IoT Chain
A HIGH-SECURITY
LITE IoT OS
Our vision
To implement impenetrable security in our Internet of Things network
To give control of data back to its rightful owner
To provide unparalleled stability and speed for data transfer
To promote the development of artificial intelligence through user data
IoT Chain

IoT Chain (ITC) is developed as a lite operating system using the blockchain concept and implementing PBFT, DAG, SPV and CPS technology, allowing data to be layered and stored in a decentralised manner and providing protection with the combined strength of the millions of IoT nodes within the network.

The technology will result in an economy of sharing for Internet of Things (IoT) devices in a decentralized and energy efficient environment while producing a wealth of valuable user data which can be used as fuel for the development of AI with users rewarded for providing this fuel.

Under this network, the interconnection of IoT devices of a home, a business or even a city can truly flourish without worry of transfer congestion, malicious attacks or losing privacy.

The implementation and monetization of ITC is not just a concept but has very real applications in the near future.

Read our white paper here

itc white paper

Complete version

itc white paper

simple version

solutions
Energy Solution

Less is more

Providing efficient transfers

Learn more >
Server Solution

Decentralizing the centralized

Reducing server costs

Creating impenetrable protection

Learn more >
Privacy Solution

Returning what’s yours back to you

Splitting user and personal data

Learn more >
Business Solution

Monetizing valuable user data

Selling user data without

breaching privacy

Rewarding users for generating user data

Learn more >

Energy Solution:

Less is more

Providing efficient transfers

Problem
Traditional methods of transfer are resource heavy and wasteful
Solution
ITC provides fast and efficient transfer using minimal resources

Described as OS Lite, the ITC operating system (OS) is developed with energy efficiency in mind in a world of mass consumption. Rather than using the concept that you need complex calculations or heavily encrypted data in order to be the best, the team takes the simple approach that less is more.

The ITC operating system is designed to work on everyday objects as simple as light bulbs imbedded with the ITC chip. Given the large array of IoT devices compatible with the operating system due to its lite nature, ITC has in effect created a network of nodes that is larger and faster than ever before. No more wasteful running of supercomputers, you just need to turn on your lights.

Described as OS Lite, the ITC operating system (OS) is developed with energy efficiency in mind in a world of mass consumption. Rather than using the concept that you need complex calculations or heavily encrypted data in order to be the best, the team takes the simple approach that less is more.

The ITC operating system is designed to work on everyday objects as simple as light bulbs imbedded with the ITC chip. Given the large array of IoT devices compatible with the operating system due to its lite nature, ITC has in effect created a network of nodes that is larger and faster than ever before. No more wasteful running of supercomputers, you just need to turn on your lights.

Server Solution:

Decentralizing the centralized

Reducing server costs

Problem
Large corporations spend millions of dollars each year maintaining their centralised servers.
Solution
ITC can provide decentralised data storage and transfer at a tiny fraction of the cost.

The ITC network consists of everyday IoT device such as lighting, smart locks and cell phones which are self maintained by the device owners.

Given that data storage and transfers are maintained within the ITC network consisting of millions of IoT nodes imbedded with the ITC chip, there are essentially no additional costs needed to maintain this network whenever additional data are transferred to the network. The network consists of everyday IoT devices such as lighting, smart locks and cell phones maintained by the device owners.

Creating impenetrable protection

Problem
Centralised servers are sitting ducks and prone to attacks.
Solution
Decentralised storage using ITC technology creates hundreds of millions of IoT nodes to prevent attacks.

While centralised servers rely on constant security monitoring and maintenance to ensure that the servers are not compromised, ITC removes the need to do so given that at least half of all nodes need to be taken down before security can be breached.

Although some technology may boast no fees for transfers as a selling point, the deliberate implementation of fees is what makes ITC the more secure technology given the cost the attackers would need to bear to try attack enough nodes.

The fees should not be seen as a compromise for security because by rewarding users for providing their generated user data to corporations, the money earned from such transactions will offset transfer fees and more, essentially making transfers free for legitimate users.

The ITC network consists of everyday IoT device such as lighting, smart locks and cell phones which are self maintained by the device owners.

Given that data storage and transfers are maintained within the ITC network consisting of millions of IoT nodes imbedded with the ITC chip, there are essentially no additional costs needed to maintain this network whenever additional data are transferred to the network. The network consists of everyday IoT devices such as lighting, smart locks and cell phones maintained by the device owners.

While centralised servers rely on constant security monitoring and maintenance to ensure that the servers are not compromised, ITC removes the need to do so given that at least half of all nodes need to be taken down before security can be breached.

Although some technology may boast no fees for transfers as a selling point, the deliberate implementation of fees is what makes ITC the more secure technology given the cost the attackers would need to bear to try attack enough nodes.

The fees should not be seen as a compromise for security because by rewarding users for providing their generated user data to corporations, the money earned from such transactions will offset transfer fees and more, essentially making transfers free for legitimate users.

