Authmen Onepager(V2.0)

Authmen
6 min readMar 31, 2021

What is Authmen?

Authmen is a trusted blockchain storage protocol, which is a new storage scheme based on the decentralized idea of blockchain. It focuses on solving the problems of data storage and data flow. Using trusted blockchain technology, such as decentralized, highly available, open and transparent, tamper proof, information security and other technical features, to build an information security tamper proof and traceability system. In addition, Authmen innovatively combines NFT with decentralized storage. NFT can be used to exchange the storage space in Authmen network, and can also be used as index proof to protect the privacy of users’ data.

What problems does Authmen solve?

Because the distributed storage mainly depends on the decentralized node structure, the storage proof consensus algorithm is needed for spatial consensus. If the consensus algorithm is missing, other nodes can not be trusted, and the problems such as whether the space for a node is enough to store data, whether the stored files or copies, have been lost can not be solved.

At present, most of the blockchains with storage characteristics in the market only recognize the storage capacity of blockchain nodes subjectively. They can not achieve a trusted node from the mathematical and computer algorithms, and can not achieve safe and reliable trust for the stored data, which violates the original intention of the blockchain to build trusted data and nodes.

Authmen is a middleware to solve all kinds of confusion and problems of distributed storage protocol.

Highlights of Authmen

1. More efficient and secure storage

2. Real tamper proof technology

3. Wider application scenarios

4. Trusted storage node

The advantages of Authmen

  1. Transparency: the storage mechanism is open and transparent.

2. Fairness: the workload and reward calculation of work nodes are protected by TEE, and the nodes need not worry that their workload will not be rewarded, and they can not get extra rewards through cheating.

3. Efficiency: the proof of storage capacity does not require the challenge of large amount of redundancy, nor does it need to store any meaningless data. Both computing and storage resources can be efficiently utilized.

4. Scalability: TEE supports complete computing, and has the potential of continuous development. Authmen ecosystem can achieve more powerful functions to ensure the development of evolution from storage consensus to computing consensus.

Architecture of Authmen system

The architecture of Authmen system is mainly divided into three layers: the storage layer based on TEE, the index layer and the user layer.

Storage layer based on TEE

The storage layer is responsible for the storage and maintenance of data on the Authmen network, which can store a wide range of data. The data is organized into blocks according to the time sequence and stored on the disk. By creating an index, the performance of transaction data reading can be improved. The storage layer is also responsible for consensus on transactions. Through the pluggable consensus module, users can use different consensus algorithms to achieve higher performance in different application scenarios.

Authmen uses the security and encryption of tee to optimize the node architecture of network transmission and storage layer, verify and protect the whole life cycle of the computer operating environment, and realize the storage, sharing and calculation of multi-party, remote and heterogeneous data on the premise of maintaining data ownership and privacy.

Gossip Protocol is a kind of network protocol with good scalability, fault tolerance, decentralization and final consistency. Authmen uses Gossip Protocol to support the underlying network communication. Through trusted computing, Authmen enables different TEE protocols to collect the newable state of neighboring nodes, check and record the historical information, and propagate the results among other nodes through Gossip Protocol. And form a reputation network, repeatedly select the “most difficult node to lie” for its repeated function contract. So as to form a robust and efficient running environment and build a blockchain distributed storage security network based on trusted computing.

Index layer

The index layer is the index of storage, which holds all kinds of data stored for users. The index layer structurizes and classifies the data, abstracts the “account” model on the basis of the storage layer, and provides support for users to search and query data more easily. DHT (Distributed Hash Table) is a distributed storage method. The principle of DHT is that each client stores a small part of data and is responsible for the retrieval of a certain area without the need of a server, so as to realize the addressing and retrieval of the whole DHT network.

Authmen refer to the Kademlia protocol of IPFS. In Authmen network, all the information is stored in the form of hash table entries. These information are scattered on each node, thus forming a huge distributed hash table in the whole network. As long as you know the KEY of the information index, you can query its corresponding value information through Authmen protocol, no matter which node the value information is stored on.

The index layer also has the function of privacy protection. Users can encrypt and save the data. After encryption, the data will be uploaded to the distributed storage network, and then calculated through the privacy computing network. Finally, the output result shows that the data can not be viewed through the index. Only the NFT with the corresponding hash certificate has the right to view. In addition, Authmen will also provide NFT trading market, so that users can obtain benefits through their own value data.

User layer

The user layer is responsible for client connection management, providing users with storage and query interface, so that users have a good experience.

For users, the user layer can bring high-quality decentralized storage service for end users, which is fast, effective and easy to use. Users can store and share files by using Authmen. It only needs to store the file in Authmen network. After the file is hashed and assigned an address, others can request the file through the address.

For developers, Authmen supports to write smart contracts in Turing complete language to support complex decentralized applications. Authmen provides SQL like query language and JDBC and RESTinterfaces. This makes it easy for application developers based on database management system to switch to application development based on Authmen, which can effectively reduce the development cost.

AUTH Token Metrics

Token Ticketer: AUTH

Total supply: 10,000,000 (10 million tokens)

Liquidity Mining: 8,000,000 (80%)

Public Sale: 400,000 (4%)

Marketing: 500,000 (5%)

Ecosystem Reserve: 1,000,000 (10%)

Uniswap Liquidity Provision: 100,000 (1%)

Token release schedule and Lockups

● Liquidity mining follows mining rate (1 million per year for 8 years. Starting a few weeks after bounce sale).

● Public sale tokens will be liquid right after the sale.

● Marketing tokens are released 1/10 per 3 months after the public sale. Tokens will be used for airdrops and marketing purposes.

● Ecosystem reserve: one-year lockup and then can be allocated based on governance voting.

● Uniswap liquidity provision immediately supplied after public sale.

NFT Mining

Authmen innovatively introduces NFT into liquidity mining. Users can mine in the mine pool through their own Authmen NFTs to obtain AUTH tokens. Different levels of NFTs have different mining efficiency.

Authmen NFT has multiple functions:
1. NFT (based on ERC1155 standard) determines the computational power of participants in liquidity mining;
2. NFT makes endorsements with actual storage. When the Authmen storage network goes online, NFT holders can redeem the storage;
3. Users can destroy NFT to obtain higher-level NFTs, thus obtaining greater storage capacity.

Authmen NFT type:

Each NFT represents specific computing power and storage capacity. In order to obtain a higher level of NFT, participants need to start with AUTH-1 and continue to replace the lower version with the higher version.

--

--