1:"$Sreact.fragment" 2:I[37512,["/_next/static/chunks/816c48af6d78de25.js","/_next/static/chunks/17d2fbe4691bfa48.js"],"default"] 3:I[75644,["/_next/static/chunks/816c48af6d78de25.js","/_next/static/chunks/17d2fbe4691bfa48.js"],"default"] 4:I[97671,["/_next/static/chunks/1a890cdbfa753545.js"],"Analytics"] 5:I[51897,["/_next/static/chunks/1a890cdbfa753545.js","/_next/static/chunks/fd2a9f3893bdeabf.js"],""] f:I[16665,["/_next/static/chunks/816c48af6d78de25.js","/_next/static/chunks/17d2fbe4691bfa48.js"],"default"] :HL["/_next/static/chunks/bbaad947c2a48464.css","style"] :HL["/_next/static/media/83afe278b6a6bb3c-s.p.3a6ba036.woff2","font",{"crossOrigin":"","type":"font/woff2"}] 0:{"P":null,"b":"OIWgHder96rtHyVOKgweQ","c":["","use-cases"],"q":"","i":false,"f":[[["",{"children":["use-cases",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",true],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/bbaad947c2a48464.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/1a890cdbfa753545.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"en","className":"dark","children":["$","body",null,{"className":"font-sans antialiased","children":[["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L4",null,{}]]}]}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[["$","div",null,{"className":"min-h-screen bg-background text-foreground","children":[["$","header",null,{"className":"fixed top-0 w-full z-50 border-b border-border/50 bg-background/80 backdrop-blur-xl","children":["$","nav",null,{"className":"container mx-auto px-6 h-16 flex items-center justify-between","children":[["$","$L5",null,{"href":"/","className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-8 h-8 rounded-lg bg-primary flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-5 h-5 text-primary-foreground","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","span",null,{"className":"text-xl font-semibold","children":"Granted.AI"}]]}],["$","div",null,{"className":"hidden md:flex items-center gap-8","children":[["$","$L5",null,{"href":"/features","className":"text-sm text-muted-foreground hover:text-foreground transition-colors","children":"Features"}],["$","$L5",null,{"href":"/how-it-works","className":"text-sm text-muted-foreground hover:text-foreground transition-colors","children":"How It Works"}],["$","$L5",null,{"href":"/use-cases","className":"text-sm text-muted-foreground hover:text-foreground transition-colors","children":"Use Cases"}],["$","$L5",null,{"href":"/pricing","className":"text-sm text-muted-foreground hover:text-foreground transition-colors","children":"Pricing"}],["$","$L5",null,{"href":"/playground","className":"text-sm text-primary hover:text-primary/80 transition-colors font-semibold","children":"Playground"}],["$","$L5",null,{"href":"/mcp-demo","className":"text-sm text-primary hover:text-primary/80 transition-colors font-semibold","children":"MCP Demo"}],["$","$L5",null,{"href":"/login","children":["$","button",null,{"data-slot":"button","className":"inline-flex items-center justify-center whitespace-nowrap text-sm font-medium transition-all disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg:not([class*='size-'])]:size-4 shrink-0 [&_svg]:shrink-0 outline-none focus-visible:border-ring focus-visible:ring-ring/50 focus-visible:ring-[3px] aria-invalid:ring-destructive/20 dark:aria-invalid:ring-destructive/40 aria-invalid:border-destructive border bg-background shadow-xs hover:bg-accent hover:text-accent-foreground dark:bg-input/30 dark:border-input dark:hover:bg-input/50 h-8 rounded-md gap-1.5 px-3 has-[>svg]:px-2.5","children":["$L6","Login"]}]}]]}]]}]}],"$L7","$L8","$L9","$La","$Lb"]}],["$Lc"],"$Ld"]}],{},null,false,false]},null,false,false]},null,false,false],"$Le",false]],"m":"$undefined","G":["$f",[]],"S":true} 16:I[33267,["/_next/static/chunks/816c48af6d78de25.js","/_next/static/chunks/17d2fbe4691bfa48.js"],"OutletBoundary"] 