Skip to main content
Jira progress: loading…

SSSR-JSON

JSON Registry (JSON Signal Library)

(Addendum to SSSR – Smart Searchable Signal Registry)

1. Purpose of the SSSR-JSON Registry

The existing SSSR is optimized for flat, tabular metadata. However, many ESG signals require structured, nested, rule-rich data models that cannot be represented in spreadsheets without loss of fidelity. Examples include:

  • XBRL/iXBRL objects
  • ESRS narrative blocks with metadata
  • Micro-engine configuration payloads
  • LCA datasets (process trees, multi-factor emission models)
  • Complex policy templates with placeholders
  • Large rule sets (validation matrices, risk maps, NACE→metric mappings)

To handle these safely, ZAYAZ introduces a separate SSSR-JSON Registry: a canonical library of versioned JSON schemas and JSON payloads, fully searchable, traceable, and integrated into the USO/ZAR/SSSR framework.

The registry serves as the authoritative source for all structured ESG logic, ensuring:

  • Standardization of complex ESG objects
  • Version control & change governance (CMCB compliance)
  • Full ESRS/CSRD traceability
  • Interoperability between engines (FOGE, ZARA, MICE, DICE, VTE, Agents)
  • High-fidelity validation (JSON schema enforcement)
  • Auditability & immutability (ALTD + Blockchain Verification Layer)

2. Architectural Overview

2.1. Position in the ZAYAZ Architecture

The SSSR-JSON Registry integrates into the following stack layers:

  • SSSR → metadata discovery (signal-level)
  • ZAR → artifact storage (JSON = an artifact class)
  • USO → semantic linking and ontology tagging
  • ZSSR → routing to engines that consume/produce JSON
  • ALTD → logging every JSON registry interaction
  • CMCB → schema evolution, compatibility rules

JSON artifacts flow to:

  • FOGE (form templates, structured instructions)
  • ZARA (intent resolver rulesets)
  • ZAAM agents (prompt templates, rules)
  • MICE engines (config, factor tables, scoring logic)
  • DaVE/DICE/VTE (advanced validation profiles)
  • XBRL exporter (taxonomy fragments)
  • Analytics & SIS (scheduler config, event rules)

3. What Belongs in the JSON Registry vs. Normal SSSR?

CategorySSSR Table (Flat)SSSR-JSON Registry
Simple fields (units, labels, source, IDs)
Dropdown lists
Single values
Complex rulesets
XBRL taxonomy fragments
Large policy templates
MICE engine configs
NACE**→**metric data models
LCA / IPCC factor trees
Multi-language blocks
Agent prompt templates
Time-series schema
Semantic graphs

4. JSON Registry Master Table (Database Specification)

This table registers every JSON artifact that exists in ZAYAZ. Stored in sssr_json_registry.

4.1. Fields

FieldTypeDescription
json_idUUID / stringUnique identifier (e.g., json.nace.tree.v1)
titlestringHuman-readable name
descriptiontextWhat this JSON object represents
categoryenum(xbrl, form_template, policy_block, ruleset, mice_config, validator_profile, agent_template, ontology_map, etc.)
versionsemver1.0.0, updated under CMCB rules
statusenum(active, deprecated, archived, experimental)
json_schema_idrefLink to schema defining required structure
dataJSONBThe actual JSON content
checksum_sha256stringHash for tamper detection
uso_tagsarrayMapped concepts from the Universal Signal Ontology
related_signalsarray(signal_id)Signals that rely on this artifact
related_enginesarray(engine_id)MICE or AISIM engines using this JSON
related_agentsarray(agent_id)ZAAM agents referencing this
source_referencearrayIPCC, EFRAG, ESRS, ISO references
created_attimestampRegistry timestamp
updated_attimestampAuto-updated
change_logarrayHistory of modifications (CMCB), including diff summaries
security_classenum(public, internal, restricted)
blockchain_txstringHash to immutable ledger (optional)

This ensures all JSON artifacts are discoverable, traceable, auditable, and versioned.


5. JSON Schema Table

Stored in sssr_json_schemas. Each schema defines expected structure for categories of JSON artifacts.

FieldDescription
schema_idUnique ID
categoryJSON category
versionSchema version
schemaJSON Schema (draft-2020-12)
descriptionNotes
statusActive/Deprecated

This enforces structural consistency across all engines using the JSON.


