Use Cases – Accumulate https://accumulate.org An Identity-Based Blockchain Protocol Fri, 25 Nov 2022 22:19:38 +0000 en-US hourly 1 https://wordpress.org/?v=6.1.6 https://accumulate.org/wp-content/uploads/2021/09/blue-icon-acc.svg Use Cases – Accumulate https://accumulate.org 32 32 Use Case: Curbing the Effects of MEV Through ADI-Enabled Reputation Systems for Validators https://accumulate.org/2022/11/use-case-curbing-the-effects-of-mev-through-adi-enabled-reputation-systems-for-validators/ https://accumulate.org/2022/11/use-case-curbing-the-effects-of-mev-through-adi-enabled-reputation-systems-for-validators/#respond Wed, 23 Nov 2022 16:20:27 +0000 https://accumulatenetwork.io/?p=30025 Miner Extractable Value (aka Maximum Extractable Value for non-PoW blockchains) or MEV has taken the crypto world by storm in the past year. 

MEV is simply the reordering, inserting, or censoring of transactions within blocks in order to extract additional value beyond the standard block rewards or transaction fees that a validator would normally earn. It is also the method by which non-validators can identify and exploit front-running or arbitraging opportunities by paying higher gas fees to validators to insert their transactions first.  

Blockchains are decentralized networks consisting of validators who are tasked with recording and verifying transactions on the network. Validators earn transaction fees for adding new transactions to a block and a block reward when the latest block is added to the chain. 

Since validators have a final say on which transactions get added to blocks, they can take advantage of their position by inserting transactions that can generate the most fees for them into a block before others, or outright re-organizing the sequence of blocks on the chain so that the ones containing transactions that were submitted with the highest fees can be ordered first.

In cases where the exclusion of a certain transaction could lead to a large liquidation event, validators could theoretically exploit this opportunity by taking a short position on the token that would be liquidated as a result of not being included in the next block.  

Other market participants called ‘Searchers’ can also take advantage of MEV even without running a node. They do this by running sophisticated bots that scan the blockchain for high-value transactions that have yet to be picked up by validators, then essentially front-running them by paying a higher gas fee in order to get their transaction in for the same buy or sell order of a token but at a more preferential execution price. 

In other words, market participants seeking to exploit front-running and arbitraging opportunities are willing to pay a higher premium in gas fees to get their transactions added to the next block. Validators, who are rewarded by the transaction fees they earn through this auction-style system, are naturally incentivized to insert transactions into the next block that pay the highest fees, which usually come from front runners or arbitrageurs.  

What are the impacts of MEV? 

MEV is made possible due to a symbiotic relationship between well-capitalized traders and maximum profit-seeking validators. 

Unfortunately, this relationship comes at the cost of regular participants who are simply trying to buy tokens to acquire their favorite NFT, play a blockchain game or use a lending protocol.

For these people, MEV is considered to be an ‘invisible tax’ on their transactions, since it usually costs them more to execute a  transaction because they pay a high price due to front running. 

What are the impacts of MEV? 

Some consider the act of reordering transactions in order to front run or extract the most fees to be unethical, while others see it as a normal part of free markets. Front running is rampant within the traditional stock market. In fact, the industry of high-frequency trading is primarily built on the idea that there is more edge to be made in being the first to execute a transaction (and therefore executing at a better price) than trying to pick which direction the market will go. 

Regardless of the ethics around MEV, the fact remains that the benefits accrued through MEV can be massive and are anything but evenly distributed amongst the crypto populace. 

Only those who have a significant advantage in terms of technical capability and information asymmetry can reap the benefits of MEV.  

This brings up the question of whether MEV should be prevented for the sake of fairness or whether there can be a system put in place to incentivize MEV participants to distribute a portion of rewards accrued through front running and block reorgs to users of the network. 

How Could ADIs Prevent MEV? 

Accumulate Digital Identifiers or ADIs are a solution for assigning unique digital identities to assets, individuals, or entities on the blockchain. Its unique key management system allows individuals and entities to generate multiple wallet keys that are linked to an ADI.

ADIs have the potential to serve as a critical mechanism for enforcing behaviors that will either prevent MEV or make proceeds earned through MEV more equitably distributed to token holders.

For example, we could imagine a scenario where ADIs are assigned to wallet keys owned by searchers and validators. We could then create a system of penalties and rewards that accrue to the MEV participants’ wallets over time based on certain behaviors.   

For validators, penalties could come in the form of slashing a small amount of their staked ACME, deducting points from an assigned reputation score that may deter future token holders from wanting to delegate their tokens to the validator, or imposing a tax on transactions from the validators wallet that is distributed to the networks treasury (if MEV is an invisible tax on regular users of the network, we can think of this as a tax refund paid for by the largest beneficiaries of MEV). 

While these solutions may not completely prevent MEV, they can enable MEV to be minimized or at least leveraged in a way that benefits the entire network. 

Ultimately, MEV is a natural byproduct of market participants acting on incentives using open-source and permissionless technology. The benefits primarily accrue to well-capitalized and highly technical searchers, as well as validators who are purely driven by the need to maximize profit. Meanwhile, the costs accrue to regular users who are forced to pay for tokens and NFTs at higher prices due to front running. 

The extent to which MEV can be controlled largely depends on the network’s underlying protocols and the culture of those who inhibit that network (e.g speculators vs consumers).

Accumulate enables a way to institute identity and reputation at the base layer. This should make it easier to identify which validators are benefiting the most from MEV and which validators are only choosing to earn value through standard transaction fees and newly issued tokens. From this design, we can enforce rules that essentially tax MEV and distribute the proceeds to the network treasury, which it can then distribute back to token holders.

Linking the wallet addresses of validators on other chains to ADIs would likewise enable MEV wallets to be aggregated into a single transparent database. This would provide more transparency for users and Dapps to decide for themselves how or if they want to interact with MEV wallets. 

The possibilities that can be explored to curb the effects of MEV through digital identifiers and validator reputation systems is purely speculative at this current time. However, through Accumulate, we believe there is potential for lots of innovation in this area in the coming years. 

]]>
https://accumulate.org/2022/11/use-case-curbing-the-effects-of-mev-through-adi-enabled-reputation-systems-for-validators/feed/ 0
Use Case: Audit Trails for CeFi Creditors using ADIs https://accumulate.org/2022/11/use-case-audit-trails-for-cefi-creditors-using-adis/ https://accumulate.org/2022/11/use-case-audit-trails-for-cefi-creditors-using-adis/#respond Tue, 22 Nov 2022 21:10:19 +0000 https://accumulatenetwork.io/?p=30098 In recent months, there’s been another example of the damage caused by the lack of transparency within the world of CeFi crypto companies.

