SlideShare a Scribd company logo
1 of 16
Download to read offline
IAME
An Expert System for
Blockchain Identity
Verification
www.iame.io
Nathaniel Tsang Mang Kin
Suryani Chang
Abstract
A decentralized identification system that would allow parties performing blockchain
transactions to verify, on a primary level, the identity of each other without having to dis-
close non-essential sensitive personal information to the counterparties; and on a sec-
ondary level the source of the Cryptocurrencies in the transaction. Identification would be
conducted by a multitude of independent third party validators, each verifying fragments
of information that together would constitute a complete verification, such that only the
original owner of the sensitive personal information retains her/his data in a wholesome
and useful way. The result of the identification process would be hashed onto a designated
blockchain and made accessible on a public repository such that the identification status
and source of the cryptocurrencies associated with specific blockchain addresses can be
consulted, without compromising the unique identification data.
1. I ntroduction	 1
2. Deconstructing the Identification Process	 2
3. Fragmenting the Identification Process	 3
4. The IAME Identification Network	 5
5. The IAM Token	 7
6. Third Party Validation	 8
7. Reward and Ranking Mechanism	 10
8. An Identification System for Blockchain P2P Transaction	 11
9. A Platform for Financial Institutions	 12
10. Conclusion	 13
Contents
1
1. Introduction
Current identification systems rely on people having to share their personal information and
supporting evidence with counterparties in order to identify themselves and their source of
wealth. Those counterparties hold the shared data wholly, and the more data a person shares
with those counterparties, the easier it is to identify the person and their source of wealth. If
a person is to transact with n counterparties, it results into a topological star network with n
nodes, each acting as point of vulnerability to the data sharer. Regardless of security measures,
the more data a person surrenders, the more severe the fallout from any potential security
breach.
All too often the counterparties/nodes do share the data partially or wholly with third parties,
which in turn extends the initial star network, hence increasing the number of points of
vulnerability in the former network. Technological innovation in encryption mostly work with
regards to securing the transmission of data between two or more nodes in a network, however
they do not address the issue of an increase in the number of nodes in a sensible data network.
As the number of electronic transactions a person conducts increases in frequency, the number
of nodes in their personal data network subsequently increases exponentially, consequently
increasing the number of points of vulnerability.
The solution we are proposing is to change the way the identification process is conducted to
the point that a person’s data is fragmented prior to confirmation by a series of independent
third parties, who are not affiliated to any parties within the transaction. The third parties would
be assigned the task of confirming fractured pieces of personal data, which by themselves are
useless to malicious parties, however, the sum of which would constitute a valid identification
to the transactional counterparty. As a result of this, this would bypass the need for any
transactional counterparty from having to process or store non-essential data.
The above process would take place on the IAME Identification Network, a purpose-built
system to service the fragmented identification process,fueled by the IAM cryptographic
token. Functionality of the IAME Identification Network would principally serve Blockchain
P2P transactions, however, usage would be extensible to merchant transactions and financial
institutions in the provision of blockchain related services.
2
2.	Deconstructing the 						
	 Identification Process
The conventional identification process starts with a party acceding to a request by a
counterparty to identify itself so that that the counterparty may ascertain to a level with whom
it is transacting. The party submits a statement filled with data that the counterparty has
deemed to be necessary and the corresponding supporting evidence. After mapping the data
to the supporting evidence, a decision is reached on whether identification of the party can
be ascertained
The process assumes that: if the party is genuine then all provided statements can be mapped
onto supporting documentation. In principle, the more data that can be mapped on more
supporting documents, the more difficult it is for a party to falsify its identity.
The mapping process itself is quite simplistic and can be categorized as follows:
1.	 Statement to string confirmation
2.	 Statement to non-string confirmation
3.	 Statement to publicly available information confirmation
4.	 Statement to privately available information confirmation
5.	 Statement to government records confirmation.
Any identification process that can gather a maximum of the above mapping data is ideal for
counterparties to guarantee that they are dealing with a genuine person, however, it can be
disastrous for the sharing-party in the event of a security breach.
Statement 1
Statement 2
Statement 3
Statement n
Supporting 1
Supporting 2
Supporting 3
Supporting n
3
3. Fragmenting the Identification	
Process
Building on the previous identification process, the same mapping functions can be achieved
without the party disclosing any non-relevant data to a counterparty - by delegating the
mapping functions to unrelated third-party Validators. The statement, supporting evidence
and functions, would first have to be fragmented in such a way that third-party validators would
be confirming fragments of data that, on their own, cannot be used by any malicious third
party. However, together, the sum of confirmations would constitute a complete identification
process.
Identify Self
Statement containing:
Data 1,2,...,n
Supporting Evidence
containing:
Supporting 1,2,...,n
Fragmentaton &
Third Party
Validator
Allocation
Analysis of fragmented
decisions
Data
1
Supporting
1
Data
2
Supporting
2
Data
n
Supporting
n
Validator
2
Mapping
Validator
2
Decision
Validator
1
Mapping
Validator
n
Mapping
Final
decision
Reject
Identification
Validator
1
Decision
Validator
n
Decision
Accept
Identification
4
Considering a simple scenario whereby a counterparty requires confirmation of 3 string type
statements with an identification document as supporting evidence:
1.	 First Name: “John”
