IoT Chain
A HIGH-SECURITY
LITE IoT OS
Our Vision
To implement impenetrable security in our Internet of Things network To give control of data back to its rightful owner To provide unparalleled stability and speed for data transfer To promote the development of artificial intelligence through user data
Our Vision
To implement impenetrable security in our Internet of Things network
To give control of data back to its rightful owner
To provide unparalleled stability and speed for data transfer
To promote the development of artificial intelligence through user data
IoT Chain

IoT Chain (ITC) is developed as a lite operating system using the blockchain concept and implementing PBFT, DAG, SPV and CPS technology, allowing data to be layered and stored in a decentralised manner and providing protection with the combined strength of the millions of IoT nodes within the network.

The technology will result in an economy of sharing for Internet of Things (IoT) devices in a decentralized and energy efficient environment while producing a wealth of valuable user data which can be used as fuel for the development of AI with users rewarded for providing this fuel.

Under this network, the interconnection of IoT devices of a home, a business or even a city can truly flourish without worry of transfer congestion, malicious attacks or losing privacy.

The implementation and monetization of ITC is not just a concept but has very real applications in the near future.

DAG

Read our white paper here

itc white paper

Complete version

itc white paper

simple version

solutions
Energy Solution

Less is more

Providing efficient transfers

Learn more >
Server Solution

Decentralizing the centralized

Reducing server costs

Creating impenetrable protection

Learn more >
Privacy Solution

Returning what's yours back to you

Splitting user and personal data

Learn more >
Business Solution

Monetizing valuable user data

Selling user data without

breaching privacy

Rewarding users for generating user data

Learn more >

Energy Solution:

Less is more

Providing efficient transfers

Problem
Traditional methods of transfer are resource heavy and wasteful
Solution
ITC provides fast and efficient transfer using minimal resources

Described as OS Lite, the ITC operating system (OS) is developed with energy efficiency in mind in a world of mass consumption. Rather than using the concept that you need complex calculations or heavily encrypted data in order to be the best, the team takes the simple approach that less is more.

The ITC operating system is designed to work on everyday objects as simple as light bulbs imbedded with the ITC chip. Given the large array of IoT devices compatible with the operating system due to its lite nature, ITC has in effect created a network of nodes that is larger and faster than ever before. No more wasteful running of supercomputers, you just need to turn on your lights.

Described as OS Lite, the ITC operating system (OS) is developed with energy efficiency in mind in a world of mass consumption. Rather than using the concept that you need complex calculations or heavily encrypted data in order to be the best, the team takes the simple approach that less is more.

The ITC operating system is designed to work on everyday objects as simple as light bulbs imbedded with the ITC chip. Given the large array of IoT devices compatible with the operating system due to its lite nature, ITC has in effect created a network of nodes that is larger and faster than ever before. No more wasteful running of supercomputers, you just need to turn on your lights.

Server Solution:

Decentralizing the centralized

Reducing server costs

Problem
Large corporations spend millions of dollars each year maintaining their centralised servers.
Solution
ITC can provide decentralised data storage and transfer at a tiny fraction of the cost.

The ITC network consists of everyday IoT device such as lighting, smart locks and cell phones which are self maintained by the device owners.

Given that data storage and transfers are maintained within the ITC network consisting of millions of IoT nodes imbedded with the ITC chip, there are essentially no additional costs needed to maintain this network whenever additional data are transferred to the network. The network consists of everyday IoT devices such as lighting, smart locks and cell phones maintained by the device owners.

Creating impenetrable protection

Problem
Centralised servers are sitting ducks and prone to attacks.
Solution
Decentralised storage using ITC technology creates hundreds of millions of IoT nodes to prevent attacks.

While centralised servers rely on constant security monitoring and maintenance to ensure that the servers are not compromised, ITC removes the need to do so given that at least half of all nodes need to be taken down before security can be breached.

Although some technology may boast no fees for transfers as a selling point, the deliberate implementation of fees is what makes ITC the more secure technology given the cost the attackers would need to bear to try attack enough nodes.

The fees should not be seen as a compromise for security because by rewarding users for providing their generated user data to corporations, the money earned from such transactions will offset transfer fees and more, essentially making transfers free for legitimate users.

The ITC network consists of everyday IoT device such as lighting, smart locks and cell phones which are self maintained by the device owners.

Given that data storage and transfers are maintained within the ITC network consisting of millions of IoT nodes imbedded with the ITC chip, there are essentially no additional costs needed to maintain this network whenever additional data are transferred to the network. The network consists of everyday IoT devices such as lighting, smart locks and cell phones maintained by the device owners.

While centralised servers rely on constant security monitoring and maintenance to ensure that the servers are not compromised, ITC removes the need to do so given that at least half of all nodes need to be taken down before security can be breached.

Although some technology may boast no fees for transfers as a selling point, the deliberate implementation of fees is what makes ITC the more secure technology given the cost the attackers would need to bear to try attack enough nodes.

The fees should not be seen as a compromise for security because by rewarding users for providing their generated user data to corporations, the money earned from such transactions will offset transfer fees and more, essentially making transfers free for legitimate users.