The decline in crypto prices set off a domino effect of imploding crypto hedge funds, lending companies, and exchanges that played loose when it came to risk management and safeguarding customer funds. 

The recent crash of FTX is by far the most egregious example of mismanagement of customer funds by a custodian that we have witnessed by a high-profile centralized exchange.

To give a quick summary of what happened: FTX skirted its fiduciary duty as a centralized custodian by lending customer deposits to its sister firm Alameda, a market-making & trading firm that was famous for providing liquidity to the crypto markets during DeFi Summer and infamous for allegedly using their close relationship with FTX to gain access to customers trading orders in order to trade against then.      

When Luna crashed and 3 Arrows Capital imploded, Alameda suffered a major loss to the tune of a few billion dollars. This loss threatened to put the firm out of business. 

Sam Bankman-Fried, the now former CEO of FTX, made the decision to plug the hole in Alameda’s balance sheet with deposits made by FTX users. 

This action exposed FTX to risks of insolvency in the event of a bank run, which is exactly what occurred when rumors of both Alamada and FTX’s financial woes led Binance CEO CZ to liquidate their stake in FTX by selling the exchange’s token FTT. 

This triggered a bank run on fears that FTT’s loss in value would lead to forced liquidation of FTX’s outstanding loans, creating further instability. The bank run naturally led to a pause on customer withdrawals, FTX bankruptcy filing, and all the revelations that have come to light since.  

What’s clear for this incident and the Celsius, BlockFi, and 3AC incidents is that there is far too much opacity in how CeFi companies operate their business. 

The simplest way to verify the solvency of a business is to look at its balance sheet, which should provide a clear breakdown of assets and liabilities. 

As private companies or companies that operate in offshore markets with limited regulation, these CeFi companies have no legal requirements to publicly share their balance sheets. 

This puts investors and especially users in the precarious position of having to trust that the company they are custodying their funds with, or the company who is borrowing their funds in order for them to generate yield on their crypto is solvent.

In the wake of the FTX crash, several exchanges have come forward to provide ‘proof of reserves’ as a way to rebuild trust with their customers. However, proof of reserves is simply a display of the number of assets that these exchanges have on their balance sheet, which is only half of the equation. 

As we said before, verifying the solvency of a business requires looking at a breakdown of both assets and liabilities. Regarding liabilities, this can be more complicated, as it involves not just knowing how much money the exchange owes, but also who the counterparties are that are owed this money.

Using ADIs to Create a Verifiable Audit Trail of CeFi Creditors 

This is a problem that is perfectly suited for decentralized digital identifiers (DIDs). 

DIDs refer to a system for assigning unique digital identities to assets, individuals, or entities on the blockchain. Accumulate Digital Identifiers (ADIs) build on this technology by presenting human-readable addresses that are chosen by individuals or assigned by organizations to represent their presence on the Accumulate Network. 

Accumulate Network can serve as the de facto audit and communication layer for the transmission and recording of all data relating to CeFi assets and liabilities. 

Everything from the list of individual creditors and the loan transaction receipts to the cold wallet addresses of crypto assets representing user deposits could all be registered as an ADI.

The goal would be to make it possible for anyone to observe the ratio of exchange assets to outstanding liabilities in real-time, and determine how safe it is to deposit funds to the exchange or Cefi lender based on this ratio.

Let’s walk through some examples of what this could look like: 

First, to briefly explain how CEXs and CeFi lenders manage user funds: 

CEXs and CeFi lenders are custodial services, where users are issued public key addresses that are all tied to a set of private keys owned by the platform. This gives the platform control over the underlying assets while still giving customers the ability to send and receive (with the platform’s permission) using the public key address tied to their account. 

On a centralized exchange, if a customer purchases 10 ETH with their credit card, I am required to purchase an equivalent amount of ETH and store it in a cold wallet to match the user’s holdings. Similarly, if the user deposits 10 ETH from their wallet, I must store that 10 ETH in my reserves so that I can deliver it back to the user if they choose to withdraw their funds. 

Customers who use CeFi platforms are essentially trading IOUs that they trust are fully backed by the exchanges reserves. All users crypto deposits are supposed to be backed 1-to-1 on the CeFi platform. This means 10 ETH of users’ deposits must be matched with 10ETH of reserves. 

Matching crypto deposits with cash reserves is highly risky because if crypto prices appreciate then it increases the mismatch between the value of IOU deposits and exchange reserves. The same mismatch can occur the other way around. 

If there is a mismatch in the value of the assets held by the exchange and the total IOU value of user deposits, it means that the exchange will be unable to fulfill all withdrawal requests if all users wanted to withdraw their funds at the same time. 

Now, even if the exchange has reserves that match or even exceed user deposits, one still needs to verify that only the users have claims on those reserves. 

For example, if 10% of an exchange’s reserves are loans that can be recalled at any moment, then in reality the exchange does not own that portion of their reserves even though they reside in their cold wallets. 

Similarly, if a CeFi Lenders promising to generate 8% APY with user deposits cannot provide a transparent audit trail to show who the counterparties are that borrowed user funds to provide that APY, then the user is taking much greater risk than they are aware of. 

Therefore, there are  2 important questions to answer: 1) how do we verify who has claims on the exchanges reserves? 2) How do we verify who are the counterparties that CeFi lenders are lending user deposits to? 

This is where the Accumulate Network can help CeFi platforms provide much greater transparency. Exchanges can onboard their lending counterparty to the Accumulate network and tokenize their loan agreements such that the size and terms of the loan are transparent for all users to see. 

These counterparties would serve a critical role of confirming the details of the loan by registering the exchange’s liability as an equivalent asset on their balance sheet. 

These details could be embedded into the subdomains of the exchange and creditors ADIs:

Exchange ADI string Creditor ADI string 
acc://exchange/acc://exchange/liabilitiesacc://exchange/liabilities/creditor-1acc://exchange/liabilities/creditor-1/balance acc://creditor/acc://creditor/assetsacc://creditor/assets/exchange-1acc://creditor/assets/exchange-1/balance 

Similarly, CeFi lenders could onboard all off-chain counterparties to whom they lend user deposits in order to generate yields.

 If these counterparties are transferring user funds to other counterparties, then this trail must be documented as well. The end goal should be for users of the CeFI lending platform to be able to locate the wallet address where their deposits are being held, regardless of how many counterparties it moves through. 