2.	 Last Name: “Doe”
3.	 Country: “Mauritius”
From the above information, a simplistic fragmentation can be derived by sending the 3 string
type statements to be confirmed with the corresponding section of the identification document
string to 3 different third-party validators who would each confirm the content of the string.
The summation of their independent validations
would hence be used as the equivalent of the counterparty itself validating the 3 string type
statements by itself. Contrasted with a traditional identification process, in the fragmented
identification process, the usefulness of the data is exponentially decreasing with the increase
in fragmentation.
Drawing on on the fragmented identification principle, statements can be further fragmented
to transform any useful string type statement into unintelligible data:
1.	 String Type Statement: John
2.	 Fragment A: “Jo”
3.	 Fragment B: “hn”
4.	 Fragment C: “oh”
Using the above process, we have rendered the string type statement, “John”, useless to
potential malicious third-party validators.
5
4.	 The IAME Identification				
	 Network
Party
Allocation Server
Party Address:
Address 1,2,...,n
Statement:
Data 1,2,...,n
Evidence:
Supporting 1,2,...,n
1. Request to Verify Statement
data 1,2,...,n
2. Request to Statement 1,2,...,n
and Supporting 1,2,...,n
4. Allocate Validation
Packet to Validators for
confimation
5. Validators Confirm
Statement for Party
Address
6.Hashes starement
confirmation on Blockchain
7. Updates Validation
Status for Client
3. Send Validation Packet
1,2,...,n
Validator
1
Validator
2
validation Server
Blockchain
Validator
n
...
The proposed IAME Identification Network would have a core that consists of 1) a client,
2) an allocation server, 3) a validation server, 4) a writeable blockchain, and 5) an identity
server. Each component would carry out specific functions that can be demonstrated in 2
processes - a validation process, and an identification process.
The validation process would be the operation through which the client would have her/his
information validated by third-party validators. The process is as shown below:
1.	 Upon request, statements and their corresponding supporting information would
be fragmented at the client level and encrypted into validation packets to be sent
to the allocation server.
2.	 The allocation server would control the random allocation of validation packets
to third-party validators, who would return the result of their validations to the
validation server.
3.	 Once the above is completed, the validation server would evaluate the validations
from the third-party validators, and hash numeric or boolean confirmations paired
to specific statements on a designated writeable blockchain.
Validation Process
6
For a counterparty to transact with a client, an identification process has to be completed.
This process is based on the counterparty’s own specific requirements.
1.	 Assuming that the counterparty requires Data 1,2,.. n to be validated for a specific
transaction with a party, the counterparty sends a request to the Identity Server
for the validation status of Data 1,2,.. n.
2.	 The Identity Server reads the blockchain for validation status of Data 1,2,..​n for
the party, and returns the validation data to the counterparty, and from thereon
the counterparty can complete the transaction.
Party
Blockchain
Party Address:
Address 1,2,...,n
Statement:
Data 1,2,...,n
5. Return validation status of
data 1,2,...,n to counterparty
6. Complete
transaction
4. Return validation
status of data 1,2,...,n to
identify server
3. Return Blockchain for
validation status of data
1,2,...,n for Party Address
1. Initiate Transaction
Requirement Data 1,2...,n
to be valid
for Party Address
2. Access identity server for validation
status of data 1,2,...,n for Party Address
Counterparty
Identity Server
As per the previous diagram, a party can self-identify her/his statements for transactional
counterparties, while the wholesomeness of sensitive data is retained solely by the owner of
the data, rendering acquisition of sensitive data by malicious third-party validators pointless.
While the IAME Identification Network would not be a bypass for data sharing between
transactional counterparties, it would serve to segregate the distribution and validation of
non-essential sensitive personal information.
Identification Process
7
5. The IAM Token
To operate the IAME Identification Network, a functional token will be issued, known as the IAM
Token, which would operate as a validation token to initiate confirmation requests for validation
packets on the IAME Identification Network. Parties would spend the token through the IAME
Identification Network client and after deduction of equivalent blockchain hashing costs, the
balance of IAM token would be paid out as reward to third-party validators who operate the
validation processes on a for-profit basis.
This would attribute not a store of value to the token but a market value based on natural
demand and supply for identification processes. The value of the IAM Token would be, in
essence, determined by 2 factors:
1.	 The cost of validation, which would be proportional to the financial cost of
hashing the requested amount of data on the designated blockchain, setting a
price floor for the token
2.	 Market demand, which would be proportional to the demand for blockchain
identification based on the IAME Identification Network
Because of the the ephemeral aspect of data validation in the field of identification, market
demand would remain recurring and would only increase with an increased adoption of the
IAME Identification Network.
8
6. Third Party Validation
Pursuant to the concept of the IAME fragmented identification system, there is a requirement
for a system of decentralised third-party validators under the rational that an identification
validation conducted by a multitude of third-party validators is more dependable and less
susceptible to the risk of fraud than an identification validation conducted by a single institution
or party. However, having a system that runs on a for-profit basis, where the third party is
“paid” to validate information, creates a natural tendency for participants to game the system
and collectively approve a validation process to receive a payout. The solution we propose
is a symmetric game model that will encourage truthful validation that is analogous to the
Byzantine Fault Tolerance - the Trial Algorithm.
Aspects of the Trial Algorithm:
1.	 Each statement and their corresponding supporting information are processed
as fragments ( “Evidence” );
