2.1 KiB
2.1 KiB
graph TD
%% Define styles
classDef layer stroke-width:2px,stroke-dasharray: 5 5;
classDef hardware fill:#f96,stroke:#333,stroke-width:2px;
classDef storage fill:#bbf,stroke:#333,stroke-width:2px;
classDef contract fill:#dfd,stroke:#333,stroke-width:2px;
subgraph User_Side [AI Accessibility Layer & Hardware Sovereignty Layer]
A[User Interaction / AI Assistant] --> B[Privacy Proxy]
B -- Local Filtering / De-identification --> C[AI Vendor Server]
B -- Identify Valuable Assets --> D{Biometric Authorization}
D -- Authorization Passed --> E[[TEE Hardware Environment]]
subgraph TEE [TEE Internal Execution]
E --> F[Master Key K]
F --> G[Inner Hardware Encryption]
end
end
subgraph API_Layer [Third-Party API Integration Layer]
H[Mode A: Standalone Sovereignty]
I[Mode B: Collaborative SDK]
I -.-> D
end
subgraph Sentinel_Storage [Sentinel Vault Layer]
G --> J[Server Cluster Outer Encryption]
J --> K[S1 Recursive Fragmentation]
subgraph Distributed_Nodes [Distributed Storage Nodes]
K --> L1[Node A: Sub-shard S1a]
K --> L2[Node B: Sub-shard S1b]
K --> Ln[Node N: Sub-shard S1n]
end
L1 & L2 & Ln --> M[(Arweave Permanent Storage Network)]
end
subgraph Survival_Mechanism [Survival Guarantee Layer]
N[Legal Trust Fund] -- Fee Payment Guarantee --> M
O[Smart Contract Dead Man Switch] -- Heartbeat Monitoring --> J
O -- Trigger Open-Source Takeover --> P[Release Node Private Keys & Ciphertext Index]
P --> Q[Open-Source Self-Recovery Tool]
subgraph Recovery [Reconstruction Path]
Q --> R{Reconstruct Master Key K}
S0[Redundancy Shard S0] --> R
S2[Heir Shard S2] --> R
L1 & L2 & Ln -- Contract-Triggered Release --> R
end
R --> T[Decrypt Original Data Assets]
end
%% Apply layer hierarchy styles
class E,F,G hardware;
class M,L1,L2,Ln storage;
class O contract;