The CARV Protocol is Designed with A Primary Focus on the Following Key Stakeholders.

Data Owner:

  • Data Ownership: Each users owns his or her identity data, which is secured through Advanced Encryption Standard (AES) symmetric encryption. The user is the sole holder of the AES key, known as the "Vault Key."
  • Data Management: Users have the ability to manage their data by granting data permissions to CARV Protocol, including reviewing their data profile, adding and removing part or all of their data, etc.
  • Brand Discovery, Engagement and Benefits: Users benefit from brand discovery, join incentive campaigns and verify various accounts they own to meet specific requirements, and redeem benefits.
  • Incentive Tokens (Rewards): Users receive incentive tokens when they permit other entities to utilize their identity data. Rewards can be claimed any time after their data is utilized.

Data Provider:

  • Data Aggregation: Data providers collect and integrate data from various sources, such as on-chain activities, in-platform activities, community participation, etc.
  • Data Analysis: Data providers process and interpret data with protocol's algorithms and standards, generating insightful and verifiable credentials for users.
  • Data Exposure: Data providers expose data to the CARV protocol and ecosystem in a reliable way, allowing them to access and use data with user consent and authorization.

Data Consumer:

  • Advertising and Discoverability: By querying users' traits and qualifications, brands are able to reach targeted users with email, notifications, app recommendations, wallet messaging, and other means in a privacy-preserving manner.
  • Campaign Creation & User Engagement: Data consumer can initiate campaigns with specific verification rules, pay rewards and fees to the CARV Protocol on chain. Then data consumer will obtain user data permissions from CARV Protocol.
  • Rewards Distribution: Data consumer can distribute rewards, including token, NFT, and other forms through CARV Protocol smart contracts for auto distribution to verified users.

Decentralized Node Operator:

  • Data Verification: Node operators can provide data verification, responsible for executing the verification rules defined by CARV protocol, checking and confirming the data submitted by users, ensuring the authenticity and validity of data.
  • Data Storage & Incentivized Sharing: Nodes can provide data storage for verified data in a distributed database, providing reliable and tamper-proof data sources. When data is consumed, nodes can provide data in the form of API or SDK, realizing value capture.
  • Decentralization: CARV nodes are decentralized nodes, not subject to any centralized organization or individual’s control and interference, protecting the privacy and rights of users and partners.
  • Data integrity: Carv nodes operate advanced encryption technology and consensus mechanism to protect data from being tampered with or leaked, preventing any malicious attacks or frauds.
  • Efficiency: With optimized algorithms and network structures, nodes are to improve the speed and quality of data processing and transmission, reducing resource consumption and latency.

Network Token Staker:

  • Trusted Support: Individuals, developers, or ecosystems trust and support CARV Protocol.
  • Contribution: Contribute by hosting and maintaining CARV Link and TEE Nodes, providing confidential computation power to the protocol.
  • Governance: Governance mechanisms, ensure transparency and resistance to Sybil attacks.
  • Developers: Developers play a vital role by using the CARV SDK or submitting Pull Requests to enhance the open ecosystem.

CARV Tech & Operation Support:

  • Technology Support: The CARV founding team utilizes cutting-edge technology and operation to build and support the CARV Protocol, while maintaining decentralization, openness, and transparency.
  • Value Capture: The team ensures that the protocol captures value from contented, privacy-preserving data sharing.
  • Anti-Fraud Measures: CARV Protocol is designed to be user-centric, and anti-fraud mechanisms are in place to ensure that rewards are distributed to genuine human users and ecosystem contributors.
Together, we form a dynamic ecosystem around the CARV Protocol, where user data ownership, privacy, and value creation are paramount.