Ecosystem Participant Map
(Section: Ecosystem and Network)
1) Why do I need a membership card
The participant map is a general who's who model in the ecosystem: roles, relationships, rights, boundaries of responsibility, and compliance contours. It eliminates the confusion of terms, accelerates partner onboarding, simplifies incident tracing and increases network manageability (governance, risk, security, development).
2) Role taxonomy (top level)
1. Operators - brands/platforms that own customer experience.
2. Content Providers (Studios/Content Providers) - slots, live games, sports feeds, mini-games.
3. Payment providers (PSP/On-Off Ramp) - cards, APM, stables, crypto wallets.
4. Identification and risk (KYC/KYB/AML/Trust) - verification, scoring, sanction filters.
5. Infrastructure/Network (Nodes/Relays/Edge/CDN/Bridges) - transport, routing, cross-chain connections.
6. Affiliates/Aggregators/Traffic - sources of leads, showcases, media networks.
7. Analytics and data (DWH/BI/Anti-Fraud) - observability, reporting, modeling.
8. Community and DevRel - developers, integrators, partner teams.
9. Regulators and auditors (B2G) - licenses, inspections, reports.
10. Governance and Treasury - rules, budgets, grants.
11. Partner brokers/Market places - exchange of traffic, liquidity, integrations.
3) Sub-roles and objects (detail)
Operators: B2C brand, White-Label, regional sub-operator, PSP router.
Studios/providers: RGS, live studio, tournament runner, sports feed supplier.
PSP: card acquiring, local APM (Papara, Mefete, etc.), crypto processing, risk rule vendor.
KYC/KYB/AML: KYC provider, source of sanctions lists, PEP/Adverse Media provider, behavioral scoring.
Infrastructure: validator/node, super node/relay, bridge (light/optimistic/ZK), CDN/edge cache.
Traffic/media: showcase, arbitrator, influencer network, retargeting DSP, CRM push partner.
Data: blockchain indexer, CDC connector, anti-fraud DSS, BI.
Community: SDK contributor, integrator, local representative/ambassador.
B2G: regulator, tax reporting, audit (external/internal).
Governance/Treasury: Board of Protocol, Delegates, Grant Committee.
Brokers: integration aggregator (API-market), traffic/liquidity exchange.
4) Models of trust and identity
Legal identity: KYB (reg. number, country, beneficiaries), licenses/permits.
Technical identity: 'org _ id', 'peer _ id' (ed25519/secp256k1), X.509 (mTLS), addresses/wallets.
Trust Tiers: T0 (public), T1 (with basic certification), T2 (advanced verification + deposits), T3 (critical roles/bridges).
Key policy: organization root keys + session keys; rotation/revocation, log of trusted keys.
5) Interaction Matrix (B2B/B2C/B2G)
Operator ↔ Provider: content, limits, tournaments, billing, SLA.
Operator ↔ PSP/KYC: deposits, payments, verification, chargebacks.
Operator ↔ Affiliates: leads, attribution, payouts, QoT.
Provider ↔ Network/Infra: distribution, delays, finalization.
Governance ↔ All: rules, voting, grants.
Regulator/Audit ↔ Operator/PSP: reports, checks, incidents.
Data/BI ↔ Everything: event diagrams, showcases, privacy.
Relationship types: data (events), calls (RPC/API), value (payments/assets), trust (keys/signatures), management (proposal/solutions).
6) Member Lifecycle
1. Onboarding: registration, KYB, license verification, document upload, 'org _ id' generation, key issuance.
2. Technical integration: sandbox → stage → canary → production, test cases, signature of first events.
3. Activation: SLO targets, quotas/limits, inclusion in pools (traffic/liquidity).
4. Growth: Regional/method expansion, grants/marketing, SDK updates.
5. Compliance: periodic reviews, key audits, rotation, DR tests.
6. Evolution/termination: contract migration, withdrawal, archive, key revocation.
7) Register of participants and access (reference model)
Entities:- 'org '(organization),' role _ binding '(role and scope),' credential '(key/certificate),' capability '(permission set),' limit '(quotas),' compliance _ record '(CCM/BCW/audit),' contact '(operational).
