Identification with the IAME
How does identification function with IAME’s system?
Since we announced our project of developing a decentralised fragmented identification system, there has been much interest in what the technology is all about. We’ve been asked questions about how the tech would work and look to all parties engaging in the transaction. We are happy to announce that we built two prototypes – one for identification and one for validation. You can personally engage them and see how both function by visiting the identification prototype and the validation prototype.
In this prototype, we run through how the IAME based identification functions from the perspective of a user.
What is DFI?
Decentralised fragmented is the method that IAME’s system leverages to reinvent the entire blockchain identification process. With DFI, the data shared in these transactions is rendered worthless, given that it is first fragmented and then distributed among a series of independent third-parties – we discuss the validation aspect of our system in our next blog titled, “Validation with the IAME prototype”. These third-parties are not affiliated with any parties operating as members of the transaction.
For now, it’s worth mentioning that this network of third-party validators is assigned the task of confirming and verifying the validity of each of these fractured pieces of personal data, which by themselves are useless to malicious parties. The compilation of these fragments would constitute a valid identification to the transactional counterparty, thereby verifying the identity of initiating party.
If you would like to know more, please visit our Website and read our White Paper. Any feedback, comments, or questions can be asked directly to our team by visiting our Telegram Channel. For updates on IAME, you can follow us on Linkedin, Facebook or Twitter. Stay tuned to our blog series, for more of the latest news in the crypto and blockchain realms.