17:"$Sreact.suspense" 19:I[33267,["/_next/static/chunks/816c48af6d78de25.js","/_next/static/chunks/17d2fbe4691bfa48.js"],"ViewportBoundary"] 1b:I[33267,["/_next/static/chunks/816c48af6d78de25.js","/_next/static/chunks/17d2fbe4691bfa48.js"],"MetadataBoundary"] 6:["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-log-in w-4 h-4 mr-2","children":[["$","path","u53s6r",{"d":"M15 3h4a2 2 0 0 1 2 2v14a2 2 0 0 1-2 2h-4"}],["$","polyline","1ail0h",{"points":"10 17 15 12 10 7"}],["$","line","v6grx8",{"x1":"15","x2":"3","y1":"12","y2":"12"}],"$undefined"]}] 7:["$","section",null,{"className":"relative pt-32 pb-20 px-6 overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0 bg-[linear-gradient(to_right,#80808012_1px,transparent_1px),linear-gradient(to_bottom,#80808012_1px,transparent_1px)] bg-[size:24px_24px]"}],["$","div",null,{"className":"absolute top-1/4 right-1/3 w-[500px] h-[500px] bg-primary/10 rounded-full blur-[100px]"}],["$","div",null,{"className":"container mx-auto max-w-4xl relative z-10 text-center space-y-6","children":[["$","h1",null,{"className":"text-5xl md:text-6xl font-bold tracking-tight text-balance","children":["Where Passwords",["$","br",null,{}],["$","span",null,{"className":"text-primary","children":"Can't Go"}]]}],["$","p",null,{"className":"text-xl text-muted-foreground max-w-2xl mx-auto text-balance leading-relaxed","children":"From remote field operations to AI-powered enterprise systems, Granted.AI works in the impossible environments."}]]}]]}] 8:["$","section",null,{"className":"py-20 px-6","children":["$","div",null,{"className":"container mx-auto max-w-6xl space-y-16","children":[["$","div",null,{"className":"grid lg:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"className":"space-y-6","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-plane w-6 h-6 text-primary","children":[["$","path","1v9wt8",{"d":"M17.8 19.2 16 11l3.5-3.5C21 6 21.5 4 21 3c-1-.5-3 0-4.5 1.5L13 8 4.8 6.2c-.5-.1-.9.1-1.1.5l-.3.5c-.2.5-.1 1 .3 1.3L9 12l-2 3H4l-1 1 3 2 2 3 1-1v-3l3-2 3.5 5.3c.3.4.8.5 1.3.3l.5-.2c.4-.3.6-.7.5-1.2z"}],"$undefined"]}]}],["$","h2",null,{"className":"text-4xl font-bold","children":"Military & Defense"}],["$","p",null,{"className":"text-lg text-muted-foreground leading-relaxed","children":"Field operations demand authentication that works in denied, disrupted, intermittent, and limited (DDIL) environments. No connectivity? No problem."}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Tactical operations with intermittent or zero connectivity"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Secure device-to-device communication in the field"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Air-gapped systems requiring cryptographic verification"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Zero breach surface for classified systems"}]]}]]}]]}],["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-8 bg-card border-border/50 relative overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0 bg-[linear-gradient(45deg,transparent_25%,rgba(34,211,238,.03)_25%,rgba(34,211,238,.03)_50%,transparent_50%,transparent_75%,rgba(34,211,238,.03)_75%,rgba(34,211,238,.03))] bg-[length:20px_20px]"}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"text-sm text-primary font-semibold mb-4","children":"Real-World Scenario"}],["$","p",null,{"className":"text-muted-foreground leading-relaxed mb-6","children":"A field team operating in a remote area needs access to encrypted communications systems. Traditional auth fails without connectivity. Granted.AI verifies permissions locally via WASM, granting access instantly without server contact."