I-AM Cryptographic Platform 1.jpg
I-AM%20Font_edited.png

Cryptographic Digital Identity Platform

Contextual, self-sovereign, distributed identity model for secure and trustable digital

Why Distributed Identity Architecture?

Screen Shot 2020-12-16 at 4.39.33 PM.png

One Entity acts as both IDP and RP

Many IDPs authenticate users to single RP

One IDP serves many RPs

A Set number of IDPs authenticate users to Many RPs

Many IDPs serve Many Different RPs

Internal Identity Management

External Authentication

Centralized Authentication

Federated Authentication

Distributed Authentication

The implementation of centralized identity management architecture over years has turned digital identity stores into a honeypot

Centralized identity management is attracting hackers and fraudsters to steal the confidential data from enterprises

Object representation in digital identity should be a continuous process

It should be able to assimilate identifiers, attributes

Digital identity should be able to present required minimal persona as per the need and context of the business

The model can be viewed as a network or graph combining, consuming, strengthening other “identities” / attributes

I-AM   follows a distributed architecture for maintaining digital identities for people and things
 

I-AM (अहम् inसंस्कृत ) identity model comes out with Novel “Cryptographic Markov Chain", a family of functions for digital representation of an object that takes care of the all the properties required for true object representation; namely uniqueness, dynamism, tamperproof, past-independent, attribute/ event provable association and provable verifiability and in control of physical world entity.

®

What are the challenges of digital identity today?

Trust

Privacy

Security

Inter-

operability

Usability

Digital identities need to be trusted

 

The identity without cryptography in digital accepts anyone who has access to the identity parameters as the authorized identity owner

 

Privacy of the identity online is fully left to the end user or end entity

 

Security of the digital identity today focuses only on secrets 

 

Digital identities today are interoperable to an extent but they are not capable of ensuring non-repudiation

Digital identities are highly complex to be usable at scale, because it can't work without password