Selasa, 22 Mei 2018

Overview: ICO & Bounty IAME

IAME  is a specially designed system for servicing a fragmented identification process based on the IAM cryptographic token. The functionality of the IAME Identity Network will mainly serve as a P2P blocking transaction, but its application can be expanded for trade transactions and financial institutions when providing associated services.

Problems

To date, identification systems are not very secure and can provide personal information to third parties. With current systems, people have to share their personal information and supporting documents with counterparties in order to identify themselves and their sources of income. Counterparties store data in their possession, the more a person will share personal data with him, the easier it will be to identify him and his sources of income. If a person has to make transactions with n-number of counterparties, he is displayed in a topological star network with n nodes, each of which is a vulnerable place for the person who shared the data. Technological innovation in encryption basically works to protect the transfer of data between two or more nodes on the network, but do not address the problem of increasing the number of nodes in the confidential data transmission network. Since the number of electronic transactions conducted by a person increases in frequency, the number of nodes in his personal data network increases exponentially, hence increasing the number of vulnerabilities.

IAME Identity Network

The IAME identity network is based on 5 main components:
  1. On the client;
  2. On the distribution server;
  3. On the server checks;
  4. Recording on the blockade;
  5. On the identity server
Each of these components performs its role in the IAME system, which can be checked by the validation process and the identification process.

Validation Process

The validation process is a very important operation in the IAME system, with the help of which the information that was provided by the client will be processed and confirmed by third-party validators.
How does this process occur:
  • All client information is fragmented and encrypted into validation packets that are sent to the distribution server. All this operation takes place at the request of the client.
  • The distribution server controls the distribution of all packets to third-party validators, which will return the result of the scan to the verification server.
  • After all these procedures, the server checks and evaluates the checks, hashes the numeric or logical acknowledgments, and interfaces with the specific data in the assigned lockbox cell.

Identification process

In order to perform an operation with a counterpart, it is necessary for the identification process to be completed. This process is based on the counterparty's own requirements.
  1. In order to verify the specific transactions, the counterparty sends a request to the authentication server for the status of data validation.
  2. The identification server analyzes the block and returns the checked data to the counterparty, after these procedures the counterparty can complete the transactions.
The IAME identity network will not be used for data exchange between transaction counterparties, it will serve to divide the distribution and verify insignificant confidential personal information

IAM Token


To manage the IAME network, a functional token - IAM token will be issued, which will act as a verification token to initiate confirmation requests for validation packets in the IAME Identity Network. The parties will spend the token through the client of the identity network IAME, and after deduction equivalent to the cost of hashing of the block account, the balance of the IAM token will be paid as a reward to third-party validators who perform the validation processes on a commercial basis. Thus, the token will not become a means of accumulation, but will acquire market value on the basis of natural demand and supply for identification processes.
The cost of the IAM token will, in fact, be determined by two factors:
  • The cost of validation, which will be proportional to the financial cost of hashing the requested amount of data in the assigned unit and set the price minimum for the token.
  • Market demand, which will be proportional to the demand for identification in the blockhouse based on the IAME Identity Network. In view of the dynamism of verification of data in the field of identification, market demand will remain cyclical and will only increase with the use of the IAME identity network.

Command



Official website 
Whitepaper 
Roadmap
Price - 1 IAM = 0.0001 ETH
Soft Cap - 1,000,000 USD

Bounty Distribution:
  • Signature Campaign - 40%
  • Translation Campaign - 5%
  • Twitter Campaign - 10%
  • Facebook Campaign - 10%
  • Blog Campaign - 20%
  • Telegram Campaign - 5%
  • AirDrop - 10%

Facebook


Conditions:
  • You must be subscribed to the official Facebook page .
  • Your account must have public privacy settings.
  • You must have at least 500 friends.
  • You must do at least 2 likes + reposts in order to get 20 bets.
  • Multi-accounts are not allowed. Any violation of the rules will lead to disqualification.
Awards:
  • 500+ friends - 20 bets.


Twitter


Conditions:
  • You must be subscribed to the official page on Twitter .
  • Your account must have public privacy settings.
  • You must have at least 500 subscribers.
  • You must do at least 2 likes + retweets in order to get 20 bets.
  • Multi-accounts are not allowed. Any violation of the rules will lead to disqualification.
Awards:
  • 500+ subscribers - 20 bids.


Blogs and Media


Conditions:
  • The article must contain at least 500 characters.
  • Article \ video should contain links to the website and white paper (or ANN). Place a link to your BTT profile at the end of the article to confirm the authorship.
  • You can use official images and graphics from a website or ANN
  • Only 5 articles for 1 user will be accepted. We recommend Steemit, Reddit, Medium and the like.
Awards:
  • Okay - 20 bets
  • Very good - 50 bets
  • Excellent - 100 bets
  • Unbeatable - 300 bets.


Bitcointalk signatures


Conditions:
  • You must write at least 10 (maximum 20) constructive messages a week in order to qualify for the award.
  • Messages must contain at least 100 characters, be positive, do not offend users or projects. Spam is prohibited.
  • Users with a Full Member rank and above must wear an avatar.
  • Users with negative credibility will not be accepted.
Awards: (equivalent in IAM tokens per post)
  • Jr.member - $ 5
  • Member - $ 10
  • Full member - $ 20
  • Sr.member - 30 $
  • Hero - $ 45
  • Legendary - $ 55


Telegram


Conditions:
  • Sign up for our official Telegram
  • Be active at least 2 times a week.
Awards:
  • Activity in the channel is 100 bets.


Author by: Hellokitty6

Tidak ada komentar:

Posting Komentar