Platform · Architecture

Component topology and trust boundaries.

The TrueSign architecture is intentionally minimal. Every component exists to enforce a specific control required by a regulated authorization workflow.

Components

Five components, one signing path.

Each authorization passes through the same deterministic path. There are no out-of-band channels, no SMS fallbacks, and no legacy bypasses.

Originating system

Customer system of record (core banking, treasury platform, ERP, custody platform). Constructs the authorization request and forwards canonical intent to the TrueSign verifier.

TrueSign verifier

Validates canonical intent encoding, evaluates server-side policy, dispatches signing challenge to the bound device, verifies the returned signature, writes to the audit ledger, and returns a cryptographic receipt.

Policy engine

Declarative, versioned, and auditable. Evaluates limits, segregation of duties, dual control, geofencing, time windows, and external compliance hooks at sign-time.

Audit ledger

Append-only, hash-chained store of every request, signature, decision, and receipt. Supports SOC 2 and ISO 27001 audit and regulator inspection. Optional external notarization.

Bound device

iOS Secure Enclave, Android StrongBox / Keymint, Windows TPM 2.0, or FIPS-validated HSM. Holds the non-exportable private key and produces signatures over canonical intent.

Trust boundaries

No trust in the host OS.

Private key material never leaves hardware. The host operating system is treated as untrusted; the bound device exposes only the ability to sign a presented canonical intent message after user confirmation.

╭───────────────────────────╮ ╭──────────────────────────╮
│ Originating system │ │ TrueSign verifier │
│ (core banking, treasury) │──────▶│ • canonical encoder │
╰───────────────────────────╯ │ • policy engine │
 ▲ │ • signature verifier │
 │ │ • audit ledger │
 │ receipt + decision ╰────────────┬─────────────╯
 │ │ challenge
 │ ▼
 │ ╭──────────────────────────╮
 │ │ Bound device │
 ╰───────────────────────│ Secure Enclave / TPM │
 signature │ / FIPS HSM │
 ╰──────────────────────────╯
Adjacent documentation

Continue across the platform.

Institutional Briefing Request

Institutional briefing request

Briefings are conducted by Charles Cohen with security architecture, compliance, and procurement leadership at qualifying institutions. Five-business-day response SLA.

Institutional email; free-email domains flagged for manual review.

Optional · 1000 characters maximum.

Submitting transmits your information to Data World 1, LLC for the purpose of evaluating an institutional briefing. Handled per the Privacy Notice.