2.	 Evidence is validated not by single third-party validators ( “Jury” ), but by a Jury
(a “Tribunal” );
3.	 Each jury validates in a designated method on whether the Evidence matches
the statements
4.	 The Tribunal validations are counted and a majority rule consensus is reached
5.	 If there is a non-majority consensus on an evidence, the evidence is sent through
a second tribunal ( “Appeal” )
6.	 If the appeal jury votes to a majority consensus identical to the initial tribunal,the
decision is upheld, or else the initial tribunal decision is rejected
9
The purpose of the trial algorithm is to support truthful validation and, most importantly,
genuine dissent in the event a significant portion of the third-party validators are corrupted in
their validation mechanism. In the proposed technical implementation, it is intended that the
third-party validators are blindly assigned tribunals, appeals, and control tribunals( “Control
Tribunal” ). Control tribunals are an allocation of non-matching statements to evidence, and
to third-party validators, such that the third-party validators are randomly subjected to double
blind procedures.
Fragmentation & Validator
Allocation
Allocation
i
Voting
Process
Appeal
Allocation
1
Allocation
2
Data
n
Supporting
n
...
Validator
i 2
Mapping
Validator
i n
Mapping
Validator
i 1
Mapping
Vote
decision
Accept
Hash on
Blockchain Reject
10
7. Reward and Ranking Mechanism
As a continuation to the Trial Algorithm, there is a need for a reward and a ranking mechanism
in such a way that good third-party validators are rewarded and bad third-party validators
penalized. For this mechanism, two reward systems are proposed: a token reward system
and a node ranking system.
1.	 The token reward system allocates a pool of IAM Tokens to the third-party
validators for completing the fragmented validation process akin to mining
2.	 The ranking system attributes an internal ranking system to third-party validators
within the IAME Identification Network, such that higher ranked validators receive
a higher proportion of the tokens, which is indicative of their ranks..
In principle, the determination of the allocation of any IAM token pool would be a function of
the outcome of the Tribunal, while the ranking system would be a function of the outcomes
of the Appeal and the Control Tribunal. Due to the application of a double blind procedure, the
third-party validators would not be at any time aware of whether they are in a Tribunal, an
Appeal, or a Control Tribunal - further reducing any risk of gaming the system. Third-party
validation would be open to the public and, in the long-run, poorly ranked third-party validators
would be banned from acting as nodes.
11
8. An Identification System for 		
Blockchain P2P Transaction
With a functional IAME Identification Network, the primary application would be the
facilitation of blockchain P2P transaction, such as online merchant transactions. Taking into
consideration a simple online purchase where a customer purchases a physical good from an
online merchant with Cryptocurrencies, the amount of personal data that is communicated
from the customer to the merchant can be segregated into two categories: essential to the
transaction and non-essential to the transaction.
1.	 Essential information would be a name and an address without which the
transaction and the delivery of the good cannot occur
2.	 Non-essential information would include, for example, an identity document to
prove the name of the customer, a utility bill to prove that the address belongs
to the customer, and the specific date of birth of the customer
The logic behind the conveyance of non-essential information is based out of regulatory
need. But with an alternative identification system, the same goal can be achieved without
disseminating the non-essential information, decreasing security risks for the customer and
decreasing the burden of security breaches for the merchant.
In the P2P scenario, the merchant would consult the public repository of the IAME Identification
network to verify whether non-essential information associated with the customer’s blockchain
address has been undertaken on the identification network. This could be either out of a
regulatory basis or for her/his own comfort level.
12
9. A Platform for Financial 	 	
Institutions
As the regulatory classification of Cryptocurrencies converges towards currencies, securities,
and/or software, there will be a need for some form of anti-money laundering procedures to be
applied, which can trace the source of the Cryptocurrencies - up to a level that can ascertain
that they are not from the proceeds of criminal activities. The use of public ledgers, though
being able to create an electronic trail up to the mining/creation of Cryptocurrencies, does not
identify the transitory wallets through which the Cryptocurrencies have been.
As an extension of the IAME Network and its public repository, the identification system
would be used in the construction of identified topological spaces that would provide financial
institutions with the tools to identify, to the nth degree, the origin of the Cryptocurrencies
they are handling.
The creation of a partially meshed system would provide financial institutions handling
Cryptocurrencies a level of comfort, to the nth level, on the source of Cryptocurrencies, which
would still constitute a more efficient anti-money laundering tool than current procedures for
Cryptocurrencies.
3rd degree
2nd degree
1st degree
13
10. Conclusion
The biggest source of security risk to persons identifying themselves is through the sharing
their personal data with counterparties. Encryption and conventional security measures can
work only to the extent that counterparties that handle the information are secure. However,
in an economy where the number of electronic transactions a person conducts is constantly
increasing, the number of points of potential vulnerabilities increase exponentially, decreasing
any advantage gained from security innovations.
Using the proposed IAME Identification Network laid out in this white paper, we seek to resolve
the problem parties face in blockchain transactions by having to identify themselves with a
multitude of counterparties, while both preserving the anonymity of the transacting party, and
satisfying the need for counterparties to conduct a certain level due diligence on clients.
There is both a practical imperative and commercial need for a non-invasive identification
system for decentralised blockchain technology and we believe that the IAME Identification
Network will be the bridge that will link blockchain technology to the regulated world.

