Scenario
ClearState stops decisions that shouldn't be made — before they are made, and shows exactly why.Before an action is executed, ClearState checks if it's allowed under current rules and limits. If not, it stops it and shows the exact reason.

For:
What goes wrong today
What ClearState does
or press T for tour
ClearState — Pre-execution decision layer
Showing a single scenario ·
ClearState — a pre-execution decision authorization layer.
Click any scenario below to see it in action. Each shows a real decision, the rulebook that must be true, the binary output — and, when authorized, an audit-ready record that is retrievable and deterministically reproducible.
▷ Quick tour (≈3 minutes)
First time here? Take a guided walk-through. Each tour shows Step 1 decisionability, the binary output, and — for AI / financial scenarios — how an LLM would handle the same question.
Filter by sector:
Each scenario shows: the situation · the input · the rulebook · the binary output · and, when ALLOWED, the audit-ready Authorization Record. Switch to Production above to see how this works at scale.
Step 1 / 8
About ClearState
What ClearState is

ClearState is a pre-execution decision authorization layer. Before a regulated decision is taken, ClearState evaluates whether it can be defended — against the customer's own mandates, policies, and ownership structure — and produces a clear yes/no result with a retrievable record.

It is not a risk engine, a scoring system, or a compliance checker. The output is binary: the decision is authorized, or it is blocked with one specific reason.

What it was built for

ClearState was originally built to make a regulated financial transaction defensible at the moment it was authorized — under conditions where reconstructing the decision afterwards was not an acceptable answer. The pre-execution authorization layer (the architecture you see in the scenarios) was developed as the gate that makes that class of decision safe at scale.

The same authorization layer — that evaluates each decision against versioned rules and named authority before it executes, and produces a record retrievable years later — applies to any regulated decision where authorization must be defensible at the moment of decision rather than reconstructed afterwards.

Patent

Core mechanics are covered by patent application SE 2515467-5, filed December 2025 by VND Scandinavia AB (Stockholm, Sweden) through Zacco Sweden AB.

Current status
Architecture
Built and integrated for the originating use case.
Patent
Filed Dec 2025 (SE 2515467-5).
Rollout
Insurer underwriting and SPV structure under review. Live operation expected within ~6 months pending insurer sign-off.
Other domains
Six application scenarios in active prospect dialogue (financial services, public sector, customs, AIFM).
Pilot offer
3-week pilot on customer's historical decisions. €7,500–15,000.
Customs case · 2026–2028 window

Regulatory trigger. The EU customs reform on low-value consignments takes effect 1 July 2026. The duty-free threshold for parcels under €150 is removed; a flat duty of €3 per tariff line is introduced as a transitional measure through 2026–2028, ahead of the EU Customs Data Hub. Parcels that previously cleared as simplified, duty-free entries now require formal declarations with payable customs debt.

What this creates. The reform reshapes the economics of high-volume cross-border e-commerce flows from non-EU marketplaces into the EU. Parcels that previously cleared duty-free now generate formal declarations and customs debt at scale. Each declaration consumes a customs broker's deferment guarantee — a finite envelope sized for current volumes, not for the volumes the reform will route through it. The capital required to scale the envelope is not on the broker's balance sheet. Without verifiable pre-submission control, the portfolio is uninsurable on commercial terms.

Architecture. The flow does not need a better tool. It needs an architecture in which control, financing, and risk transfer are held by parties priced to bear them. Six parties: marketplace operator (generates volume), data partner (structures declaration data), control layer (ClearState — authorizes each declaration before submission), customs broker (operates the flow without absorbing the customs debt on its balance sheet), financing partner (provides capital backing the deferment guarantee), credit insurer (covers credit risk against verifiable pre-submission control).

What each party gains. The marketplace operator continues to operate at scale under the new regulation. The customs broker captures volume revenue without taking proportional balance sheet risk — operator, not risk bearer. The control and data layers capture a share of the value created. The financing partner earns priced return on capital extended against an observable, capped exposure. The credit insurer earns premium on a risk that is controlled at origination — each underlying exposure gated against policy terms before it enters the book.

What the control layer adds. Without verifiable pre-submission control, this architecture does not exist. The financing partner cannot price a volume that may or may not stay within capacity. The credit insurer cannot underwrite a portfolio that cannot be reconstructed at claim time. ClearState authorizes each declaration in real time against mandate, capacity, and external coverage conditions — simultaneously, at the moment of submission — locks the rulebook by version, produces a signed Authorization Record per decision, and blocks non-compliant declarations before submission, non-overrideable.

Status. Architecture defined. Control layer built and patented (SE 2515467-5). First customs broker engaged as operating partner; operational rulebook being specified jointly. Engagement with credit insurer for policy terms and pricing is the next step, followed by financing partner engagement on guarantee capital structured against the same controlled flow. Onboarding of marketplace operator under bankable, insurable terms is targeted ahead of 1 July 2026. Replication across additional brokers and operators within the 2026–2028 window.

