System Architecture

A high-assurance, 8-phase pipeline designed for deterministic safety and regulatory compliance on the edge.

Customer (Phone)
Cloudflare / Twilio
Call Engine
Safety Firewall
Shadow Auditor
Forensic Manifest
Llama-3 (LoRA)
Phi-3 (Checker)
Piper (TTS)
1

Secure Ingress & TPI Verification

Establishing encrypted WebSocket connection via mTLS and verifying Mission Authorization through the Trust-Party Ingress handshake.

cloudflare-tunnel mTLS fastapi
2

Acoustic Sentiment Intelligence

Real-time FFT pitch analysis for F0 tracking. Detects age-gating requirements and identifies customer agitation spikes.

numpy-fft rms-energy pitch-tracking
3

Deterministic Safety (Ingress)

Evaluating transcribed input through a deterministic firewall to identify intent and apply safety guardrails before inference.

regex-intent spacy-ner safety-firewall
4

Logic & Fine-Tuned Inference

LoRA fine-tuned Llama-3 model generates recovery-specific responses based on historical context and collection scripts.

mlx-inference llama-3-lora qlora-v4
5

Deterministic Safety (Egress)

The Shadow Auditor intercepts LLM output, extracting numerical and identity tokens to validate against the secure SQLCipher database.

phi-3-checker sqlcipher circuit-breaker
6

Multilingual Texture Engine

Neural TTS synthesis with dynamic prosody shifting. Adjusts speed and pitch based on the context of the interaction.

piper-tts onnx-runtime dynamic-prosody
7

Forensic Manifest Sealing

Every turn is hashed (SHA-256) and cryptographically chained. Watermarked with hardware-bound serial numbers for immutable auditing.

sha-256-chain hardware-attestation forensic-manifest
8

Termination & Discovery

Autonomous terminal exit and packaging of the Examiner Pack (encrypted ZIP) for institutional review and auditing.

examiner-pack digital-receipt session-archive