The Infrastructure Layer
Lending against LP interests, RSUs, and tokenized securities requires solving problems your core system was never designed for. Aaim provides three capabilities: valuation methodology for Level 3 assets, legal perfection automation across UCC articles, and custody integrations that establish control. Together, these make modern wealth lendable.
Fair value methodology for assets without market prices
Public securities have CUSIP numbers and real-time quotes. The assets reshaping member portfolios do not. LP interests, private company stock, RSUs, and tokenized securities require valuation methodology beyond market quotes. Aaim's unique IP, ReferenceModel, is our patent-pending architecture for defensible fair value estimates.
Multi-Source Data Fusion
Aggregated pricing from 20+ data providers. Public market correlates, secondary market transactions, and proprietary data sources combined through weighted ensemble methods. No single point of failure.
ASC 820 Compliance
FASB fair value measurement standard implemented. Level 1, 2, and 3 hierarchy classification. Methodology documentation generated automatically for examiner review.
Asset-Specific Risk Models
Each asset class has distinct characteristics. LP interests face capital call exposure. RSUs face vesting risk. Cryptocurrency faces volatility. Risk models calibrated to actual asset behavior, not generic assumptions.
Explainable Outputs
Every valuation includes methodology documentation, input sources, and sensitivity analysis. The audit trail exists because the examiner will ask.
Observable certainty that enforces and enhances policy
Tenant isolation, immutable ledgers, smart contract and multiparty execution, all enforced by mathematics to deliver incontrovertible proof and observability.
Homomorphic Encryption
Data remains encrypted during processing. Member data never exists in plaintext outside your institution. Compute on encrypted values without exposure.
Immutable Audit Ledgers
Every state change is hashed and chained. Examiner-ready means mathematically provable. Tampering becomes detectable through cryptographic verification.
Cryptographic Isolation
Tenant data guarded by unique key hierarchies. NIST post-quantum cryptography ready. Hardware secure enclave processing for sensitive operations.
Cryptographic proof of ownership and encumbrance
UCC Article 12 requires "control" for super-priority perfection. Control is not documentation; it is technical architecture that enables a secured party to exercise exclusive power over a controllable electronic record. Aaim's QuantumVerify protocol provides the cryptographic infrastructure for identity verification and control establishment.
Identity Verification
Cryptographic binding between borrower identity and asset ownership. Zero-knowledge proofs enable verification without unnecessary data exposure.
Encumbrance Registry
Real-time visibility into existing liens, pledges, and restrictions. Prevents double-pledging and priority conflicts before they occur.
Control Establishment
Technical integration with custodians that satisfies Article 12 control requirements. Actual technical capability to exercise control elements.
Your risk policy. Our enforcement infrastructure.
Every institution has different risk tolerances. We provide baseline parameters calibrated to regulatory guidance; you override them based on your underwriting standards. The system enforces that policy in real-time.
LTV Caps
Maximum advance rates by asset class. Override our defaults or build from scratch. The system blocks any loan exceeding configured limits.
65% max on public equities
Concentration Limits
Cap exposure to any single asset, issuer, or sector. Prevent portfolio imbalance before it happens. Alerts trigger at thresholds you define.
no more than 20% in any single position
Volatility Buffers
Automatic margin call triggers when asset volatility exceeds comfort zones. Configure based on realized volatility, correlation metrics, or custom thresholds.
+10% buffer when 30-day vol > 25%
Collateral Health Thresholds
Configurable triggers when collateral value approaches LTV limits. Define cure periods, notification sequences, and escalation thresholds. The system monitors; you decide when to act
3-day cure period at 85% of limit
Regulatory guidance provides the floor. Your risk appetite sets the ceiling. We built the infrastructure that enforces the space between.
Each asset class requires specific valuation methodology and perfection framework. Baseline LTV ranges reflect liquidity profile, volatility characteristics, and regulatory guidance. Your institution sets final terms.
Near-cash; minimal haircut
Reg T/U baseline; daily pricing
Appraisal-based; established guidance
Volatility offset by 24/7 liquidity; Article 12
Daily pricing; liquid markets
Underlying varies; Article 12 framework
Secondary market exists; NAV reporting
Redemption restrictions; NAV-based
Strategy-dependent; redemption gates
Illiquid; NAV lag; capital call exposure
Vesting schedule risk; employer concentration
409A-informed; cap table complexity
Binary outcomes; extreme illiquidity
Calibrated to Federal Reserve Reg T/U, OCC Comptroller's Handbook, FDIC Risk Management Manual, and UCC Article 8/9/12 requirements
Programmable legal agreements
Multi-party agreements with atomic execution guarantees. Control agreements that automatically satisfy UCC Article 12 requirements. Margin call triggers with pre-wired liquidation pathways. Legal documents that execute themselves when conditions are met.