Greetings community,
AIME
IAME is a system specifically designed to serve a fragmented identification process based on the IAM cryptographic token. The functionality of the IAME Identity Network will primarily serve as a P2P blocking transaction, but the application can be extended to trade transactions and financial institutions when providing related services.
ICO
The purpose of IAME’s Early Coins Offer is to raise funds for the development and commercialization of the IAME Identification Network. ICO will be slim and will only involve two cryptographic assets, Ethereum and IAM Token.
White paper
The IAME Identification Network is a decentralized identification system built for the Blockchain ecosystem.
This system allows parties in a Blockchain transaction to verify the identity of each other without having to disclose non-essential personal information to other parties involved in the transaction. This system achieves this by splitting information into parts of the data that can not be understood which are then distributed to many independent third-party validators that verify the authenticity of each of these fragments.
The sum of these fragmented verifications is a complete identity verification. Only the original owner of the information will have access to this data in a holistic and meaningful way.
Road Map
Iame Identity Network
IAME identity network is based on 5 main components:
- In client
- On the distribution server
- On server checking
- Record in blockade
On the identity server
Each of these components performs its role in the IAME system, which can be checked by the validation and identification process.
Validation Process
The validation process is a very important operation in the IAME system, with the help of information provided by the client will be processed and confirmed by a third party validator.
How this process occurs:
All client information is fragmented and encrypted into validation packets sent to the distribution server. All of these operations occur at the request of the client.
The distribution server controls the distribution of all packets to the third-party validator, which will return the scan results to the verification server. After all these procedures, the server checks and evaluates the checks, lists numerical or logical awards, and interfaces with specific data in the specified lockbox cell.
IAME Team
For more information visit the link below:
Website: https://iame.io/
Whitepaper: https://iame.io/res/180301-IAME-White-Paper-en.pdf
Facebook: https://www.facebook.com/IAMEIdentity/
Twitter: https://twitter.com/@iameidentity
Telegram: https://t.me/IAME_identity
Medium: https://medium.com/@IAMEIdentity
Video: https://vimeo.com/iameidentity
Github: https://github.com/iameidentity
Author : Novrijal pane
Bitcointalk Profil : https://bitcointalk.org/index.php?action=profile;u=1464297