Proprietary Data Architecture · NDA Required
Three-chain cryptographic architecture. Every clinical event timestamped and hash-chained. Mathematically tamper-proof. PIPL and HIPAA compliant by design.
When a physician acts on synthesized records in a legal, adjudication, or insurance context, the provenance of every data point must be verifiable. A PDF report with no audit trail is inadmissible evidence. An assertion with no source citation is clinically unreliable.
The immutable ledger solves both problems simultaneously. Every extracted marker is linked to its source block. Every synthesis event references specific source blocks. The chain from current clinical assertion to original source document is fully traceable and cryptographically proven.
This is not a compliance feature added on top of a working system. It is the foundation the rest of the architecture is built on. Data without provenance is not clinical data — it is hearsay.
Three chains segregated by the logical orthogonality of the data types they contain. Each chain has one responsibility. No chain's data type can contaminate another chain.
Every clinical event entering the platform creates a block. Lab result ingestion. Imaging report processing. TCM syndrome record. Prescription extraction. Diagnosis isolation. Procedure record. Each block contains the SHA3-256 hash of the source document and the extracted structured data.
Links clinical records across time, providers, and institutions. Each longitudinal synthesis transaction references specific Clinical Record Chain blocks by hash. The complete causal chain from current condition to earliest relevant clinical event is fully traceable through the block references.
Every access authorization, every query, every output delivery is logged with the requester identity, parameters, timestamp, and output hash. Consent is logically orthogonal to the clinical record — a consent event cannot create clinical data. This is enforced at the data model layer, not by policy.
Implementation details available to qualified partners under NDA. Summary specifications below.
PIPL (2021): PHI for Chinese nationals processed on China-side infrastructure using self-hosted DeepSeek. Cross-border transfer only after explicit consent recorded on Chain 03. Data localization by default.
DSL (2021): Health data classified as Important Data. Security assessment required for cross-border transfer. Chain 03 provides the required audit trail for regulatory review. Consent events are timestamped and immutable.
HIPAA Security Rule: AES-256 at rest, TLS 1.3 in transit. PHI never stored in the ledger — hashes only. Business Associate Agreement framework for US-side processing partners.
HITECH Breach Notification: Every access event on Chain 03 is time-stamped and identity-bound. Full breach analysis from access log export in any time range. Breach surface is minimized because PHI is in the encrypted store, not the ledger.