6. Examples of JSON Artifacts

6.1. Example: MICE Engine Configuration

mice-engine-configuration.jsonGitHub ↗
{
"engine_id": "MEID_CALC03_v1",
"factor_source": "IPCC 2006",
"unit": "kgCO2e",
"calculation_rules": {
"formula": "distance_km * factor_kg_per_km",
"validity": ["scope3.category6"]
},
"defaults": {
"factor_kg_per_km": 0.143
}
}

6.2. Example: Form Template Block for FOGE

foge-form-template-block.jsonGitHub ↗
{
"section": "water_use",
"fields": [
{
"id": "water_withdrawal",
"type": "numeric",
"unit": "m3",
"help": {
"en": "Enter total water withdrawal.",
"es": "Ingrese la extracción total de agua."
}
}
]
}

6.3. Example: Agent Prompt Template

agent-prompt-template.jsonGitHub ↗
{
"agent_id": "form_diagnostic_assistant",
"template_id": "scope3_cat4_help_v2",
"language": "en",
"prompt": "The user is entering Scope 3 Category 4 data. Validate the input using rules from {json_id:rules.scope3.v2}."
}

7. Governance & Versioning (CMCB Compliance)

MAJOR (breaking)

  • Schema change
  • Removal/rename of fields
  • Migration: required
  • Deprecation window: 6–12 months

MINOR (non-breaking)

  • New optional fields
  • Extended rules
  • Auto-version: minor bump

PATCH

  • Typo fixes
  • Metadata updates
  • Silent version bump

Governance rules All must be logged in:

  • schema_audit_log
  • ZAR artifact history
  • ALTD for all reads/writes
  • Blockchain verification layer for critical ESG-impacting JSON

8. Querying the JSON Registry

The registry becomes part of SSSR search, with SSSR+JSON unified search: Query example (SSSR unified search):

search: “scope 3 factors + ruleset + NACE agriculture”
→ returns signals + JSON artifacts + engines + agents

9. Integration With Engines

Engine/ModuleInteraction with JSON Registry
FOGEloads templates, layouts, blocks
ZARAloads intent → tasks rulesets
ZAAM Agentspulls prompt templates / logic trees
MICEfetches engine configs
DICE/DaVE/VTEloads advanced validator models
XBRL/iXBRL Exporterloads ESRS taxonomy fragments
SEELloads stakeholder logic
ALTDlogs each JSON reference

10. Summary

The SSSR-JSON Registry becomes the central library for all complex, structured, multi-layered ESG intelligence in ZAYAZ. It:

  • Complements the existing SSSR (flat tables)
  • Powers dynamic engines (FOGE, ZARA, MICE, DICE)
  • Enables strict governance (CMCB, ALTD, Blockchain)
  • Gives white-label partners a stable, versioned API of ESG artifacts
  • Supports full ESRS/CSRD digital compliance (XBRL aligned)

It is the backbone of structured logic in the ZAYAZ platform.


11. Sequence Diagram — JSON Registry Read Flow (Engine Consumption)

Example: FOGE requesting a JSON form template block

User → Frontend
Frontend → FOGE: Request “Generate CSRD Form”
FOGE → SSSR: Query signals needed
SSSR → SSSR-JSON Registry: Fetch JSON metadata (json_id, version, schema)
SSSR-JSON Registry → ZAR: Retrieve JSON artifact payload
ZAR → USO Resolver: Resolve semantic tags, ontology links
USO Resolver → DICE: Validate structural / semantic integrity (optional)
DICE → FOGE: Return validated JSON structure
FOGE → AISIM: Inject contextual explanations (optional)
AISIM → FOGE: Enriched form template
FOGE → Frontend: Render dynamic form
Frontend → User: Form presented

Key Notes

  • All JSON pulls route through SSSR, ensuring unified Signal–JSON mapping.
  • ZAR is the authoritative storage of the JSON artifact.
  • USO provides semantics and inheritance.
  • DICE ensures trust and correct structure.

12. Sequence Diagram — JSON Registry Write/Update Flow (Governed Update)

Example: Updating a MICE engine configuration or XBRL taxonomy fragment

Admin → Frontend
Frontend → Registry API (Write Endpoint): Upload JSON payload + metadata
Registry API → JSON Schema Validator: Validate against schema_id
JSON Schema Validator → CMCB: Check compatibility rules (major/minor/patch)
CMCB → USO Resolver: Validate semantic tags + ontology constraints
USO Resolver → ZAR: Store new JSON artifact version
ZAR → SSSR-JSON Registry: Register version + metadata + checksum
SSSR-JSON Registry → ALTD: Log governance event (creation/update)
ALTD → Blockchain Verification Layer: Write tamper-proof hash (optional)
Registry API → Admin: Confirm JSON artifact updated

Key Notes

  • No JSON enters the system without schema validation.
  • CMCB enforces breaking change policy.
  • ALTD + Blockchain provide audit-grade traceability.