}],"$L10"]}]]}]]}],"$L11","$L12","$L13","$L14","$L15"]}]}] 9:["$","section",null,{"className":"py-20 px-6 bg-card/30","children":["$","div",null,{"className":"container mx-auto max-w-6xl","children":[["$","div",null,{"className":"text-center mb-16","children":[["$","h2",null,{"className":"text-4xl md:text-5xl font-bold mb-4","children":"By The Numbers"}],["$","p",null,{"className":"text-xl text-muted-foreground","children":"Why enterprises are moving to neural access control."}]]}],["$","div",null,{"className":"grid md:grid-cols-4 gap-8","children":[["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-6 bg-card border-border/50 text-center","children":[["$","div",null,{"className":"text-4xl font-bold text-primary mb-2","children":"0ms"}],["$","div",null,{"className":"text-sm text-muted-foreground","children":"Network latency for offline verification"}]]}],["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-6 bg-card border-border/50 text-center","children":[["$","div",null,{"className":"text-4xl font-bold text-primary mb-2","children":"0"}],["$","div",null,{"className":"text-sm text-muted-foreground","children":"Password databases to breach"}]]}],["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-6 bg-card border-border/50 text-center","children":[["$","div",null,{"className":"text-4xl font-bold text-primary mb-2","children":"100%"}],["$","div",null,{"className":"text-sm text-muted-foreground","children":"Uptime even during network outages"}]]}],["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-6 bg-card border-border/50 text-center","children":[["$","div",null,{"className":"text-4xl font-bold text-primary mb-2","children":"∞"}],["$","div",null,{"className":"text-sm text-muted-foreground","children":"Time hackers need to breach (it's impossible)"}]]}]]}]]}]}] a:["$","section",null,{"className":"py-20 px-6","children":["$","div",null,{"className":"container mx-auto max-w-4xl text-center space-y-8","children":[["$","h2",null,{"className":"text-4xl md:text-5xl font-bold text-balance","children":"Your use case not listed?"}],["$","p",null,{"className":"text-xl text-muted-foreground text-balance","children":"If passwords don't work for your environment, Granted.AI probably does. Let's talk."}],["$","div",null,{"className":"flex items-center justify-center gap-4","children":[["$","$L5",null,{"href":"/demo","children":["$","button",null,{"data-slot":"button","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap text-sm font-medium transition-all disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg:not([class*='size-'])]:size-4 shrink-0 [&_svg]:shrink-0 outline-none focus-visible:border-ring focus-visible:ring-ring/50 focus-visible:ring-[3px] aria-invalid:ring-destructive/20 dark:aria-invalid:ring-destructive/40 aria-invalid:border-destructive bg-primary text-primary-foreground hover:bg-primary/90 h-10 rounded-md px-6 has-[>svg]:px-4 glow-cyan group","children":["Request Demo",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4 ml-2 group-hover:translate-x-1 transition-transform","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]}],["$","a",null,{"href":"mailto:sales@granted.ai","children":["$","button",null,{"data-slot":"button","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap text-sm font-medium transition-all disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg:not([class*='size-'])]:size-4 shrink-0 [&_svg]:shrink-0 outline-none focus-visible:border-ring focus-visible:ring-ring/50 focus-visible:ring-[3px] aria-invalid:ring-destructive/20 dark:aria-invalid:ring-destructive/40 aria-invalid:border-destructive border bg-background shadow-xs hover:bg-accent hover:text-accent-foreground dark:bg-input/30 dark:border-input dark:hover:bg-input/50 h-10 rounded-md px-6 has-[>svg]:px-4","children":"Contact Sales"}]}]]}]]}]}] b:["$","footer",null,{"className":"py-12 px-6 border-t border-border/50","children":["$","div",null,{"className":"container mx-auto max-w-6xl","children":[["$","div",null,{"className":"grid md:grid-cols-4 gap-8 mb-12","children":[["$","div",null,{"children":[["$","div",null,{"className":"flex