This is where the Accumulate key management system could provide value. It allows entities to generate multiple wallet keys that are linked to a decentralized digital identifier or ADI. Entities have access to a set of key books which reference multiple keys within a Key Page. Keys can be arranged based on a set priority. For example, you can create high-priority keys that are placed in cold storage for use in case your other keys are lost or compromised. 

In addition, each account or sub-identity on the Accumulate network can be designated a specific key page. You can have a key page consisting of keys for significant transactions such as moving funds on behalf of a DAO treasury of institutional clients and another key page for transactions of lower importance, such as testing newly deployed Defi smart contracts. 

Lastly, Key Books can also allow ADIs to update their security settings to include multi-sig transactions (transactions that require 2 or more digital signatures), delegated transactions (transactions that can be initiated by an external authority based on 3rd party verification), managed transactions (transactions that include self-imposed limits on spending or frequency) or other conditions without having to touch high-priority keys, thereby maintaining the highest possible security standards and minimizing vulnerabilities. 

Conclusion

These are just a few examples of how CeFi platforms can follow DeFi in offering a more transparent and auditable record of their balance sheet and activities. 

Given all that has happened in the past 6 months, exchanges and CeFi lenders should be highly incentivized to onboard all counterparties unto a digital identity layer like Accumulate. 

This will be an important first step towards restoring trust in their users and bolstering their reputation as entities that not only profit from but also believe in the power and ethos of blockchain technology.

]]>
https://accumulate.org/2022/11/use-case-audit-trails-for-cefi-creditors-using-adis/feed/ 0
Use Case: A Unified Digital Identity Layer for Multi-Chain Ads https://accumulate.org/2022/11/use-case-a-unified-digital-identity-layer-for-multi-chain-ads/ https://accumulate.org/2022/11/use-case-a-unified-digital-identity-layer-for-multi-chain-ads/#respond Fri, 11 Nov 2022 17:20:49 +0000 https://accumulatenetwork.io/?p=30071 Digital identities allow companies and protocols to link users actions from the top of the marketing funnel (engaging with a post on a decentralized social media site) to the bottom (connecting their wallet to a dapp, purchasing an NFT or token, etc). 

Accumulate aims to establish a communication and audit layer for all individuals, entities, and blockchains to transact with each other using Accumulate digital identifiers or ADIs – human-readable addresses similar to website URLs that are chosen by individuals or assigned by organizations to represent their presence on the blockchain.

We view digital identity as a core piece of Web3 infrastructure that provides legitimacy to the concept of ownership and property rights in the digital world.

In pursuit of this goal, a recognized challenge of Web3 is the lack of connectivity between the dozens of other blockchain-based identity solutions, each of which is vying for the same goal of achieving a universal identity layer. 

The ultimate purpose of a digital identity is to serve as a single source of truth and a standardized form of accounting for all on-chain and off-chain activities that the identity holder has participated in and for all digitally native and digitized (or tokenized) assets that they hold. 

Under this description, it is essential that a digital ID be integrated into every Dapp or blockchain that a user has adopted in order to represent that user in the most accurate and complete way possible. 

To this end, the Accumulate network is not just focused on creating its own digital identity layer for users to adopt, it is also focused on partnering with existing digital identity providers in order to consolidate these services under one universal indeed layer that can most accurately represent the Web3 space in its entirety. 

We believe creating a universal digital identity layer is the first step to enabling web3 marketing and advertising programs to become feasible, as companies and protocols will now have the means to understand who their users are at a much deeper level due to their consolidation of wallet addresses and decentralized IDs under a single digital identifier.  

.ENS (Ethereum) .Sol (Solana)ADI (Accumulate)ADI (Sub-ID) 
johnsmith.eth →j.smith.sol →acc://johnsmith →acc://j.smith

Multi-chain advertising and loyalty programs 

A unified digital identity layer can unlock massive potential for multi-chain loyalty programs. These are programs that would enable users to earn loyalty points by using Dapps across different blockchain networks. As the largest Dapps like Uniswap and Aave extend their utility to layer 2 networks and EVM-compatible chains, it only makes sense that many of the same users will be accessing those Dapps from different chains. 

The same thing can be said for app-chain ecosystems like Cosmos and Avalanche that are building a highly interoperable experience for users to migrate between games, NFT marketplaces, and DEXs.  

If these protocols want to reward users for their continued support of their products, they need a way to track which wallets from which chains belong to the same user. 

ADIs would massively improve the ability for companies to target users with ads that are most relevant to them based on their on-chain behavior, which will become more clear as their various wallets from different chains are tied to a single ADI. 

In line with the ethos of web3 and digital ownership, we can expect this experience to be one that benefits not only advertisers but also the end user by enabling them to monetize their data in a variety of ways. 

For example, we could see the emergence of decentralized advertising networks (DANs) that serve as an intermediary between ADI holders and the brands that wish to reach them based on their on-chain activity. 

These DANs could reward ADI users for opting into promotional campaigns by receiving a cut of the revenues the network earns from brands that pay to gain access. Plus, as a potential bonus, users could also receive a cut of the revenues generated from the sale of new products or services sold by those brands through the ad network.

All the user would need to do is connect their ADI to a smart contract, which would reveal to the DAN the history of Dapps and networks that the user has interacted with, enabling them to direct brand ads toward the most relevant users based on their on-chain activity. 

Over time, as on-chain activity amongst ADI holders grows, and as DANs are able to peer into the activities of more ADIs, their routing process will become even more tailored and sophisticated, resulting in more targeted ads and better ROI for brands.  

In another example, we could imagine a scenario where an ADI holder gets shown an ad for a new NFT based on the DAN being able to deduce that there is a 70% correlation between ETH addresses that minted a previous NFT they currently own and the addresses that are now minting this new NFT. Such analysis would significantly raise the chances of the ADI holder being interested in clicking that ad and purchasing the NFT. 

ADIs would also be a game changer for referral programs. Traditional online referral programs lack transparency, are easy to manipulate and are incapable of providing the type of sophisticated, second-order analysis that would make it possible for referrers to get rewarded over the course of a referred customer’s lifecycle with the product and affiliated products.

With decentralized digital identities and on-chain affiliate links, brands can easily verify where a user has come from and show proof to the referrer of how many people have interacted with their links. As the referred customers migrates from the first product to other on-chain products, this creates a trail that can be traced back to the original affiliate link, meaning the referrer can potentially reap the rewards from other affiliate programs simply by starting the user on a path to adopt one product, which leads to multiple over time. 

Multi-tiered affiliate programs would create a lot of value in the Defi space.

