2.11.1 Watchdogs

Watchdogs

All Watch Dogs are interconnected – they can use one another when needed, share data, communicate, and contribute to each other's training models and databases.

Watchdog access points are:

  • Origin Studio (asset owners and IAC triangle members)

  • GOR (accessible for users)

Watchdogs are also seamlessly embedded into the core OAE infrastructure via Xend Connect. They play a critical role in spot verification of assets onboarded to the chain and risk flagging (e.g., AML checks, illegality monitoring)

All watchdogs can be used ad-hoc or for ongoing monitoring with custom frequency.

AI Anomalies Detector

AI anomalies detector utilizes external big data and advanced training models to monitor anomalies and risks related to specific assets. It detects issues like inconsistencies, illogical data, real-world conditions, and other factors that are not identifiable through direct data replication.

Smart ASR leverages natural language processing (NLP) and draws conclusions from sources such as:

  • Comments and opinions

  • Advanced thought processes (e.g., valuation logic for cars, real estate, etc.)

  • Comparisons with localized data and price ranges

Traditionally, such anomalies would be flagged by authentication or compliance providers as part of the IAC verification triangle. Anomalies detector however, enables faster, cheaper, and real-time flagging. These flags can then be further investigated by full-scope assessment done by the IAC triangle or verified through simple fact/data checks by users who run that feature.

AI Credibility Assessor

This AI module is linked to a broader stream of data specific to the given asset. It first uses Anomalies detector and then incorporates pre-acquired data, including:

  • Historical local data (news and relevant events in the region/country)

  • Legislative stability

  • Currency stability

  • Legal compliance

  • Publicly available data sources

  • Asset insurance details

  • Asset setup within the OAE ecosystem

  • Input from asset authenticators (irreplaceable even with AI)

Credibility Assessor then runs its own automated authentication and compliance assessment using its 2 other ‘AI watchdog friends’ - Compliance Validator and AI Event Mirror, to generate AI credibility rating.

Note: If an asset owner uses AI Credibility Scoring or replaces authentication and compliance validation components of the IAC with AI-based workflows and scores, this will be clearly disclosed on the asset's main page. A warning will indicate the absence of relevant human-based assessment.

AI Compliance Validator

The AI Compliance Validator collects and monitors regulations related to assets from all countries. It uses advanced algorithms to track changes or additions to these regulations, forming a continuously updated training model.

Key Features:

  • Real-time Updates: Provides real-time updates on regulatory changes and their implications for tokenized assets.

  • Legal Integration: Enhances legal binding features by connecting assets to legal record sources, even without an available API endpoint (subject to limitations like CAPTCHA or anti-AI restrictions).

  • Automated Compliance Assessment: Offers automated compliance validation, though with a lower credibility score compared to human-based compliance assessments.

AI Event Mirror

The AI Event Mirror enhances asset authentication - its usage is optional by the asset owner or asset authenticator, however if used and incorporated as part of ongoing asset status replication workflow, it will increase authenticity scoring (co-building overall credibility scoring of the asset).

Key Features:

  • Real-Time Data: Receives live news and updates from multiple sources within a given region.

  • NLP Interpretation: Uses natural language processing (NLP) to interpret the data.

  • Event Detection: Identifies crucial physical events such as floods, fires, or destruction.

  • Integration: Seamlessly connects with Smart ASR for enhanced anomaly detection and validation

Note: Full replacement of asset authentication is not possible - physical existence of the asset must always be confirmed by the human).

Last updated