Vault & Subscription

Vault & Node Subscription Flows

From personal memories to institutional ledgers, powered by IOI vaults.

Choose the node tier that fits your needs. Every vault is encrypted, AI-governed, and backed by cryptographic receipts.

Node Tiers

Pick the subscription that matches your storage, governance, and intelligence needs.

Personal Node

Individuals & creators

Storage
1TB encrypted storage
Data Types
Personal memoriesHealth records (PHI)Music & creative workDigital identity
Primary Operator
Nucleus
Subscription Flow
  1. 1.Sign up with cryptographic identity
  2. 2.Connect your personal vault
  3. 3.Set AI policies with Jericho
  4. 4.Start routing messages & assets

Family Node

Families & small groups

Storage
2TB shared + encrypted
Data Types
Family documents & photosWills & estate planningShared health dataLegacy vaults
Primary Operator
Jericho
Subscription Flow
  1. 1.Create family vault structure
  2. 2.Invite members with permissions
  3. 3.Configure access policies
  4. 4.Enable secure sharing & inheritance

Business Node

Startups & enterprises

Storage
10TB+ scalable storage
Data Types
Clinical trials dataPayment ledgersTokenized assetsCompliance records
Primary Operator
Genesis
Subscription Flow
  1. 1.Enterprise onboarding & verification
  2. 2.Connect rails (EMR, payments, etc.)
  3. 3.Deploy governance policies
  4. 4.Scale with performance receipts

Governance / Institutional Node

Regulators & networks

Storage
Custom infrastructure
Data Types
PoHG events & policiesNetwork-wide receiptsInterop ledgersConsensus data
Primary Operator
All operators
Subscription Flow
  1. 1.Custom deployment & integration
  2. 2.Configure PoHG committee rules
  3. 3.Connect to Shiloh anchor (planned)
  4. 4.Monitor network governance

How AI Protects Your Vault

Three operators work together to ensure your vault is secure, compliant, and performant at all times.

Nucleus

Context & Retrieval

Nucleus understands your data structure and routes requests intelligently. It retrieves the right memories, health records, or assets without exposing everything.

Jericho

Policies & Access Control

Jericho enforces who can access what, when, and why. It applies PoHG governance to ensure your vault data is only shared according to your rules and risk tolerances.

Genesis

Performance & Receipts

Genesis tracks every vault access, generates cryptographic receipts, and monitors performance. You always know who touched your data and when.

Ready to start your vault journey?

Explore pricing, learn about the trust layer, discover memory rails, or see how builders earn rewards for securing the network.