Proof of concept
Provide a gateway for regulatory and mainstream adoption.
The whole IAME identification process is truly decentralised. Making use of data sharding algorithms and consensus voting systems, we are building the first generation of unhackable blockchain identity.
Using our identity mold, only you can reconstruct your whole identity to have it validated.
And with in-built data minimisation, the power to choose what to share is in your hands.
Built with integrated Multi Dimensional Analysis Tools, IAME makes it possible to look beyond the public ledger. Analyse the transaction topology and evaluate the trustworthiness of counter parties.
The IAME app allows users to attach their identity to their cryptocurrency addresses, identified addresses being the first step towards mainstream integration. Any documentation that will be uploaded on the IAME app will never leave wallet as whole, but as encrypted fragments to be validated by the IAME Identification Network. With IAME the fallout of identity data breaches will be a thing of past.
Every piece of information you share leaves you susceptible to theft and every piece of information you collect leaves you vulnerable to litigation. Don’t share don’t take!
Nobody is Hack Proof, but you can become Hack Worthless.
You don’t need an expensive mining rig or a Phd to become part of our identification network. At IAME, our token mining has been made easy. A phone, wifi and 2 thumbs will suffice!
Verify Shapes, Letters and Numbers to become a Third Party Verifier
At IAME we know where we are going and how to get there, which is why we do not need to wait for the ICO to be completed to start development. We come with more than just an idea in mind, which is why we will succeed.
Proof of concept
Peer to Peer Transaction
Third Party Integration & API
Link Analysis (Transaction Topology)
Multi Dimensional Analysis (Trust Seal Engine)