OpenLayer
  • Introduction
    • About OpenLayer
    • Our Mission
    • Our Approach
      • Foundations
        • OpenNodes
        • Restaking
        • Validation services
          • What is OVC
          • How is it done
          • Why is it better
        • Infrastructure
      • Modular Design
        • Modular data source
        • Modular source of security
        • Modular validation
        • Modular data transformation
        • Modular interoperability
      • Lifecycle of a Request
  • Data Validation Light Paper
  • OpenLayer AVS
    • Why Data Layer
    • How OpenLayer Works
    • Crypto Security
      • Websession proofs
      • Parser execution
    • End User Participation
    • On Demand Security
    • Multi Token Staking
    • Zero Bridging Solutions
  • For Node Operators
  • For Developers
    • Public Data Streams
    • VRF (Verifiable Randomness)
    • User Personal Data Proving
  • Privacy Policy
Powered by GitBook
On this page
  1. Introduction
  2. Our Approach
  3. Modular Design

Modular data transformation

Authentic data comes from different sources, and is validated via different methods. Next to serve them to consumers, we also provide modular transformation methods so it easily connects with all kinds of applications.

One example is to transform the data in an on-chain oracle like format so it can be easily consumed by smart contracts. Another common transformation is from unstructured raw data to structured data, preprocessed for AI trainings etc. For data from user’s private accounts, certain information needs to be desensitized, and OpenLayer also supports components to be enabled for enhanced security during data sharing.

PreviousModular validationNextModular interoperability

Last updated 8 months ago