Overview: ICO & Bounty IAME
IAME is a specially designed system for servicing a fragmented identification process based on the IAM cryptographic token. The functionality of the IAME Identity Network will mainly serve as a P2P blocking transaction, but its application can be expanded for trade transactions and financial institutions when providing associated services.
Problems
To date, identification systems are not very secure and can provide personal information to third parties. With current systems, people have to share their personal information and supporting documents with counterparties in order to identify themselves and their sources of income. Counterparties store data on themselves, the more a person shares personal data with him, the easier it will be to identify him and his sources of income. If a person has to make transactions with n-number of counterparties, he is displayed in a topological star network with n nodes, each of which is a vulnerable location for the person who shared the data. Technological innovation in encryption is mainly working to secure the transfer of data between two or more nodes on the network, but do not address the problem of increasing the number of nodes in the confidential data transmission network. Since the number of electronic transactions conducted by a person increases in frequency, the number of nodes in his personal data network increases exponentially, hence increasing the number of vulnerabilities.
IAME Identity Network
The IAME identity network is based on 5 main components:
- On the client;
- On the distribution server;
- On the server checks;
- Recording on the blockade;
- On the identity server
Each of these components performs its role in the IAME system, which can be checked by the validation process and the identification process.
Validation Process
The validation process is a very important operation in the IAME system, with the help of which the information that was provided by the client will be processed and confirmed by third-party validators.
How does this process occur:
- All client information is fragmented and encrypted into validation packets that are sent to the distribution server. All this operation takes place at the request of the client.
- The distribution server controls the distribution of all packets to third-party validators, which will return the result of the scan to the verification server.
- After all these procedures, the server checks and evaluates the checks, hashes the numeric or logical acknowledgments, and interfaces with the specific data in the assigned lockbox cell.
Identification process
In order to perform an operation with a counterpart, it is necessary for the identification process to be completed. This process is based on the counterparty's own requirements.
- In order to verify the specific transactions, the counterparty sends a request to the authentication server for the status of data validation.
- The identification server analyzes the block and returns the checked data to the counterparty, after these procedures the counterparty can complete the transactions.
The IAME identity network will not be used for data exchange between transaction counterparties, it will serve to divide the distribution and verify insignificant confidential personal information
IAM Token
To manage the IAME network, a functional token - IAM token will be issued, which will act as a verification token to initiate confirmation requests for validation packets in the IAME Identity Network. The parties will spend the token through the client of the identity network IAME, and after deduction equivalent to the cost of hashing of the block account, the balance of the IAM token will be paid as a reward to third-party validators who perform the validation processes on a commercial basis. Thus, the token will not become a means of accumulation, but will acquire market value on the basis of natural demand and supply for identification processes.
The cost of the IAM token will, in fact, be determined by two factors:
- The cost of validation, which will be proportional to the financial cost of hashing the requested amount of data in the assigned unit and set the price minimum for the token.
- Market demand, which will be proportional to the demand for identification in the blockhouse based on the IAME Identity Network. In view of the dynamism of verification of data in the field of identification, market demand will remain cyclical and will only increase with the use of the IAME identity network.
Command
Author:Agung pratama
https://bitcointalk.org/index.php?action=profile;u=1807351
Tidak ada komentar:
Posting Komentar