For example, Instead of getting rewarded one time when a referred user makes a trade on a DEX, referrers could receive multiple tiers of rewards based on that user trading on a DEX, then deploying capital on a lending protocol, then staking their assets on a different blockchain. All of this could be easily trackable using ADIs that consolidate wallet addresses and other decentralized domains. 

Ultimately, online marketing and advertising decisions have always been driven by insights brands gather through data. Blockchains provide a new medium in which the bulk of user data is transparent for everyone to see, yet brands have been unable to make commercial sense of this data due to the disparate nature of a multi-chain world and the challenges of dealing with pseudonymous addresses. 

ADIs represent a major step in the direction of enabling users to consolidate their on-chain activity under a single human-readable address. This presents a major opportunity for brands to connect the dots between users’ on-chain activity and their preferences as a consumer. 

With these insights, companies may finally begin to understand how to market to web3 consumers, a major catalyst that could drive the top brands in the traditional economy to embrace blockchain technology.

]]>
https://accumulate.org/2022/11/use-case-a-unified-digital-identity-layer-for-multi-chain-ads/feed/ 0
Use Case: How ADIs Leverage Social Connections To Enhance Economic Relationships https://accumulate.org/2022/11/use-case-how-adis-leverage-social-connections-to-enhance-economic-relationships/ https://accumulate.org/2022/11/use-case-how-adis-leverage-social-connections-to-enhance-economic-relationships/#respond Fri, 04 Nov 2022 15:17:49 +0000 https://accumulatenetwork.io/?p=30056 There is a concept in social psychology known as ‘six degrees of separation’ which states that all people are six or fewer social connections away from each other. 

This means that given any random sample of people from anywhere in the world, you can draw a linkage between their social relationships to find a mutual connection no more than 6 relationships away. 

This idea has many profound implications, including the idea that our world is much smaller and interconnected than we perceive it to be. With the advent of the internet and social networks, these links have become even more apparent as well as our capacity to form new relationships and collaborate on projects at a greater scale than in any other time in history 

In the same way that the internet has made the concept of six degrees of separation more relevant, we believe that the emergence of blockchains and decentralized digital identifiers will enable people to leverage social connections in new and exciting ways that are currently not possible with the current system. 

Digital Identifiers refer to a system for assigning unique digital identities to assets, individuals, or entities on the blockchain. On Accumulate, there are Accumulate Digital Identifiers (ADIs), which are human-readable addresses chosen to represent one’s presence on the blockchain. 

ADIs enable more flexibility and deployment of complex operations by issuing a hierarchy of keys with different permissions or levels of security. 

This allows entities operating on the blockchain to more easily build standardized yet scalable protocols for other entities to interact with and exchange sensitive information with them based on their access permissions for specific data sets.   

Using ADI’s, Accumulate can serve as the de-facto communication and audit layer between blockchains, enabling the seamless transfer of tokens or other kinds of digital assets between ADI’s across different chains regardless of their consensus mechanism. 

What this means is that every individual or entity who holds an ADI could potentially run a query that pulls all of their primary, secondary, and tertiary social connections on-chain and across chains. This would enable them to gain instant access to the full scope of their social networks and construct economic relationships based on where each connection falls within the spectrum of the 6 degrees of separation. 

For example, we could envision a lending protocol that structures loan terms that are not solely based on collateral or credit score, but instead based on where the borrowers sit along their spectrum of the 6 degrees of separation. 

If the borrower has a primary relationship with an existing borrower (i.e both borrowers have a pre-existing business relationship) then the interest payments and/or collateral requirements would be lower compared to if the borrower had a pre-existing business relationship with another entity that has a primary relationship with the first borrower, or if the borrower had a  pre-existing relationship with an entity that was 2 or more connections away from the first borrower.   

From a bank’s perspective, it is less risky to lend to a business that earns a significant portion of their revenues from an existing client whom they already trust (e.g a landlord that receives rent from a grocery store that has received a loan from the bank). 

This is in contrast to a business that has no prior or a weak relationship with the client and therefore is not part of the economic chain that the bank is already supporting.

On Accumulate, the ability to identify these types of relationships would become significantly easier overtime as more businesses adopt ADIs to present themselves on-chain. 

Managed transactions (a form of smart contracts on Accumulate) could be coded to operate based on on-chain analysis that identifies primary, secondary, or tertiary connections and adjusts the terms of the loan based on the strength of the connection. 

This same principle could be applied to solving complex logistics problems within supply chain networks, where the ability to identify and form relationships with secondary or tertiary connections could save companies millions of dollars in shipping and transportation costs. 

Ultimately, one of the most important factors for enhancing one’s capacity to leverage social connections is interoperability. Increased connectivity through the internet has accelerated our ability to identify primary, secondary and tertiary relationships and as a result, form new primary relationships that creates an entirely new set of secondary and tertiary connections, thereby exponentially expanding one’s social network. 

ADIs enable individuals and entities to experience this phenomenon through a transparent and permissionless blockchain network. 

By forming a unified communication, audit, and identity layer for the web3 ecosystem, we are expanding each member’s capacity to identify and form new social connections, while enhancing economic relationships through managed transactions that operate based on the degrees of separation between counterparties. 

]]>
https://accumulate.org/2022/11/use-case-how-adis-leverage-social-connections-to-enhance-economic-relationships/feed/ 0
Use Case: Creating an Interoperability Layer for the Physical World https://accumulate.org/2022/10/use-case-creating-an-interoperability-layer-for-the-physical-world/ https://accumulate.org/2022/10/use-case-creating-an-interoperability-layer-for-the-physical-world/#respond Thu, 13 Oct 2022 14:06:18 +0000 https://accumulatenetwork.io/?p=29992 Prominent investor and entrepreneur Peter Theil once stated that  “we’ve seen innovation in the world of bits, but not in the world of atoms”. This was in response to the question of whether technology has lived up to its promise to make the world a better place. 

The advent of blockchain technology has brought profound change to how we perceive money, governance, and the potential of open permissionless networks to create value. Yet this innovation has almost entirely been confined to the world of bits (i.e the internet and its digital economy). Meanwhile, the world of atoms (hardware, physical infrastructure, manufacturing, and supply chains) have seen almost no improvement from blockchain technology. 

For a variety of reasons, including regulations, costs, and liability, Innovation in the world of atoms has been notoriously more difficult to achieve than in the world of bits. 

Yet it is in the world of Atoms that technologies can truly build solutions that improve people’s lives. 

After all, we’re still physical beings that live in the real world and must consume physical things for survival. No amount of innovation in the metaverse will ever change this fact. 

