FHPROTOCOL

Execution Model

Canonical payload → deterministic state root → portable artifact.

Run through the execution interface.

Canonical Payload
Structured input
State Root
Computed Truth
Artifact
Verification Record

Authority Stack

The system establishes a clear hierarchy of truth.

Authority Stack

Canonical Payload
Structured input representation
State Root
Deterministic state binding
Verification Artifact
Verification Record envelope
Dispute Resolution

If mismatch occurs, recomputation from canonical payload governs. State root resolves disputes.

Determinism Invariants

Determinism Rules

  • No wall-clock time
  • No randomness
  • No insertion-order ambiguity
  • No runtime entropy
  • Pure function boundary

Guarantee

Identical structured input + identical branch context = identical state root.

Branch Isolation

Each branch operates within its own state scope.

Institution Tenant
TENANT-001
Branch AA
  • Own state scope
  • No cross-branch memory
  • No shared mutable state
Branch BB
  • Own state scope
  • No cross-branch memory
  • No shared mutable state
Branch CC
  • Own state scope
  • No cross-branch memory
  • No shared mutable state

Isolation is structural, not conventional.

Artifact Lifecycle

From payload lock to audit retrieval.

1
Canonical payload locked
2
State root computed (SHA-256)
3
Verification Record generated
4
Append-only persistence
5
Optional external archival reference
6
Indexed for audit retrieval

Reproducibility Check

Verify deterministic computation from canonical payload.

Reproducibility Check

Verification interface. Protocol remains server-authoritative.

Sorted, normalized JSON
Click Recompute to derive hash

Uses protocol core: canonicalize() + hashCanonicalSync()

Security Properties

Immutability

Once computed, state roots cannot be modified without detection.

Auditability

Verification Records are indexed and retrievable for compliance review.

Portability

Verification Records are self-contained and verifiable across systems.

Run verification →