items-center gap-2 mb-4","children":[["$","div",null,{"className":"w-8 h-8 rounded-lg bg-primary flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-shield w-5 h-5 text-primary-foreground","children":[["$","path","oel41y",{"d":"M20 13c0 5-3.5 7.5-7.66 8.95a1 1 0 0 1-.67-.01C7.5 20.5 4 18 4 13V6a1 1 0 0 1 1-1c2 0 4.5-1.2 6.24-2.72a1.17 1.17 0 0 1 1.52 0C14.51 3.81 17 5 19 5a1 1 0 0 1 1 1z"}],"$undefined"]}]}],["$","span",null,{"className":"text-lg font-semibold","children":"Granted.AI"}]]}],["$","p",null,{"className":"text-sm text-muted-foreground","children":"Neural access control for the modern enterprise."}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4","children":"Product"}],["$","ul",null,{"className":"space-y-2 text-sm text-muted-foreground","children":[["$","li",null,{"children":["$","$L5",null,{"href":"/features","className":"hover:text-foreground transition-colors","children":"Features"}]}],["$","li",null,{"children":["$","$L5",null,{"href":"/pricing","className":"hover:text-foreground transition-colors","children":"Pricing"}]}],["$","li",null,{"children":["$","$L5",null,{"href":"/docs","className":"hover:text-foreground transition-colors","children":"Security"}]}],["$","li",null,{"children":["$","$L5",null,{"href":"/use-cases","className":"hover:text-foreground transition-colors","children":"Enterprise"}]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4","children":"Resources"}],["$","ul",null,{"className":"space-y-2 text-sm text-muted-foreground","children":[["$","li",null,{"children":["$","$L5",null,{"href":"/docs","className":"hover:text-foreground transition-colors","children":"Documentation"}]}],["$","li",null,{"children":["$","$L5",null,{"href":"/docs","className":"hover:text-foreground transition-colors","children":"API Reference"}]}],["$","li",null,{"children":["$","$L5",null,{"href":"/docs","className":"hover:text-foreground transition-colors","children":"Guides"}]}],["$","li",null,{"children":["$","a",null,{"href":"mailto:support@granted.ai","className":"hover:text-foreground transition-colors","children":"Support"}]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4","children":"Company"}],["$","ul",null,{"className":"space-y-2 text-sm text-muted-foreground","children":[["$","li",null,{"children":["$","a",null,{"href":"https://z3n.ai","target":"_blank","rel":"noopener noreferrer","className":"hover:text-foreground transition-colors","children":"Z3N.AI"}]}],["$","li",null,{"children":["$","a",null,{"href":"mailto:hello@granted.ai","className":"hover:text-foreground transition-colors","children":"Contact"}]}]]}]]}]]}],["$","div",null,{"className":"pt-8 border-t border-border/50 flex items-center justify-between text-sm text-muted-foreground","children":[["$","p",null,{"children":"© 2026 Granted.AI. All rights reserved."}],["$","div",null,{"className":"flex items-center gap-6","children":[["$","a",null,{"href":"#","className":"hover:text-foreground transition-colors","children":"Privacy"}],["$","a",null,{"href":"#","className":"hover:text-foreground transition-colors","children":"Terms"}],["$","a",null,{"href":"#","className":"hover:text-foreground transition-colors","children":"Legal"}]]}]]}]]}]}] c:["$","script","script-0",{"src":"/_next/static/chunks/fd2a9f3893bdeabf.js","async":true,"nonce":"$undefined"}] d:["$","$L16",null,{"children":["$","$17",null,{"name":"Next.MetadataOutlet","children":"$@18"}]}] e:["$","$1","h",{"children":[null,["$","$L19",null,{"children":"$@1a"}],["$","div",null,{"hidden":true,"children":["$","$L1b",null,{"children":["$","$17",null,{"name":"Next.Metadata","children":"$@1c"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}] 10:["$","div",null,{"className":"p-4 bg-background/50 rounded-lg border border-border/50","children":["$","div",null,{"className":"text-xs font-mono text-muted-foreground space-y-1","children":[["$","div",null,{"className":"text-primary","children":"→ Offline environment detected"}],["$","div",null,{"children":"→ WASM verification engine active"}],["$","div",null,{"children":"→ Vector watermark validated"}],["$","div",null,{"className":"text-primary","children":"→ Communications access granted"}]]}]}] 11:["$","div",null,{"className":"grid lg:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-8 bg-card border-border/50 relative overflow-hidden lg:order-1 order-2","children":[["$","div",null,{"className":"absolute inset-0 bg-[linear-gradient(45deg,transparent_25%,rgba(34,211,238,.03)_25%,rgba(34,211,238,.03)_50%,transparent_50%,transparent_75%,rgba(34,211,238,.03)_75%,rgba(34,211,238,.03))] bg-[length:20px_20px]"}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"text-sm text-primary font-semibold mb-4","children":"Real-World Scenario"}],["$","p",null,{"className":"text-muted-foreground leading-relaxed mb-6","children":"Industrial facilities with OT/IT networks need zero-trust access control. Technicians access critical systems via watermarked vectors, verified locally by edge devices—no cloud dependencies, no password databases."}],["$","div",null,{"className":"p-4 bg-background/50 rounded-lg border border-border/50","children":["$","div",null,{"className":"text-xs font-mono text-muted-foreground space-y-1","children":[["$","div",null,{"className":"text-primary","children":"→ Technician presents credential"}],["$","div",null,{"children":"→ Edge device verifies watermark"}],["$","div",null,{"children":"→ No external network calls"}],["$","div",null,{"className":"text-primary","children":"→ SCADA system access granted"}]]}]}]]}]]}],["$","div",null,{"className":"space-y-6 lg:order-2 order-1","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-factory w-6 h-6 text-primary","children":[["$","path","159hny",{"d":"M2 20a2 2 0 0 0 2 2h16a2 2 0 0 0 2-2V8l-7 5V8l-7 5V4a2 2 0 0 0-2-2H4a2 2 0 0 0-2 2Z"}],["$","path","uldtlt",{"d":"M17 18h1"}],["$","path","s9uhes",{"d":"M12 18h1"}],["$","path","1neino",{"d":"M7 18h1"}],"$undefined"]}]}],["$","h2",null,{"className":"text-4xl font-bold","children":"Industrial & Manufacturing"}],["$","p",null,{"className":"text-lg text-muted-foreground leading-relaxed","children":"Critical infrastructure and industrial control systems can't afford network-dependent auth. Offline verification protects against both digital and physical threats."}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"SCADA and industrial control system access"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Edge device authentication without cloud dependency"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],"$L1d","$undefined"]}],"$L1e"]}],"$L1f"]}]]}]]}] 12:["$","div",null,{"className":"grid lg:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"className":"space-y-6","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-hospital w-6 h-6 text-primary","children":[["$","path","16clxf",{"d":"M12 6v4"}],["$","path","esezmu",{"d":"M14 14h-4"}],["$","path","16mqa2",{"d":"M14 18h-4"}],["$","path","z8ypaz",{"d":"M14 8h-4"}],["$","path","b1k337",{"d":"M18 12h2a2 2 0 0 1 2 2v6a2 2 0 0 1-2 2H4a2 2 0 0 1-2-2v-9a2 2 0 0 1 2-2h2"}],["$","path","16g51d",{"d":"M18 22V4a2 2 0 0 0-2-2H8a2 2 0 0 0-2 2v18"}],"$undefined"]}]}],["$","h2",null,{"className":"text-4xl font-bold","children":"Healthcare & Medical"}],["$","p",null,{"className":"text-lg text-muted-foreground leading-relaxed","children":"Patient data demands maximum privacy with zero-knowledge verification. Emergency responders need access even when networks fail. HIPAA compliance without the password liability."