SettleMint
ArchitectureOverview

Architecture overview

Client-facing overview of the DALP architecture: what it is, who it is for, the decisions it supports, core system layers, client responsibilities, limits, and next architecture pages to read.

DALP is a Digital Asset Lifecycle Platform for regulated tokenized assets on EVM-compatible networks. It gives banks, asset managers, fund administrators, and their operators one control plane for issuing assets, enforcing eligibility, submitting lifecycle actions, and reading operational state.

The architecture has one practical job: keep the responsibilities for user actions, workflow execution, on-chain enforcement, indexed reads, and external integrations clear enough for a bank-grade review.

Who this is for

ReaderWhat they are deciding
Business sponsorWhether DALP matches the institution's digital-asset operating model
Technology architectWhere DALP sits relative to identity, custody, EVM network access, data stores, and observability
Operations leadWhich teams own day-to-day actions, approvals, monitoring, reconciliation, and incident response
Compliance or risk reviewerWhich controls are enforced on-chain, which controls are off-chain, and where audit evidence is formed

This page gives review teams the responsibility map before the component, deployment, security, and self-hosting pages add implementation detail.

What DALP is

DALP is a full-stack platform with five cooperating layers.

Rendering diagram...
LayerClient-facing rolePrimary evidence it produces
Asset ConsoleHuman operators configure assets, review actions, manage users, and monitor statusUser-visible action history and operational state
Unified APISystems integrate with DALP through authenticated API routes and generated API documentationRequest validation, transaction-request records, API audit trails
Execution EngineLong-running blockchain actions are journaled, retried, signed, submitted, and reconciledDurable workflow state and transaction status
SMART Protocol contractsAsset rules, identity checks, compliance modules, roles, and token balances are enforced on-chainEVM transactions, contract storage, and events
Chain IndexerOn-chain events are transformed into queryable platform state for the console, API, reports, and monitorsIndexed PostgreSQL views derived from chain events

The table is the short version of the mental model. Human and API users start work through DALP. The execution layer prepares and tracks the transaction. SMART Protocol contracts enforce configured asset, role, identity, and compliance rules on-chain. The indexer then turns emitted events into the state operators see in dashboards, reports, and API reads.

External systems connect at explicit handoff points. Custody providers sit in the signing path, compliance providers can support issuer and claim workflows, EVM RPC providers or nodes carry transactions to the selected network, and downstream systems consume API or report outputs. DALP documents those handoffs as integration responsibilities, not as implicit platform ownership.

How to read the overview schematic

The schematic is a review aid, not a deployment diagram. Read it from left to right when you need to explain how an operator action becomes controlled platform state.

Schematic elementWhat it means in reviewWhat it does not claim
Asset ConsoleHuman operators use DALP to configure assets, review actions, and monitor statusA retail investor channel or a replacement for institution-specific operating policies
Unified APIIntegrations use authenticated API routes and generated API documentationA bypass around authorization, tenant context, validation, or approval requirements
Execution EngineAccepted actions become durable workflows for signing, submission, retries, and statusA finality layer, custody policy, or provider availability commitment
SMART ProtocolEVM contracts enforce configured token, role, identity, and compliance rules on-chainNative support for non-EVM ledgers or private-chain confidentiality by default
Chain IndexerContract events become queryable read state for the console, APIs, reports, and monitorsA separate source of truth that can overrule accepted on-chain state

Use this page when a review needs the top-level control model. Use the linked detail pages when the review needs deployment topology, data ownership, cross-chain responsibilities, or specific security controls.

What changes and where it is controlled

Architecture concernWhere DALP controls itWhat the client still decides
Who may actAuthentication, authorization, tenant context, role checks, and API validationUser lifecycle, segregation of duties, and approval policy
What may transferSMART Protocol roles, identity checks, compliance modules, and token configurationWhich compliance rules to configure and which issuers or providers to trust
How transactions leave the platformDurable execution, signer abstraction, transaction preparation, status tracking, and retriesCustody model, quorum policy, HSM or provider administration, and signer governance
What evidence is availableAPI records, workflow state, EVM transactions, contract events, indexed reads, and audit surfacesRetention policy, evidence pack assembly, downstream reporting, and operating procedures

How a state change works

DALP separates write execution from read visibility. That separation matters during review, because an action is not treated as operationally visible just because an HTTP request was accepted.