So when it comes to the world of atoms, where are the key challenges we face and how can blockchain technology solve them? 

The first major challenge is broken supply chains. A common opinion shared by experts on humanitarian aid is that much of the world’s remaining problems with hunger do not stem from a lack of food but actually the inability to efficiently transport food and other resources to at-risk areas. 

Fundamentally, the problem is a combination of a lack of transparency and poor logistics that make delivering food, medicine, and other important things to people who need them.   

While blockchain cannot solve all of these problems, it is clear that by representing physical identities and goods on decentralized and permission-less databases, we can at least improve the amount of visibility into the logistics process and identify problem areas more efficiently. 

The Accumulate Network is designed to be a universal identity, audit, and communication layer for the traditional economy. Using ADIs, we can assign unique identities to individuals, groups, as well as physical goods such as bags of food, medicines, or other equipment. 

Improving IoT devices

One of the areas that we specialize in is the integration of IoT devices to blockchain networks. Currently, the challenges with IoT involves lack of efficient methods to store all the data that accumulates on IoT sensors, poor interoperability between manufacturers of these devices, which leads to siloed networks, and of course all of the classic problems that are incurred from centralized data systems, including weak security and lack of censorship resistance. 

IoT devices are a necessary solution to the problems of broken supply chains that make the distribution of food and medicines to at-risk populations more challenging. From a commercial standpoint, a unified supply chain network can radically reduce the costs for companies to distribute their goods globally and increase the efficiency in which faulty products can be identified and recalled. 

Accumulate is able to solve the problems of traditional IoT devices by assigning a unique digital identifier or ADI to each device, which can be controlled by wallet keys and managed through sophisticated authorization schemes. This enables owners of different sets of devices to decide how they want to share data with each other. 

For example, Governments and nonprofit organizations could coordinate food distribution efforts by sharing data on a single Accumulate chain. While non-profits assign ADIs to food packages that are being monitored by IoT sensors, governments could assign ADIs to citizens via their phone records. This would allow a link to be formed between the aid being distributed and the recipients in a way that is transparent and immutable. 

Proof of Physical State 

One of the ways in which innovation in the world of bits is also helping to accelerate innovation in the world of atoms is through the growing capacity for hardware devices like smartphones and IoT sensors to store and transmit data unto blockchain networks. 

This opens the door for critical problems in the physical world to be solved through real-time verification of data by people on the ground level. For example, we could create peer-to-peer delivery networks for transporting goods to places that are hard to reach or verify details about properties that require constant updates to be published to the blockchain in order for their ADIs to reflect their most recent physical state. 

By assigning ADIs to hardware devices like smartphones or IoT sensors, we can more easily enable owners of digital tokens that represent physical goods to verify proof of physical state. This is simply cryptographic proof that the details regarding something or someone in the physical world are in sync with their digital representation in the metaverse.

The easier it is to link the physical world with the digital one, especially when it is decentralized and transparent, the better companies and individuals can coordinate action in real-time to solve problems related to transportation, infrastructure, logistics, and more. 

Ultimately, the Accumulate Network is not only trying to solve critical problems with blockchain scalability and adoption through our identity layer, but also creating the infrastructure that will connect the physical world to the digital in a way that is decentralized, transparent, and propels further innovation to occur in the physical world.

]]>
https://accumulate.org/2022/10/use-case-creating-an-interoperability-layer-for-the-physical-world/feed/ 0
Use Case: Tokenizing Public Equity Markets https://accumulate.org/2022/10/use-case-tokenizing-public-equity-markets/ https://accumulate.org/2022/10/use-case-tokenizing-public-equity-markets/#respond Thu, 13 Oct 2022 14:03:11 +0000 https://accumulatenetwork.io/?p=29977 Public equity markets are one of the largest sectors of the global economy. As of 2022, the total market capitalization of domestic companies listed on stock exchanges worldwide is 105 trillion dollars, with US equities representing about 41% of this figure, and China representing about 11%.

Yet, despite the massive size of these markets, public equities remain heavily siloed to their specific regions, making it challenging for individual and institutional investors to access certain high-value markets and invest in international companies. 

One of the primary objectives of blockchain technology is the ability to leverage permissionless networks to create open and transparent capital markets. Thus far this has been achieved in the market for tokens, where 20,000+ tokens are tradable by anyone around the world who has access to an internet connection and digital wallet. 

However the same cannot be said for stocks, which are more regulated and in many ways are tied to the strength and accessibility of their host countries’ national currencies. 

This explains why countries with heavy capital controls like China also limit access to international investments in domestic public equities.  

The siloing of international equity markets has led to investors migrating their capital to markets that are more open and accessible. As a result, there is a high concentration of investments in the US stock market, which is the most open and capital efficient in the world. 

In our efforts to become a universal identity and communication layer for the web3 and traditional economy, Accumulate can create a bridge that connects all public equity markets in the world under a single distributed network. 

On this network, companies, stocks, regulators, audits and both Individual and institutional investors would be represented as ADIs. institutional investors could create sub-identities to represent different entities that each hold a different basket of stocks from a particular country. This would help make tax compliance and auditing more efficient, as each country may have different compliance and filing standards.

Similarly, all participants in the network would be represented as ADIs and have their identities authenticated for KYC and tax purposes. This is particularly important as equity markets are highly regulated and companies require certain disclosures from shareholders to adhere to regulations. 

Using Managed Transactions to Enforce Limits on Foreign Investments 

We’ve created systems for enforcing certain types of transactions using authorization schemes that could potentially enable capital to flow into more restrictive public equities markets while their governments can still maintain control. 

For example, certain ADIs could be designated to international investors, which, through managed transactions, would restrict the amount of capital that they could invest in tokenized stocks from a particular country, thereby enabling that country to maintain a target ratio of foreign-to-domestic investments in local public equities. 

Auditing Tokenized Stocks 

Tokenized stocks are actually just another form of real-world assets (RWAs) since they represent certificates of ownership of a company that operates in the traditional economy.  

Like other RWAs such as real estate, commodities, machinery, or accounts receivables, there is a significant need for auditing solutions to verify that the metadata embedded within these tokens accurately reflects the current state of the real-world asset, and that this data is frequently updated as the state changes. 

This task requires an immense amount of coordination between the off-chain physical world and the on-chain protocols that will support these tokens. 

Auditing firms such as PWC, Deloitte, E&Y, and KPMG  could be introduced to the Accumulate network to ensure that the metadata for tokenized stocks are frequently updated with accurate information. We can think about this structure like a network of auditing teams operating like oracle nodes, where each node would be delegated the responsibility of verifying and periodically updating data for a particular set of stocks, including earnings, outstanding shares, employee headcount, etc.

