With blockchain technology to operate in the IAME identification network, an ideal token will be offered called the IAME Token

in ethereum •  7 years ago 

With blockchain technology to operate in the IAME identification network, an ideal token will be offered called the IAME Token

INTRODUCTION

To operate in the IAME identification network, an ideal token will be offered called the IAME Token, with this token issued will accommodate as an expedient of certification or authentication, attestation and verification on the IAME network. Individuals will operate and spend the token through IAME identification network system or client after inverting the corresponding blockchain hashing costs, with this operation the token balance of IAM will be giving out as reward to third-party or individual who aspire the validation processes on a for-profit substructure.

Determinant of token based on the demand and supply for identification processes, which are:

  1. The cost of validation
  2. The market demand.

Deconstructing the Identification Process

The conventional identification process commences with a party approaching to request by counterparty to identify itself so that the counterparty may ascertain to a caliber with whom it is transacting. The party submits a verbalization filled with data that the counterparty has deemed to be obligatory and the corresponding fortifying evidence. After mapping the data to the fortifying evidence, a decision is reached on whether identification of the party can be ascertained. Below shows the configuration

With this process it shows the full configuration if the party is genuine or not, the all provided verbal expressions can be trapped or tracked onto accepting documentation. In principle, the more data that can be assigned on more accepting documents, the more hard it become for the party to falsify it identity

The mapping process is listed as follow but few will be assigned

  1. Statement to string confirmation
  2. Statement to no-string confirmation
  3. Statement to privately available information confirmation,
    please visit the whitepaper for more about the processes
    https://iame.io/res/180301-IAME-White-Paper-en.pdf

Any identification assignment that can accumulate a maximum of the above mapping data is ideal for counter-parties to assure that they are dealing with a genuine person, however, it can be disastrous for the sharing-party in the event of a security breach

Fragmenting Identification processes

Sighting on the past identification processes, the mapping functions can be derived without the party exposing any impertinent detail to counterparty by delegating the mapping operations to non related third-party validators. The verbalization fortifying proof and functions would first have to be fragmented in such a method that third-party validators would be attesting fragments of data, that is on their own cannot be utilized by any maleficent third party. Nevertheless, the total substantiations would constitute a consummate identification process. Below show the processes

Third party validation

Pursuant to the concept of the IAME fragmented identification system, there is a requisite for a system of decentralised third-party validators under the rational that an identification validation conducted by a multitude of third-party validators is more dependable and less susceptible to the peril of fraud than an identification validation conducted by a single institution or party. However, having a system that runs on a for-profit substratum, where the third party is “paid” to validate information, engenders a natural propensity for participants to game the system and collectively approve a validation process to receive a payout. The solution we propose is a symmetric game model that will inspirit veracious validation that is analogous to the Byzantine Fault Tolerance - the Tribulation Algorithm
Aspects of the Trial Algorithm, few are listed below please visit the whitepaper for more updates.

  1. Each verbalization and their corresponding fortifying information are processed as fragments ( “Evidence” );
  2. Evidence is validated not by single third-party validators ( “Jury” ), but by a Jury (a “Tribunal” );
  3. Each jury validates in a designated method on whether the Evidence matches the verbalizations

The IAME Token:

To operate the IAME Identification Network, a functional token will be issued, kenned as the IAM Token, which would operate as a validation token to initiate corroboration requests for validation packets on the IAME Identification Network. Parties would spend the token through the IAME Identification Network client and after deduction of equipollent blockchain hashing costs, the balance of IAM token would be paid out as reward to third-party validators who operate the validation processes on a for-profit substructure.
This would attribute not a store of value to the token but a market value predicated on natural demand and supply for identification processes. The value of the IAM Token would be, in essence, determined by 2 factors:

  1. The cost of validation, which would be proportional to the financial cost of hashing the requested amount of data on the designated blockchain, setting a price floor for the token
  2. Market demand, which would be proportional to the authoritative ordinance for blockchain identification predicated on the IAME Identification Network

The IAME Trusted Team:

The IAME are also in partner with followings

Utralnote:
Pylon:
Qvolta:
Mycreditchain:
Please visit the following details for more updates and the movement of the IAME project
Whitepaper: https://iame.io/res/180301-IAME-White-Paper-en.pdf
Website: https://iame.io/
Official facebook page: https://facebook.com/IAMEidentity
Official Twitter page: https://facebook.com/IAMEidentity
Official telegram Group: https://t.me/IAME_identity

For more clarification watch the official video using the following link https://vimeo.com/iameidentity

Author’s details:
Bitcointalk username: hh4mmm
Bitcointalks url: https://bitcointalk.org/index.php?action=profile;u=1213121
Ether address: 0xee1D45eA5153413495912d3C5d53B78b195a25e5
Author’s name: Hopeson Harrison

Authors get paid when people like you upvote their post.
If you enjoyed what you read here, create your account today and start earning FREE STEEM!