N E U R O C H A I N T E C H

Similar documents
Distributed Ledger Technology & Fintech Applications. Hart Montgomery, NFIC 2017

Token White Paper. Global marketplace based on Block chain for small-scale business I ver P a g e

Cyber-Physical Chain (CPChain) Light Paper

RESHAPING SIM BUSINESS PARIS. MOSCOW. DUBAI. SINGAPORE. SEATTLE.

KnownOrigin.io. Be Original. Buy Original. executive summary v0.4. KnownOrigin.io

Nextgen Governance to Support Blockchain/Digital Solutions for MRV and Climate Actions

Blockchain for the energy market. Erwin Smole gridsingularity.com

Decentralized Database for Developers. White Paper v March 31,2018

NKN is a new kind of network connectivity protocol & ecosystem powered by blockchain for an open, decentralized, and shared Internet.

Blockchain without Bitcoin. Muralidhar Gopinath October 19, 2017 University at Albany

Transforming the way people watch TV

ISSUSE AND FEATURES TO CONSIDER WHEN SELECTING A BLOCKCHAIN SYSTEM. Find us at

Hyperledger - Project Overview. January 2018

We help startups and digital agencies launch projects on time, with no pain.

QUADCORECHAIN. White Paper ver.1

B2B Marketplace Platform

POLAR INTERNET SHARING, A CONNECTION OF CONSTELLATIONS

BeEasy. blockchain ecosystem designed for mining, trading, and managing cryptocurrency investments

What is Ontology? Public blockchains with new architecture & A Distributed Trust Collaboration Platform

ICO Review: Raiden Network (RDN)

Blockchain! What consultants should know about it. Daniel

The World s first Public Chain for Decentralized NaaS (Network-as-a-Service)

Smart City in the 5G Era

Building a Data Strategy for a Digital World

Principals of Blockchain technology - Digital Business Ecosystem Kick of meeting Helsinki

Executive Summary. (The Abridged Version of The White Paper) BLOCKCHAIN OF THINGS, INC. A Delaware Corporation

Secure communications simplified

A Brief Introduction to Leviathan

Cyber Security: Are digital doors still open?

API s in a hybrid world. Date 28 September 2017

NOVEMBER 2017 Leading Digital Transformation Driving innovation at scale Marc Leroux Executive Evangelist/Digital ABB

How Secure is Blockchain? June 6 th, 2017

Transforming IT: From Silos To Services

Mobilink-Network Partial List of Partners

0xcert - Your ID, degree, artwork or house. 0xcert-ified on the blockchain.

BLOCKCHAIN ARCHITECT Certification. Blockchain Architect

ELASTIC SERVICES PLATFORM

Budapest: Nyugati tér 6 (+36) Q4 2018

In Accountable IoT We Trust

OpenFog Reference Architecture. Presented by Dr. Maria Gorlatova OpenFog Consortium Communications Working Group Co-chair, Technical Committee Member

How I Learned to Stop Worrying and Love the Internet of Things

Prelude. The notes within this Whitepaper publication are intended to formally document the concepts and features of the Aegeus cryptocurrency.

ETHERNITY DECENTRALIZED CLOUD COMPUTING

SOME OF THE PROBLEMS IN BLOCKCHAIN TODAY

Autobot - IoT enabled security. For Private circulation only October Risk Advisory

Demystifying the Cloud With a Look at Hybrid Hosting and OpenStack

Security for V2X Communications

Privacy based Public Key Infrastructure (PKI) using Smart Contract in Blockchain Technology

VERSION: 1

EY Consulting. Is your strategy planning for the future or creating it? #TransformativeAge

IOTA Decentralized and Public Platform. Ledger of Things/Economy of Things

From product design to marketing and customer services, good practices

Next Paradigm for Decentralized Apps. Table of Contents 1. Introduction 1. Color Spectrum Overview 3. Two-tier Architecture of Color Spectrum 4

Unified Communications Express AM

REALIZE YOUR. DIGITAL VISION with Digital Private Cloud from Atos and VMware

Cirius Secure Messaging Single Sign-On

FileMaker Business Alliance. Program Guide

Table Of Contents. Introduction Blockchain and Cryptocurrency...1. Stellar (payment network)...2. Internet and its issues...3. LocalXpose...

Mobilink-Network Partial List of Partners

Blockchain for Enterprise: A Security & Privacy Perspective through Hyperledger/fabric

Accelerate Your Enterprise Private Cloud Initiative

Dr Chris Ettmayr. ICT & Renewable Energy Specialist: ELIDZ. Name and surname. Title of presentation

DuncanPowell RESTRUCTURING TURNAROUND FORENSIC

Single Sign-On. Introduction

As a 3rd generation currency, not only are transactions secured, private and fast, you actually get paid for holding DigitalPrice coins.

