8. Integration Loop (Operator-Side Pseudocode)

loop:
  E_t = collect_sentinel_sensors()
  sentinel_resp = POST /sentinel/event(E_t)

  if sentinel_resp.system_state in { "critical", "locked" }:
      hard_shutdown_rf()
      continue

  req = build_transmission_request(sentinel_resp)
  perm = POST /transmission/permission(req)

  if perm.decision == "deny":
      suppress_transmission()
  else if perm.decision in { "shape", "reduce" }:
      apply_constraints(perm.constraints)
      transmit_within_envelope()
  else:
      transmit_nominal()

  log_audit_ids(sentinel_resp.audit_id, perm.audit_id)
end loop
        

All governance responsibility is centralised in the WCF-1 service. Operator equipment becomes a compliant actuator that obeys: state, decision, constraints, and equilibrium signals. Internal PHM, Sentinel, NashMark, BCE, and EEE logic never leave the sealed module.