IAME

Screenshot_10.png

Dear crypto-drivers! Greetings, on your blog! 
Today we have on the agenda, there is a short overview of the prospective ICO, which has not yet begun! Nevertheless, I already predict the success of the project in advance and I want to dwell on it!
I ask to love and to pay - IAME! 
Official video from developers 
What is IAME, where does it come from, and where is the technology of blocking? Let's understand!
So, IAME is a specific product! This is the Identification Network, which will work only with a limited number of crypto-currencies, and more specifically with Ethereum and the IAM token! 
Screenshot_6.png
Screenshot_5.png
IAME will provide its users with a tool that is designed to simplify their lives in matters of self-identification!
IAME WALLET - can be downloaded for use on a variety of mobile platforms! That is, in other words IAME will always be with you! 
The IAME application allows its users to unite their identity, that is, to identify it and link it to their crypto-currency addresses (purses), and note that these identified addresses are only the first step in global integration! 
Absolutely all documents and files that will be downloaded in the IAME application will be inextricably linked to a particular purse, but will be under reliable protection, being encrypted fragmentarily, and passing through the internal IEE Identification Network . Now, users can forget that such mistakes when confirming the identity, with such and such a system of protection!
Screenshot_1.png
Of course, without the technology of blocking and smart contracts, it would be impossible to do this!
Let's try in a few words to understand the basic principles of the IAME identification system.
As already mentioned, we are talking about fragmented encryption, about a fragmented decentralized system! The developers claim that they created two different so-called blocks, two prototypes - one for identification and the other for verification, the so-called confirmation of identification!
You can personally see how they look and how they work in real time, right in your browser! Yes, the creators of the project, offer you this opportunity! 
In this prototype, we are viewing, as identification functions, based on IAME, from the user's point of view.
Screenshot_2.png
What is DFI? This is a decentralized fragmented method that the IAME system uses for cyclical, that is, reuse of the entire identity process!
Thanks to DFI, the data transmitted and shared in the transaction flows, in essence, are useless separately, given the preliminary fragmentation! Further, these data are anonymously distributed among independent third parties! These third-party third parties are not, in any way related to members of transactions
Of course, it is worth mentioning that in this network of third-party validators, according to all canons of the block, the task of confirmation is assigned, as well as verification of the reliability of each piece of data, that is, each fragment! The protection is ensured by the fact that separately these fragments do not represent any interest, and it is impossible to calculate the missing fragments, therefore falsification or loss of data is practically excluded!
Screenshot_3.png
Compilation, in other words, the process of collecting back into a single whole, these fragments will be a confirmation of identification for the transaction counterparty, in fact, just the same and confirming the authenticity of the person being identified!
This type of verification, through third-party validators, is much more reliable and safer than the ways in which identification is given to a particular organization or person!
As soon as the user tries to verify and confirm their identity, the data is fragmented and individual components are immediately sent to the platform of the validator, where ready to process the request, free validators, immediately accept the task assigned to them! 
The validators are rewarded by the system for their contribution.
662400600_640.jpg
Also, IAME thought of the moment to exclude various manipulations of validators in order to obtain greater financial benefits! 
In order to counteract the third-party validators trying to fool the system, the IAME identification network, in effect, deploys a symmetric game model - an antidote that employs the so-called tribunal method! This is when a consensus, that is, a community of validators, reaffirms the validation, in other words, secondary validators, come into play, if initially there is no compromise in initialization, there is doubt and an appeal is required. Accordingly, neither party has sole control over the authentication process. This means that every user can be sure that the validators of your personality are not interested in falsification or other manipulations with your data, but moreover, additionally verified by the intelligent system IAME.
Here is such a cool and interesting system offers us a team of developers! 
Screenshot_8.png
Screenshot_9.png
And I, you suggest, get acquainted with the details of the coming token-sail.
Screenshot_7.png
And at will participate in the PRE-ICO, which will run until May 20, 2018 
Screenshot_4.png
Token IAM
PreICO 1 ETH = 20,000 IAM 
ICO 1 ETH = 10,000 IAM
Soft cap 1,000,000 USD 
Hard cap 25,000,000 USD
my profile - https://bitcointalk.org/index.php?action=profile;u=2027828
ETH: 0x73998E2fB5604606E87585edc2C834539400985B

Comments

Popular posts from this blog

COINOLIX EXCHANGE dengan fasilitas perdagangan kelas dunia

ZAN Coin

ZAN 동전