ICO listing: BaaSid ICO

baasid ico
ICO BaaSid

BaaSid

PRE ICO Dates : 01/03/18 – 30/03/18
Active ICO : 01/04/18 – 30/04/18

Decentralized Database

“Blockchain as a Service” is a concept that means enabling many unspecified internet suppliers to easily borrow blockchain based technology and infrastructure. (Example) SaaS : Software as a Service

As one BaaS project, this project means various login, personal identification, and other certification services developed on a public network. BaaS + ID(Identification)

In this BaaS infrastructure, “BaaSid” will offer certificate services to the internet service provider from an unspecified number from a P2P based split and divided powerful, yet safe database that is based on a public network.
Also, it is intended to replace a third party certification authority, or payment gateway (PG) with a shortened procedure that is safer and more convenient.

All the unspecified OSP providers on the internet have partially borrowed existing SasS, IaaS, PaaS or ASP services to use according to their business goals.
In the new world of the blockchain, via the concept of BaaS, diverse software and technology will be borrowed from the necessary parts of the Blockchain Infra API, database, or going one step further, the mobilization of node members (users or participants), network resources, and other diverse forms of blockchain infrastructure that are experiencing explosive growth.

“BaaSid” was designed to help process the various phases of verification, offering all internet service providers and all users a more convenient and safer way to login, and this could act as an enabler for more lively communication between the providers and user.

In the “BaaSid,” via “one-time instant access” that utilizes a certification of public network, participants and providers alike can attain quicker verification with tighter security and greater ease.

In particular, sensitive personal information including, name, phone number, email address, ID, password, credit car numbers, biometric information, etc. is split, after which it is split into data fragments unique to the hundreds and thousands of nodes, which are then distributed and saved different from one another, enabling verification, login and other functions to be peformed in the absense of a source of such personal information.