Cryplex AI Docs
  • Getting Started
    • What is Cryplex
  • Why is Cryplex
  • Cryplex Mission
  • Cryplex Vision
  • What is Cryplex Node
    • What is Cryplex Node
    • What is Cryplex Point
    • How it works
  • Cryplex’s Training Model
    • Models Training
    • Cryplex - Online Storage Node
  • Cryplex Feature
    • Cryplex Feature
  • System Architecture & Technology
    • Technical Highlights
    • Core Components
    • Data Lifecycle
  • Tokenomics
    • Token metrics
    • Token Distribution Model
    • Functions of CPX Tokens
  • Benefits and Pricing
    • Pricing
    • Extra Points Reward
    • Cryplex - Community
  • How Cryplex Work
    • Setup Cryplex Extension
    • How Cryplex Storage Node Works
  • Support
    • FAQ
    • Official Link
  • Mechanism of Cryplex
  • Backer
    • HuntX Labs
Powered by GitBook
On this page
  1. System Architecture & Technology

Data Lifecycle

1. Contribution: Empowering Global Participation

  • User Onboarding & Storage Allocation:

    • Installation: Users install the Cryplex browser extension, which is engineered for seamless onboarding across various devices (PCs, laptops, and even mobile devices).

    • Dynamic Storage Allocation: Unlike fixed limits, the Cryplex extension dynamically determines the optimal storage allocation based on your device’s available idle space, up to a maximum of 1TB.

    • Hardware & Network Verification: Before onboarding, the system conducts comprehensive checks to verify hardware compatibility and ensure that the network connection is stable and robust, guaranteeing that only reliable nodes join the network.

  • Community Engagement:

    • Incentives to Participate: Users are encouraged to contribute not only for rewards but also to support a global mission: powering the next generation of AI.

    • Referral Programs: By inviting friends and expanding the network, users can earn bonus points, reinforcing a strong community-driven approach.

2. Encryption and Fragmentation: Securing Every Byte

  • End-to-End Encryption:

    • AES-256 Encryption: All data is encrypted locally on the user’s device using AES-256 before it leaves the device, ensuring that no sensitive information is exposed during transit or storage.

    • Zero-Knowledge Proofs: Additional cryptographic protocols, such as Zero-Knowledge Proofs, allow for verification of data integrity and authenticity without disclosing the actual data—enhancing privacy.

  • Fragmentation Process:

    • Data Chunking: Once encrypted, data is divided into small, manageable fragments (e.g., 64 MB per fragment). This fragmentation enhances both security and resilience, as each piece is independently stored across the network.

    • Unique Identifiers: Each data fragment is tagged with a unique identifier that enables precise tracking, reassembly, and auditing within the decentralized storage network.

  • AI-Driven Distribution:

    • Optimized Node Selection: Cryplex leverages AI algorithms to determine the optimal distribution of these fragments, taking into account node reliability, geographic diversity, and network latency.

    • Load Balancing: This intelligent distribution ensures that no single node is overwhelmed and that data retrieval remains efficient and balanced across the network.

3. Storage and Maintenance: Ensuring Resilience and Availability

  • Decentralized Data Storage:

    • Global Network Integration: Encrypted data fragments are stored across a global network of Cryplex nodes, creating a resilient, decentralized repository for AI training data.

    • Redundancy & Replication: To ensure continuous availability, the system automatically replicates data fragments across multiple nodes. If one node goes offline or experiences performance issues, the network re-replicates the missing fragments to maintain redundancy.

  • Periodic Reporting & Integrity Checks:

    • Node Health Monitoring: Each node regularly sends status updates, including storage availability and data integrity checks, to the blockchain.

    • Automated Maintenance: If any data inconsistency or node failure is detected, the AI-driven system triggers immediate re-replication or corrective measures, ensuring minimal disruption and maximum data integrity.

4. Retrieval: Fast and Secure Data Access

  • Smart Contract Orchestration:

    • On-Demand Data Requests: Developers or authorized users can request specific datasets by spending CPX tokens. This request triggers smart contracts that manage the entire retrieval process.

    • Fragment Reassembly: The smart contracts coordinate the collection of data fragments from multiple nodes, reassembling them into a complete dataset.

    • Decryption & Delivery: Once reassembled, the data is decrypted on-the-fly and delivered securely to the requester.

  • Caching & Optimization:

    • Popular Data Caching: Frequently accessed datasets are cached at strategic nodes, significantly reducing retrieval time and improving overall network performance.

    • Load Distribution: AI algorithms also optimize the retrieval process by dynamically balancing load across available nodes, ensuring high-speed data access even during peak demand.

5. Reward Distribution: Transparent and Performance-Based Incentives

  • Point-Based Reward System:

    • Earning Cryplex Points: Users earn 0.8 Cryplex Points per minute for every 1GB of storage contributed. These points serve as a key metric for reward calculation.

    • Dynamic Performance Bonuses: Additional points are awarded based on node performance—factors include uptime, the volume of data processed, and efficiency in handling requests.

  • Token Airdrops and Profit Sharing:

    • CPX Token Rewards: Cryplex Points directly influence the amount of CPX tokens distributed during regular airdrops. Higher point totals yield a larger share of the token rewards.

    • Revenue Sharing: Beyond token airdrops, active node operators may also participate in profit-sharing programs, receiving bonus incentives and daily revenue distributions from the Cryplex ecosystem, often paid in stable coins like $SOL.

  • Community and Referral Incentives:

    • Referral Bonuses: Users can multiply their rewards by inviting friends to join Cryplex, earning extra points for each successful referral.

    • Tiered Rewards: Incentives are structured to reward higher node ownership and sustained performance, encouraging long-term engagement and network growth.


Conclusion

Cryplex's data lifecycle is a comprehensive, secure, and highly optimized process that transforms idle storage into a critical asset for AI training. By ensuring robust encryption, intelligent data fragmentation and distribution, continuous maintenance, and rapid, secure retrieval—all while rewarding community participation—Cryplex stands at the forefront of decentralized storage innovation. This detailed orchestration not only maximizes resource utilization and reduces operational costs but also empowers a global network of users and developers to drive the future of AI with confidence and trust

PreviousCore ComponentsNextToken metrics

Last updated 2 months ago