Fingerprints and Keys

24 Mar 2017 / CodaSiren

Fingerprints and Keys

We’re all familiar with Sherlock Holmes as investigator, dusting off some object for fingerprints. Fingerprints are unique to every person and an expression of our individuality.

As early as the year 650 the Chinese historian Kia Kung-Yen had already remarked that fingerprints could be used as a means of authentication. In the nineteenth century, it was rediscovered that they could be used to uniquely identify any person on this planet and therefore this data was included in many identification documents, from the start of the twentieth century.

For the Internet of Coins project, we have also been developing innovative ways of securely establishing the identity of an account owner, inspired by the time-honoured practice of the fingerprint. Instead of a literal fingerprint, we use a digital encryption key unique to every user’s account, that is used to ‘sign’ any transaction datagrams, so that both their origin as wel as the authenticity of their original content can be verified by the receiver at all times.

In this way, users of the Internet of Coins have a way of knowing that transactions cannot be forged or modified by third parties. The contents of private contracts are also fully encrypted and untraceable on the network by any but those parties involved in the transaction. To everyone who is not given the secret keys to the transaction, the information in the contract is simply indistinguishable from random noise and this guarantees the confidentiality and immutability of the contracts on the Internet of Coins infrastructure.

For ordinary users, this means you can be sure every contract that you offer, in payment for your service or product, will be treated confidentially. This means there is an encrypted channel containing multiple encrypted tunnels between you and your seller, and every step of the transaction is mapped on the way. If the seller unexpectedly breaks out of the contract process, it will cost him credibility and he will not be considered for transaction handling any longer, as his reputation and earnings are on the line.

This process is automatic. All our regular transactions will be fingerprinted also, in such a way that anonymized generic comparisons are possible. This way the system “knows” what a regular transaction looks like. If any transaction is irregular, the Internet of Coins will pick up on it and ask for extra verification. That way, you as user can decide for yourself what transaction limits you set for your stored value. Simple built in checks and services will help you to prevent overspending and it increases your security.

Using such methods Internet of Coins is designed to promote both a safe as well as decentralized architecture, with a focus to unify blockchains in a way that has not before been concieved, which is the basic Muir web of the cryptosphere. This means Internet of Coins is like a glue between various blockchain technologies, in how you administrate your energy, how you pay your bills, and how you participate in community decision making. That way the environment should offer people worldwide the tools to drive their organisations in a way that empowers their communities.



events Bitcoinference altcoins bitcoin Hybrid Assets history integration dapps decentralized meta-network inter-blockchain value exchange exchanges risk hacks multigateways smart contracts smart oracles assets cryptoequity merchants instability evolution revolution development consortium politics Virtual Bitcoin Expo Bitcoin Wednesday Ethereum Arnhem Bitcoin City eclectic architecture atomic transactions RPC calls Bitalo launch open source mammals crypto decentralisation cryptosphere economy autonomous banks dinosaurs Crypto Money Expo Bitcoin Embassy API future pizza day altcoin nxt xcp counterparty block explorer SIDN funding NLnet exchange peer shared mesh peersm technology cooperation beta New years eve Cyber.Fund blockchain finance ethics government manifesto update campaign Blockchain Expo London trust trustless fintech technologies tokens deterministic transactions internet of coins greenpeace Technologies Hybrid cross-blockchain environment crowdfund cross-blockchain Hybrid asset HYBRID weavechain immutable storage consensus column personal finance financial freedom authentication Fingerprints Keys decentralized anonymity social tech technological advancements economic freedom hybrid assets decentralized economy inter-blockchain connectivity P2P meta-network security cryptography NACL encryption Development evolution NEM Waves Bitshares Early Birds milestone hacking spree token release pricing schedule transparency grandma human readable hashstrings libraries missing PIN alpha wallet fundraiser hardware node virtual machine early bird VirtualBox DIY ICO Alert TOR live first transfer LSK grant release early holders pioneers distribution trade hybrid tokens third party exchange early holder scam policy trading preparation ethereum wallet ethereum blockchain CLI internet coins research low bandwidth multiple-token interchange etherdelta local storage usability legal hiring ERC20 token upgrade Ethereum foundation XHY ethereum classic ETC user interface teeny tiny token support torrent smart contract markets expansion command line asset management NXT blockchain star decentralized storage favourite cryptocurrencies dashboard token management user settings ISOC Internet Society awards startup script documentation hybridd node system Chaos Communications Congress Internet Innovation Award nomination beta wallet token mining Telegram altcoin implementation new website fridge channel