IAME — Decentralized Identification System Built For Blockchain Ecosystems

in #blockchain7 years ago

AIME.png

Greetings community,

AIME
IAME is a system specifically designed to serve a fragmented identification process based on the IAM cryptographic token. The functionality of the IAME Identity Network will primarily serve as a P2P blocking transaction, but the application can be extended to trade transactions and financial institutions when providing related services.

ICO
The purpose of IAME’s Early Coins Offer is to raise funds for the development and commercialization of the IAME Identification Network. ICO will be slim and will only involve two cryptographic assets, Ethereum and IAM Token.

White paper

The IAME Identification Network is a decentralized identification system built for the Blockchain ecosystem.
This system allows parties in a Blockchain transaction to verify the identity of each other without having to disclose non-essential personal information to other parties involved in the transaction. This system achieves this by splitting information into parts of the data that can not be understood which are then distributed to many independent third-party validators that verify the authenticity of each of these fragments.
The sum of these fragmented verifications is a complete identity verification. Only the original owner of the information will have access to this data in a holistic and meaningful way.

ds.png

Road Map
roadmap-graphic.png

Iame Identity Network

IAME identity network is based on 5 main components:

  1. In client
  2. On the distribution server
  3. On server checking
  4. Record in blockade

On the identity server
Each of these components performs its role in the IAME system, which can be checked by the validation and identification process.

Validation Process
The validation process is a very important operation in the IAME system, with the help of information provided by the client will be processed and confirmed by a third party validator.

How this process occurs:
All client information is fragmented and encrypted into validation packets sent to the distribution server. All of these operations occur at the request of the client.
The distribution server controls the distribution of all packets to the third-party validator, which will return the scan results to the verification server. After all these procedures, the server checks and evaluates the checks, lists numerical or logical awards, and interfaces with specific data in the specified lockbox cell.

IAME Team
t1.png
sa.png

For more information visit the link below:








Website: https://iame.io/ Whitepaper: https://iame.io/res/180301-IAME-White-Paper-en.pdf Facebook: https://www.facebook.com/IAMEIdentity/ Twitter: https://twitter.com/@iameidentity Telegram: https://t.me/IAME_identity Medium: https://medium.com/@IAMEIdentity Video: https://vimeo.com/iameidentity Github: https://github.com/iameidentity


Author : Novrijal pane
Bitcointalk Profil : https://bitcointalk.org/index.php?action=profile;u=1464297

Sort:  
 7 years ago  Reveal Comment