Where Does Your Firm Fall?

BRIDGE TO GLOBAL MARKET FOR MVNOs. Local prices on mobile data around the world Global Mobile Data Exchange Gate to millions of underserved customers

CipherPost Pro. Secure communications simplified. Feature Sheet

Pioneering New Frontiers

Cloud Security Alliance Quantum-safe Security Working Group

The Open Application Platform for Secure Elements.

Abstract Industrial background Industrial background Current Status of blockchain technology Design Concept - 4 -

Dyadic Security Enterprise Key Management

Cloud28+ Compliance in Cross Border Business

IFEA Risk Management and Cybercrime

BaFin-Tech 2018 BlockChain & Security (from #developerview)

Single Sign-On. Introduction. Feature Sheet

Cisco Borderless Networks Value Proposition

NPP & Blockchain Have you thought about the data? Ken Krupa, CTO, MarkLogic

Horizont HPE Synergy. Matt Foley, EMEA Hybrid IT Presales. October Copyright 2015 Hewlett Packard Enterprise Development LP

SALESFORCE CERTIFIED SERVICE CLOUD CONSULTANT

Bringing cyber to the Board of Directors & C-level and keeping it there. Dirk Lybaert, Proximus September 9 th 2016

Executive Summary. Swiss Alps Mining & Energy.

DIGITAL TRUST Making digital work by making digital secure

CardOS Secure Elements for Smart Home Applications

Decentralized Identity for a Decentralized World. Alex Simons Partner Director Program Management, Identity Division Microsoft

Supporting Customer Growth Strategies by Anticipating Market Change End-to-end Optimization of Value Chains

Town Crier. Authenticated Data Feeds For Smart Contracts. CS5437 Lecture by Kyle Croman and Fan Zhang Mar 18, 2016

Synapse: Decentralized Intelligence

IoT security based on the DPK platform

ENABLE Scotland Privacy Policy

Do you really mean business in LBS?

Linux Foundation. Linux Foundation Overview. (Linux Foundation) at

2 nd Year. Module Basket of Courses Duration Credit Offered Status. 12 Weeks 4 NPTEL Programming in Java

1) RED MegaWatt Tokens 2) RED Platform 3) RED Franchise

Cloud Computing with Microsoft Azure Level 2. Description. Objective. Who Should Attend. Course Duration: 2 Days. Course Authored by CloudThat

Future-Proof Security & Privacy in IoT

Why is Office 365 the right choice?

HPE GreenLake. Consumption Solutions

White Paper. Blockchain alternatives: The case for CRAQ

Transcription:

NEUROCHAIN TECH

SUMMARY Introduction. 02 The Team. 03 Timeline. 05 Business Plan. 06 Functional description. 15 Technical description. 19 Use Cases. 28

WHAT S NEUROCHAIN? Is a n e w technology b a s e d o n D i s t r i b u t e d system such as Blockchain, and Artificial Intelligence. NeuroChain t e c h n o l o g y comes out with new revolutionary concepts which m a k e t h e Blockchain applications on large scales possible. In NeuroChain, nodes are r e p l a c e d b y intelligent Bots. The new protocol and the pragmatic communication Layer yield to its l a r g e u s e a n d adoption(by the corporations and large public).

KEY POINTS Our own consensus algorithm, our own architecture, our own vision! INTELLIGENCE Bots integrate Machine Learning and Artificial Intelligence CONSENSUS MODULARITY FLEXIBILITY NeuroChain uses new consensus based on weighted entropy and Integrity Create your own NeuroChain group easily Interaction with the existing environment, Blockchains, orphan Bots and business applications

THE TEAM Composed by different experts Frédéric GOUJON Founder Architecture, Big Data and Open Source Products Specialist Dr. Billal CHOULI Founder Distributed Algorithms, Cryptography and Machine Learning Specialist Dr. Patrice GUICHARD IT Security Expert Legal Expert at the Paris Court of Appeal Renaud ROQUEBERT Founding Advisor CEO/Managing Partner at LightHouse/LHLF International Lawyer

TIMELINE Launch The NeuroChain subscriptions (ICO) 11/2017 NeuroChain ICO Development and test in large environment ~01/2018 Measure and control the implementations 12/2018 ~01/2017 Start the MVP (Minimum Viable Product) development 11/2017 First performance results (MVP) 08/2018 First application deliveries Time Flies when You re busy.

