FTH Trading LLC · Sovereign Infrastructure

Doc Intelligence
Engine

Self-hosted, sovereign document processing and delivery platform built for regulated capital operations. Every document is canonicalized, fingerprinted, signed, encrypted, and anchored to an immutable ledger — with full auditability at every stage.

ESIGN Compliant UETA Compliant SEC 17a-4 Aligned x402 Protocol Ed25519 Signing IPFS Anchored
49+
Core Modules
6
Security Layers
7
Audit Ledgers
3
Anchor Chains
0
Exposed Ports
All Systems OPERATIONAL
IPFS/Kubo CONNECTED
Signing Gateway :3002 ACTIVE
SDC Viewer :3003 ACTIVE
Cloudflare Tunnel HEALTHY
Updated:
System Overview

Six-Layer Sovereign Infrastructure

Purpose-built for capital formation with zero exposed ports, three-tier governance, and cryptographic integrity at every step.

&x2B21;
14 modules

Document Engine

Ingest 7 formats (PDF, DOCX, PNG, JPG, HTML, TXT, MD). Canonical parsing, governance transforms, compliance injection, brand styling, template export, and SHA-256 fingerprinting.

PORT :3001 · INTERNAL ONLY
12 modules

Sovereignty Layer

IPFS/Kubo storage, CID registry, hash-chain ledger anchoring, document fingerprinting, digital signatures, QR code generation, audit trail, SKU engine.

IPFS :5001 · GATEWAY :8081
5 modules

Signing Gateway

Multi-signature ceremonies with OTP verification, ESIGN Act / UETA compliant certificates, session management, and distribution engine.

PORT :3002 · INTERNAL ONLY
7 modules

Secure Document Control

Viewer protection with copy/print/download disabling, time-limited access tokens, forensic watermarking, export policy enforcement (4 tiers), access ledger.

PORT :3003 · INTERNAL ONLY
6 modules

Sovereign Comms Agent

AI-powered telecom layer for investor communications. Intent classification, TCPA compliance, conversation ledger, Telnyx integration, inbound + outbound.

PORT :3004 · SCA WEBHOOK
5 modules

Perimeter Security

Cloudflare Zero Trust tunnels, rate limiting, webhook HMAC-SHA256 validation, replay attack prevention with timestamp validation, IP allowlisting.

CLOUDFLARE EDGE · ZERO EXPOSED PORTS
x402 Protocol

AI-to-AI Payment Infrastructure

Native machine-to-machine payment layer enabling autonomous agents to negotiate, execute, and settle transactions without human intervention. HTTP 402 “Payment Required” as a first-class protocol primitive.

Autonomous

AI Agent Orchestration

Facilitator-mediated payment flow where AI agents autonomously discover pricing, negotiate terms, and execute payments for API access, compute resources, and document services.

Agent A Gateway Agent B
Metered

Per-Request Micropayments

Sub-cent granularity billing for every API call, document generation, or AI inference. Real-time metering with cryptographic receipts. No subscription overhead, no minimum commitments.

Request Meter Receipt
Multi-Chain

Cross-Chain Settlement

Settle on XRPL, EVM chains, or UnyKorn L1 with automatic routing. Payment proofs anchored alongside document hashes for unified audit trails.

XRPL · EVM · UnyKorn L1
Secure

Cryptographic Payment Proofs

Every transaction produces a signed receipt with SHA-256 hash, Ed25519 signature, and optional IPFS anchor. Tamper-evident payment trail integrated into document provenance.

Hash Sign Anchor
Compliant

Regulatory-Aware Pricing

Dynamic pricing engine enforces jurisdictional rules, rate limits, and compliance requirements. Automatic disclosure generation for regulated document transactions.

Price Comply Execute
Integrated

Doc Intelligence Fusion

x402 payments are embedded directly into the document lifecycle. Generate, sign, anchor, and pay in a single atomic flow. Payment metadata lives alongside document metadata.

Doc Pay Anchor
Technology Stack

Deterministic. Cryptographic. Compliant.

LayerTechnologyDetail
LanguageTypeScriptES2020, strict mode, full type safety
RuntimeNode.jsModule isolation, per-service containers
StorageIPFS / KuboContent-addressed, SEC 17a-4 compliant immutability
Paymentsx402 ProtocolAI-to-AI micropayments, per-request metering, multi-chain
ContainerizationDocker Compose 3.9Six-service orchestration, health checks
PerimeterCloudflare Zero TrustZero exposed ports, Argo tunnels, identity verification
TelecomTelnyxVoice/SMS, TCPA compliance, conversation ledger
EncryptionAES-256-GCMAt-rest storage, PBKDF2 key derivation (100k iterations)
HashingSHA-256Document fingerprinting, hash-chain integrity
ComplianceESIGN · UETA · SEC 17a-4Full electronic signature ceremony compliance
Quick Start

Deploy an Agreement in Minutes

Generate a cryptographically-bound agreement session, share via QR code, and execute a compliant signing ceremony.

QR Agreement Generator: Create a session, configure the agreement parameters, and receive a unique QR code that recipients can scan to complete an ESIGN/UETA compliant signing ceremony.
01

Configure Agreement

Set parties, document type, governance tier, and signing protocol. System generates session ID + fingerprint.

02

Receive QR Code

A unique, signed QR code is generated linking to the secure signing session. Share via any encrypted channel.

03

OTP Verification

Recipient scans QR, enters 6-digit OTP to authenticate the signing session (5-minute challenge window).

04

Certificate Issued

ESIGN/UETA certificate generated with hash, timestamp, signer identity, and ledger anchor. Immutable record created.