}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Emergency medical system access during network outages"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Zero-knowledge patient data verification"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Medical device access without credential storage"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Mobile health worker authentication in remote areas"}]]}]]}]]}],["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-8 bg-card border-border/50 relative overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0 bg-[linear-gradient(45deg,transparent_25%,rgba(34,211,238,.03)_25%,rgba(34,211,238,.03)_50%,transparent_50%,transparent_75%,rgba(34,211,238,.03)_75%,rgba(34,211,238,.03))] bg-[length:20px_20px]"}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"text-sm text-primary font-semibold mb-4","children":"Real-World Scenario"}],["$","p",null,{"className":"text-muted-foreground leading-relaxed mb-6","children":"During a network outage, emergency responders need immediate access to patient records. Granted.AI's offline verification grants access instantly via WASM, ensuring life-critical systems remain operational regardless of network status."}],"$L20"]}]]}]]}] 13:["$","div",null,{"className":"grid lg:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-8 bg-card border-border/50 relative overflow-hidden lg:order-1 order-2","children":[["$","div",null,{"className":"absolute inset-0 bg-[linear-gradient(45deg,transparent_25%,rgba(34,211,238,.03)_25%,rgba(34,211,238,.03)_50%,transparent_50%,transparent_75%,rgba(34,211,238,.03)_75%,rgba(34,211,238,.03))] bg-[length:20px_20px]"}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"text-sm text-primary font-semibold mb-4","children":"Real-World Scenario"}],["$","p",null,{"className":"text-muted-foreground leading-relaxed mb-6","children":"Your advanced MCP system gates enterprise messaging and AI agent interactions. Agents receive watermarked vectors representing their permissions. Local WASM verification grants access without password management, token refresh, or auth infrastructure."}],["$","div",null,{"className":"p-4 bg-background/50 rounded-lg border border-border/50","children":["$","div",null,{"className":"text-xs font-mono text-muted-foreground space-y-1","children":[["$","div",null,{"className":"text-primary","children":"→ AI agent requests enterprise access"}],["$","div",null,{"children":"→ Vector watermark verified in WASM"}],["$","div",null,{"children":"→ Zero auth overhead"}],["$","div",null,{"className":"text-primary","children":"→ MCP messaging access granted"}]]}]}]]}]]}],["$","div",null,{"className":"space-y-6 lg:order-2 order-1","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-cpu w-6 h-6 text-primary","children":[["$","rect","14l7u7",{"width":"16","height":"16","x":"4","y":"4","rx":"2"}],["$","rect","5aljv4",{"width":"6","height":"6","x":"9","y":"9","rx":"1"}],["$","path","13l42r",{"d":"M15 2v2"}],["$","path","15mkzm",{"d":"M15 20v2"}],["$","path","1gxd5l",{"d":"M2 15h2"}],["$","path","1bbxkp",{"d":"M2 9h2"}],["$","path","19e6y8",{"d":"M20 15h2"}],["$","path","19tzq7",{"d":"M20 9h2"}],["$","path","165o2o",{"d":"M9 2v2"}],["$","path","i2bqo8",{"d":"M9 20v2"}],"$undefined"]}]}],["$","h2",null,{"className":"text-4xl font-bold","children":"Enterprise AI & MCP"}],["$","p",null,{"className":"text-lg text-muted-foreground leading-relaxed","children":"AI agents and Model Context Protocol systems need seamless, cryptographically verified access. No password management, no token refresh, no authentication complexity—just mathematical proof."