Example schema (pseudo-SQL)
sql
CREATE TABLE orgs (
org_id TEXT PRIMARY KEY,
legal_name TEXT, country TEXT, regulator TEXT,
trust_tier SMALLINT, status TEXT, created_at TIMESTAMPTZ
);
CREATE TABLE role_bindings (
org_id TEXT REFERENCES orgs(org_id),
role TEXT, -- operator provider psp kyc relay bridge affiliate...
scope JSONB, -- regions/networks/products
PRIMARY KEY (org_id, role)
);
CREATE TABLE credentials (
org_id TEXT REFERENCES orgs(org_id),
peer_id TEXT, type TEXT, public_key TEXT, valid_to TIMESTAMPTZ,
revoked BOOLEAN DEFAULT FALSE,
PRIMARY KEY (org_id, peer_id)
);
CREATE TABLE capabilities (
org_id TEXT REFERENCES orgs(org_id),
capability TEXT, -- payouts. write, events. publish, traffic. receive, bridge. sign,...
conditions JSONB, -- limits/hours/countries/assets
PRIMARY KEY (org_id, capability)
);
CREATE TABLE compliance_records (
org_id TEXT REFERENCES orgs(org_id),
kyb_status TEXT, licenses JSONB, sanctions_check TEXT,
last_audit TIMESTAMPTZ, next_review TIMESTAMPTZ
);
Sample Policy (YAML)
yaml access:
tiers:
T1: { max_regions: 2, payouts_daily_usd: 100000, assets: [USDC, EUR] }
T2: { max_regions: 6, payouts_daily_usd: 1000000, assets: [USDC, EUR, TRY] }
T3: { max_regions: 32, unlimited: true, bridge_sign: true }
roles:
operator:
caps: [events. publish, payouts. write, users. read]
provider:
caps: [content. serve, limits. read, events. publish]
psp:
caps: [payments. process, payouts. execute]
8) Connection graph and observability contour
Member graph: vertices - 'org _ id', edges - 'relation (type, scope, slas, limits)'.
Edge categories: 'content', 'payments', 'bridge', 'traffic', 'data', 'governance'.
Observability: tracing of P2P-hops, log of trust (signatures), SLI/SLO for each type of edge.
Example of an edge model (pseudo-SQL)
sql
CREATE TABLE edges (
src_org TEXT, dst_org TEXT, edge_type TEXT, -- payments content traffic bridge data gov slas JSONB, limits JSONB, status TEXT, since TIMESTAMPTZ,
PRIMARY KEY (src_org, dst_org, edge_type)
);
9) Process and data mapping
Event model: 'signup/kyc/pass', 'deposit/payout', 'game _ start/event', 'bridge. lock/mint`, `traffic. view/click '- a single scheme and idempotency keys.
Catalogs: networks/assets/payment methods/SDK versions/regulators/countries.
Logging and auditing: immutable logs (hash chains), binding to 'proposal _ id' (governance) and 'org _ id'.
10) Health metrics "maps" (KPI/SLO)
Coverage and completeness
Coverage% by role (proportion of ecosystem functions closed by participants).
Region Coverage% (countries × methods × providers).
Version Coverage% (SDK/Protocol).
Quality and risk
Compliance Freshness.
Key Hygiene (rotation on time, share of rotten keys).
Incident Rate by role/edge; MTTA/MTTR.
Economy and growth
New Partners/month, Activation Velocity (onboarding to first events), Net Contribution (contributor's contribution to GTV/MAU/liquidity).
Partner Churn%.
SLO examples
KYB review ≤ 5 working days; keys T3 rotation ≤ 90 days; Incident SEV-1 MTTR ≤ 30 min; Post-mortem ≤ 72 ч.
11) Dashboards (layouts)
Atlas (general map): interactive graph: roles, connections, statuses (zel/yellow/red), filters by country/edge.
Compliance: audit deadlines, overdue QAS/audits, sanctions hits.
Connectivity: p95 latency and success by edge, proportion of direct P2P, relay-percent.
Economy: Contributor (GTV/MAU/Take Rate), top up/down.
Risk: incidents by class, burn-rate SLO, exposures by counterparties.
Governance: proposal activity, vote distribution, grants.
