Whitepaper
  • 1.0 Introduction
    • 1.1 Migration from XEND to RWA
    • 1.2 New Vision - Xend V2 and Xend V3
      • 1.2.1 Principles overview
      • 1.2.2 Xend V2 & V3 - Roadmaps
      • 1.2.3 Xend V2 Roadmap
      • 1.2.4 Xend V3 Roadmap
  • 2.0 OAE - Onchain Assets Environment
    • 2.1 OAE Core Idea
    • 2.2 OAE Framework
    • 2.3 OAE - Products Overview
      • 2.3.1 Asset Chain
      • 2.3.2 Origin Studio
      • 2.3.3 Social Hub
      • 2.3.4 Xend Connect
      • 2.3.5 GOR
      • 2.3.6 Xend Solutions
    • 2.4 Asset Smart Contract
    • 2.5 IAC Framework
      • 2.5.1 Importance Of IAC to OAE
      • 2.5.2 (b) IAC in Practice
    • 2.6 Asset Credibility
      • 2.6.1 Authentication Rating
      • 2.6.2 Compliance Rating
      • 2.6.3 Asset Insurance Rating
      • 2.6.4 Events Mirroring
      • 2.6.5 Visual Summary
    • 2.7 IAC Partners
      • 2.7.1 IAC Provider
      • 2.7.2 Conflict Resolution Process
      • 2.7.3 I - AC Interdependence
    • 2.8 Assets Policy in OAE
      • 2.8.1 Web3 Token Issues
      • 2.8.2 AssetChain 10 Cardinal Rules
      • 2.8.3 Assets As Smart Contracts, Tokens As Rights
      • 2.8.4 Verifiable Legal Binding
      • 2.8.5 Intrinsic Legalization
      • 2.8.6 Multi-Level Asset & Token Structures
      • 2.8.7 Token Bonding
      • 2.8.8 Separating Ownership, Possession And Holding
      • 2.8.9 Structured Asset Administration Policy
    • 2.9 AssetChain - 4 Execution Levels
    • 2.10 P2P Lending In OAE
      • 2.10.1 Basics of P2P lending
      • 2.10.2 Appraisers And Custodians
      • 2.10.3 Xend Fundraising Platform On OAE
    • 2.11 AI Stack
      • 2.11.1 Watchdogs
      • 2.11.2 Assistants
      • 2.11.3 Improvers
      • 2.11.4 Concepts
  • 3.0 Xend Browser
    • 3.1 One-4-All
    • 3.2 NodeOs
    • 3.3 Subnet
    • 3.4 Explorer
    • 3.5 Node Enterprise
    • 3.6 e-Admin
    • 3.7 NodeBox
  • 4.0 Progressive Synchronization (V3)
    • 4.1 Objectives Of The IAC Councils
    • 4.2 Progressive Adoption Of Public AssetChains
    • 4.3 Progressive Adoption Of Public Subnets
    • 4.4 OAE Marketplace
  • Practical Use Cases
    • Business & Banking
    • Real Estates
    • Compliance - by - Design
    • Tokenization Beyond Ownership
    • Global Assets Accessibility
    • Green Impact
    • Software, Gaming and Entertainment
    • Global Transparency and E-Administration
  • RWA (OAE) Token Economy 1.0
    • RWA Token
    • RWA Economy Ecosystem Participants
    • RWA Staking
    • RWA Incentives
    • RWA LP Tokens, Market Makers, & Trading Competitions
    • Gamification Of OAE User Experience
    • RWA Token Utilities
    • OAE & RWA Macro-Economy
    • Future Legal Status Of RWA Tokens
  • Litepaper
    • Solving ASR Issue
    • OAE From User Standpoint
    • Xend Solutions
    • Future Roadmap
  • Appendices
    • Appendix A: Understanding RWA
      • Assets Classification
      • Narrow Understanding Of RWA
      • Wide Understanding Of RWA
      • UWA - Unreal World Asset
      • RWA versus UWA - They Key Difference Lies In Legal Context
      • Examples Of RWAs Definitions Incoherence
      • Key Takeaways
    • Appendix B: Digitization vs Tokenization
      • Existence vs Ownership
      • Hierarchy Of Terms
      • Digitation Of Asset
      • Documenting The Asset
      • Tokenization Of The Asset On Gen2 Blockchain
      • Legal Causality Of Gen2 Tokenized Asset
      • Key Takeaways
    • Appendix C: Rise Of AssetChains
      • Theses A
      • Theses B
      • Theses C
      • Theses D
      • Theses E
      • Theses F
    • Appendix D: Brief Analysis On Who Owns The Internet
    • Appendix E: Market Research
      • RWA Solutions - Scope Of Work Overview
        • Centralized
        • Decentralized
        • In-depth Scope Comparison
      • Statistics
        • CEFI - Territorial Coverage
        • CEFI - Funding Ranges Popularity
        • CEFI - Funding Values Breakdown
        • Visual Data Metrics
      • Research Summary
  • FAQs
Powered by GitBook
On this page
  1. 2.0 OAE - Onchain Assets Environment
  2. 2.11 AI Stack