Auditors could earn ACME in the process, which would be generated from the transaction fees of tokenized stocks that are traded on the Accumulate network.

Increasing Liquidity 

The barriers to entry that currently exist in international equities markets lead to fragmented liquidity. This is because the wealthiest investors gravitate towards markets like the US and Europe because they are more open. As a result, the majority of the liquidity also ends up residing in those markets. 

On the other hand, most emerging markets suffer from poor liquidity because foreign capital is restricted in its ability to invest. This leads to poor price discovery for stocks and limited ability for business owners to fundraise from a well-capitalized network of public investors. 

A unified global equities market would enable liquidity to be more dispersed to different markets, enabling greater price discovery and stronger financial support for local companies with sustainable business models. 

Liquidity could be managed via decentralized liquidity pools or LPs. Entities who own stocks could partner with exchanges or banks to provide liquidity for niche markets, using ADIs as the core infrastructure for representing liquidity providers, tokenized stocks, and shares in the LP.  

Improving Verification of Underlying Assets

In using Accumulate ADIs to represent individuals, entities and assets on-chain, we would eliminate the need for unregulated decentralized protocols to offer tokenized stocks, a practice that has led to problems for token holders unable to redeem their tokenized stocks for their full value due to under-collateralization. 

Tokenizing stocks in a regulatory-compliant way ensures that the stocks are collateralized with real stock certificates and that there are qualified auditors who can update the metadata with the latest information about the stocks being traded.

Ultimately, Accumulate has the potential to connect several of the world’s disparate equity markets under a unified identity and communication and audit layer. 

]]>
https://accumulate.org/2022/10/use-case-tokenizing-public-equity-markets/feed/ 0
Use Case: An Enterprise Level Search Engine for Web3 https://accumulate.org/2022/09/use-case-an-enterprise-level-search-engine-for-web3/ https://accumulate.org/2022/09/use-case-an-enterprise-level-search-engine-for-web3/#respond Thu, 08 Sep 2022 20:47:38 +0000 https://accumulatenetwork.io/?p=29844 The current web3 ecosystem is a complex maze of Dapps, blockchains, and tokens that are often difficult to differentiate. Given the decentralized and open source nature of the industry, it is expected that there will be hundreds if not thousands of additional protocols launching over the next 5 to 10 years.

While this is great for consumers of these services, it presents a challenge for traditional businesses that seek to navigate this space in order to deploy capital or deliver services of their own on-chain. 

Today, products like Google are the primary source of information for nearly all sectors of the traditional economy that is represented online, particularly the tech sector.  

What makes Google so valuable is that it centralizes and indexes all of the web’s information in such a way that anyone can find the website they’re looking for, no matter what hosting service it uses or what category it falls under (e.g news, image, videos, research papers, etc). 

In the same way that Google has made web2 less complex to users, the web3 space needs its own search engine for individuals and companies to navigate the rapidly expanding ecosystem.

An ADI Enabled Data Index

As a universal communication, identity, and audit layer, one of the most promising potential use cases for the Accumulate Network is to create a data index and search engine for the entire crypto ecosystem. 

This web3 search engine would enable individuals and traditional companies to better understand where to find the best yield-generating opportunities, the largest liquidity pools, and the most vibrant communities. It would also allow them to avoid the riskiest or least secure protocols.

The way this solution would work is by linking each blockchain, sidechain, or L2 block explorer to an Accumulate Account chain, then having ‘data providers’ on each account chain import and authenticate data from their assigned blockchain explorer, which would then be represented as a series of ADIs and sub-identities. 

One example of this could be a group of Account chains that each aim to catalog the top 10 largest transactions each day from their assigned network. 

Data providers would stake ACME as collateral to ensure honesty as they collect this data. They could then use APIs or manual processes to pull in the data and create a new entry on the Account chain. Other validators would need to verify the entry to ensure it is accurate before it is accepted and assigned an ADI. The provider that submitted the entry would then be rewarded with ACME tokens for their contributions. 

This is similar to the Chainlink model where requests for data are sent out to the public and then service providers must then stake the LINK token to retrieve and submit the requested data. 

Over time, Accumulate can build a fully transparent and authenticated index of multi-chain block explorers, which can then serve as the backend to a powerful web3 search engine. 

Filtering for Risky Addresses and Protocols 

The benefit of an ADI-enabled web3 search engine is that it can create the necessary filters for companies looking to interact with low-risk, regulatory-friendly protocols. 

Data providers can flag protocols that have recently been hacked, or addresses that have been blacklisted on various blockchains to create a centralized directory for companies to reference. 

Data providers can also aggregate whitelisted addresses from multiple networks, making it easier for businesses to market their products and services to compliant customers. 

All of this data would be registered as ADIs and continually updated to provide the latest record of whitelisted and blacklisted addresses or protocols. 

This would provide a safer and more convenient way for enterprises and other highly regulated institutions to navigate the public blockchain space while minimizing the contamination that comes from transacting in liquidity pools or protocols where addresses associated with criminal behavior may reside.

Conclusion

Our industry is in critical need of a search engine and indexing solution that can aggregate information from block explorers to provide a clear and concise map of the crypto ecosystem. 

Accumulate Network has the potential to provide this solution through its decentralized community and audit layer built using ADIs as the key format for representing data from multiple blockchains on the Accumulate Network.

]]>
https://accumulate.org/2022/09/use-case-an-enterprise-level-search-engine-for-web3/feed/ 0
How Accumulate Enables Better Compliance For Blockchain Privacy Tools https://accumulate.org/2022/09/how-accumulate-enables-better-compliance-for-blockchain-privacy-tools/ https://accumulate.org/2022/09/how-accumulate-enables-better-compliance-for-blockchain-privacy-tools/#respond Thu, 01 Sep 2022 22:12:44 +0000 https://accumulatenetwork.io/?p=29785 In the wake of the recent bans of crypto mixing services, privacy has once again become a focal point of the web3 community. While the long-term implications of these events remain unknown, what’s clear to many in the crypto space is that there need to be better solutions to enforce the self-regulation of privacy tools. 

As a reaction to the ban,  stablecoin providers began blacklisting addresses that had previously engaged with the mixing services, creating a serious dilemma for a number of users.  

There is a type of cross-contamination between real bad actors (e.g state-sponsored hackers) and well-meaning individuals who wish to have privacy for their transactions in order to donate to political causes such as the Ukraine crisis, or simply to make payments to people without revealing how much crypto they own in their sending wallet.

