CWPM
Concealed Work Proof Mode (CWPM) in Pinede
Data Encryption and Secure Signing
Workload data is encrypted at the device level to protect sensitive information, followed by signing with the device’s private key.
This encryption ensures data privacy, with Zero-Knowledge Proof technology available for verification without revealing the raw data.
Oracle’s Verification and Secure Transmission
The oracle first confirms the encrypted data’s signature, then securely transmits it to rule engines and connectors.
The Security Standard Score (SSS) and Connectivity Index (CI) are assessed during transmission to ensure data security and integrity.
Confidential Computing and ZK Proofs
In a confidential computing environment, the encrypted data is decrypted, and physical work statements are generated.
Zero-Knowledge Proof technology generates proofs for verifying work statements without disclosing specific data details.
Adaptive Reward Mechanisms in Smart Contracts
Smart contracts receive the verified work statements and ZK proofs, adjusting the reward mechanism based on the Scalability Score (SS) and Intelligence Level (IL).
The reward system also considers the Environmental Impact Factor (EIF) to promote environmentally friendly and efficient operations of devices.
Last updated