12) Member onboarding: checklist
1. Legal questionnaire + documents (KYB, licenses, beneficiaries).
2. Technical registration 'org _ id', key release/download, mTLS setting.
3. Selection of roles and scopes, assignment of'capabilities' and limits.
4. Connection to sandbox, test suites (events, payouts, limits, bridge).
5. Setting up SLO/alerts and contact ruler (24/7 for critical roles).
6. Approval of SLAs/regulations, publication in the register.
7. Canary period (1-2 weeks), then expansion of quotas.
13) Change management and interoperability
API/Event/Schema Versioning: Add-Only Policy, Deprecate Window ≥ 90 days.
Capability negotiation: declaring supported capabilities when handshake.
Role/scoop migrations: applications through governance, timelock, audit.
14) Security and privacy
Minimum necessary rights (PoLP) by roles and edges.
E2E encryption for sensitive topics (payments/CCM).
DLP/PII control: tokenization, pseudonymization, regional showcases.
Anti-Sybil for critical roles: deposits/insurance, proof-of-authority.
Key rotation/recall: "double keys," shift log, partner notifications.
15) Playbook incidents (by "edge" and "role")
Member Key Compromise (T2/T3):- Immediate recall, publication of'revoke-event', block by ACL, rotation of dependent keys, report ≤ 24 hours.
- Route switching, increasing K-confirmations, throttle volumes, communications, SLO compensation.
- Freezing links/scopes, manual review, compliance report, updating lists.
- Clash of logs (signatures/receipts), arbitration, temporary greylist, adjustment of payments.
16) Examples of "map" analytics (pseudo-SQL)
Coverage by role and country
sql
SELECT role, country, COUNT(DISTINCT org_id) AS orgs
FROM role_bindings rb
JOIN orgs o USING (org_id)
GROUP BY role, country;
Compliance (delay) period
sql
SELECT org_id, last_audit, next_review,
CASE WHEN next_review < now() THEN 'overdue' ELSE 'ok' END AS status
FROM compliance_records
ORDER BY next_review ASC;
Rib health (success/latency)
sql
SELECT edge_type,
PERCENTILE_CONT(0. 95) WITHIN GROUP (ORDER BY latency_ms) AS p95_latency,
100. 0 SUM(CASE WHEN status='success' THEN 1 ELSE 0 END)/COUNT() AS success_rate
FROM edge_metrics
WHERE ts >= now() - INTERVAL '7 days'
GROUP BY edge_type;
17) Registers and catalogs (reference-YAML)
yaml catalogs:
networks: [eth-mainnet, polygon, solana, tron]
assets:
- { symbol: USDC, decimals: 6, chains: [eth-mainnet, polygon] }
- { symbol: TRYX, decimals: 2, chains: [tron] }
regulators:
- { code: UKGC, country: GB }
- { code: MGA, country: MT }
sdk_versions:
required: { min: "2. 4. x", lts: "2. 6. x" }
18) Operating Regulations
Daily: edge monitoring (SLO), key recall check, onboarding status reports.
Weekly: card committee - new roles/scopes, compliance delays, grant/MVP recommendations integrations.
Monthly: asset/network catalog audit, SDK revision, incident report, and time-to-fix.
Quarterly: Trust Tiers review, DR stress test and emergency procedures.
19) Card implementation checklist
1. Agree on the taxonomy of roles/sub-roles and data schemas.
2. Deploy member registry, directories, ACLs, and capability policies.
3. Include edge observability (SLI/SLO) and burn-rate alerts.
4. Set up an onboarding pipeline (KYB, keys, sandbox→prod).
5. Link the map to governance (proposals, timelock, solution log).
6. Regularly revamp coverage, risks and compliance delays.
7. Publish an "ecosystem atlas" for internal/partner users.
20) Glossary
org_id is the unique technical identity of the organization.
Trust Tier - member trust/certification level.
Edge/Edge - formalized communication between participants with SLO and limits.
Capability - allowed operation/rights in a specific loop.
Coverage% - the share of closed functions/regions/versions.
Burn-rate SLO - the rate of "burning" the error budget.
Bottom line: the participant map is the ecosystem's "organizational topology." Its implementation provides a single language of roles and connections, transparent boundaries of responsibility, predictable SLOs, fast onboarding and manageable risks. With this foundation, the network is easier to scale, monitor and develop - without surprises and with maximum benefit for all parties.