IAME is a specially designed system for servicing a fragmented identification process based on the IAM cryptographic token. The functionality of the IAME Identity Network will mainly serve as a P2P blocking transaction, but its application can be expanded for trade transactions and financial institutions when providing associated services.
To date, identification systems are not very secure and can provide personal information to third parties. With current systems, people have to share their personal information and supporting documents with counterparties in order to identify themselves and their sources of income. Counterparties store data in their possession, the more a person will share personal data with him, the easier it will be to identify him and his sources of income. If a person has to make transactions with n-number of counterparties, he is displayed in a topological star network with n nodes, each of which is a vulnerable place for the person who shared the data. Technological innovation in encryption basically works to secure the transfer of data between two or more nodes on the network, but does not affect the problem of increasing the number of nodes in the network for transferring sensitive data. Since the number of electronic transactions conducted by a person increases in frequency, the number of nodes in his personal data network increases exponentially, hence increasing the number of vulnerabilities.
IAME Identity Network
The IAME identity network is based on 5 main components:
- On the client;
- On the distribution server;
- On the server checks;
- Recording on the blockade;
- On the identity server
Validation Process
The validation process is a very important operation in the IAME system, with the help of which the information that was provided by the client will be processed and confirmed by third-party validators.
How does this process occur:
- All client information is fragmented and encrypted into validation packets that are sent to the distribution server. All this operation takes place at the request of the client.
- The distribution server controls the distribution of all packets to third-party validators, which will return the result of the scan to the verification server.
- After all these procedures, the server checks and evaluates the checks, hashes the numeric or logical acknowledgments, and interfaces with the specific data in the assigned lockbox cell.
Identification process
In order to perform an operation with a counterpart, it is necessary for the identification process to be completed. This process is based on the counterparty's own requirements.
- In order to verify the specific transactions, the counterparty sends a request to the authentication server for the status of data validation.
- The identification server analyzes the block and returns the checked data to the counterparty, after these procedures the counterparty can complete the transactions.
The IAME identity network will not be used for data exchange between transaction counterparties, it will serve to divide the distribution and verify insignificant confidential personal information
IAM Token
To manage the IAME network, a functional token - IAM token will be issued, which will act as a verification token to initiate confirmation requests for validation packets in the IAME Identity Network. The parties will spend the token through the client of the identity network IAME, and after deduction equivalent to the cost of hashing of the block account, the balance of the IAM token will be paid as a reward to third-party validators who perform the validation processes on a commercial basis. Thus, the token will not become a means of accumulation, but will acquire market value on the basis of natural demand and supply for identification processes.
The cost of the IAM token will, in fact, be determined by two factors:
The cost of validation, which will be proportional to the financial cost of hashing the requested amount of data in the assigned unit and set the price minimum for the token.
Market demand, which will be proportional to the demand for identification in the blockhouse based on the IAME Identity Network. In view of the dynamism of verification of data in the field of identification, market demand will remain cyclical and will only increase with the use of the IAME identity network.
Author: yantiaryan
Tidak ada komentar:
Posting Komentar