What’s clear is that distinctions need to be made between these different groups of users so as not to conflate the privacy-conscious users with the malicious-minded actors. 

A Credibly Neutral Audit Trail for Private Transactions

Accumulate can solve this problem by establishing an identity, audit, and communication layer for addresses that wish to use privacy tools while signaling to regulators that they are being compliant with KYC and AML regulations.  

We can think about the Accumulate Network as a neutral space where well-meaning users of privacy tools could register an ADI linked to some form of off-chain personal identification (a bank account, state ID, etc). The individuals or entities could then connect their ADI to addresses that engage in private transactions on other chains, providing an audit trail that is accessible when needed for tax purposes or other reasons. 

The Accumulate layer would link all ETH addresses associated with private transactions, creating an audit trail for users who wish to conduct private transactions in a regulatory-compliant manner.

Separating The ‘Good’ and ‘Bad’ Users of Privacy Tools

What this solution could provide is a way for users of privacy tools to demonstrate their intent by creating an audit trail for their private transactions on a 3rd party network. 

The user’s ADI could be hosted on a private permissioned version of an Accumulate chain, or public permissionless one where it would be formatted in such a way as to preserve anonymity.  

In either case, the ADI would not be known to those who transact on the network that offers the privacy tools. For example, Ethereum users would not be able to link 2 addresses together if they transferred funds with each other using a mixing service. However, the owner of the ADI would link those addresses themselves (or have them linked by an audit service) and then store the audit trail on Accumulate.  

While banned mixing services did offer a compliance feature that would enable users to download a report of their transactions on the mixing service, it is only natural that regulators would be skeptical of the accuracy of this feature knowing that it came from the privacy tool itself instead of a neutral 3rd party. 

Establishing a 3rd party network that provides users of these tools with the ability to signal their intent to use them for legal purposes allows regulators and exchanges to more easily distinguish between different types of users and prevents much of the cross-contamination of ‘good’ and ‘bad’ addresses that we’ve seen in recent weeks. 

Over time, addresses that engage in private transactions but have not linked themselves to an ADI could be placed in a higher category of risk compared to those that are linked to ADIs which are themselves linked to some form of off-chain and official form of identification. 

This data could not only be useful for regulators and exchanges but also for everyday users who don’t want to transact with addresses that engage in private transactions without an ADI. 

Another benefit of adopting this solution is that it removes the need to classify specific tokens as high or low risk, which is ultimately a futile effort because of the fungible and divisible nature of cryptocurrencies. 

Conclusion

Coming to a place of understanding between citizens and governments about what qualifies as an acceptable use of privacy tools is not something anyone can expect to solve overnight. However, with the help of Accumulate’s identity and communication layer, there can be a compromise that allows users to create a transparent audit trail of their private transactions on a credibly neutral platform, giving regulators an easier way to scope out high-risk addresses from those that simply want to protect their privacy for social,  security or commercial reasons. 

Ultimately, by providing more compliant ways for users to adopt privacy technologies, Accumulate can enable these technologies to unlock their full potential. 

For mixing service tools, coins like Monero, or Zero-Knowledge proof based Dapps, this means empowering individuals and entities to leverage public blockchains without having all of their activities displayed on-chain, and more importantly, without the risk of being mistakenly associated with criminal activities.

]]>
https://accumulate.org/2022/09/how-accumulate-enables-better-compliance-for-blockchain-privacy-tools/feed/ 0
Data Mapping Infrastructure: Merkle Trees & BPTs https://accumulate.org/2022/08/data-mapping-infrastructure-merkle-trees-bpts/ https://accumulate.org/2022/08/data-mapping-infrastructure-merkle-trees-bpts/#respond Wed, 03 Aug 2022 20:39:17 +0000 https://accumulatenetwork.io/?p=29688 Merkle Trees are a core component of blockchain architecture and design. For the Accumulate network, Merkle Trees are the glue that ties together Accumulate’s chains-of-chains architecture and enables disparate networks to remain in sync with one another even as they operate independently. 

What is a Merkle Tree?

A Merkle Tree is a hierarchical data structure that succinctly encodes large batches of data in the form of a Merkle root or hash.

There are several layers that make up a blockchain network, the most foundational of which is the data layer. This is where data about the digital signatures and hashes that make up all transactions within a blockchain are stored. 

The Data layer consists of the 3 main components: blocks, merkle trees and digital signatures.  

  1. Blocks are data structures that are used to bundle sets of transactions and distribute them to all nodes on the network. 
  2. A Merkle tree is a binary tree of hashes. Hashes cryptographically record details from the previous block in the chain, including the timestamp and transaction values. The hash is then used to chain a new block to the previous block.
  3. Digital signatures are signatures that use asymmetric cryptography to secure information about the block, transactions and transacting parties. Transactions are digitally signed on the blockchain to ensure the security and integrity of the data stored on it. 

As the name suggests, Merkle trees are essentially the connective tissue for not just individual blocks within a chain but also independent blockchains that want to stay synchronized.

Hashes are like certificates that allow you to verify the history of transactions within a Merkle tree through simple computation. Using root hashes, each chain on the Accumulate network connects to the other to form a growing Merkle tree of data. This tree is where we get the concept of a ‘chain of chains’, as every chain within a Block Validator Network (BVN) or Directory Network (DN) can be considered a side chain of its respective BVN/DN root anchor chain.

Accumulate Chains-of-Chains architecture connected by merkle tree & hashes: 

Each BVN can contain multiple accounts, each of which has a Signature Chain and a Main Chain. Each BVN (and the DN) has a Synthetic Transaction Chain, a Root Anchor Chain, and one or more Intermediate Anchor Chains. These are collectively referred to as system chains, as they are not tied to any specific account and are used by the system as a whole.

Binary Patricia Trie (BPT)

The Binary Patricia Trie (BPT) is another component of Accumulate’s chains of chains architecture. It is responsible for collecting hashes that represent the current state and history of all accounts in a BVN or DN, thereby helping to keep the entire network in sync. 

Use Cases: Cross-Chain Lending and Audit Trails 

Merkle Trees and BPTs are both essential components of Accumulates modular architecture and play a key role in the implementation of various use cases, particularly around interoperability and cross chain bridging.

By inputting hashes of one chain’s data into another, blockchains can keep an updated record of the state of other chains, enabling value transfer between chains to occur with little friction and full transparency.

Markle Trees and BPTs also serve a critical role in helping Accumulate function as an audit layer for cross-chain activities. This can include bridge transactions, managed or delegated transactions between organizations, or transferring and storing of real-world assets. 

