3. DARP & HighKey Platform Architecture
Last updated
Last updated
The DARP protocol consists of several key components working together to create a seamless Web3-AI integration experience. And the architecture diagram illustrates the comprehensive structure of DARP and the HighKey platform, showing how different layers interact to create a unified Web3 intelligence ecosystem.
The platform offers two primary access methods:
DARP Client (IDEs, Tools): For developers and technical users
HighKey Web Platform: User-friendly web interface for general users
Essential platform services:
Auth Service: Handles authentication and authorization
Resource Market: Manages platform resources and marketplace functions
Open Source Model Service: Provides AI model capabilities for agents and analysis
Task orchestration and automation:
Official Scheduler: HighKey's built-in scheduling system
Custom Schedulers: User-created scheduling solutions
Intelligent agent ecosystem:
Agent Hub: Central management for all agents
Custom Agents: User-created specialized agents
Data access and processing:
Official DARP Servers: HighKey-maintained servers
Third-party DARP Servers: Community-contributed servers
Available data sources:
Chain Data:
Solana Network
EVM Chains
Other blockchain networks
Off-Chain Data:
Databases
Third-Party APIs
User Access Flow:
Users interact through either DARP Client or Web Platform
All requests go through Core Services for authentication
Agent Operations:
Agents can be deployed through Agent Hub
Custom Agents interact with both Official and Third-party DARP Servers
Scheduling System:
Both Official and Custom Schedulers coordinate agent activities
Schedulers interact directly with Agent Layer
Data Access Pattern:
DARP Servers access External Resources
Data flows through standardized protocols
Model Integration:
Open Source Model Service supports agent operations
Models can be integrated into custom solutions
Decentralization:
Support for third-party servers
Custom agent creation
Community-driven expansion
Flexibility:
Multiple access methods
Customizable components
Extensible architecture
Security:
Centralized authentication
Controlled resource access
Secure data handling
Scalability:
Modular design
Distributed processing
Extensible components