6.1. User Service Layer

6.1.1. User End

The user end mainly includes the wallet, user service APP, AI model market like Data Exchange, and other functions. Users can create their own private key via the wallet so as to conduct token transactions and call and execute intelligent contract, and the whole network can be maintained by the consensus mechanism.

Collecting users' vital signs data, the AI intelligent doctor engine will call upon the DAPP service application aiming for the data, providing users with timely health advice and health warning.

6.1.2. Blockchain Browser

Users can inquire block generation, transactions and address details in real time with the blockchain browser. With a specified transaction number, users can inquire the completion status of the transaction.

6.1.3. DAPP Market

• AI model suppliers can publish models, model types, task requirements, and settlement methods of tokens in the AI model market.

• Normal users can conduct call and query.

6.1.4. Computing Ability End

Computing ability providers shall download the specified computing end, which will automatically detect whether the minimum requirements of the computing ability are met. If the requirements are met, it can add to the whole network and get a certain amount of the token revenue.

6.1.5. Assessment Service

Users can give their product experience to the corresponding DAPP service providers to adjust and improvements, and smooth communication is conducive to the iterative update of products.

6.1.6. Expert Node Service

The expert node will conduct special audits and assessments on a certain number of cases randomly selected by the DAPP from the records of recent services every three months, and the cases that fail to meet the standard will be taken off the shelf.

6.1.7. Computing Ability Node Monitoring

Monitor the current running condition of computing ability nodes on the network, and maintain a complete list of computing nodes according to the computing processing capacity and the credit score.

6.1.8. Privacy Protection

Offer protection by using advanced technologies such as homomorphic encryption, differential privacy, and discrete storage.

Last updated