More Related Content

Similar to IAME Blockchain Identity - Cryptocurrency ICO offer of IAM tokens & Ethereum

Factographic significance
Factographic significanceFactographic significance
Factographic significanceNadya_0802
 
Blockchain for AML: A next-gen AML solution ready for today’s complex financi...
Blockchain for AML: A next-gen AML solution ready for today’s complex financi...Blockchain for AML: A next-gen AML solution ready for today’s complex financi...
Blockchain for AML: A next-gen AML solution ready for today’s complex financi...Blockchain Worx
 
Block Chain Report By Abhishek Patel
Block Chain Report By Abhishek PatelBlock Chain Report By Abhishek Patel
Block Chain Report By Abhishek PatelAbhishek Patel
 
Blockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction MonitoringBlockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction MonitoringFloyd DCosta
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and ApplicationsSvetlin Nakov
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communicationmanish kumar
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - NotesKranthi
 
User authentication crytography in cse engineering
User authentication crytography in cse engineeringUser authentication crytography in cse engineering
User authentication crytography in cse engineeringmohmmedsahil111
 
Network Security
Network SecurityNetwork Security
Network SecurityBeth Hall
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Avirot Mitamura
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsKaashivInfoTech Company
 
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docxhyacinthshackley2629
 
Project security
Project securityProject security
Project securitymaryam H
 
Project security
Project securityProject security
Project securitymh77ha
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...prjpublications
 

Similar to IAME Blockchain Identity - Cryptocurrency ICO offer of IAM tokens & Ethereum (20)

Factographic significance
Factographic significanceFactographic significance
Factographic significance
 
Blockchain.docx
Blockchain.docxBlockchain.docx
Blockchain.docx
 
Blockchain for AML: A next-gen AML solution ready for today’s complex financi...
Blockchain for AML: A next-gen AML solution ready for today’s complex financi...Blockchain for AML: A next-gen AML solution ready for today’s complex financi...
Blockchain for AML: A next-gen AML solution ready for today’s complex financi...
 
Block Chain Report By Abhishek Patel
Block Chain Report By Abhishek PatelBlock Chain Report By Abhishek Patel
Block Chain Report By Abhishek Patel
 
Paper1_Final
Paper1_FinalPaper1_Final
Paper1_Final
 
Blockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction MonitoringBlockchain for Anti Money Laundering (AML) Transaction Monitoring
Blockchain for Anti Money Laundering (AML) Transaction Monitoring
 
Cupa pres a_2
Cupa pres a_2Cupa pres a_2
Cupa pres a_2
 
PKI and Applications
PKI and ApplicationsPKI and Applications
PKI and Applications
 
Mutual Authentication For Wireless Communication
Mutual Authentication For Wireless CommunicationMutual Authentication For Wireless Communication
Mutual Authentication For Wireless Communication
 
06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes06 Computer Image Verification and Authentication - Notes
06 Computer Image Verification and Authentication - Notes
 
User authentication crytography in cse engineering
User authentication crytography in cse engineeringUser authentication crytography in cse engineering
User authentication crytography in cse engineering
 
Network Security
Network SecurityNetwork Security
Network Security
 
Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)Digital certificate management v1 (Draft)
Digital certificate management v1 (Draft)
 
Distance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance fraudsDistance-bounding facing both mafia and distance frauds
Distance-bounding facing both mafia and distance frauds
 
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
1112015 search.proquest.comcriminaljusticeperiodicalsprint.docx
 
It act
It actIt act
It act
 
Project security
Project securityProject security
Project security
 
Project security
Project securityProject security
Project security
 
E-Business security
E-Business security E-Business security
E-Business security
 
A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...A secure payment scheme in multihop wireless network by trusted node identifi...
A secure payment scheme in multihop wireless network by trusted node identifi...
 

