IOTY Protocol, for worldwide IoT devices
  • πŸ•ΆοΈOverview
  • πŸ’‘Introduction
    • πŸ§˜β€β™‚οΈOur vision: make accessible IoT
    • πŸš€IoT: a growth market
    • πŸ€–Problem: interoperability
    • βš™οΈHow blockchain works
      • πŸ—³οΈTrust through blockchain
      • πŸ“”Automate actions with smart contracts
    • πŸŒ€Our solution to these challenges
  • πŸ˜Άβ€πŸŒ«οΈComplex ecosystem
    • 🌐Too much diversity of technologies
    • 🚧Each network as its own standard
    • 🎊Lack of interoperability
    • β›ˆοΈCascade of isolated systems
    • 🦸Business challenges
  • πŸ›‘οΈSafety and traceability
    • πŸ’’Insecure networks
    • πŸ–²οΈIoT data difficult to track
    • *️Cyber risks
    • πŸͺŸTrust needed
  • πŸͺ…CONNECTIFY' system
    • πŸ—οΈSeamless integration into CONNECTIFY
    • β˜€οΈCONNECTIFY: a problem resolver
    • πŸͺͺOur industrialization platform
    • πŸ’»Simple interface
  • πŸ’«IOTY Protocol
    • ✨Decentralized platform
    • ✍️Message signature
    • 🫧Encrypted storage
  • πŸ”…IOTY Network
    • πŸ“±App IOTY
    • πŸ“²SDK
    • β›³Wifi Geoloc
  • πŸ’ŽUse cases
    • πŸ’ Industry 4.0
    • 🧬Healthcare
    • 🏠Smart home
    • πŸ›΅Mobility
    • πŸ™οΈSmart cities
  • 🌽Grant Program
  • πŸ’²Tokenomics $IOTY
    • β›²Token Metrics
    • πŸ¦‹Overview of the $IOTY
    • πŸ–οΈMinting Mechanism
    • ❇️Use of Proceeds
    • 🐳Utilities
  • 🎯Roadmap and go to market
    • 🧩Milestones
    • πŸ‘¨β€πŸ’ΌTechnological and partnerships
    • πŸ’ΈFund-raising
    • πŸ›’long-term roadmap
    • πŸ‘₯KPI objectives
  • 🏁To conclude
  • 🏒Compagny
    • πŸ‘¨β€πŸ‘©β€πŸ‘§β€πŸ‘¦Team
    • πŸŽͺMedia kit
    • βš–οΈDisclaimer
    • πŸ’₯Risks
Powered by GitBook
On this page
  1. IOTY Protocol

Encrypted storage

On the cloud or private NAS as required

Although blockchain certifies data integrity, data must be stored securely once collected by the CONNECTIFY platform. Our solution offers great flexibility on the underlying storage architecture, to meet customers' specific confidentiality needs. Data can be persistently encrypted in a highly secure public cloud, or on a private cloud controlled by the customer. For cases requiring total control, data remains on on-site servers, with encryption keys controlled by the customer. In all cases, data is encrypted end-to-end. Only services authorized by the customer can access decrypted data, thanks to fine-tuned management of access rights. This flexibility of data storage offers a perfect balance between sovereignty, security and ease of implementation. The customer retains full control over the lifecycle of his data.

PreviousMessage signatureNextIOTY Network

Last updated 1 year ago

πŸ’«
🫧