LayerDrone
  • LayerDrone Whitepaper
  • Executive Summary
  • Introduction to the LayerDrone Network
  • Earth Imagery Yesterday and Today
    • Demand for Earth Imagery Today
    • Earth Imagery Tomorrow
    • Challenges with Current Earth Imagery Solutions
    • Enter the LayerDrone Network
      • A Tokenized Network on a Blockchain
  • The LayerDrone Protocol
    • Role of Blockchain
    • Key Network Actors
    • How the Network Funds Missions
    • Prioritized Capture
    • Rewards
    • Technical Overview (Architecture)
      • Activity and Proof of Capture
      • Storage and Entitlement Design
      • Governance Modules
      • Micro-Drone Standardization (Sub-250g Drones)
      • Example Applications from Core Contributors
  • LayerDrone’s Token (Lite)
    • Utility and Overall Purpose
    • Token Supply
  • Conclusion
Powered by GitBook
On this page
  1. The LayerDrone Protocol
  2. Technical Overview (Architecture)

Activity and Proof of Capture

A set of rules will govern which missions are created and the specifications of that mission, the rewards associated with it, and instructions for the proof of capture uploading process. Pilots will interact with the activity protocol when performing missions, receiving rewards, and using tokens for potential features like mission reservation. This protocol will mint non-fungible tokens (NFTs) indicating submission, verification, and approval. Various applications, including third-party apps, can facilitate this interaction.

Blockchain technology underpins LayerDrone’s data verification system, ensuring that all captured imagery is authentic, traceable, and timestamped. Each image undergoes a proof of capture process, the results of which are verified against image metadata, time, and GPS location, which are stored immutably on the blockchain. This ensures data integrity and builds trust among buyers, who can be confident in the accuracy and reliability of the imagery they purchase from the LayerDrone Network.

When a pilot submits data, an on-chain receipt records a hash of metadata directly from the drone, including a timestamp of capture, a GPS location, and a file size that is taken directly from the capture app(s) that was directing the drone. These metadata are used to verify the actual image files submitted, to ensure pilots are not uploading invalid imagery.

PreviousTechnical Overview (Architecture)NextStorage and Entitlement Design

Last updated 1 month ago