Recently uploaded

Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideCharleston Alexander
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?Alejandro Cremades
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesHaseebBashir5
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdflinciy03
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckHajeJanKamps
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Alejandro Cremades
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...AnaBeatriz125525
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product DiscoveryDesmond Leo
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...srcw2322l101
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfhostl9518
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future worldChris Skinner
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon investment
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesAlejandro Cremades
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfmstarkes24
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.smalmahmud11
 
Unveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the TwinsUnveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the Twinsmy Pandit
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxSaksham Gupta
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsStefan Wolpers
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsSlidesAI
 

Recently uploaded (20)

Engagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed GuideEngagement Rings vs Promise Rings | Detailed Guide
Engagement Rings vs Promise Rings | Detailed Guide
 
How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?How Do Venture Capitalists Make Decisions?
How Do Venture Capitalists Make Decisions?
 
Elevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO ServicesElevate Your Online Presence with SEO Services
Elevate Your Online Presence with SEO Services
 
Powers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdfPowers and Functions of CPCB - The Water Act 1974.pdf
Powers and Functions of CPCB - The Water Act 1974.pdf
 
Pitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deckPitch Deck Teardown: Terra One's $7.5m Seed deck
Pitch Deck Teardown: Terra One's $7.5m Seed deck
 
Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)Inside the Black Box of Venture Capital (VC)
Inside the Black Box of Venture Capital (VC)
 
What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...What is social media.pdf Social media refers to digital platforms and applica...
What is social media.pdf Social media refers to digital platforms and applica...
 
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
8 Questions B2B Commercial Teams Can Ask To Help Product Discovery
 
What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...What is paper chromatography, principal, procedure,types, diagram, advantages...
What is paper chromatography, principal, procedure,types, diagram, advantages...
 
Potato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdfPotato Flakes Manufacturing Plant Project Report.pdf
Potato Flakes Manufacturing Plant Project Report.pdf
 
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdfInnomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
Innomantra Viewpoint - Building Moonshots : May-Jun 2024.pdf
 
How to refresh to be fit for the future world
How to refresh to be fit for the future worldHow to refresh to be fit for the future world
How to refresh to be fit for the future world
 
Falcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small BusinessesFalcon Invoice Discounting Setup for Small Businesses
Falcon Invoice Discounting Setup for Small Businesses
 
Raising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE VenturesRaising Seed Capital by Steve Schlafman at RRE Ventures
Raising Seed Capital by Steve Schlafman at RRE Ventures
 
MichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdfMichaelStarkes_UncutGemsProjectSummary.pdf
MichaelStarkes_UncutGemsProjectSummary.pdf
 
Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.Team-Spandex-Northern University-CS1035.
Team-Spandex-Northern University-CS1035.
 
Unveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the TwinsUnveiling Gemini: Traits and Personality of the Twins
Unveiling Gemini: Traits and Personality of the Twins
 
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptxBlinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
Blinkit: Revolutionizing the On-Demand Grocery Delivery Service.pptx
 
Toyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & TransformationsToyota Kata Coaching for Agile Teams & Transformations
Toyota Kata Coaching for Agile Teams & Transformations
 
Creative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team PresentationsCreative Ideas for Interactive Team Presentations
Creative Ideas for Interactive Team Presentations
 

