IOTY Protocol, for worldwide IoT devices
  • πŸ•ΆοΈOverview
  • πŸ’‘Introduction
    • πŸ§˜β€β™‚οΈOur vision: make accessible IoT
    • πŸš€IoT: a growth market
    • πŸ€–Problem: interoperability
    • βš™οΈHow blockchain works
      • πŸ—³οΈTrust through blockchain
      • πŸ“”Automate actions with smart contracts
    • πŸŒ€Our solution to these challenges
  • πŸ˜Άβ€πŸŒ«οΈComplex ecosystem
    • 🌐Too much diversity of technologies
    • 🚧Each network as its own standard
    • 🎊Lack of interoperability
    • β›ˆοΈCascade of isolated systems
    • 🦸Business challenges
  • πŸ›‘οΈSafety and traceability
    • πŸ’’Insecure networks
    • πŸ–²οΈIoT data difficult to track
    • *️Cyber risks
    • πŸͺŸTrust needed
  • πŸͺ…CONNECTIFY' system
    • πŸ—οΈSeamless integration into CONNECTIFY
    • β˜€οΈCONNECTIFY: a problem resolver
    • πŸͺͺOur industrialization platform
    • πŸ’»Simple interface
  • πŸ’«IOTY Protocol
    • ✨Decentralized platform
    • ✍️Message signature
    • 🫧Encrypted storage
  • πŸ”…IOTY Network
    • πŸ“±App IOTY
    • πŸ“²SDK
    • β›³Wifi Geoloc
  • πŸ’ŽUse cases
    • πŸ’ Industry 4.0
    • 🧬Healthcare
    • 🏠Smart home
    • πŸ›΅Mobility
    • πŸ™οΈSmart cities
  • 🌽Grant Program
  • πŸ’²Tokenomics $IOTY
    • β›²Token Metrics
    • πŸ¦‹Overview of the $IOTY
    • πŸ–οΈMinting Mechanism
    • ❇️Use of Proceeds
    • 🐳Utilities
  • 🎯Roadmap and go to market
    • 🧩Milestones
    • πŸ‘¨β€πŸ’ΌTechnological and partnerships
    • πŸ’ΈFund-raising
    • πŸ›’long-term roadmap
    • πŸ‘₯KPI objectives
  • 🏁To conclude
  • 🏒Compagny
    • πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘¦Team
    • πŸŽͺMedia kit
    • βš–οΈDisclaimer
    • πŸ’₯Risks
Powered by GitBook
On this page
  1. Introduction

How blockchain works

Blockchain is a decentralized database distributed across multiple peer-to-peer servers.

It takes the form of an immutable register in which blocks of transactions are added and verified sequentially using a consensus mechanism. Each block contains a set of transactions, such as the sending of a message by a connected object in the case of CONNECTIFY. These transactions are validated and encrypted by network peers using complex protocols, making them tamper-proof and traceable. Each transaction or message is given a unique hash, a fingerprint that identifies it and guarantees its integrity. The blockchain register containing the secure history of all messages and transactions is duplicated on each peer server.

This massive distribution makes any retroactive modification impossible without altering the coherence of the whole, bringing decentralization and resilience.

PreviousProblem: interoperabilityNextTrust through blockchain

Last updated 1 year ago

πŸ’‘
βš™οΈ