Files
whitepaper/en/technical/arch.md
2026-02-08 21:39:16 -08:00

2.1 KiB

graph TD
    %% Define styles
    classDef layer stroke-width:2px,stroke-dasharray: 5 5;
    classDef hardware fill:#f96,stroke:#333,stroke-width:2px;
    classDef storage fill:#bbf,stroke:#333,stroke-width:2px;
    classDef contract fill:#dfd,stroke:#333,stroke-width:2px;

    subgraph User_Side [AI Accessibility Layer & Hardware Sovereignty Layer]
        A[User Interaction / AI Assistant] --> B[Privacy Proxy]
        B -- Local Filtering / De-identification --> C[AI Vendor Server]
        B -- Identify Valuable Assets --> D{Biometric Authorization}
        D -- Authorization Passed --> E[[TEE Hardware Environment]]
        subgraph TEE [TEE Internal Execution]
            E --> F[Master Key K]
            F --> G[Inner Hardware Encryption]
        end
    end

    subgraph API_Layer [Third-Party API Integration Layer]
        H[Mode A: Standalone Sovereignty] 
        I[Mode B: Collaborative SDK]
        I -.-> D
    end

    subgraph Sentinel_Storage [Sentinel Vault Layer]
        G --> J[Server Cluster Outer Encryption]
        J --> K[S1 Recursive Fragmentation]
        subgraph Distributed_Nodes [Distributed Storage Nodes]
            K --> L1[Node A: Sub-shard S1a]
            K --> L2[Node B: Sub-shard S1b]
            K --> Ln[Node N: Sub-shard S1n]
        end
        L1 & L2 & Ln --> M[(Arweave Permanent Storage Network)]
    end

    subgraph Survival_Mechanism [Survival Guarantee Layer]
        N[Legal Trust Fund] -- Fee Payment Guarantee --> M
        O[Smart Contract Dead Man Switch] -- Heartbeat Monitoring --> J
        O -- Trigger Open-Source Takeover --> P[Release Node Private Keys & Ciphertext Index]
        P --> Q[Open-Source Self-Recovery Tool]
        
        subgraph Recovery [Reconstruction Path]
            Q --> R{Reconstruct Master Key K}
            S0[Redundancy Shard S0] --> R
            S2[Heir Shard S2] --> R
            L1 & L2 & Ln -- Contract-Triggered Release --> R
        end
        R --> T[Decrypt Original Data Assets]
    end

    %% Apply layer hierarchy styles
    class E,F,G hardware;
    class M,L1,L2,Ln storage;
    class O contract;