Platform / Technology

The Infrastructure Layer

Lending against LP interests, RSUs, and tokenized securities requires solving problems your core system was never designed for. Aaim provides three capabilities: valuation methodology for Level 3 assets, legal perfection automation across UCC articles, and custody integrations that establish control. Together, these make modern wealth lendable.

Aaim's ReferenceModel Valuation Engine

Fair value methodology for assets without market prices

Public securities have CUSIP numbers and real-time quotes. The assets reshaping member portfolios do not. LP interests, private company stock, RSUs, and tokenized securities require valuation methodology beyond market quotes. Aaim's unique IP, ReferenceModel, is our patent-pending architecture for defensible fair value estimates.

Multi-Source Data Fusion

Aggregated pricing from 20+ data providers. Public market correlates, secondary market transactions, and proprietary data sources combined through weighted ensemble methods. No single point of failure.

ASC 820 Compliance

FASB fair value measurement standard implemented. Level 1, 2, and 3 hierarchy classification. Methodology documentation generated automatically for examiner review.

Asset-Specific Risk Models

Each asset class has distinct characteristics. LP interests face capital call exposure. RSUs face vesting risk. Cryptocurrency faces volatility. Risk models calibrated to actual asset behavior, not generic assumptions.

Explainable Outputs

Every valuation includes methodology documentation, input sources, and sensitivity analysis. The audit trail exists because the examiner will ask.

Computational Trust Architecture

Observable certainty that enforces and enhances policy

Tenant isolation, immutable ledgers, smart contract and multiparty execution, all enforced by mathematics to deliver incontrovertible proof and observability.

Homomorphic Encryption

Data remains encrypted during processing. Member data never exists in plaintext outside your institution. Compute on encrypted values without exposure.

Immutable Audit Ledgers

Every state change is hashed and chained. Examiner-ready means mathematically provable. Tampering becomes detectable through cryptographic verification.

Cryptographic Isolation

Tenant data guarded by unique key hierarchies. NIST post-quantum cryptography ready. Hardware secure enclave processing for sensitive operations.

Aaim's QuantumVerify Identity and Control

Cryptographic proof of ownership and encumbrance

UCC Article 12 requires "control" for super-priority perfection. Control is not documentation; it is technical architecture that enables a secured party to exercise exclusive power over a controllable electronic record. Aaim's QuantumVerify protocol provides the cryptographic infrastructure for identity verification and control establishment.

Identity Verification

Cryptographic binding between borrower identity and asset ownership. Zero-knowledge proofs enable verification without unnecessary data exposure.

Encumbrance Registry

Real-time visibility into existing liens, pledges, and restrictions. Prevents double-pledging and priority conflicts before they occur.

Control Establishment

Technical integration with custodians that satisfies Article 12 control requirements. Actual technical capability to exercise control elements.

Configurable Risk Frameworks

Your risk policy. Our enforcement infrastructure.

Every institution has different risk tolerances. We provide baseline parameters calibrated to regulatory guidance; you override them based on your underwriting standards. The system enforces that policy in real-time.

LTV Caps

Maximum advance rates by asset class. Override our defaults or build from scratch. The system blocks any loan exceeding configured limits.

65% max on public equities

Concentration Limits

Cap exposure to any single asset, issuer, or sector. Prevent portfolio imbalance before it happens. Alerts trigger at thresholds you define.

no more than 20% in any single position

Volatility Buffers

Automatic margin call triggers when asset volatility exceeds comfort zones. Configure based on realized volatility, correlation metrics, or custom thresholds.

+10% buffer when 30-day vol > 25%

Collateral Health Thresholds

Configurable triggers when collateral value approaches LTV limits. Define cure periods, notification sequences, and escalation thresholds. The system monitors; you decide when to act

3-day cure period at 85% of limit

Regulatory guidance provides the floor. Your risk appetite sets the ceiling. We built the infrastructure that enforces the space between.

BASELINE LTV BY ASSET CLASS

Each asset class requires specific valuation methodology and perfection framework. Baseline LTV ranges reflect liquidity profile, volatility characteristics, and regulatory guidance. Your institution sets final terms.

Stablecoins (USDC, USDT)8090%

Near-cash; minimal haircut

Public Securities6075%

Reg T/U baseline; daily pricing

Commercial Real Estate5570%

Appraisal-based; established guidance

Major Cryptocurrency (BTC, ETH)5065%

Volatility offset by 24/7 liquidity; Article 12

Public REITs5065%

Daily pricing; liquid markets

Tokenized Securities4560%

Underlying varies; Article 12 framework

Private Credit4055%

Secondary market exists; NAV reporting

Non-Traded REITs3555%

Redemption restrictions; NAV-based

LP Interests (Hedge Funds)3050%

Strategy-dependent; redemption gates

LP Interests (Private Equity)2545%

Illiquid; NAV lag; capital call exposure

RSUs / Restricted Stock2545%

Vesting schedule risk; employer concentration

Private Company Equity2040%

409A-informed; cap table complexity

Venture/Startup Equity1030%

Binary outcomes; extreme illiquidity

0%25%50%75%

Calibrated to Federal Reserve Reg T/U, OCC Comptroller's Handbook, FDIC Risk Management Manual, and UCC Article 8/9/12 requirements

Smart Contract Infrastructure

Programmable legal agreements

Multi-party agreements with atomic execution guarantees. Control agreements that automatically satisfy UCC Article 12 requirements. Margin call triggers with pre-wired liquidation pathways. Legal documents that execute themselves when conditions are met.

Aaim-FI Agreements
Master Platform Services Agreement
Core technology services relationship
Data Processing Addendum
GLBA/CCPA compliance for member data handling
Model Risk Management Addendum
OCC 2011-12 compliance documentation
FI-Borrower Agreements
Member Authorization and Data Sharing
Consent for financial data access
Pledged Asset Security Agreement
Grant of security interest from borrower to FI
Succession Planning Addendum
Death and incapacity provisions
Custodian Integration
Tri-Party Control Agreement
UCC Article 8 control between borrower, FI, and custodian
Digital Asset Control Agreement
UCC Article 12 control for cryptocurrency and tokenized securities
Custodian Integration Agreement
API access and data sharing with broker-dealers
Perfection Documents
UCC-1 Financing Statement
Initial filing for Article 9 perfection
UCC-3 Amendment/Continuation
Continuation, amendment, or termination filings

Infrastructure for modern wealth