2PM.Network
WebsiteXDiscordLinkedinGithub
  • Overview
    • What is 2PM.Network
    • Architecture
    • FAQ
    • Official Social Channels
  • 2PM Data VSIES Service
    • What is Data VSIES and why is it important
    • [V] Data Validation (ZK)
    • [SI] Data Standardization and Index
    • [E] Data Encryption Client (FHE)
    • [S] Data Storage and Access
    • Data VSIES SDK
  • Node Framework
    • Modular Architecture
    • Federated Learning
      • Horizontal Federated Learning Task
      • Logistic Regression Task
      • On-chain Secure Aggregation
      • Typical Scenarios
    • FHE Machine Learning
      • Built-in Models
      • Deep Learning
      • Typical Scenarios
    • Task Submission
    • Running a 2PM Node
      • Installation
      • Chain Connector Configuration
      • Data Preparation
      • Joining a Subnet
  • Security and Verification
    • Node Staking and Slash Mechanism
    • Running Verification Client
      • EigenLayer
      • Mind Network
    • Restaking and Delegation
  • Model Inference
    • 2PM Node Inference API
    • Posting Request to a Subnet Model
    • Getting Inference Results on Chain
      • Oracle Adapters
  • Monetization and Incentives
    • AI Model IP Assets
    • Distribution Algorithm
  • 2PM DAO
    • Build Subnets
      • Establishing New Subnets
      • General Requirements
      • Data Schema Definition
      • Model Selection
      • Task Implementation
    • $DMP Token
  • Deployed Smart Contracts
    • Subnets on Testnets
    • Local Deployment Guideline
  • Ecosystem
    • Partners
    • Use Cases
      • Private Personalized Recommendation
Powered by GitBook
On this page
  • Trading Decision Model
  • Biometric Identification
  • Personalized Recommendation System
  • LLM Joint Training
  1. Node Framework
  2. FHE Machine Learning

Typical Scenarios

2PM.Network harnesses the capabilities of Fully Homomorphic Encryption (FHE) to facilitate secure and private computation across various sectors Here are some typical scenarios where 2PM.Network’s FHE solutions are effectively applied:

Trading Decision Model

This scenario involves training models for predicting cryptocurrency price movements, ensuring privacy in users' decision-making processes. By using FHE, 2PM.Network allows financial traders and analysts to utilize sensitive financial data without exposing it, maintaining confidentiality while harnessing powerful predictive analytics. This setup is crucial for environments where investment decisions need to be data-driven and highly secure.

Biometric Identification

In this application, 2PM.Network safeguards users' biometric data while identifying individuals, adhering to strict privacy standards. Utilizing FHE, the platform ensures that biometric data, whether fingerprints, facial recognition, or other identifiers, are processed in an encrypted form. This prevents any possibility of privacy breaches while allowing for secure and reliable user authentication processes.

Personalized Recommendation System

This system delivers tailored recommendations for projects, products, or currencies, protecting users' behavioral data privacy. Through FHE, 2PM.Network ensures that user preferences and behaviors are analyzed without ever exposing the raw data, allowing companies to offer personalized experiences and suggestions based on encrypted data insights. This scenario is particularly beneficial for e-commerce and digital marketing platforms seeking to enhance user engagement without compromising privacy.

LLM Joint Training

2PM.Network facilitates the collaborative training of a Large Language Model (LLM) using private data from multiple users, protecting their interaction privacy. This scenario supports sectors such as IP creations and collaborations.

PreviousDeep LearningNextTask Submission

Last updated 10 months ago