Whitepaper
  • 1.0 Introduction
    • 1.1 Migration from XEND to RWA
    • 1.2 New Vision - Xend V2 and Xend V3
      • 1.2.1 Principles overview
      • 1.2.2 Xend V2 & V3 - Roadmaps
      • 1.2.3 Xend V2 Roadmap
      • 1.2.4 Xend V3 Roadmap
  • 2.0 OAE - Onchain Assets Environment
    • 2.1 OAE Core Idea
    • 2.2 OAE Framework
    • 2.3 OAE - Products Overview
      • 2.3.1 Asset Chain
      • 2.3.2 Origin Studio
      • 2.3.3 Social Hub
      • 2.3.4 Xend Connect
      • 2.3.5 GOR
      • 2.3.6 Xend Solutions
    • 2.4 Asset Smart Contract
    • 2.5 IAC Framework
      • 2.5.1 Importance Of IAC to OAE
      • 2.5.2 (b) IAC in Practice
    • 2.6 Asset Credibility
      • 2.6.1 Authentication Rating
      • 2.6.2 Compliance Rating
      • 2.6.3 Asset Insurance Rating
      • 2.6.4 Events Mirroring
      • 2.6.5 Visual Summary
    • 2.7 IAC Partners
      • 2.7.1 IAC Provider
      • 2.7.2 Conflict Resolution Process
      • 2.7.3 I - AC Interdependence
    • 2.8 Assets Policy in OAE
      • 2.8.1 Web3 Token Issues
      • 2.8.2 AssetChain 10 Cardinal Rules
      • 2.8.3 Assets As Smart Contracts, Tokens As Rights
      • 2.8.4 Verifiable Legal Binding
      • 2.8.5 Intrinsic Legalization
      • 2.8.6 Multi-Level Asset & Token Structures
      • 2.8.7 Token Bonding
      • 2.8.8 Separating Ownership, Possession And Holding
      • 2.8.9 Structured Asset Administration Policy
    • 2.9 AssetChain - 4 Execution Levels
    • 2.10 P2P Lending In OAE
      • 2.10.1 Basics of P2P lending
      • 2.10.2 Appraisers And Custodians
      • 2.10.3 Xend Fundraising Platform On OAE
    • 2.11 AI Stack
      • 2.11.1 Watchdogs
      • 2.11.2 Assistants
      • 2.11.3 Improvers
      • 2.11.4 Concepts
  • 3.0 Xend Browser
    • 3.1 One-4-All
    • 3.2 NodeOs
    • 3.3 Subnet
    • 3.4 Explorer
    • 3.5 Node Enterprise
    • 3.6 e-Admin
    • 3.7 NodeBox
  • 4.0 Progressive Synchronization (V3)
    • 4.1 Objectives Of The IAC Councils
    • 4.2 Progressive Adoption Of Public AssetChains
    • 4.3 Progressive Adoption Of Public Subnets
    • 4.4 OAE Marketplace
  • Practical Use Cases
    • Business & Banking
    • Real Estates
    • Compliance - by - Design
    • Tokenization Beyond Ownership
    • Global Assets Accessibility
    • Green Impact
    • Software, Gaming and Entertainment
    • Global Transparency and E-Administration
  • RWA (OAE) Token Economy 1.0
    • RWA Token
    • RWA Economy Ecosystem Participants
    • RWA Staking
    • RWA Incentives
    • RWA LP Tokens, Market Makers, & Trading Competitions
    • Gamification Of OAE User Experience
    • RWA Token Utilities
    • OAE & RWA Macro-Economy
    • Future Legal Status Of RWA Tokens
  • Litepaper
    • Solving ASR Issue
    • OAE From User Standpoint
    • Xend Solutions
    • Future Roadmap
  • Appendices
    • Appendix A: Understanding RWA
      • Assets Classification
      • Narrow Understanding Of RWA
      • Wide Understanding Of RWA
      • UWA - Unreal World Asset
      • RWA versus UWA - They Key Difference Lies In Legal Context
      • Examples Of RWAs Definitions Incoherence
      • Key Takeaways
    • Appendix B: Digitization vs Tokenization
      • Existence vs Ownership
      • Hierarchy Of Terms
      • Digitation Of Asset
      • Documenting The Asset
      • Tokenization Of The Asset On Gen2 Blockchain
      • Legal Causality Of Gen2 Tokenized Asset
      • Key Takeaways
    • Appendix C: Rise Of AssetChains
      • Theses A
      • Theses B
      • Theses C
      • Theses D
      • Theses E
      • Theses F
    • Appendix D: Brief Analysis On Who Owns The Internet
    • Appendix E: Market Research
      • RWA Solutions - Scope Of Work Overview
        • Centralized
        • Decentralized
        • In-depth Scope Comparison
      • Statistics
        • CEFI - Territorial Coverage
        • CEFI - Funding Ranges Popularity
        • CEFI - Funding Values Breakdown
        • Visual Data Metrics
      • Research Summary
  • FAQs
Powered by GitBook
On this page
  1. 2.0 OAE - Onchain Assets Environment
  2. 2.6 Asset Credibility

2.6.1 Authentication Rating

Authentication Checkpoint & Rating

Authenticators report their findings through "authentication checkpoints" available on the asset's GOR profile. These reports include:

  • Downloadable Reports: Comprehensive documents detailing the authentication process.

  • Overall Authenticity Rate: A score between 0 and 100 assessing the asset's authenticity.

  • Rating Justification: Explanations for any changes in the asset's rating, especially if the checkpoint has been conducted more than once.

  • Asset Location: The current physical location of the asset, if relevant.

  • Existence Evidence: Supporting material such as photos, videos, or LIDAR scans confirming the asset's existence, copies of authenticated obfuscated asset documentation etc.

Minus points: In case of any restrictions, authenticators allocate ‘minus points' per each restriction, ranging from 1 to 100. The total amount of minus points that can be granted is 100, if all are spent, it means the asset has received negative authentication (i.e. it has been deemed as not authentic).

The asset's final authenticity score is calculated based on the following methodology:

  1. Each authenticity rating provided by any authenticator that has ever provided such rating for a given asset is:

    1. Multiplied by authenticator’s reputation score

    2. Multiplied by logarithmic function applying sequential [n]% decrease of that rate for each day that have elapsed since that rating has been given

  2. Authenticity ratings subjected to the above adjustment step, are then averaged to the final asset authenticity rate.

The mathematical formulas for above process are as follows:

For each authenticity rating provided by an authenticator, we calculate a weighted score (Aws) as follows:

Aws=Ar × (1−n)t

Where:

Aws = Weighted authenticity rating from the single authenticator

A = Rating (from 1 to 10)

r = Authenticator's reputation

n = time-elapse based logarithmic daily decrease rate (e.g. 0.25%)

t = amount of days that have elapsed from rating submission

Then, to find the overall Asset Authenticity Rating (AAR), we average all the weighted ratings:

AAR = ∑(Aws) / Total number of ratings

Above method provides:

  1. Gradually decreasing reliability of ratings that have been made in the past, without sudden rating drop

  2. Providing higher strength of ratings from Authenticators with higher reputation, therefore promoting engagement of reliable Service Providers.

The Xend team retains the flexibility to dynamically adjust the [n]% decrease rate applied to the authenticity ratings over time. This adjustment capability allows for higher rates to be set for categories of assets deemed 'high risk,' where frequent and up-to-date authenticity checkpoints are crucial.

Previous2.6 Asset CredibilityNext2.6.2 Compliance Rating

Last updated 1 year ago