```mermaid graph TD %% Define styles classDef layer stroke-width:2px,stroke-dasharray: 5 5; classDef hardware fill:#f96,stroke:#333,stroke-width:2px; classDef storage fill:#bbf,stroke:#333,stroke-width:2px; classDef contract fill:#dfd,stroke:#333,stroke-width:2px; subgraph User_Side [AI Accessibility Layer & Hardware Sovereignty Layer] A[User Interaction / AI Assistant] --> B[Privacy Proxy] B -- Local Filtering / De-identification --> C[AI Vendor Server] B -- Identify Valuable Assets --> D{Biometric Authorization} D -- Authorization Passed --> E[[TEE Hardware Environment]] subgraph TEE [TEE Internal Execution] E --> F[Master Key K] F --> G[Inner Hardware Encryption] end end subgraph API_Layer [Third-Party API Integration Layer] H[Mode A: Standalone Sovereignty] I[Mode B: Collaborative SDK] I -.-> D end subgraph Sentinel_Storage [Sentinel Vault Layer] G --> J[Server Cluster Outer Encryption] J --> K[S1 Recursive Fragmentation] subgraph Distributed_Nodes [Distributed Storage Nodes] K --> L1[Node A: Sub-shard S1a] K --> L2[Node B: Sub-shard S1b] K --> Ln[Node N: Sub-shard S1n] end L1 & L2 & Ln --> M[(Arweave Permanent Storage Network)] end subgraph Survival_Mechanism [Survival Guarantee Layer] N[Legal Trust Fund] -- Fee Payment Guarantee --> M O[Smart Contract Dead Man Switch] -- Heartbeat Monitoring --> J O -- Trigger Open-Source Takeover --> P[Release Node Private Keys & Ciphertext Index] P --> Q[Open-Source Self-Recovery Tool] subgraph Recovery [Reconstruction Path] Q --> R{Reconstruct Master Key K} S0[Redundancy Shard S0] --> R S2[Heir Shard S2] --> R L1 & L2 & Ln -- Contract-Triggered Release --> R end R --> T[Decrypt Original Data Assets] end %% Apply layer hierarchy styles class E,F,G hardware; class M,L1,L2,Ln storage; class O contract; ```