What is ITC?
Security:
ITC is designed to solve the severe safety problems of present IoT. ITC applies a combination of asymmetric encryption of cryptography, semi-homomorphic-encryption ciphertext computing technology and distributed architecture without data center. Therefore, ITC can not only protect the users’ devices from being attacked by hackers, ensuring its control. but also defend users and their devices’ data safety sovereignty and privacy security. For example, the data of intelligent device, such as the camera, can only be checked by users themselves.
Efficient:
The architecture of ITC can well satisfy the high-concurrency environment of IoT where everything is interconnected with each other. The main chain has adopted PBFT consensus strategy. Through combination of point-to-point communication network of DAG subnet and simple verification technology of Merkel data structure, the main net can meet the requirment of 100,000 concurrency simultaneously. Because of the distributed DAG subnet, the whole network can reach better concurrency.
Shareable:
Under the circumstance of big-data revolution modifying commercial industry, ITC firstly puts forward the idea that data property belongs to the users and provide technical protection for this. Non-circulation data is valueless. ITC has applied zero-knowledge proof, BloomFilter, Hyperloglog and other probabilistic models to provide data-analysis access to smart contracts. In this way, the companies can submit smart contract to use the users’ data for machine learning by paying tokens for the users according to their data contribution.
Source:
Hi! I am a robot. I just upvoted you! I found similar content that readers might be interested in:
https://www.youtube.com/watch?v=LwFTdGBW4M0
Downvoting a post can decrease pending rewards and make it less visible. Common reasons:
Submit