Privacy Solution:

Returning what’s yours back to you

Splitting user and personal data

Problem
User and personal data are stored by corporations when an individual interacts with the corporation
Solution
ITC technology ensures all data remain with the individual but allow flexibility for data to be shared

Currently when we interact with a corporation, our personal data such as name, date of birth, address and even our credit card details are stored with the corporation. Most corporations then have little use for such personal data as they only value the user data generated from your habits for their internal business development.

The ITC network allows for all data generated by the individual to remain with the individual with the ability to split user data from personal data. As such, if the individual permits, they can provide their user data while retaining all person data.

Currently when we interact with a corporation, our personal data such as name, date of birth, address and even our credit card details are stored with the corporation. Most corporations then have little use for such personal data as they only value the user data generated from your habits for their internal business development.

The ITC network allows for all data generated by the individual to remain with the individual with the ability to split user data from personal data. As such, if the individual permits, they can provide their user data while retaining all person data.

Business Solution:

Monetizing valuable user data

Selling user data without breaching privacy

Problem
Corporations are unable to sell some of their user data due to attached personal data.
Solution
By splitting personal data from user data, user data can now be sold by corporations to interested parties.

User data is one of the most valuable commodity a corporation can own, whether it is grow their existing business based on user trends or developing new technology through artificial intelligence.

A large amount of generated user data owned by corporations is currently linked to personal data making it unethical and illegal to sell such data. By ensuring user data generated in the ITC network are not attached to personal data, corporations can ethically and legally sell their user data.

Rewarding users for generating user data

Problem
Only corporations are being rewarded for the user data generated by individuals.
Solution
Through the use of IoT devices in the ITC network, individuals are able to benefit from providing their user data to corporations.

User data used by corporations are all generated by individuals and therefore individuals should be rewarded for it. As such, user data generated under the ITC network belongs to the IoT device user and if corporations wish to have access to this user data, then they will need the user’s authority and reward the user accordingly.

This reward can be used to offset the transaction fees within the ITC network and more.

User data is one of the most valuable commodity a corporation can own, whether it is grow their existing business based on user trends or developing new technology through artificial intelligence.

A large amount of generated user data owned by corporations is currently linked to personal data making it unethical and illegal to sell such data. By ensuring user data generated in the ITC network are not attached to personal data, corporations can ethically and legally sell their user data.

User data used by corporations are all generated by individuals and therefore individuals should be rewarded for it. As such, user data generated under the ITC network belongs to the IoT device user and if corporations wish to have access to this user data, then they will need the user’s authority and reward the user accordingly.

This reward can be used to offset the transaction fees within the ITC network and more.

TIMELINE
2017/11/30

Main Chain
test begins

2018/01/30

Wallet test
begins

2018/04/30

Main chain test
accomplishes.

2018/05/20

ITC main-chain
wallet test
accomplishes.

2018/09/30

DAG structure
test begins

2018/12/30

DAG structure
gets online

2019/02/28

DAG structure
debug and main
network
accomplishes.

core TEAM
Xie Zhuopeng
CEO
in
He has been engaged in smart hardware field for four years and has profoundly studied blockchain for three years.He has participated in designing smart lighting architecture for several lighting companies at home and abroad. Besides, he has taken part in many designs of smart hardware architecture.
Lyu Xinhao
Co-Founder
in
Blockchain technology expert, who has been participating in Bitcoin field since 2013 and translated the first Chinese blockchain book "mastering bitcoin". Established the blockchain team at Xiaomi to solve the problem of isolated data islands in digital marketing. A blockchain evangelist who has been actively pushing forward the blockchain technology application and development worldwide.
Ding Ying
CTO
in
He has worked on development of chip’s firmware for 12 years, having experience in digital image, 3D model retrieval,compression algorithm processing of audio and video and financial software of bank card. Ding has deep understanding of chip’s hardware.
Zhao Tan
CFO
in
MBA from MIT Sloan School of Management,CPA of China, Singapore and FCCA of UK. He was APAC treasurer in a largemulti-national company, responsible for FX hedging, upkeep of bankinfrastructure (JPM), supply chain finance roll-out (DB), cash management,in-country funding strategy and financial risk management. He was selected intoJ.P.Morgan APAC Client Advisory Council in 2017.
Advisory TEAM
Liang Ran
He has been engaged in smart hardware field for four years and has profoundly studied blockchain for three years.He has participated in designing smart lighting architecture for several lighting companies at home and abroad. Besides, he has taken part in many designs of smart hardware architecture.
Ma Zhiwei
Vice president of Opple Lighting Co., Ltd (603515). After Opple’s going public, it became the world’s largest lighting company with more than 30 million yuan market value.
Ji Xinhua
Master of Shanghai Jaitong University and winner of first prize of Shanghai science and technology advancement. Ji took part in establishing standards for Unionpay credit cards’ encryption chips and for Central .
Guo Yuhang
Founder of DianRong and STARWIN capital, fintech-focusing investor. In 2012, Yuhang founded DianRong fintech company with Soul Htite, known as co-founder and CTO of the biggest lending platform Lending Club.
INVESTMENT AGENCY
TRADING PLATFORM
COOPERATIVE PARTNER
Media Partners