2.11.1 Watchdogs

Previous2.11 AI StackNext2.11.2 Assistants

Last updated 4 months ago

Watchdogs

All Watch Dogs are interconnected – they can use one another when needed, share data, communicate, and contribute to each other's training models and databases.

Watchdog access points are:

  • Origin Studio (asset owners and IAC triangle members)

  • GOR (accessible for users)

Watchdogs are also seamlessly embedded into the core OAE infrastructure via Xend Connect. They play a critical role in spot verification of assets onboarded to the chain and risk flagging (e.g., AML checks, illegality monitoring)

All watchdogs can be used ad-hoc or for ongoing monitoring with custom frequency.

AI Anomalies Detector

AI anomalies detector utilizes external big data and advanced training models to monitor anomalies and risks related to specific assets. It detects issues like inconsistencies, illogical data, real-world conditions, and other factors that are not identifiable through direct data replication.

Smart ASR leverages natural language processing (NLP) and draws conclusions from sources such as:

  • Comments and opinions

  • Advanced thought processes (e.g., valuation logic for cars, real estate, etc.)

  • Comparisons with localized data and price ranges

Traditionally, such anomalies would be flagged by authentication or compliance providers as part of the IAC verification triangle. Anomalies detector however, enables faster, cheaper, and real-time flagging. These flags can then be further investigated by full-scope assessment done by the IAC triangle or verified through simple fact/data checks by users who run that feature.

AI Credibility Assessor

This AI module is linked to a broader stream of data specific to the given asset. It first uses and then incorporates pre-acquired data, including:

  • Historical local data (news and relevant events in the region/country)

  • Legislative stability

  • Currency stability

  • Legal compliance

  • Publicly available data sources

  • Asset insurance details

  • Asset setup within the OAE ecosystem

  • Input from asset authenticators (irreplaceable even with AI)

Note: If an asset owner uses AI Credibility Scoring or replaces authentication and compliance validation components of the IAC with AI-based workflows and scores, this will be clearly disclosed on the asset's main page. A warning will indicate the absence of relevant human-based assessment.

AI Compliance Validator

The AI Compliance Validator collects and monitors regulations related to assets from all countries. It uses advanced algorithms to track changes or additions to these regulations, forming a continuously updated training model.

Key Features:

  • Real-time Updates: Provides real-time updates on regulatory changes and their implications for tokenized assets.

  • Legal Integration: Enhances legal binding features by connecting assets to legal record sources, even without an available API endpoint (subject to limitations like CAPTCHA or anti-AI restrictions).

  • Automated Compliance Assessment: Offers automated compliance validation, though with a lower credibility score compared to human-based compliance assessments.

AI Event Mirror

The AI Event Mirror enhances asset authentication - its usage is optional by the asset owner or asset authenticator, however if used and incorporated as part of ongoing asset status replication workflow, it will increase authenticity scoring (co-building overall credibility scoring of the asset).

Key Features:

  • Real-Time Data: Receives live news and updates from multiple sources within a given region.

  • NLP Interpretation: Uses natural language processing (NLP) to interpret the data.

  • Event Detection: Identifies crucial physical events such as floods, fires, or destruction.

  • Integration: Seamlessly connects with Smart ASR for enhanced anomaly detection and validation

Note: Full replacement of asset authentication is not possible - physical existence of the asset must always be confirmed by the human).

Credibility Assessor then runs its own automated authentication and compliance assessment using its 2 other ‘AI watchdog friends’ - and , to generate AI credibility rating.

Anomalies detector
Compliance Validator
AI Event Mirror