FH Protocol

System Architecture

Deterministic State Validation Pipeline

A reproducible verification pipeline that transforms structured event data into deterministic state roots through isolated, auditable computation stages.

Pipeline Stages

01

Structured Event Payload

Typed input events with schema-enforced field constraints.

02

Canonicalization Layer

Deterministic field ordering and normalization pass.

03

Branch-Scoped State Isolation

Domain-partitioned state with no cross-branch references.

04

Deterministic Hash Computation

Reproducible hash derivation from canonical input.

05

State Root Generation

Merkle-structured root from ordered hash sequence.

06

Optional Anchoring Interface

External commitment layer for third-party verification.

Architectural Principles

Protocol-UI Separation

The protocol layer operates independently of any presentation or interface layer. State transitions, validation logic, and hash computation are defined at the protocol level and are not coupled to rendering, user interaction, or display concerns. This boundary is structural, not conventional.

Deterministic State Roots

Given identical input events and an identical branch context, the pipeline will produce an identical state root on every execution. There is no reliance on wall-clock time, insertion order ambiguity, or runtime-specific entropy. Reproducibility is a protocol invariant, not a best-effort target.

Branch Isolation

Each domain branch maintains its own state scope. No branch may read from, write to, or reference the state of another branch during pipeline execution. This prevents cross-domain contamination and ensures that state roots are locally verifiable without global context.