Lock in $30 Savings on PRO—Offer Ends Soon! ⏳

WEEVE Token Model

WEEVE Token Model

Avatar for Token Engineering Tokyo

Token Engineering Tokyo

September 20, 2018
Tweet

More Decks by Token Engineering Tokyo

Other Decks in Technology

Transcript

  1. Building a Chain of Trust Economy of Things prerequisites trust

    in all stages, from data harvesting to commercialization Harvest Data Process Data Transport Data Assess Data Commercialise Data
  2. With weeve technology; data is truthful, trustworthy and transparent To

    Deliver a Truthful Data Protocol for IoT and Blockchain Harvest Data
  3. Why the Weeve token? Weeve aims to be independent of

    the actions taken by the governors of other cryptocurrencies. Resistance to hacks in other crypto wallets Currencynomics Incentives Tokenomics Disincenitves
  4. Weeve MSP (Multisided Marketplace) Business Model •  Device owners cross

    sell authentic data to potential buyers. •  Device owners are paid set fee as determined by network and creators of Marketplace. Device Owners •  Co-create rules of the marketplace with weeve network. •  Determine type and value of data to be traded. •  Earn portion of transaction fee alongside weeve network. Marketplace Co-Creators •  Provide services to marketplace creators for add on services such as attestations, validations, user interface etc. •  Earn fixed fee or per transaction fee depending on the contractual agreement. 3rd Party service providers •  Consumers buy attested data at set prices. •  weeve network game theory design ensures truthfulness of data. •  weeve smart cont. protocol serves as escrow protection for sellers to receive timely and correct payment. Consumers weeve Marketplace •  Revenue generated by transaction fee from all 4 sides of the market* •  Additional revenue for weeve certifications which includes attestations and dispute resolutions in marketplace trading activities. *All generated revenue for weeve would be in non fiat currencies; weeve’s platform is blockchain agnostic. This enables weeve to operate with BTC, ETH, IOTA etc.
  5. How using Game theory mechanics enables us to keep the

    system state fair? Code based consensus Approach System State Code based consensus Approach Enforced Trust Enforced Trust Game thereotic incentive based approach Intrinsic and Organic trust in the system state *Designing a system where individual selfish interests align with common interest of the network – Reaching equilibrium
  6. weeveNetwork Protocol blockchain agnos<c Ethereum backbone to leverage ERC20 WEEV

    u<lity token curates marketplaces with high-quality data curates device registries providing aSested data ac<vates validators to enforce membership standard ac<vates arbiters to resolve dispute The open-source protocol for the tokeniza<on and commercializa<on of a<ested IoT Data is a suit of protocols:
  7. weeveNetwork Protocol blockchain agnos<c Ethereum backbone to leverage ERC20 WEEV

    u<lity token Graded token-curated Device Registries and Marketplaces use WEEVE token to stake collateral and punish bad behavior Knowledge Extractable VoFng use WEEV token to mint KNOW token in order to improve distribu<on of voters The open-source protocol for the tokeniza<on and commercializa<on of a<ested IoT Data is a suit of protocols: more on medium