The Customs Deferment Gate scenario in this demo (scenario 04) shows the control layer in operation — a single declaration evaluated against mandate, capacity, and credit insurer conditions at the moment of submission.

Operating entity

VND Scandinavia AB · Stockholm, Sweden. Patent counsel: Zacco Sweden AB. Contact: info@clearstatenetwork.com.

Glossary
A short reference. The terms below describe what ClearState does and how it differs from tools that look adjacent — audit logs, rule engines, AI, decision support, compliance software. None of those produce an authorized decision at the moment it is taken. ClearState does.
ClearState
A pre-execution decision authorization layer. It sits between a decision being proposed and that decision being executed. It evaluates — in real time, against the customer's versioned rulebook, with the named decision-maker on record — whether the decision can be taken at all. The output is binary: ALLOWED or NOT ALLOWED. The result is captured as an Authorization Record retrievable years later.A new layer. Not an audit log, not a rule engine, not AI, not decision support, not compliance software. The category did not exist as a recognized market category a year ago.
Pre-execution authorization
Authorization happens before the decision is executed — not afterwards as a logged event, not as a recommendation that a human then signs under pressure. The Authorization Record is created at the moment of decision, not reconstructed when someone asks years later.This is the core distinction from audit logs, which register events after the fact, and from AI copilots, which recommend but do not authorize.
Decisionability
Whether a decision can be taken at all — regardless of whether it should be taken. A decision fails decisionability if required input is incomplete, the mandate is absent, or no responsibility is assigned. ClearState evaluates this first. Rules are not evaluated on a decision that is not decidable.
Mandate
A defined, versioned, owned authorization to make a category of decision within stated bounds. A mandate has a name, a version, a locked-at timestamp, an owner, an approver, and an approval date. ClearState binds every rule to a mandate at evaluation time — so that the question "who was authorized to make this call" always has an answer.
Rulebook
The customer's own policies, mandates, and rules — expressed in a form ClearState can evaluate. Versioned, locked at activation, retrievable. The rulebook is the customer's; ClearState is the layer that applies it.Most organizations discover during a pilot that what they call "rules" are prose in policy documents, undocumented exceptions, and unversioned mandates. The rulebook is the artifact that did not exist before.
Authorization Record
The retrievable record of an evaluated decision. Contains decision ID, timestamp, outcome (ALLOWED or NOT ALLOWED), authority, rulebook version, and the accountability chain. Retrievable for the retention period (typically 7 years). The record for a stopped decision is also retained — there is no version of "this never happened".
Accountability chain
The retrievable record of who owns each rule, mandate, and policy that applied to a decision. Includes mandate owner and approver, policy owner and approver, active delegation level, and the named decision-maker at the moment of decision. The accountability chain is what distinguishes a ClearState record from a rule-engine output.
Binding reason
When a decision is NOT ALLOWED, ClearState surfaces exactly one reason — the highest-priority condition that did not hold. Distinct from rule-engine error reports that list every failure. The single binding reason makes the block defensible and actionable: one thing to fix, one role responsible.
Deterministic replay
Re-evaluating the same input against the same rulebook version always produces the same outcome. Replay produces a new event (new ID, new timestamp) but identical decision content. Distinct from AI behavior, where the same input may produce different outputs across runs or model versions — which is why an AI cannot be the authorizing layer for a decision that must be defensible later.
ALLOWED / NOT ALLOWED
The two possible outcomes. Binary by design. There is no "approved with conditions", no "review pending", no third state. If conditions are not satisfied, the answer is NOT ALLOWED — accompanied by the binding reason and the role required to escalate.
Pilot
A 3-week engagement on the customer's historical decision data. Produces (1) the customer's own rulebook in machine-readable form, (2) Authorization Records on historical decisions, (3) breakdown of allowed / blocked / why. The customer keeps the rulebook permanently, regardless of whether they continue. Pilot fee €7,500–15,000, with 50% credited toward license if the customer continues.
What ClearState is not
Not an audit or logging tool — those register events after they happen. Not a rule engine — a rule engine gives an answer but no record of who was authorized to make the call. Not AI or a copilot — those recommend; they do not authorize. Not a decision support tool — those inform a person who then decides under pressure. Not compliance software — that documents policy but is not active in the moment of decision.Each of those categories gives part of what is needed. None gives the decision as a complete, defensible object at the moment it is taken.
Keyboard shortcuts
P toggle presenter mode
E evaluate scenario
R verify determinism (replay)
L show LLM contrast
13 switch example (Customs / Pre-Trade / LP)
G open glossary
Esc back / close panels
? toggle this help
click anywhere to dismiss