Privacy Solution:

Returning what's yours back to you

Splitting user and personal data

Problem
User and personal data are stored by corporations when an individual interacts with the corporation
Solution
ITC technology ensures all data remain with the individual but allow flexibility for data to be shared

Currently when we interact with a corporation, our personal data such as name, date of birth, address and even our credit card details are stored with the corporation. Most corporations then have little use for such personal data as they only value the user data generated from your habits for their internal business development.

The ITC network allows for all data generated by the individual to remain with the individual with the ability to split user data from personal data. As such, if the individual permits, they can provide their user data while retaining all person data.

Currently when we interact with a corporation, our personal data such as name, date of birth, address and even our credit card details are stored with the corporation. Most corporations then have little use for such personal data as they only value the user data generated from your habits for their internal business development.

The ITC network allows for all data generated by the individual to remain with the individual with the ability to split user data from personal data. As such, if the individual permits, they can provide their user data while retaining all person data.

Business Solution:

Monetizing valuable user data

Selling user data without breaching privacy

Problem
Corporations are unable to sell some of their user data due to attached personal data.
Solution
By splitting personal data from user data, user data can now be sold by corporations to interested parties.

User data is one of the most valuable commodity a corporation can own, whether it is grow their existing business based on user trends or developing new technology through artificial intelligence.

A large amount of generated user data owned by corporations is currently linked to personal data making it unethical and illegal to sell such data. By ensuring user data generated in the ITC network are not attached to personal data, corporations can ethically and legally sell their user data.

Rewarding users for generating user data

Problem
Only corporations are being rewarded for the user data generated by individuals.
Solution
Through the use of IoT devices in the ITC network, individuals are able to benefit from providing their user data to corporations.

User data used by corporations are all generated by individuals and therefore individuals should be rewarded for it. As such, user data generated under the ITC network belongs to the IoT device user and if corporations wish to have access to this user data, then they will need the user's authority and reward the user accordingly.

This reward can be used to offset the transaction fees within the ITC network and more.

User data is one of the most valuable commodity a corporation can own, whether it is grow their existing business based on user trends or developing new technology through artificial intelligence.

A large amount of generated user data owned by corporations is currently linked to personal data making it unethical and illegal to sell such data. By ensuring user data generated in the ITC network are not attached to personal data, corporations can ethically and legally sell their user data.

User data used by corporations are all generated by individuals and therefore individuals should be rewarded for it. As such, user data generated under the ITC network belongs to the IoT device user and if corporations wish to have access to this user data, then they will need the user's authority and reward the user accordingly.

This reward can be used to offset the transaction fees within the ITC network and more.

TIMELINE
2018/05

Implement
modular
framework and
testbed

2018/07

Integrate all
components

2018/10

Provide public
test network

2018/11

Create
ecosystem for
developers

2018/12

Release of
IoT Chain to
public

core TEAM
Xie Zhuopeng
CEO
in
Xie Zhuopeng has been engaged in the field of smart devices for over four years, having designed many smart device architectures for companies both domestically and abroad during this time. His profound study of blockchain over the last three years has led to the perfect union of smart devices and blockchain through the co-founding IoT Chain.
Lyu Xinhao
Co-Founder
in
A blockchain expert and evangelist, Lyu Xinhao has been heavily involved in the field since 2013, translating the first blockchain book “Mastering Bitcoin” into Chinese. He was also responsible for establishing the blockchain team at Xiaomi, a multibillion dollar corporation, to solve problems associated with isolated data islands in digital marketing. Lyu's passion and desire to promote real world application of blockchain technology is the driving factor behind IoT Chain.
Ding Ying
CTO
in
Having over 12 years of experience in developing firmware for chips, Ding Ying's deep understanding of such technology is integral to the development of IoT Chain. Ding's expertise also extends to digital imaging, 3D model retrieval, audio and video compression algorithm and development of financial software for bank cards.
Zhao Tan
CFO
in
In addition to obtaining a MBA from MIT Sloan School of Management, Zhao Tan is also a recognized CPA in China,Singapore and FCCA in the UK. Zhao also worked as the APAC treasurer in a large multinational company being responsible for FX hedging, banking infrastructure upkeep, rollout of supply chain finance, risk management amongst many other duties. He was further elected into JP Morgan's APAC Client Advisory Council in 2017.
Advisory TEAM
Liang Ran
As an expert in blockchain technology, Liang focuses his studies on the issues relating to the transaction of assets. He co-edited the China Blockchain Technology and Application Development white paper issued by the Ministry of Industry and Information Technology as well as ChinaLedger's white paper. He is also the co-founder of RippleFox exchange, China's biggest Ripple and Stellar gateway.
Ma Zhiwei
Vice President of Opple Lighting, a company which became the world's largest lighting company after going public. Ma Zhiwei's business expertise and knowledge in lighting greatly assist the team at IoT Chain.
Ji Xinhua
Awarded first prize of Shanghai Science and Technology Advancement and being a Master graduated from Shanghai Jiaotong University, Ji Xinhua contributed to establishing standards for Unionpay's credit card chip encryption. IoT Chain strongly values Ji's strong experience in encryption.
Guo Yuhang
Founder of DianRong and STARWIN Capital, Guo Yuhang is a focused investor in fintech. In addition to his extensive knowledge in fintech, Guo has solid connection with the biggest lending platform, Lending Club. Guo's support of the IoT Chain project shows his confidence in its potential.
INVESTMENT AGENCY
TRADING PLATFORM
COOPERATIVE PARTNER
Media Partners