9.0 KiB
Sentinel Protocol Whitepaper
——A Digital Life Perpetual Storage and Intelligent Succession Protocol Based on AI and Blockchain
Table of Contents
- 1. Project Background and Core Pain Points
- 2. Core Technology: Persistent Storage and Fragmented Sovereignty
- 3. Passive Verification and State Machine: Multi-dimensional Service Boundaries
- 4. Perpetual Governance: Community Co-governance and Failover
- 5. AI Application Layer: Intelligent Butler
- 6. Developer Ecosystem: Open API
- 7. Economic Model: Differentiated Tiering and Reserve Pool
- 8. Conclusion
1. Project Background and Core Pain Points
- 1.1 Digital Assets "Permanently Locked": Due to private keys being lost upon the holder's death, decentralized assets face irreversible loss.
- 1.2 Internet Data "Ten-Year Disappearance Law": Commercial company bankruptcies result in 38% of links becoming invalid within 10 years, posing a threat to users' digital memories.
- 1.3 Meaning Obscurity and Information Overload: Massive redundant data prevents users from extracting truly valuable successor assets from fragmented information.
- 1.4 High-Risk Professions "Sudden Rupture": Workers in hazardous industries (miners, sailors) face insurmountable barriers to asset access in zero-warning, zero-network situations.
2. Core Technology: Persistent Storage and Fragmented Sovereignty
2.1 Fragmented Key Management and Absolute User Sovereignty (SSS 3/2)
- User Sovereign State (Combination A): Users gain complete control of the full mnemonic entropy upon initialization, with complete control over S0, S1, and S2. At any time during their lifetime, users maintain 100% sovereign autonomy.
Sovereignty Definition: This means you need no one's permission to complete daily operations. Whether transferring assets or reading files, the system completes verification through biometric authentication in the background, giving you absolute control and seamless user experience.
- S1 and S2 Anti-Collusion Mechanism:
- Logic Isolation: Before determination logic is triggered, S1 distributed nodes remain locked, rejecting any collision requests.
- Smart Contract Witness Release: S1 can only be unfrozen after the smart contract detects the system entering "Released" status, completely preventing collusion between custodians and successors.
- Succession Extraction State (Combination B): Once the status determination is established, S1 automatically unfreezes, allowing successors to retrieve assets using S2.
2.2 S1 Decentralized Distribution and Multi-layer Storage Guarantees
- Heterogeneous Redundant Backup: Synchronously connected to Arweave (permanent storage), Filecoin (incentivized storage), and heterogeneous encrypted nodes across multiple jurisdictions.
- VSS Distributed Custody: S1 shards are further fragmented using Verifiable Secret Sharing (VSS) and distributed across decentralized networks, eliminating the risk of single-server failures.
2.3 AI-Driven "Data Funnel" and Automated Archiving
- Intelligent Sorting: AI identifies high-value information during daily interactions and automatically suggests users to structure and archive critical elements (accounts, insurance policies, testamentary intentions) with "one-click installation."
3. Passive Verification and State Machine: Multi-dimensional Service Boundaries
3.1 Pending Status Double-Lock Mechanism
- Misidentification Grace Period: If the system triggers Pending (disconnection signal), users can preset a 180-365 day freeze period. During this time, the system prohibits releasing any data, protecting users in long-term coma or special circumstances from having their sovereignty compromised.
- Composite Verification: Combines low-sensitivity privacy monitoring (step count, heart rate, interaction frequency) with manual verification by emergency contacts.
3.2 Released Status and Automated Delivery
- Shadow Proxy (AI Proxy): Runs within TEE (Trusted Execution Environment), the AI generates a structured Digital Asset Succession Guide and proactively pushes it to designated successors.
3.3 Subscription Suspension and Recovery Mechanism
-
Sleep Mode : Users can actively trigger "Pause Subscription".
-
Service Silence: Upon entering this state, the system stops active heartbeat monitoring and AI asset sorting.