IAME Blockchain Identity - Cryptocurrency ICO offer of IAM tokens & Ethereum

  • 1. IAME An Expert System for Blockchain Identity Verification www.iame.io Nathaniel Tsang Mang Kin Suryani Chang
  • 2. Abstract A decentralized identification system that would allow parties performing blockchain transactions to verify, on a primary level, the identity of each other without having to dis- close non-essential sensitive personal information to the counterparties; and on a sec- ondary level the source of the Cryptocurrencies in the transaction. Identification would be conducted by a multitude of independent third party validators, each verifying fragments of information that together would constitute a complete verification, such that only the original owner of the sensitive personal information retains her/his data in a wholesome and useful way. The result of the identification process would be hashed onto a designated blockchain and made accessible on a public repository such that the identification status and source of the cryptocurrencies associated with specific blockchain addresses can be consulted, without compromising the unique identification data.
  • 3. 1. I ntroduction 1 2. Deconstructing the Identification Process 2 3. Fragmenting the Identification Process 3 4. The IAME Identification Network 5 5. The IAM Token 7 6. Third Party Validation 8 7. Reward and Ranking Mechanism 10 8. An Identification System for Blockchain P2P Transaction 11 9. A Platform for Financial Institutions 12 10. Conclusion 13 Contents
  • 4. 1 1. Introduction Current identification systems rely on people having to share their personal information and supporting evidence with counterparties in order to identify themselves and their source of wealth. Those counterparties hold the shared data wholly, and the more data a person shares with those counterparties, the easier it is to identify the person and their source of wealth. If a person is to transact with n counterparties, it results into a topological star network with n nodes, each acting as point of vulnerability to the data sharer. Regardless of security measures, the more data a person surrenders, the more severe the fallout from any potential security breach. All too often the counterparties/nodes do share the data partially or wholly with third parties, which in turn extends the initial star network, hence increasing the number of points of vulnerability in the former network. Technological innovation in encryption mostly work with regards to securing the transmission of data between two or more nodes in a network, however they do not address the issue of an increase in the number of nodes in a sensible data network. As the number of electronic transactions a person conducts increases in frequency, the number of nodes in their personal data network subsequently increases exponentially, consequently increasing the number of points of vulnerability. The solution we are proposing is to change the way the identification process is conducted to the point that a person’s data is fragmented prior to confirmation by a series of independent third parties, who are not affiliated to any parties within the transaction. The third parties would be assigned the task of confirming fractured pieces of personal data, which by themselves are useless to malicious parties, however, the sum of which would constitute a valid identification to the transactional counterparty. As a result of this, this would bypass the need for any transactional counterparty from having to process or store non-essential data. The above process would take place on the IAME Identification Network, a purpose-built system to service the fragmented identification process,fueled by the IAM cryptographic token. Functionality of the IAME Identification Network would principally serve Blockchain P2P transactions, however, usage would be extensible to merchant transactions and financial institutions in the provision of blockchain related services.
  • 5. 2 2. Deconstructing the Identification Process The conventional identification process starts with a party acceding to a request by a counterparty to identify itself so that that the counterparty may ascertain to a level with whom it is transacting. The party submits a statement filled with data that the counterparty has deemed to be necessary and the corresponding supporting evidence. After mapping the data to the supporting evidence, a decision is reached on whether identification of the party can be ascertained The process assumes that: if the party is genuine then all provided statements can be mapped onto supporting documentation. In principle, the more data that can be mapped on more supporting documents, the more difficult it is for a party to falsify its identity. The mapping process itself is quite simplistic and can be categorized as follows: 1. Statement to string confirmation 2. Statement to non-string confirmation 3. Statement to publicly available information confirmation 4. Statement to privately available information confirmation 5. Statement to government records confirmation. Any identification process that can gather a maximum of the above mapping data is ideal for counterparties to guarantee that they are dealing with a genuine person, however, it can be disastrous for the sharing-party in the event of a security breach. Statement 1 Statement 2 Statement 3 Statement n Supporting 1 Supporting 2 Supporting 3 Supporting n
  • 6. 3 3. Fragmenting the Identification Process Building on the previous identification process, the same mapping functions can be achieved without the party disclosing any non-relevant data to a counterparty - by delegating the mapping functions to unrelated third-party Validators. The statement, supporting evidence and functions, would first have to be fragmented in such a way that third-party validators would be confirming fragments of data that, on their own, cannot be used by any malicious third party. However, together, the sum of confirmations would constitute a complete identification process. Identify Self Statement containing: Data 1,2,...,n Supporting Evidence containing: Supporting 1,2,...,n Fragmentaton & Third Party Validator Allocation Analysis of fragmented decisions Data 1 Supporting 1 Data 2 Supporting 2 Data n Supporting n Validator 2 Mapping Validator 2 Decision Validator 1 Mapping Validator n Mapping Final decision Reject Identification Validator 1 Decision Validator n Decision Accept Identification
