IAME

IAME


IAME is a system specifically designed to serve a fragmented identification process based on the IAM cryptographic token. The functionality of the IAME Identity Network will primarily serve as a P2P blocking transaction, but the application can be extended to trade transactions and financial institutions when providing related services.

Problem
Currently, the identification system is not very secure and can provide personal information to third parties. With the current system, people must share their personal information and support documents with opponents to identify themselves and their sources of income. Counterparty stores data on themselves, the more people share personal data with it, the easier it is to identify itself and its source of income. If one has to deal with n-number of opponents, it is displayed in a star topology network with n nodes, each of which is a vulnerable location for the person sharing the data. Technological innovation in encryption basically serves to secure data transfer between two or more nodes in the network, but does not affect the problem of increasing the number of nodes in the network to transfer sensitive data.

Game plan
A striking decentralized confirmation IAME proves a framework that will allow parties to exchange blockchains to check, at a basic level, characterize each other without disclosing non-essential sensitive individual data to the opposing party and at the discretionary level of the springs from Cryptocurrency in exchange. recognizing verification confirmation will be driven by a far reaching number of self-administering unentittersable validators, each examining the data bits that together will form the entire certification, with a single original target that the new owner of the sensitive individual data holds his information in addition to powerful , obliging the road.


All client information is fragmented and encrypted into validation packets sent to the distribution server. All this work takes place under the client's request.

The distribution server controls all packets to a third-party validator, which will guarantee the scan results to the verification server.

After all this, the server checks and evaluates, lists the numbers, and connects with the specific data in the specified lockbox cells.

Process to perform operations with partners, identification process must be completed. This process occurs on the terms of the parties themselves.

For transaction verification, partners send requests to the authentication server for data validation status.

The information server discovers the block and recovers the data being checked to the partner, at the time of the transaction.

IAME identity network will not be used for data exchange between transactions against transactions, it would be very suitable to share information and send information to things that are not important

Iame Identity Network
IAME identity network is based on 5 main components:
In client;

  • On the distribution server;
  • On server checking;
  • Record in blockade;
  • On the identity server
Each of these components performs its role in the IAME system, which can be excluded by the validation process. The validation process is a very important operation in the IAME system, with the help of information provided by clients being processed by third-party validators.




IAM Token
To manage the IAME network, functional token - the IAM token will be issued, which will act as a verification token to run a confirmation request for the validation package on the IAME Identity Network. All will spend token through a client from the IAME identity network, and after deducting blocking account fees for blocking, the IAM balance token will be discarded as a value for a third party validator committing a commercial validation process. As such, tokens will not be a means of payment, but will result in greater value.

IAM token fee
The cost of validation, which will be proportional to the financial cost of the amount of data requested in the specified unit and stating the minimum price for the token.

Market demand, which will be comparable to a request to appreciate in the IAME Identity network. With the dynamics of verification data in the information field, the use of IAME's identity network will continue to exist in the market.

ROADMAP

From the bootstrapped basement project to full start up, IAME has come a long way.
On the road to ICO, we have honed our claws against angel investors to come up with a viable strategy and secure the funds necessary to begin development.
With confidence that we will launch our ICO, and we can say with certainty that we will bring the IAME project to a great end result.



TEAM


ADVISORS




For more info :

Comments