The trust model is explicit and standard-first. Every criterion must point back to an authoritative source. Every payload must be verifiable offline. Every assertion must expire before it becomes stale.
Use Enilo.ai to ingest and normalize authoritative study, work, and travel abroad criteria, then let Decionis verify the signed assertion before it is admitted into the policy graph and encoded into the Decision Dossier.
The trust model is explicit and standard-first. Every criterion must point back to an authoritative source. Every payload must be verifiable offline. Every assertion must expire before it becomes stale.
The downstream case system receives a normalized trust verdict instead of raw provider-specific token parsing logic.
The pilot proves the Decionis standard first, then expands corridor coverage after the provider profile is stable.
Every eligibility criterion must preserve source identity, source version, retrieval time, verification time, and normalization version before Decionis will trust it.
Enilo emits JWTs signed with RS256 or ES256 so Decionis can validate issuer, audience, key id, and signature integrity without depending on a live callback.
Signals carry computed-at, valid-until, and recompute-required-after timestamps so stale eligibility signals cannot silently remain in circulation.
The first slice should be corridor-specific, criteria-specific, and easy to inspect manually while the verification layer is hardening.
Start with one or two study, work, or travel corridors so both teams can prove the trust contract before broad expansion.
Decionis returns accepted, downgraded, rejected, or recompute-required so downstream systems never need provider-specific token parsing logic.
Every accepted or rejected signal is recorded with provider, key id, reason codes, and criterion provenance references for later review.
Enilo owns the domain signal. Decionis owns the trust standard, policy admission, and dossier encoding.
Agree on the first corridor, required criteria, authoritative sources, and freshness windows for each criterion family.
Enilo emits the exact JWT contract with protected header, claims, criterion provenance, and validity boundaries.
Decionis validates signature, issuer, audience, freshness, and provenance completeness, then returns a single trust verdict.
Accepted or downgraded signals are recorded in the dossier trail so downstream actions remain explainable and reviewable.
No. Enilo is the signal authority for corridor-specific eligibility facts. Decionis remains the policy and dossier authority that decides whether the signed assertion is acceptable policy input.
The first proof target is trust, not automation volume: valid signed payloads, criterion-level provenance, fresh signals, and deterministic verification outcomes in Decionis.
Decionis can downgrade, reject, or force recomputation. The downstream system receives the normalized verdict and reason codes instead of a silent failure.
A signed JWT gives Decionis an offline-verifiable contract with explicit issuer, audience, key id, and freshness boundaries. That reduces runtime coupling and makes dossier evidence portable.
The right first pilot is small, signed, traceable, and freshness-bound. Decionis verifies the standard contract before the external workflow consumes the resulting policy dossier.
Discuss the Enilo pilot