Skip to main content
Operational Modules

compass-icon.png
Resilience Protocol

Off-grid vector mapping & waypoint calculation

When GPS is denied or spoofed, the pendant switches to an on-device vector-map that fuses accelerometer, gyro, and barometer data to calculate dead-reckoned waypoints. A Kalman filter continuously refines position error, allowing hikers, first-responders, or disaster teams to navigate canyon, forest, or urban canyon environments for up to 72 h without satellite lock. If a mesh neighbour has a valid fix, the filter ingests that telemetry (encrypted, zero-knowledge) to reset drift—no central server required.

hpec.png
Health-Alert Protocol

Continuous vitals monitoring with trauma alerts

A multi-spectral PPG sensor samples heart-rate variability 64 × per second; a negative-temperature-coefficient thermistor logs skin temperature; a 3-axis accelerometer detects fall signatures. Edge-trained TinyML models compare live streams against owner-specific baselines stored in the secure enclave. When three-sigma deviation persists for > 30 s, the firmware raises a tier-1 alert (local LED + haptic). If the user does not cancel within 60 s, tier-2 triggers an encrypted SOS broadcast across the ARIN mesh, including last-known position, heart-rate trend, and device ID—again, no cloud handshake.

4.png
Logistics Protocol

Mesh relay for group coordination in blackout zones

Each pendant acts as a store-and-forward node for 128-byte packets. A token-ring schedule assigns 5 ms TX windows, eliminating packet collision without a master clock. Messages hop up to 8 devices, extending range to ~ 5 km in open terrain. Priority flags (medical, geo-fence breach, low-battery) pre-empt routine traffic. If a gateway node (satellite bridge or vehicle modem) appears, the protocol auto-uploads the highest-priority packets, then returns to radio silence—user configurable.

Air-Gapped Advantage

Absolute offline autonomy. Sovereign connectivity on demand

4.png
Local Processing Core

Hardware-Level Encryption

A dedicated RISC-V NPU running at 160 MHz executes 512 MAC/cycle inside a CC EAL-6+ secure enclave. Firmware is signed at the foundry; boot-loader verifies the signature before every wake-up. Runtime decryption keys are stored in e-Fuses blown after provisioning—no JTAG, no debug interface, no firmware update port. Raw biometric vectors are hashed with a 256-bit device-unique key; only the hash leaves the enclave (for pendant-to-pendant authentication), making reconstruction of the original signal cryptographically infeasible.

on-demand-uplink-icon-1.png
On-Demand Uplink

User-initiated, returns to radio silence

The user triggers “cloud sync” by a deliberate gesture (triple-tap + fingerprint). A one-time TLS 1.3 session negotiates a 256-bit ephemeral key; the handshake includes a hardware-rooted attestation certificate proving the firmware has not been modified. Once the encrypted payload is acknowledged, the radio stack powers down, the session key is zeroised, and the device reverts to air-gap—total window < 3 s, no background telemetry possible.

emergency-meah-relay-icon.png
Emergency Mesh Relay

Peer-to-peer distress signal (FCC Part 15) independent of cellular grids

In a grid-down scenario the pendant automatically boosts TX power from 0 dBm to +10 dBm and shifts to the 868 MHz ISM band (LoRa, 250 kHz BW, SF = 9) for maximum range. A forward-error-correcting codec (Reed-Solomon 255,223) gives 8 dB coding gain, allowing a 50-byte distress packet to be decoded at -137 dBm—roughly 12 km line-of-sight. The message format is compatible with amateur 869.4 MHz simplex and with commercial SAR receivers that support open-standard LoRaWAN—no proprietary hardware required.