Technical Architecture
Core Architecture Overview
The technical foundation of the AIWave is a modular, scalable, and secure architecture, integrating blockchain, AI, and 3D rendering technologies. This design ensures decentralized data management, advanced AI functionality, and seamless 3D avatar interaction.
Key Components
1. Backend Server and Large AI Model Interaction
Backend Server:
Responsible for managing interactions with LLM, performing computations, and facilitating the exchange of information between the AI and the frontend app.
It also handles requests for data access, forwarding these requests to the privacy chain after user wallet authorization.
LLM:
The backend interacts with LLM for tasks like emotional analysis, text to speech, speech to text and personalized user engagement. These models run in the backend but rely on user data for contextual and personalized responses.
2. Data Storage on Privacy Chain (e.g., Midnight)
Privacy-Preserving Blockchain:
All user data is stored securely on a privacy chain like Midnight, ensuring that only the user has control over access and permissions.
Data such as interaction logs, preferences, and past AI engagements are stored in an encrypted, tamper-proof manner.
Zero-Knowledge Proofs (zk-proofs):
When the AI needs to access user data, it requests permission through zk-proofs, enabling the backend to retrieve data from the privacy chain without revealing sensitive information to the AI model or any third-party systems.
This ensures full privacy while allowing the AI to perform personalized tasks and provide tailored responses.
C. Frontend App and Wallet Integration
User Wallets:
The frontend app connects with users' wallets for secure identity verification and data access authorization.
Users have full control over the data they share and can approve or revoke access at any time.
Wallet Authorization:
When the AI model requires access to a user’s data, the user is prompted to authorize the request via their wallet, ensuring that no data is accessed without their explicit consent.
After authorization, zk-proofs are used to grant access to the relevant data on the privacy chain.
Last updated