}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Gate advanced MCP systems with neural access control"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"AI agent permissions verified cryptographically"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":["$L21","$L22","$undefined"]}],"$L23"]}],"$L24"]}]]}]]}] 14:["$","div",null,{"className":"grid lg:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"className":"space-y-6","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-radio w-6 h-6 text-primary","children":[["$","path","1vaf9d",{"d":"M4.9 19.1C1 15.2 1 8.8 4.9 4.9"}],["$","path","u1ii0m",{"d":"M7.8 16.2c-2.3-2.3-2.3-6.1 0-8.5"}],["$","circle","1c9p78",{"cx":"12","cy":"12","r":"2"}],["$","path","1j5fej",{"d":"M16.2 7.8c2.3 2.3 2.3 6.1 0 8.5"}],["$","path","10b0cb",{"d":"M19.1 4.9C23 8.8 23 15.1 19.1 19"}],"$undefined"]}]}],["$","h2",null,{"className":"text-4xl font-bold","children":"IoT & Edge Computing"}],["$","p",null,{"className":"text-lg text-muted-foreground leading-relaxed","children":"Billions of connected devices can't all rely on cloud authentication. Edge verification with WASM runs on constrained hardware, enabling secure device-to-device communication."}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Lightweight WASM verification for embedded systems"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Device-to-device authentication without cloud"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Smart city infrastructure access control"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Edge AI systems with cryptographic permissions"}]]}]]}]]}],["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-8 bg-card border-border/50 relative overflow-hidden","children":[["$","div",null,{"className":"absolute inset-0 bg-[linear-gradient(45deg,transparent_25%,rgba(34,211,238,.03)_25%,rgba(34,211,238,.03)_50%,transparent_50%,transparent_75%,rgba(34,211,238,.03)_75%,rgba(34,211,238,.03))] bg-[length:20px_20px]"}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"text-sm text-primary font-semibold mb-4","children":"Real-World Scenario"}],["$","p",null,{"className":"text-muted-foreground leading-relaxed mb-6","children":"A smart city deploys thousands of IoT sensors. Each sensor verifies other devices' credentials via WASM before sharing data. No cloud authentication, no credential database, no single point of failure."}],"$L25"]}]]}]]}] 15:["$","div",null,{"className":"grid lg:grid-cols-2 gap-12 items-center","children":[["$","div",null,{"data-slot":"card","className":"text-card-foreground flex flex-col gap-6 rounded-xl border shadow-sm p-8 bg-card border-border/50 relative overflow-hidden lg:order-1 order-2","children":[["$","div",null,{"className":"absolute inset-0 bg-[linear-gradient(45deg,transparent_25%,rgba(34,211,238,.03)_25%,rgba(34,211,238,.03)_50%,transparent_50%,transparent_75%,rgba(34,211,238,.03)_75%,rgba(34,211,238,.03))] bg-[length:20px_20px]"}],["$","div",null,{"className":"relative","children":[["$","div",null,{"className":"text-sm text-primary font-semibold mb-4","children":"Real-World Scenario"}],["$","p",null,{"className":"text-muted-foreground leading-relaxed mb-6","children":"A data center requires both physical and digital access control. Employees present watermarked vectors verified offline by access terminals. No biometric privacy concerns, no password vulnerabilities."}],["$","div",null,{"className":"p-4 bg-background/50 rounded-lg border border-border/50","children":["$","div",null,{"className":"text-xs font-mono text-muted-foreground space-y-1","children":[["$","div",null,{"className":"text-primary","children":"→ Employee approaches secure door"}],["$","div",null,{"children":"→ Terminal verifies vector watermark"}],["$","div",null,{"children":"→ Zero-knowledge verification"}],["$","div",null,{"className":"text-primary","children":"→ Physical + digital access granted"}]]}]}]]}]]}],["$","div",null,{"className":"space-y-6 lg:order-2 order-1","children":[["$","div",null,{"className":"w-12 h-12 rounded-lg bg-primary/10 flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-building2 w-6 h-6 text-primary","children":[["$","path","1b4qmf",{"d":"M6 22V4a2 2 0 0 1 2-2h8a2 2 0 0 1 2 2v18Z"}],["$","path","i71pzd",{"d":"M6 12H4a2 2 0 0 0-2 2v6a2 2 0 0 0 2 2h2"}],["$","path","10jefs",{"d":"M18 9h2a2 2 0 0 1 2 2v9a2 2 0 0 1-2 2h-2"}],["$","path","1itunk",{"d":"M10 6h4"}],["$","path","tcdvrf",{"d":"M10 10h4"}],["$","path","kelpxr",{"d":"M10 14h4"}],["$","path","1ulq68",{"d":"M10 18h4"}],"$undefined"]}]}],["$","h2",null,{"className":"text-4xl font-bold","children":"High-Security Facilities"}],["$","p",null,{"className":"text-lg text-muted-foreground leading-relaxed","children":"Physical and digital access control unified without biometric privacy concerns. Cryptographic verification that respects privacy while maintaining security."