Bluwhale AI Docs
  • Introducing Bluwhale
  • Web3's Intelligence Layer
  • Architecture
    • Overview
    • Data Verification Module
    • Identity Embedding Module
    • Privacy Inference Module
    • Zero-Knowledge Proof
  • AI Nodes
    • Bluwhale AI Nodes
    • Purpose of AI Nodes
    • Node Sale Details
    • Node Tiers / Earnings
    • Money-Back Guarantee
    • Node Mobile App
    • Node Rewards
    • Node Delegation
    • Node Staking
    • Node FAQs
  • Tokens
    • $BLUAI
      • Tokenomics
        • Distribution/Vesting
        • Utility
        • Staking
      • Airdrops
    • $BLUP
      • Points Conversion
  • Whale Tank
  • Community
    • Community Activations
    • Social & Community Links
    • Distributor & Referral Programs
    • Media Coverage
  • Resources
  • General FAQs
  • Brand Guidelines
  • Media Kit
  • Contact Us
Powered by GitBook
On this page
  1. Architecture

Overview

PreviousArchitectureNextData Verification Module

Last updated 9 months ago

The Bluwhale Protocol fits seamlessly between the application layer and protocols plus L1/L2 chains, passing on crucial aggregated user insights to dApps and individuals without them needing to manually do the analysis or write the technical queries.

The personalization layer can further be broken down into core 3 modules

  1. Data Verification Module

This layer consists of verifiers from the community, social interactions, and circles, tasked with validating the attestation to confirm the layers' secure and accurate operations, including the data contributed and identities established in Bluwhale’s AI network.

  1. Identity Embedding Module

This layer authenticates users via both traditional (web2) social accounts and blockchain (web3) like social reference mechanisms, aggregated under the embedding. It integrates identities and data through knowledge links, weights, rankings, and other identity contextualization models.

  1. Privacy Inference Module

Established on a Zero-Knowledge foundation, it interprets and shadows data consumers reveal and release, allocating rewards according to the demand from enterprises or individuals as well as the amount of processing and queries required to extract the full understanding and insights around the wallet/user.

Each of the modules are critical for the entire personalization layer to become trustless, decentralized and secure. The Data Verification Module ensures that contributed internal, external, on-chain/off-chain data seamlessly integrates with each other by leveraging a reference verification approach through nodes. The Identity Embedding Module contextualizes user behavior and continuously optimizes incoming references and data which make the profile as wholistic as possible. Then it passes the embeddings with its descriptive surrounding data to a zk-layer that only allows enterprises to access if the individual wallet holder gives permission to its data in exchange for financial rewards.