-
Physical Persistence: Thanks to the multi-layer storage system (Arweave/Filecoin), core encrypted data remains physically sealed in the underlying network, unaffected by subscription status.
-
Wake-up Logic: Users can verify their identity (S0/mnemonic) at any time, pay outstanding maintenance fees, and restore to "Active" status with one click.
-
-
Extreme Extraction During Sleep Mode: If a user passes away while in sleep mode, successors holding S2 can still initiate extraction requests. The system guides successors to settle outstanding fees before entering the release process.
4. Perpetual Governance: Community Co-governance and Failover
- 4.1 Digital Trust Foundation: An independent legal entity managing storage funds and shard security.
- 4.2 Smart Failover: Blockchain smart contracts continuously monitor commercial entity activity. Should anomalies exceed thresholds (e.g., lost heartbeat), system control automatically transfers to the Decentralized Autonomous Organization (DAO) to take over, ensuring service never stops.
5. AI Application Layer: Intelligent Butler
- 5.1 Shadow Gateway: AI assists with daily tasks without accessing core encryption, protecting privacy boundaries.
- 5.2 Advanced Prompt Engineering Encapsulation and Scenario-based Assistants:
- Skill Capsules: Complex prompt engineering is encapsulated into ready-to-use functional modules. Users don't need to learn AI commands; simply select scenarios like "Asset Inventory," "Family Letter Writing," or "Legal Consultation," and the system automatically loads deeply optimized Chain-of-Thought (CoT) logic in the background, guiding users to efficiently complete information organization.
- AI Assistant Matrix: Built-in specialized assistants such as "Asset Detective" (helping recall hidden assets) and "Emotional Support Runner" (reducing anxiety about end-of-life planning), lowering user adoption barriers and psychological burden through heuristic dialogue.
6. Developer Ecosystem: Open API
- Open Vault API: Supports third-party applications (wallets, password managers, etc.) integration, shared protocol and resources, and shared revenue distribution.
7. Economic Model: Differentiated Tiering and Reserve Pool
7.1 Service Tier System
| Tier | Duration | Extraction Fee | Legal Service Capability | Value-Added Features |
|---|---|---|---|---|
| Standard (L0) | 10 years | Outstanding fees + Service fee | Basic Notarization + Custom Consultation | Prepayable extraction fees, optional offline key |
| Premium (L1) | 20 years | Free extraction service fee | E-signature + Custom Consultation | High data quota, frictionless succession experience |
| Eternal (L2) | 100+ years | Free extraction service fee | Full-process Public Notarization + Custom Consultation | Bank-grade key custody, regular cold backup |
7.2 Financial Soundness: Protocol Reserve Pool
- Cross-subsidy Logic: Extract 10% from high-premium revenue of L1/L2 tiers into the reserve pool.
- Risk Hedging: Reserve pool hedges against future storage cost fluctuations and serves as a default insurance fund for L0-tier users' storage defaults, ensuring physical data security for all users.
7.3 Offline Services and Customized Consultation
- Offline Cold Wallet Key Service: Available to all users. L2 users additionally enjoy offline storage environments with bank-grade security monitoring.
- Comprehensive Legal Services: All tier users can schedule consultations with partner law firms for legal certification of critical documents and custom consultation.
7.4 Storage Overage Fees
- User Quota Overage Charges: Each tier has a certain quota; additional fees apply for overages.
8. Conclusion
Sentinel Protocol establishes a new paradigm for digital asset succession centered on "user sovereignty." By eliminating risks through S1 distributed custody and anti-collusion protocol, protecting incapacitated sovereignty through the double-lock mechanism, and achieving long-term economic sustainability through the protocol reserve pool, it provides a trustworthy, perpetual, and legally compliant safe harbor for humanity's digital assets.
Sentinel Protocol: Protecting your digital assets until sovereignty is awakened once more.