  • 7. 4 Considering a simple scenario whereby a counterparty requires confirmation of 3 string type statements with an identification document as supporting evidence: 1. First Name: “John” 2. Last Name: “Doe” 3. Country: “Mauritius” From the above information, a simplistic fragmentation can be derived by sending the 3 string type statements to be confirmed with the corresponding section of the identification document string to 3 different third-party validators who would each confirm the content of the string. The summation of their independent validations would hence be used as the equivalent of the counterparty itself validating the 3 string type statements by itself. Contrasted with a traditional identification process, in the fragmented identification process, the usefulness of the data is exponentially decreasing with the increase in fragmentation. Drawing on on the fragmented identification principle, statements can be further fragmented to transform any useful string type statement into unintelligible data: 1. String Type Statement: John 2. Fragment A: “Jo” 3. Fragment B: “hn” 4. Fragment C: “oh” Using the above process, we have rendered the string type statement, “John”, useless to potential malicious third-party validators.
  • 8. 5 4. The IAME Identification Network Party Allocation Server Party Address: Address 1,2,...,n Statement: Data 1,2,...,n Evidence: Supporting 1,2,...,n 1. Request to Verify Statement data 1,2,...,n 2. Request to Statement 1,2,...,n and Supporting 1,2,...,n 4. Allocate Validation Packet to Validators for confimation 5. Validators Confirm Statement for Party Address 6.Hashes starement confirmation on Blockchain 7. Updates Validation Status for Client 3. Send Validation Packet 1,2,...,n Validator 1 Validator 2 validation Server Blockchain Validator n ... The proposed IAME Identification Network would have a core that consists of 1) a client, 2) an allocation server, 3) a validation server, 4) a writeable blockchain, and 5) an identity server. Each component would carry out specific functions that can be demonstrated in 2 processes - a validation process, and an identification process. The validation process would be the operation through which the client would have her/his information validated by third-party validators. The process is as shown below: 1. Upon request, statements and their corresponding supporting information would be fragmented at the client level and encrypted into validation packets to be sent to the allocation server. 2. The allocation server would control the random allocation of validation packets to third-party validators, who would return the result of their validations to the validation server. 3. Once the above is completed, the validation server would evaluate the validations from the third-party validators, and hash numeric or boolean confirmations paired to specific statements on a designated writeable blockchain. Validation Process
  • 9. 6 For a counterparty to transact with a client, an identification process has to be completed. This process is based on the counterparty’s own specific requirements. 1. Assuming that the counterparty requires Data 1,2,.. n to be validated for a specific transaction with a party, the counterparty sends a request to the Identity Server for the validation status of Data 1,2,.. n. 2. The Identity Server reads the blockchain for validation status of Data 1,2,..​n for the party, and returns the validation data to the counterparty, and from thereon the counterparty can complete the transaction. Party Blockchain Party Address: Address 1,2,...,n Statement: Data 1,2,...,n 5. Return validation status of data 1,2,...,n to counterparty 6. Complete transaction 4. Return validation status of data 1,2,...,n to identify server 3. Return Blockchain for validation status of data 1,2,...,n for Party Address 1. Initiate Transaction Requirement Data 1,2...,n to be valid for Party Address 2. Access identity server for validation status of data 1,2,...,n for Party Address Counterparty Identity Server As per the previous diagram, a party can self-identify her/his statements for transactional counterparties, while the wholesomeness of sensitive data is retained solely by the owner of the data, rendering acquisition of sensitive data by malicious third-party validators pointless. While the IAME Identification Network would not be a bypass for data sharing between transactional counterparties, it would serve to segregate the distribution and validation of non-essential sensitive personal information. Identification Process
  • 10. 7 5. The IAM Token To operate the IAME Identification Network, a functional token will be issued, known as the IAM Token, which would operate as a validation token to initiate confirmation requests for validation packets on the IAME Identification Network. Parties would spend the token through the IAME Identification Network client and after deduction of equivalent blockchain hashing costs, the balance of IAM token would be paid out as reward to third-party validators who operate the validation processes on a for-profit basis. This would attribute not a store of value to the token but a market value based on natural demand and supply for identification processes. The value of the IAM Token would be, in essence, determined by 2 factors: 1. The cost of validation, which would be proportional to the financial cost of hashing the requested amount of data on the designated blockchain, setting a price floor for the token 2. Market demand, which would be proportional to the demand for blockchain identification based on the IAME Identification Network Because of the the ephemeral aspect of data validation in the field of identification, market demand would remain recurring and would only increase with an increased adoption of the IAME Identification Network.
  • 11. 8 6. Third Party Validation Pursuant to the concept of the IAME fragmented identification system, there is a requirement for a system of decentralised third-party validators under the rational that an identification validation conducted by a multitude of third-party validators is more dependable and less susceptible to the risk of fraud than an identification validation conducted by a single institution or party. However, having a system that runs on a for-profit basis, where the third party is “paid” to validate information, creates a natural tendency for participants to game the system and collectively approve a validation process to receive a payout. The solution we propose is a symmetric game model that will encourage truthful validation that is analogous to the Byzantine Fault Tolerance - the Trial Algorithm. Aspects of the Trial Algorithm: 1. Each statement and their corresponding supporting information are processed as fragments ( “Evidence” ); 2. Evidence is validated not by single third-party validators ( “Jury” ), but by a Jury (a “Tribunal” ); 3. Each jury validates in a designated method on whether the Evidence matches the statements 4. The Tribunal validations are counted and a majority rule consensus is reached 5. If there is a non-majority consensus on an evidence, the evidence is sent through a second tribunal ( “Appeal” ) 6. If the appeal jury votes to a majority consensus identical to the initial tribunal,the decision is upheld, or else the initial tribunal decision is rejected
