Know more about DIRO distribution of identity and access to apps

11224332_351292302047296_6614871744672956416_n


Everyone in this article will have a fun ICO analysis called Diro based on the following criteria:

What is DIRO?

DIRO distributed identity and access applications that support crowdsourcing contact lists on network, web, app, IoT, contract, smart AR / VR, and other domains that use people resources.

Automatic, systematic, latest contact information with one-click access to the service. Set the IVR option in contact, latency, last appointment, or live with the universe or unwise access.

Resource Directory The Crowd Contact Us

Reduce over 90% of contact management efforts.
Diro uses the power of the intelligence crowd to automatically tag people in the phone book for everyone.
When people join the phone book, efforts continue to fall by 50%, 66%, 75%, and so on.

Evidence of life insurance to guarantee digital identity

Live conversations with friends and family.
Identify Sybil as you talk to your family and friends by identifying your groups and devices in action.
Never use key fragments stored on other phones to recover lost keys without losing their private key.

Distributed IAM (dIAM) ($ 32 billion market by 2022)

Currently, IAM is highly fragmented and can be identified at various Silo service providers. The need for cybersecurity and access control grows at a complex level. In addition, billions of IoT devices can not be controlled by a centralized identity provider. Because the violation of these suppliers will prove to be a serious disaster.

The operating system directory

Automatic crowd of contact management is here:

Automatic contact configuration
Automatically receive lost contacts
Contacts that are updated automatically
Digital Identity for Block Chain
Phone numbers in human readable format:

Privacy
Control of Main Personal Information (DPKI)
Distributed Search (uPort)
Integration of KYC and AML
Human Identification (Certificate of Life)
Silo Identification

fae167_6907e1f61fdd4ba1977674dc612760df ~ mv2

Conclusion

The Contacts Directory provides a quick way to validate your digital identity using SPKI to perform a social KYC. It also offers the possibility of strong identity verification through human interaction and clear voice and video call interaction. Voice and video conversations provide a strong, certified, and sustainable stream of digital identity.

In addition, distributed identity platforms require secure public and private keys
The administrative and recovery process is required. The DPKI-based architecture and uPort require social evidence for key management and recovery.

Therefore, KYC social is an important element for authentication in many ways, such as creating distributed identity structures, such as key management, non-identity verification, and generation of life cycle authentication from other devices.

Screenshot_5

Contacts directory, based on MSDIN is a web application, blocking new areas of the chain, AR / VR and other Distributed identities in various domains, such as all industries as the user directory for the context and security (LDAP) and access management infrastructure It's open. Contact data from a crowd source with MSDIN provides a fast source for building a universal distributed identity system that is a holy grail that provides public benefits.

Screenshot_6

Extend trust with chain blocks

Identity and security to build trust is a key element in the chain of blocks. Contact directories or social graphs are a key component in distributing identity and access management. It is impossible to have a reliable identity and distributed security architecture without using social validation.

Please visit the links below to learn more about contributions and progress of this proposal.

Website   || WHITEPAPER   || Facebook   || Twitter   || TELEGRAM   ||

Comments

Popular posts from this blog

All about FLUX ico

All about the CINDX INVESTMENT ECOSYSTEM PLATFORM TRADING CRYPTOCURRENCY

An insight about Bouncy Coin - Putting Players in Control in gambling