REVENUES Regulated professions 8 % Mass-market applications 20 % Institutions 6 % Retail 14 % Telecom 6 % Bank, Finance, Insurance 30 % Industry 6 % Green and ethic economy 10 %

USER TARGETS SMBs People Small/medium businesses Improve their competitivity SMBs Mass-market Change the communication process Increase the transparency, validation and the information pertinence tions Corporations Institutions Facilitate the direct communication Agglomerate business applications Introduce traceability and transparency Ethic Business Transparency and regulation

WORLDWIDE PROJECT 26% 35% 10 % 5 % 20 % 4 %

TESTIMONIALS What our subscribers are saying? The Blockchain is very complicated to understand. We do not see how we can use it Decentralization and consensus, I see very well what this could bring us, but how to implement it? We would need a simplified protocol to use

MARKETING STRATEGY Consulting To deploy the solution Corporation Subscription For support and expertise NeuroChain for all For mass-market Elaborated applications For regulated and institutional professions

MARKET NEEDS WHAT DO YOU WANT, WHAT DO YOU NEED People are asking for more privacy 45 % 30 % 45 % Share information Secure storage People are asking for trustable applications 90 % 55 % 60 % Traceability Decentralized process

NEUROCHAIN APLICATIONS Bots use performant decision process (Weighted Entropy) NeuroChain is based on its own Crypto-Value Bots can use many protocols to keep in touch: Social Bots Business Applications Regulated, Unregulated and Institutional Bots are using Artificial Intelligent Algorithms Bot Bots for IoT and Traceability Chain Certified Data Bank Bots are able to interact with other Blockchains or orphan Bots

MANAGE YOUR NEUROCHAIN GROUPS Create many NeuroChain Groups and manage their implications Your friend s Bots 18% Your NeuroChain Create multiple groups in NeuroChain and manage the role and implication of the Bots 60% Professional Bots 49% Your city s Bots

NEUROCHAIN GLOBAL OPERATION Treatment applications distributed to the Bots Your application Transaction #223408 Blockchain transactions Transaction #223411 Data request Consensus, transaction validations Unlimited secured storage with IPFS For example IPFS allow unlimited decentralized secured storage Transaction #223409 Transaction #223410

TRAFFIC FLOWS Bots are able to adapt automatically the communication protocol to optimize the bandwidth. Bot communication layer is developed to optimize the communication channel. Global message exchanges

TRAFFIC FLOW Bot is smart, ubiquity is not a problem: switch automatically on the best possible channel! Bot 1 Go back home, go to shopping, traveling your Bot uses emails to communicate with the other Bots Bot 2 Bot 3 Slow traffic by emails

TECHNICAL COMPONENTS Presentation layer Front end Elasticsearch Neo4j Node RED Machine Learning Algorithm Machine Learning Node JS C ++ Node JS C ++ Back end Protocol TCP/IP SMTP IPFS TCP/IP SMTP IPFS Bot Full features TCP/IP SMTP IPFS Bot Light

INTERNAL PROCESS Internet Protocol SMTP Decrypted Message SMS Ligthning Networks Communication Layer Decryption Layer Metadata/Content Decrypted Message Encryption Layer Validation Layer Metadata/Content Consensus Decrypted Message Validation Layer Switch Layer Transaction Metadata/Content Intelligence Diffusion Machine Learning

SCHEMATIC ARCHITECTURE OF NEUROCHAIN APis Blockchains E-Mail Sochets Lightning NetworkS IPFS Mobile App Web App Monitroning App Smart Applications Traceability CryptoValue Social Networks Orphan Bots Ethereum Bitcoin Semantic analysis Recommendation Engines Bayesian Networks Communication Jobs Algorithms

NEUROCHAIN CONSENSUS Proof of Involvement and Integrity (PII) Weighted Entropy and Integrity

NEUROCHAIN CONSENSUS Proof of Workflow Authentication and distributed storage (IPFS)

ADAPTIVE NEUROCHAIN Real Time reactivity NeuroChain works very quickly if the requirements are validated. Standard reactivity NeuroChain works as quick as possible. But, the Bots can adapt the network operation with the context. Don t need real time NeuroChain works slower but works in every contexts.

BOT TECHNICAL COMPATIBILITY Windows Windows 7/8/10 Windows 2012/2016 04 01 Mobile phone Android Iphone IOS Windows phone Mac OS OS X 10.11 OS X 10.12 03 02 Linux/Raspberry Ubuntu RedHat/Centos Debian Raspbian Easy to install with Docker

NEUROCHAIN USE CASES Communication IoT Food Traceability Drug Traceability Archiving Crypto-Value Certification Social network

TRACEABILITY CHAIN Member comes to website and shares resources or document Certifications Provenance is checked and shared Tracked object/concept Supplying Members who are truly interested by the traceability Members can share new resources

NEUROCHAIN ECOSYSTEM NeuroChain, the link between governmental and non governmental organizations NeuroChain