  • 12. 9 The purpose of the trial algorithm is to support truthful validation and, most importantly, genuine dissent in the event a significant portion of the third-party validators are corrupted in their validation mechanism. In the proposed technical implementation, it is intended that the third-party validators are blindly assigned tribunals, appeals, and control tribunals( “Control Tribunal” ). Control tribunals are an allocation of non-matching statements to evidence, and to third-party validators, such that the third-party validators are randomly subjected to double blind procedures. Fragmentation & Validator Allocation Allocation i Voting Process Appeal Allocation 1 Allocation 2 Data n Supporting n ... Validator i 2 Mapping Validator i n Mapping Validator i 1 Mapping Vote decision Accept Hash on Blockchain Reject
  • 13. 10 7. Reward and Ranking Mechanism As a continuation to the Trial Algorithm, there is a need for a reward and a ranking mechanism in such a way that good third-party validators are rewarded and bad third-party validators penalized. For this mechanism, two reward systems are proposed: a token reward system and a node ranking system. 1. The token reward system allocates a pool of IAM Tokens to the third-party validators for completing the fragmented validation process akin to mining 2. The ranking system attributes an internal ranking system to third-party validators within the IAME Identification Network, such that higher ranked validators receive a higher proportion of the tokens, which is indicative of their ranks.. In principle, the determination of the allocation of any IAM token pool would be a function of the outcome of the Tribunal, while the ranking system would be a function of the outcomes of the Appeal and the Control Tribunal. Due to the application of a double blind procedure, the third-party validators would not be at any time aware of whether they are in a Tribunal, an Appeal, or a Control Tribunal - further reducing any risk of gaming the system. Third-party validation would be open to the public and, in the long-run, poorly ranked third-party validators would be banned from acting as nodes.
  • 14. 11 8. An Identification System for Blockchain P2P Transaction With a functional IAME Identification Network, the primary application would be the facilitation of blockchain P2P transaction, such as online merchant transactions. Taking into consideration a simple online purchase where a customer purchases a physical good from an online merchant with Cryptocurrencies, the amount of personal data that is communicated from the customer to the merchant can be segregated into two categories: essential to the transaction and non-essential to the transaction. 1. Essential information would be a name and an address without which the transaction and the delivery of the good cannot occur 2. Non-essential information would include, for example, an identity document to prove the name of the customer, a utility bill to prove that the address belongs to the customer, and the specific date of birth of the customer The logic behind the conveyance of non-essential information is based out of regulatory need. But with an alternative identification system, the same goal can be achieved without disseminating the non-essential information, decreasing security risks for the customer and decreasing the burden of security breaches for the merchant. In the P2P scenario, the merchant would consult the public repository of the IAME Identification network to verify whether non-essential information associated with the customer’s blockchain address has been undertaken on the identification network. This could be either out of a regulatory basis or for her/his own comfort level.
  • 15. 12 9. A Platform for Financial Institutions As the regulatory classification of Cryptocurrencies converges towards currencies, securities, and/or software, there will be a need for some form of anti-money laundering procedures to be applied, which can trace the source of the Cryptocurrencies - up to a level that can ascertain that they are not from the proceeds of criminal activities. The use of public ledgers, though being able to create an electronic trail up to the mining/creation of Cryptocurrencies, does not identify the transitory wallets through which the Cryptocurrencies have been. As an extension of the IAME Network and its public repository, the identification system would be used in the construction of identified topological spaces that would provide financial institutions with the tools to identify, to the nth degree, the origin of the Cryptocurrencies they are handling. The creation of a partially meshed system would provide financial institutions handling Cryptocurrencies a level of comfort, to the nth level, on the source of Cryptocurrencies, which would still constitute a more efficient anti-money laundering tool than current procedures for Cryptocurrencies. 3rd degree 2nd degree 1st degree
  • 16. 13 10. Conclusion The biggest source of security risk to persons identifying themselves is through the sharing their personal data with counterparties. Encryption and conventional security measures can work only to the extent that counterparties that handle the information are secure. However, in an economy where the number of electronic transactions a person conducts is constantly increasing, the number of points of potential vulnerabilities increase exponentially, decreasing any advantage gained from security innovations. Using the proposed IAME Identification Network laid out in this white paper, we seek to resolve the problem parties face in blockchain transactions by having to identify themselves with a multitude of counterparties, while both preserving the anonymity of the transacting party, and satisfying the need for counterparties to conduct a certain level due diligence on clients. There is both a practical imperative and commercial need for a non-invasive identification system for decentralised blockchain technology and we believe that the IAME Identification Network will be the bridge that will link blockchain technology to the regulated world.