

Cryptographic Digital Identity Platform
Contextual, self-sovereign, distributed identity model for secure and trustable digital
Why Distributed Identity Architecture?

One Entity acts as both IDP and RP
Many IDPs authenticate users to single RP
One IDP serves many RPs
A Set number of IDPs authenticate users to Many RPs
Many IDPs serve Many Different RPs
Internal Identity Management
External Authentication
Centralized Authentication
Federated Authentication
Distributed Authentication
The implementation of centralized identity management architecture over years has turned digital identity stores into a honeypot
Centralized identity management is attracting hackers and fraudsters to steal the confidential data from enterprises
Object representation in digital identity should be a continuous process
It should be able to assimilate identifiers, attributes
Digital identity should be able to present required minimal persona as per the need and context of the business
The model can be viewed as a network or graph combining, consuming, strengthening other “identities” / attributes
I-AM follows a distributed architecture for maintaining digital identities for people and things
I-AM (अहम् inसंस्कृत ) identity model comes out with Novel “Cryptographic Markov Chain", a family of functions for digital representation of an object that takes care of the all the properties required for true object representation; namely uniqueness, dynamism, tamperproof, past-independent, attribute/ event provable association and provable verifiability and in control of physical world entity.
®
What are the challenges of digital identity today?
Trust
Privacy
Security
Inter-
operability
Usability
Digital identities need to be trusted
The identity without cryptography in digital accepts anyone who has access to the identity parameters as the authorized identity owner
Privacy of the identity online is fully left to the end user or end entity
Security of the digital identity today focuses only on secrets
Digital identities today are interoperable to an extent but they are not capable of ensuring non-repudiation
Digital identities are highly complex to be usable at scale, because it can't work without password