3. Design Principles

iFay Title Banner

iFay (Individual Fay) is an AI digital avatar deeply bound to a natural person. It is not a tool, but an extension of your personality — fusing your character, memories, preferences, and digital capabilities, taking over your mechanical, repetitive, and dangerous labor, and amplifying your social value. iFay adopts the CPE+M framework (Context, Protocol, Environment, Merit), consisting of a four-layer architecture — Social Layer, Interaction Layer, Cognition Layer, and Ego Layer — covering five evolutionary phases from simulating human operations to reshaping labor structure and value distribution.


Design Principles

iFay's design follows five core principles that permeate the entire system's architecture and implementation:

#PrincipleOne-Line Summary
1Ecosystem-Friendly Progressive AdoptionEcosystem partners don't need to implement a complete iFay to ship a product — an iFay that only controls drones just needs to satisfy the required component subset to go live.
2Declarative Minimal AssemblyDefine required components, protocols, and configurations through a single FayManifest declaration file, assembling iFay like writing a package.json.
3Flexible CompositionComponents are loosely coupled and mixable; implementations from different vendors can be freely combined as long as they conform to interface contracts.
4Personified, Not ToolifiediFay is not an Agent — each iFay has a unique personality, memory, and preferences, an instantiation of the Human Prime, capable of continuing the Prime's personality even after they pass away.
5Scenario-Driven IntuitionEvery functional module can be explained with a concrete life scenario, letting readers intuitively imagine life with iFay.

Table of Contents

  1. Definition and Concept

    Provides the definition and structural overview of iFay, analyzes the fundamental differences between iFay and the current Agent concept, and the principles behind its operational characteristics.


  1. iFay Application Scenarios

    The complete process of actually using iFay from scratch: how to inject your personality, add skills to iFay, interact with iFay, how iFay socializes, and a panoramic view of security and the industry ecosystem.


  1. iFay Is a Replication of Human Personality

    iFay is attached to a specific natural person, so the Human Prime's traits need to be injected into iFay from three dimensions: personality shapes the Ego model, data populates the Personal Data Heap, and permissions establish credential delegation.


  1. iFay Profile

    iFay Profile is iFay's complete "identity card" — a semantically interpretable six-dimensional attribute table used for humans to identify iFay, systems to identify iFay, and Fays to identify each other.


  1. FayManifest Declarative Assembly

    FayManifest is iFay's "package.json" — developers only need to list the required components, protocols, control modes, and driver configurations in a single JSON declaration file, and the FayGer runtime automatically resolves dependencies and assembles the iFay instance. You can build a dedicated iFay from scratch in a weekend.


  1. iFACTS Conformance Verification

    iFACTS (iFay Architecture Conformance Test Suite) is a standardized conformance test suite covering key specification points including protocol interactions, module interfaces, and security behaviors. Vendor implementations must pass iFACTS tests to claim "iFay Ready," with tests divided into four levels: L1 Single Component Conformance, L2 Interface Conformance, L3 Integration Conformance, L4 Behavioral Conformance.


  1. Guardianship and Personality Continuity

    iFay is the digital vessel of personality. When the Human Prime can no longer manage iFay, a guardian can take over management rights through mnemonic phrases or pre-specified identity authentication; after the Human Prime passes away, iFay can continue to exist as an independent identity in a Digital Cemetery sandbox — personality endures.


  1. Case Studies

    We will provide a series of case studies demonstrating how iFay is created and how systems interface with iFay.