Files
whitepaper/whitepaper_en.md
Jingliang(Dan) Jiang 8f9474bb0a add whitepaper draft
2026-01-22 13:19:26 -08:00

6.8 KiB
Raw Blame History

Sentinel Protocol Whitepaper

—— An AI & Blockchain-based Protocol for Digital Life Perpetual Storage and Intelligent Inheritance

Table of Contents


1. Project Background & Pain Points

  • 1.1 "Permanent Lock" of Digital Heritage: Irreversible loss of decentralized assets due to private keys being lost upon the owner's passing.
  • 1.2 The "Ten-Year Disappearance Law" of Internet Data: 38% of web links fail within 10 years due to company bankruptcies, leading to the evaporation of digital memories.
  • 1.3 Meaning Drowning & Filtering Dilemma: Massive data redundancy makes it impossible for users to extract key assets of true inheritance value from the flood of information.
  • 1.4 High-Risk Industry "Sudden Disconnection": A gap in asset retrieval for groups like miners and sailors in zero-warning or zero-network environments.

2. Core Technology: Perpetual Storage & Shared Sovereignty

2.1 Fragmented Key Management & Absolute User Sovereignty (SSS 3/2)

  • Sovereign State (Combination A): Upon initialization, the user possesses the full mnemonic entropy and holds total control over S0, S1, and S2. At any moment during their lifetime, the user maintains 100% sovereign self-determination.

    Sovereignty Definition: This means you can complete daily calls and transactions without anyones permission. Whether it is transferring assets or reading files, the system completes verification in the background via biometrics, providing the user with absolute control and a seamless experience.

  • S1 & S2 Anti-Collusion Mechanism:
    • Logical Isolation: Before the inheritance logic is triggered, S1 distributed nodes remain locked, rejecting any collision requests.
    • Contract Witness Release: The unlocking of S1 must be triggered by a smart contract detecting the "Released" status. This prevents collusion between the hosting party and the heirs.
  • Inheritance Extraction State (Combination B): Once the state is determined, S1 is automatically unfrozen, allowing heirs to extract assets using S2.

2.2 Decentralized S1 Distribution & Multi-Storage Redundancy

  • Heterogeneous Redundant Backup: Synchronized interfacing with Arweave (permanent storage), Filecoin (incentivized storage), and heterogeneous encryption nodes across multiple jurisdictions.
  • VSS Distributed Hosting: S1 shards are further sliced using Verifiable Secret Sharing (VSS) and stored across a decentralized network to eliminate the risk of a single server crash.

2.3 AI-Driven "Data Funnel" & Auto-Archiving

  • Intelligent Sorting: AI identifies high-value information during daily interactions and suggests structured archiving for key elements (accounts, insurance policies, wills), achieving "one-click filling."

3. Passive Verification & State Machine: Service Boundaries

3.1 "Double-Lock" Mechanism in Pending State

  • Anti-Misjudgment Grace Period: If the system triggers a "Pending" status (loss of signal), the user can preset a 180-365 day freezing period. During this time, the system is prohibited from releasing any data, ensuring that the sovereignty of users in long-term comas or special environments is not compromised.
  • Composite Verification: Combines low-sensitivity privacy monitoring (steps, heart rate, interaction frequency) with manual verification from emergency contacts.

3.2 Released State & Automated Delivery

  • Shadow Proxy (AI Proxy): Running in a TEE (Trusted Execution Environment), the AI generates a structured "Digital Heritage Inheritance Guide" and actively pushes it to designated heirs.

4. Perpetual Governance: Community Co-governance & Failover

  • 4.1 Digital Trust Foundation: An independent legal entity managing the storage fund and shard security.
  • 4.2 Smart Failover: Smart contracts monitor the activity of the commercial entity in real-time. If anomalies exceed a threshold (e.g., loss of heartbeat), control of the system is automatically transferred to a Decentralized Autonomous Organization (DAO) to ensure the service never goes offline.

5. AI Application Layer: Intelligent Proxy

  • 5.1 Shadow Gateway: AI assists in handling daily tasks without touching core ciphertexts, maintaining a strict privacy boundary.

6. Developer Ecosystem: Open API

  • Open Vault API: Supports third-party applications (wallets, password managers, etc.) to access the protocol, share resources, and participate in revenue sharing.

7. Economic Model: Tiered Services & Reserve Pool

7.1 Service Tier System

Tier Retention Period Retrieval Fee Legal Support Value-Added Features
Standard (L0) 10 Years Dues + Service Fee Basic Evidence Pre-paid retrieval fees supported
Premium (L1) 20 Years Waived E-Signature + Consulting Large quota, seamless inheritance
Eternal (L2) 100+ Years Waived Full Notarization Bank-grade Key Vault, Cold Backup

7.2 Financial Stability: Protocol Reserve Pool

  • Cross-Subsidization: 10% of revenue from L1/L2 premiums is injected into the Reserve Pool.
  • Risk Hedging: The pool hedges against future storage cost fluctuations and acts as a guarantee fund for L0 users, ensuring the physical security of all data.

7.3 Offline Services & Customized Consulting

  • Offline Cold Wallet Key Service: Available to all users. L2 users enjoy an offline environment monitored by bank-grade security.
  • Universal Legal Service: Users of all levels can book consultations with partner law firms for legal certification of important documents.

8. Conclusion

Sentinel Protocol establishes a new paradigm for digital asset inheritance centered on "User Sovereignty." By utilizing S1 Distributed Hosting and Anti-Collusion Protocols to eliminate risks, employing Double-Lock Mechanisms to protect incapacitated sovereignty, and integrating a Protocol Reserve Pool for economic longevity, it provides a trusted, perpetual, and legal haven for human digital civilization.


Sentinel Protocol: Guarding your digital assets until sovereignty is awakened once more.