13. Sequence Diagram — Search Flow (Unified SSSR Query)

Example: Searching “scope 3 category 4 ruleset”

User → Frontend Search Bar
Frontend → SSSR Search API: Query("scope 3 category 4 ruleset")
SSSR Search API → SSSR Table: Search signal metadata
SSSR Search API → SSSR-JSON Registry: Search JSON metadata (tags, ontology, categories)
SSSR-JSON Registry → USO Resolver: Expand semantic graph (map related domains)
USO Resolver → ZAR: (Optional) Fetch top JSON artifacts for preview
ZAR → SSSR Search API: Return JSON links + signal matches
SSSR Search API → Frontend: Consolidated results
Frontend → User: Display unified search results

Search Modes Activated

  • Keyword search
  • Ontology-based semantic search (USO)
  • Category + version filters
  • Related signals / engines / agents

14. Sequence Diagram — Engine Trigger → JSON Consumption → Output Generation

Example: MICE engine calculating emissions using a JSON-based ruleset

User → Frontend: Submit Input Module (Business Travel)
Frontend → Input Hub: Validate field-level data
Input Hub → Rule Engine: Determine required MICE engine (MEID_CALC03_v1)
Rule Engine → SSSR: Lookup related JSON configs
SSSR → SSSR-JSON Registry: Fetch metadata for calculation ruleset
SSSR-JSON Registry → ZAR: Retrieve JSON ruleset
ZAR → MICE Engine: Deliver ruleset + config
MICE Engine → DaVE: Validate integrity (logical + numeric)
DaVE → MICE Engine: Approved ruleset
MICE Engine: Perform calculation
MICE Engine → DICE: Validate result (coherence, unit, trust thresholds)
DICE → Output Hub: Validated emissions result
Output Hub → Frontend: Display emission outputs
Frontend → User: Final result shown

Key Notes

  • This flow ensures no engine ever consumes unvalidated JSON.
  • MICE, DICE, DaVE form a sequencing trio:rules → compute → validate → output.

15. Sequence Diagram — Agent Prompt Resolution via JSON Registry

Example: ZAAM’s Form Diagnostic Assistant pulling a JSON prompt template

User → Frontend: Click “Help” on a form field
Frontend → ZAAM Dispatcher (ZADIF): Request agent help
ZADIF → Agent Profile DB: Determine required agent
ZADIF → SSSR: Fetch agent-related signal metadata
SSSR → SSSR-JSON Registry: Retrieve prompt template JSON
SSSR-JSON Registry → ZAR: Load JSON prompt object
ZAR → Prompt Template Engine: Apply dynamic resolvers
Prompt Template Engine → AIGS: Tag AI-origin metadata + trust profile
AIGS → Agent Engine: Final prompt constructed
Agent Engine → OpenAI API: Generate output
OpenAI API → Agent Engine: Response
Agent Engine → Frontend: Display contextual help
Frontend → User: Inline guidance shown

Key Notes

  • Every agent prompt is sourced from versioned JSON templates.
  • AI-origin tagging and trust scores ensure EU AI Act alignment.

16. Sequence Diagram — XBRL/iXBRL Generation Using JSON Registry

Example: Exporting ESRS-aligned XBRL using JSON-based taxonomy fragments

User → FOGE: “Export CSRD in iXBRL format”
FOGE → SSSR: Fetch required metric → XBRL tag mappings
SSSR → SSSR-JSON Registry: Retrieve XBRL taxonomy blocks (JSON)
SSSR-JSON Registry → ZAR: Load taxonomy JSON artifacts
ZAR → XBRL Builder Engine: Merge mappings + facts
XBRL Builder → DaVE/VTE: Validate taxonomy correctness + fact structure
DaVE/VTE → XBRL Builder: Approve or reject
XBRL Builder → Blockchain Verification Layer: Write disclosure integrity stamp
XBRL Builder → Reports Hub: Produce final document
Reports Hub → Frontend → User: Provide downloadable iXBRL report



GitHub RepoRequest for Change (RFC)