Rendering diagram...
StepWhat is controlled there
Request acceptanceAuthentication, authorization, tenant/system context, input validation
Durable executionWorkflow progress, retries, transaction queueing, nonce ordering, custody path
On-chain executionToken state, compliance checks, identity claims, role checks, final events
Indexed visibilityOperator dashboards, API reads, reports, reconciliation, monitoring

Who owns what

DALP is designed so ownership can be assigned without guessing which layer is responsible.

AreaDALP platform ownsClient or operator owns
Asset lifecycleAsset factories, lifecycle workflows, transaction orchestration, on-chain state transition routesBusiness approval policy, asset terms, role assignment, operating procedures
Compliance controlsIdentity-bound transfer checks, compliance module execution, trusted-issuer configuration surfacesWhich controls to configure, which issuers are trusted, how exceptions are approved and documented
Key and signing pathSigner abstraction, transaction preparation, status tracking, local development signerCustody-provider selection, approval policies, HSM or provider administration, signer key governance
Network accessEVM RPC client integration, chain gateway, transaction submission, indexer ingestionWhich EVM network is used, RPC provider or node operations, confirmation policy for the operating entity
Platform dataDatabase schema, indexed read model, audit events, API recordsData-retention policy, backup operations, downstream reporting controls
Operations visibilityHealth checks, observability hooks, failure-mode pages, status surfacesAlert routing, runbooks, support model, incident command

Architecture decisions this page supports

The table below maps each decision to the architecture answer and the next detail page. Use it as the first-pass review map before opening component, security, deployment, or operability pages.

DecisionThe architecture answerRead next
Platform fitDALP is an EVM-only lifecycle platform for regulated assets, not a retail wallet or cross-chain bridgePrinciples and scope
Deployment planningRuntime zones separate public console, backend services, durable execution, data stores, and EVM accessDeployment topology
Control reviewAuthentication and orchestration happen off-chain; asset and compliance finality happen on-chainSecurity
Operational readinessDurable workflows and indexer-derived reads define the normal recovery and reconciliation modelQuality attributes
Data governanceOn-chain state, off-chain records, and derived indexed data have different sources of truthData domains
Integration responsibilityCustody, compliance providers, RPC nodes, object storage, secrets, and observability are explicit ownership pointsIntegrations

Review answers before detail pages

Review questionArchitecture answer on this page
What runs in DALP?The console, API, execution engine, SMART Protocol contract integration, chain indexer, and supporting platform services.
What changes asset state?Authenticated requests create durable workflows that prepare, sign, and submit EVM transactions to SMART Protocol contracts.
Who controls final asset rules?Contract roles, identity checks, compliance modules, and token configuration enforce the final on-chain rule set.
Who controls operational policy?The institution or operator owns asset terms, business approvals, custody policy, network choice, retention, and runbooks.
Where does evidence come from?API records, workflow state, transaction status, EVM receipts, contract events, indexed reads, and audit surfaces.
What is intentionally not covered here?SLA commitments, legal opinions, privacy guarantees, custody operating policy, retail distribution, and bridge architecture.

Client decisions outside this overview

The overview is deliberately narrow:

LimitMeaning for client evaluation
EVM-onlyDALP operates with EVM-compatible networks. Non-EVM ledgers are outside this architecture.
No bridge architectureDALP does not present a bridge, cross-chain settlement layer, or non-EVM interoperability layer in these docs.
Not a legal opinionCompliance modules provide technical enforcement points. Legal interpretation and regulatory sign-off remain client responsibilities.
Not an SLAReliability patterns are described as architecture, not contractual availability or support commitments.
Not a privacy guaranteePublic-chain privacy limits depend on the selected network and data placed on-chain.
Not a retail front endThe Asset Console is built for institutional operators. Retail investor experiences are integration-specific.

These limits are part of the architecture, not footnotes. They keep the overview from implying that DALP is also a bridge, legal opinion, privacy layer, SLA, custody policy, or retail channel.

Where to go next

Start with the page that matches the review underway:

Review trackRecommended path
Executive architectureThis page → Principles and scopeSystem context
Technical architectureThis page → ComponentsFlows
Security and riskThis page → SecurityIdentity and complianceAsset policy
Deployment and operationsThis page → Deployment topologyOperability
Data governanceThis page → Data domainsDatabase

Compatibility paths remain available for older bookmarks: the former principles route routes to Principles and scope, and SMART Protocol routes to the asset-contracts reference.

On this page