Let’s say you are developing a cross-chain lending protocol that aims to process loans as managed transactions to different Accumulate accounts/chains. 

Merkle Trees would provide you with a transparent audit trail of all loan transactions that occur across different chains. The BPT would enable you to tie these activities together to the BVN and DN, ensuring that the broader network is able to update its own state to reflect these lending transactions. 

You could even extend loans to blockchains outside of the Accumulate network and use hashes to record those transactions on various chains. This would make it easier to expand credit throughout the web3 ecosystem without incurring risks due to a lack of coordination between smart contracts. 

Ultimately, Merkle trees serve as a critical mapping infrastructure for data that is recorded on a blockchain and across blockchains. The ability to cryptographically record details about a transaction in the form of a hash that links to other hashes and forms a merkle tree insures that no matter how expansive and complex the web3 ecosystem becomes there will always be a transparent audit trail for users to look back on to ensure that the data is correct, verified and can be trusted.  

]]>
https://accumulate.org/2022/08/data-mapping-infrastructure-merkle-trees-bpts/feed/ 0
How Accumulate Provides Blockchain Infrastructure for Identity and Security Management https://accumulate.org/2022/07/how-accumulate-provides-blockchain-infrastructure-for-identity-and-security-management/ https://accumulate.org/2022/07/how-accumulate-provides-blockchain-infrastructure-for-identity-and-security-management/#respond Wed, 20 Jul 2022 15:55:22 +0000 https://accumulatenetwork.io/?p=29602 Web3 is a user-centric vision of the World Wide Web that adds blockchain technology to the backend of the existing internet to create a more open, trustless, and decentralized network. The core promise of Web3 is the ownership of one’s data and identity, which allows users to manage and monetize their content without the interference of a third party and engage with decentralized organizations, applications, and marketplaces through their digital identities. 

The market opportunities for Web3 extend from the art world to the financial sector, and the potential for mass adoption is reflected in the billions of dollars locked in DeFi smart contracts. However, technology challenges are hindering the institutional adoption of DeFi, which forms the financial backbone of the broader Web3 ecosystem. Security and identity are inflexible, scaling solutions are immature, and the integration of blockchain with legacy technology is more of an afterthought than a deliberate design decision.  

The Accumulate protocol is a blockchain that was designed around the Web3 needs of enterprise users and the DeFi needs of institutional investors. Its internal architecture scales linearly with adoption, and its throughput is high enough to support payment rails, IoT networks, and high-frequency trading platforms. Most importantly, the identity and security infrastructure of Accumulate is flexible enough to meet the dynamic needs of clients and adapt to the evolving Web3 ecosystem. 

Accumulate can model an organization’s structure 

An organization’s basic structure can be modeled on the blockchain as an interactive and dynamic hierarchy of identities. For example, a large company may have branches, departments, employees, and clients whose responsibilities may change over time. These hierarchies are difficult to reproduce on most blockchains because they’re organized around transactions and constrained by blocks. 

Accumulate is organized around human-readable, URL-based addresses that we call Accumulate Digital Identifiers (ADIs). URL addressing facilitates the integration of Accumulate with websites and mobile apps, while human readability minimizes human error and allows data to be intuitively organized into hierarchies in the same way that files can be organized into folders and sub-folders on your computer.  

The components of a hierarchical organization can be represented on Accumulate by top-level ADIs and nested sub-ADIs. For example, the ADI ‘bank’ may be associated with a sub-ADI ‘branch’. Responsibilities are represented by the various accounts that can be managed by each ADI and sub-ADI (e.g. data, token, and staking accounts). Both ADIs and sub-ADIs can also be managed, updated, and exchanged to provide the flexibility needed to adapt to the growth of an organization and the evolution of Web3. 

Each identity on the Accumulate network is treated as an independent blockchain and assigned to a subset of available validators that we call block validator networks (BVNs). This allows the network to be partitioned by identity and transactions between identities to be validated on devices as simple as a mobile phone. The network can be scaled to millions of transactions per second (TPS) by adding BVNs. 

Accumulate can model an organization’s security 

Blockchain security evolved to become more forgiving with public adoption of cryptocurrency and more functional with institutional adoption of DeFi. Better user interfaces have made blockchain more accessible to the non-technical public, while the integration of multisig with business APIs has allowed companies to securely replicate operations like payroll and accounting on the blockchain. 

Institutional investment in DeFi, however, is currently limited to small-scale experiments in borrowing, lending, and staking that represent a small portion of the potential market. Broader participation by institutional investors will require significant changes to security. Clients need assurance that their assets will be safe if their keys are lost or compromised, multisig accounts need resiliency against the loss of signators, and businesses need flexibility that matches the dynamic nature of their operations. 

An organization’s basic security operations can be modeled on the blockchain as an interactive and dynamic hierarchy of signatures that are backed by cryptographic keys. For example, important decisions that require the input of multiple people may be reproduced in a multisig transaction whose execution requires m signatures from n permissioned signators in an m-of-n type authorization scheme. 

Accumulate takes this further with its hierarchy of Key Books, Key Pages, and Keys/Key Book URLs. Key Books are authorities that specify which identity is involved in a transaction. Key Pages are signers for a Key Book that are organized by priority. Keys and Key Book URLs are signators that occupy slots within a Key Page. A Key Page with a higher priority can modify itself or a Key Page of lower priority, which enables features such as key recovery, key rotation, and key backup. The ability to modify multiple keys within a Key Page allows for dynamic multi-sig transactions. The option to specify a Key Book URL in a Key Page slot lets an account owner automate security or delegate authority to another identity.  

Since Key Books and Key Pages are indexed chains with URL-based addresses, signatures are auditable, human-readable, and time-stamped. This means that events such as the valuation of a property at a given point in time, the purchase of an insurance policy before a claim is submitted, or the use of a license before a contract expires can all be proven on the blockchain. Since Accumulate supports a variety of security standards (e.g. security algorithms, elliptic curves, and hash functions), these operations can be managed for multiple blockchains within the Accumulate wallet. 

Conclusion

Accumulate provides the backend infrastructure for identity and security management on the blockchain. Identity hierarchies allow companies to replicate organizational structures, while key hierarchies allow companies to replicate financial operations. URL addressing and multiple security standards facilitate interoperability with blockchains, websites, and traditional databases. Organizing the blockchain around identities allows the protocol to scale, and indexing signatures within chains that are associated with these identities provides a comprehensive framework for Web3 applications. 

]]>
https://accumulate.org/2022/07/how-accumulate-provides-blockchain-infrastructure-for-identity-and-security-management/feed/ 0