}],["$","ul",null,{"className":"space-y-3","children":[["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Data center physical and digital access management"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Biometric-free verification that preserves privacy"}]]}],["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":["$L26","$L27","$undefined"]}],"$L28"]}],"$L29"]}]]}]]}] 1d:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 1e:["$","span",null,{"className":"text-muted-foreground","children":"Zero-trust OT/IT network segmentation"}] 1f:["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Technician access control for critical systems"}]]}] 20:["$","div",null,{"className":"p-4 bg-background/50 rounded-lg border border-border/50","children":["$","div",null,{"className":"text-xs font-mono text-muted-foreground space-y-1","children":[["$","div",null,{"className":"text-destructive","children":"→ Network outage detected"}],["$","div",null,{"className":"text-primary","children":"→ Offline verification active"}],["$","div",null,{"children":"→ Responder credential validated locally"}],["$","div",null,{"className":"text-primary","children":"→ Patient records accessed"}]]}]}] 21:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 22:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 23:["$","span",null,{"className":"text-muted-foreground","children":"Enterprise messaging with zero auth overhead"}] 24:["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"No credential management for autonomous systems"}]]}] 25:["$","div",null,{"className":"p-4 bg-background/50 rounded-lg border border-border/50","children":["$","div",null,{"className":"text-xs font-mono text-muted-foreground space-y-1","children":[["$","div",null,{"className":"text-primary","children":"→ Device requests sensor data"}],["$","div",null,{"children":"→ Edge WASM verifies watermark"}],["$","div",null,{"children":"→ No cloud dependency"}],["$","div",null,{"className":"text-primary","children":"→ Secure data transfer"}]]}]}] 26:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 27:["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}] 28:["$","span",null,{"className":"text-muted-foreground","children":"Multi-level security clearance management"}] 29:["$","li",null,{"className":"flex gap-3","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-circle-check w-5 h-5 text-primary flex-shrink-0 mt-1","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","path","dzmm74",{"d":"m9 12 2 2 4-4"}],"$undefined"]}],["$","span",null,{"className":"text-muted-foreground","children":"Audit trails without credential exposure"}]]}] 1a:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1"}]] 2a:I[41564,["/_next/static/chunks/816c48af6d78de25.js","/_next/static/chunks/17d2fbe4691bfa48.js"],"IconMark"] 1c:[["$","title","0",{"children":"Granted.AI - Neural Access Control"}],["$","meta","1",{"name":"description","content":"Offline/Online verification-as-permission. Access granted by semantic vectors, not passwords."}],["$","meta","2",{"name":"generator","content":"v0.app"}],["$","link","3",{"rel":"icon","href":"/icon-light-32x32.png","media":"(prefers-color-scheme: light)"}],["$","link","4",{"rel":"icon","href":"/icon-dark-32x32.png","media":"(prefers-color-scheme: dark)"}],["$","link","5",{"rel":"icon","href":"/icon.svg","type":"image/svg+xml"}],["$","link","6",{"rel":"apple-touch-icon","href":"/apple-icon.png"}],["$","$L2a","7",{}]] 18:null