ICO & Bounty IAME


IAME is a specially designed system for servicing a fragmented identification process based on the IAM cryptographic token. The functionality of the IAME Identity Network will mainly serve as a P2P blocking transaction, but its application can be expanded for trade transactions and financial institutions when providing associated services

 Problems 
At the moment, identification systems are not very secure and can provide personal information to third parties. With current systems, people have to share their personal information and supporting documents with counterparties in order to identify themselves and their sources of income. Counterparties store data in their possession, the more a person will share personal data with him, the easier it will be to identify him and his sources of income. If a person has to make transactions with n-number of counterparties, he is displayed in a topological star network with n nodes, each of which is a vulnerable place for the person who shared the data. Technological innovation in encryption basically works to secure the transfer of data between two or more nodes on the network, but does not affect the problem of increasing the number of nodes in the network for transferring sensitive data. Since the number of electronic transactions conducted by a person increases in frequency, the number of nodes in his personal data network increases exponentially, hence increasing the number of vulnerabilities. 
IAME Identity Network
The IAME identity network is based on 5 main components:
  • On the client;
  • On the distribution server;
  • On the server checks;
  • Recording on the blockade;
  • On the identity server
Each of these components performs its role in the IAME system, which can be checked by the validation process and the identification process.
Validation Process 
The validation process is a very important operation in the IAME system, with the help of which the information that was provided by the client will be processed and validated by third-party validators. 
How does this process occur:
  •  All client information is fragmented and encrypted into validation packets that are sent to the distribution server. All this operation takes place at the request of the client.
  • The distribution server controls the distribution of all packets to third-party validators, which will return the result of the scan to the verification server.
  • After all these procedures, the server checks and evaluates the checks, hashes the numeric or logical acknowledgments, and interfaces with the specific data in the assigned lockbox cell. 


Identification process

 
  • In order to verify the specific transactions, the counterparty sends a request to the authentication server for the status of data validation. 
  • The identification server analyzes the block and returns the checked data to the counterparty, after these procedures the counterparty can complete the transactions.
The IAME identity network will not be used for data exchange between transaction counterparties, it will serve to divide the distribution and verify insignificant confidential personal information

 

IAM Token 
To manage the IAME network, a functional token - IAM token will be issued, which will act as a verification token to initiate confirmation requests for validation packets in the IAME Identity Network. The parties will spend the token through the client of the identity network IAME, and after deduction equivalent to the cost of hashing of the block account, the balance of the IAM token will be paid as a reward to third-party validators who perform the validation processes on a commercial basis. Thus, the token will not become a means of accumulation, but will acquire market value on the basis of natural demand and supply for identification processes. 
The cost of the IAM token will, in fact, be determined by two factors:
 The cost of validation, which will be proportional to the financial cost of hashing the requested amount of data in the assigned unit and set the price minimum for the token. 
Market demand, which will be proportional to the demand for identification in the blockhouse based on the IAME Identity Network. In view of the dynamism of verification of data in the field of identification, market demand will remain cyclical and will only increase with the use of the IAME identity network. 
Command



FACEBOOK | TWITTER | VIDEO | MEDIUM | WEBSITE | TELEGRAM | WHITEPAPER | DRIBBBLE | GITHUB
Distribution Bounty: 
  • Signature Campaign - 40%
  • Translation Campaign - 5%
  • Twitter Campaign - 10%
  • Facebook Campaign - 10%
  • Blog Campaign - 20%
  • Telegram Campaign - 5%
  • AirDrop - 10% 
Facebook
Conditions:
  • You must be subscribed to the official Facebook page.
  • Your account must have public privacy settings.
  • You must have at least 500 friends.
  • You must do at least 2 likes + reposts in order to get 20 bets.
  • Multi-accounts are not allowed. Any violation of the rules will lead to disqualification. 
 Awards:
500+ friends - 20 bets.

Registration form
Spreadsheet

Twitter

Conditions:
  • You must be subscribed to the official page on Twitter.
  • Your account must have public privacy settings.
  • You must have at least 500 subscribers.
  • You must do at least 2 likes + retweets in order to get 20 bets.
  • Multi-accounts are not allowed. Any violation of the rules will lead to disqualification. 
Awards:
500+ subscribers - 20 bids.

Blogs and Media

Conditions:
  • The article must contain at least 500 characters.
  • Article \ video should contain links to the website and white paper (or ANN). Place a link to your BTT profile at the end of the article to confirm the authorship.
  • You can use official images and graphics from a website or ANN
  • Only 5 articles for 1 user will be accepted. We recommend Steemit, Reddit, Medium and the like.

Awards:
  • Okay - 20 bets
  • Very good - 50 bets
  • Excellent - 100 bets
  • Unbeatable - 300 bets.
Registration formSpreadsheet 
Bitcointalk signatures 
Conditions:
  •  You must write at least 10 (maximum 20) constructive messages a week in order to qualify for the award.
  • Messages must contain at least 100 characters, be positive, do not offend users or projects. Spam is prohibited.
  • Users with a Full Member rank and above must wear an avatar.
  • Users with negative credibility will not be accepted.
Awards: (equivalent in IAM tokens per post) 
  • Jr.member - $ 5
  • Member - $ 10
  • Full member - $ 20
  • Sr.member - 30 $
  • Hero - $ 45
  • Legendary - $ 55

 Registration formSpreadsheet 
Telegram 
Conditions: 
  • Sign up for our official Telegram
  • Be active at least 2 times a week.

Awards:Activity in the channel is 100 bets. 
Registration formSpreadsheet
 My account Bitcointalk
Group in telegram
Classified on crypto currency
My page Golos
My Steemit Blog
My blog 
 Hasil gambar untuk bounty iame

Author : pohon tumbsng37
My ETH : 0xB62D8A32653B27aca79bF18dC1C61c7fE58A199b

Komentar

Postingan populer dari blog ini

XYO NETWORK THE REAL WORLD

MAVRO-Ethereal区块链大大帮助世界各地的传销工业革命。

eCoinomic - a new platform that provides financial services to crypto holders