Architecture Overview

The Raiinmaker Network architecture defines the creation and interaction of four blockchain layers to provide consensus and a spectrum of trust for verification of any data;

  • User Action Layer(s) (UAL)

  • Enterprise Application Layer(s) (EAL)

  • Network Validation Layer(s) (NVL)

The combined layers will be used to promote continued improvement in user reputation via increased identity and behavior information on a trustless network. The architecture allows independent creation of multiple Al/ML behavior applications by network participants.

User Action Layer

The User Action Layer (UAL) uses a unique and novel blockchain architecture to allow normal users (including non-technical users) of any system to directly interact with a blockchain to verify all events on the network without any extra effort or understanding on their part. The User Action Layers formulates next-generation identity protocols with advanced security features that allow for a traditional work flow of routine web or application usage.

The web or mobile application automatically generates and registers a cryptographic key pair for the user, with which every action is signed. This signature improves the application security with direct and powerful authentication and authorization, as well as allowing every user to act as a blockchain node via normal application actions (e.g. login, click, share, view, comments, or any other application action). When a user performs any tracked action, the signed message includes the latest global UAL block hash, as well as the latest NVL block hash (see below), enhancing decentralization of data verification for all actions on the entire network. This model makes possible the measurement of identity based verification data and enhanced incentivization to improve the verification of application users. A UAL node is defined as a registered and verified human with a personal device such as CPU or iOS/Android device. Information about a human user‘s identity can be improved for use in applications, with powerful privacy controls.

Enterprise Action Layer

Enterprises, Applications, Networks, or Systems can operate within Enterprise Application Layer (EAL) nodes to host private enterprise chains allowing them full access to Web3 tools such as tokens, NFT‘s, smart contracts, and a full suite of enterprise integrations.

Businesses can also launch private blockchains within the EAL. These blockchains are advanced, scalable, and interoperable blockchains, capable of large transaction volume. This provides “Real-time Enterprise Governance“ with rules defined by the business for validation of all transactions regardless of the local business data.

EAL deployments protect proprietary business processes by deploying smart contracts within Docker containers, allowing developers to code in any software language. All transactions are assembled into blocks with a configurable time window (the default creates a block every 5 seconds ifthere are new transactions). Blocks are periodically sent to the Network Validation Layer (NVL) (see details below) for final verification and proof, and will be signed by every user action on the UAL.

With the Raiinmaker Network, verification of transactions is based on the decentralization of proof by checkpointing into other (public) blockchains. Utilizing a hybrid Blockchain architecture and developer friendly coding languages including Java, Python, C+, and Go, the Colin Network Protocol creates a frictionless integration between Web2 systems and Web3 infrastructure.

Network Verification Layer

The Network Validation Layer (NVL) is used to finalize all validation on the Raiinmaker Network. Participants establish identity and economic information to compete for mining incentives.

Proxy Validator (Non-custodial delegated Proof of Stake)

The NVL Proxy Validator will allow any user to participate in the finalization of all transactions and User Actions on the Raiinmaker Network. The NVL Proxy Validaotr will accept block signatures from any number of UAL and EAL blockchains. Every 30 minutes, the NVL Proxy Validator will create and sign a new block containing all block signatures received and make the blockhash available to all UAL, EAL, and NVL Independent Validators for future signing. This hash is what all users on the network sign with every action taken inside a business application.

Independent Validator

Multiple Public Validator Chains will be deployed and hosted by independent parties to further decentralize all network proofs.

Every NVL Independent Validator will cryptographically sign verification records from the NVL Proxy Validator. This function allows the user to act as an independent witness to all events and verifications on the Raiinmaker Network and for mining rewards.

Public Verification

A Public Verification integration will provide bridges to one or more public or external blockchains (e.g. Bitcoin, Ethereum, etc.) allowing clients to capture measurable proof of data quality and event timing. The Raiinmaker Network is thus able to provide a spectrum of trust for businesses and all participants, where risk is accepted based upon a combination of real world contracts, reputation of nodes, and trustless system assertions. The system will provide a human readable report as well as API access to this capability. The Public Verification is a scalable model that aggregates one or more blocks from the NVL and places the resulting hash into a transaction on each respective public blockchain. The existence of this hash can be used to prove that the artifact was in existence and at a certain state using independently verifiable public blockchain data. Further, network data may be used to generate a US Dollar based security measure of the proof of any transaction or set of transactions from any application on the system.

MyFii

MyFii a Decentralized Identity solution built on blockchain technology. Focused on privacy and control of users’ data. MyFii is a decentralized identity service for applications and services. It deploys a decentralized authentication model, which allows users to own their data and control who has access to it. Using assertions from third party identity providers to corroborate a person’s claim of a real-world identity.

MyFii offers individuals unprecedented control and visibility of access to their personal data by third party data processors. MyFii helps build identity assurance by combining user authentication with a set of attributes as identity factors. This allows MyFii to provide verification for business transactions, for example, certain transactions above a certain amount can only be conducted by a customer that has been verified through a Know Your Customer (KYC) service. MyFii maintains a provably accurate and tamper-proof on-chain audit log to demonstrate compliance and accountability with regulations, enable users to manage preferences, and maintain detailed records of users’ consent.

MyFii enables users to manage preferences with increased control and ownership over their data. All transaction payloads (e.g. personal information, biometrics, health information, etc.) are stripped and protected inside a trusted storage environment, never to be exposed to the blockchain consensus process. The user controls where their personal data is stored (e.g. cloud, decentralized storage systems, personal device, mobile, another privacy blockchain).

MyFii is built with the principles of privacy by design, as well as a GDPR-capable blockchain solution that doesn’t expose personal identifiable information. This guarantees personal data stored inside will be protected, with respect to user consent. MyFii lets users understand what happens with their personal data to give them granular control over its management and use. MyFii allows users to monetize identity services, authenticate or provide an identity service, all while protecting personal information from tracking. MyFii enables organizations to map human real world processes related to regulatory compliance to demonstrate due care with privacy policies. MyFii is able to provide proof of compliance for all technical requirements (e.g. the right to be forgotten, subject access requests, data retention).

Voting, DAO, Community Governance

A decentralized autonomous organization (DAO) is an entity run by a set of rules embedded into code and automated through the use of smart contracts. DAOs are typically built in open-source environments and are fully autonomous and transparent. With no central leadership or control, the decisions are made by a community. The community will typically own a specific token that will be used to vote on proposals and influence how the organization operates. There are no employees or executives in a DAO but they do have built-in blockchain-based treasuries, governed by the community, that can be audited.