Xenchain
Xenchain
Token: SENC


The Evolution Of Digital Identity

ICO dates
Start date:
End date: 2018-08-06

Registrated in: Singapore

Platform: Ethereum
Type: ERC20

PREMIUM ICO

HARA

Empowering billions by utilizing a global and transparent data exchange.
Ends in 261 days 19 hours
Goal: 17,000,000 USD
Price: 1 HART = 0.059 USD

Dominium

Dominium Blockchain – The one-stop-platform for everything to do with property anywhere in the world!
Ends in 230 days 19 hours
Goal: 17,500,000 USD
Price: 1 DOM = 0.25 EUR
https://xenchain.io Screenshot
Xenchain categories
Artificial Intelligence Cryptocurrency Smart Contract
Xenchain whitepaper
Xenchain token sale
KYC passing required Yes | Whitelist Yes | Restriction for countries USA
Tokens for sale 105,800,000
Token distribution in ICO
52,9%
52,9%
Xenchain news, social
Xenchain search trends in Google
Random whitepaper excerpts

Table of Content
1. Abstract
3
2. Introduction and Problem Statement
5
3. KYC Blockchain as a Service
8
4. Xenchain Solutions
10
4.1 Xenchain Technology
13
4.2 Xenchain Distributed Storage
17
4.3 Xenchain Utility Token
17
4.4 Xenchain Roadmap
18
4.5 Xenchain Target Market
19
5. Xenchain Business Model
21
5.1 Xenchain Workflow
22
5.2 Xenchain Use Case
23
5.3 Xenchain Business Development Strategy
24
5.4 Xenchain Team
24
5.5 Xenchain Advisor
25
6. Xenchain Token Sale
27
7. Budget
29
8. Legal and Regulatory Remarks
33
9. References
40
Page 02
...

1. Abstract
“Knowledge is power” is overrated. The re-defini-
tion? Organised Knowledge is True Power.
The world is gearing towards a stage of information overload, knowledge scattered all over the landscape in
different sizes, forms and shape, and it has been repurposed, refit and reiterated sometimes to a point beyond
recognition.
Massive Amount of Unstructured Data is Useless Data
Without proper structure and management, that knowledge will be useless to organizations, who would, in turn,
have this massive amount of disorganized data and yet still operate in the dark.
The Critical Issue of Data Safety
However, structuring the data is only the first part of the extensive problem. With the massive amount of
information to be cataloged and stored for later retrieval, the second, perhaps more critical issue is in its safety.
Personal Identifiable Information (PII)
Enter the new currency - Personal Identifiable Information (PII) which includes your personal identification,
beh...

Beyond gathering of end-users’ identity, a valuable asset identity management is equally important. Those data
are used in tracking and verifying any assets’ location, ownership and service records. Confirmed and low-cost
identification of assets will fuel further innovation and growth in various industries, such as P2P marketplace,
logistic, and healthcare/insurance records.
Suiting Up Against The Next Big Crime of The Future
In the near future, personal data breach and theft will be one of the most damaging crime. In 2017 alone, there are
a total 1,080 reported cases of personal data breach incidents, exposing over 171 million
1
records. Reputable
companies like Equifax, Yahoo and Uber are not excluded from that predicament.
In the same year, identity theft and breach are estimated to affect about 15.4 million customers, costing a
whopping USD16 billion in the US alone.
2
Clearly, a new-age, ground-up approach to digital identity.
Managing identity and its permission are sup...

Never in the history of humanity has personal identifiable information (PII) is at most risk of theft and misuse. As
the growth in the digital space connects us and draws us closer to one another, sadly, this has also created
opportunities for hackers and identity thieves to make their move.
In the last decade, there have been a steady rise in identity theft and confidential breaches and an estimation of
$107 billion have been stolen
3
. The USA Today reports that more and more people will lose their identity to hackers,
thieves and fraudsters if they do not pay serious attention to identity management and the aspect of data
security.
4
The antivirus giants, McAfee have announced their decision to make identity theft one of the arrowhead threats
that they will be fighting against in recent time. This decision was made on the heels of data breaches happened
in 2017 that caused millions of people with SSN exposed to identity theft.
6
The situation calls for a robust platform for ide...

A Piece of an $8 Billion Market
According to Stratistics MRC, the Global Identity & Access Management market is estimated for $7.94 billion in
2016 and is expected to reach $20.87 billion by 2022.
Xenchain aims to build the largest identity pool that will allow easy access to critical information in a highly
protected platform, and we are offering you the opportunity to be part of this exciting revolution in PII
management.
Xenchain Is Dedicated To:
Enable personal contribution for improving the global identity management situation
Utilize Blockchain technology for improved efficiency
Empower transparent transactions between all the parties involved in the identity management
system based on smart-contracts
Lower costs by reducing the time and process required for onboarding
Strengthen the Blockchain network
Create opportunities borderless environment.
Xenchain aims to create a performance-driven identity management system. Our team has remarkable ideas on
how to integrate...

Despite the fact that increased resources had been allocated to KYC and onboarding by various organizations, the
challenge of identity verification appears to be on the rise. For instance, according to a survey of selected financial
institutions
10
in 2017, compliance headcount increased by 400% while average spending on KYC related cost rose
to about USD150 million. In spite of that, customer onboarding time still saw an increase from 24 to 32 days.
KYC and PII are extremely important to bring financial inclusion to the underbanked or unbanked. Around 2
billion
11
adults, 39% of the world’s population still do not have access to any formal banking service, more than 75%
12
of this number are yet to experience or have access to digital payment services. Without a proper KYC onboarding
and PII management, financial inclusion and affordable financial services will not be possible. Moreover, the
compliance requirement is also adding pressure to the situation.
It is essential for...

Xenchain aims to be a complete end-to-end Blockchain-based identity management. The key components are :
Data acquisition module – Full suite of OCR and computer vision machine learning to
identity document and bio-recognition (facial, motion).
Data validation module – Trusted source of data from companies or individual which can
act as referred for identity data.
Data Blockchain module – Onboarded and verified data is stored in Blockchain and
additional off-chain data on distributed storage.
Data rating module – Rating for identity data (XenScore) and social network link between
Xenchain users.
Data
Validation
Module
Data
Acquisition
Module
Data
Rating
Module
Data
Blockchain
Module
User can use Xenchain via mobile application and Application Programming Interface ( API ) to retrieve or verify
identity.
Page 11
...

There are three (3) role types of Xenchain users, and user can play all roles or just a single role, dependent on the
intended usage:
XenDataConsumer
– A corporate entity (or individual) who wish to retrieve and verify an
identity from Xenchain network. XenRequestor has enterprise application and
Application Programming Interface or Software Development Kit ( SDK ) to retrieve
identity data.
XenUser / XenAsset
– A natural person or an asset where the identity data is stored in
Xenchain Blockchain network. The identity data consists of various information fields and
its unique permission. XenUser is interconnected with each other through Xenchain
identity social network.
XenValidator
– Entity which can provide personal questions for the purpose of identity
validation or individual who can act as referee to another XenUser.
Xenchain Roles
XenUser/
Xen Asset
XenData
Consumers
Xen
Validator
Depending on the situation, an in...

Xenchain Roadmap

1
Jan 2018 - Mar 2018
Stage 1. Xenchain version Alpha ready.
Stage 2. Xenchain trial deployment
with corporate customers.
Stage 3. System readiness with
corporate XenValidator.
Stage 4. Xenchain structure and legal
preparation.
Stage 5. Xenchain Whitepaper
2
Mar 2018 - May 2018
Stage 1. Xenchain version Beta +
Blockchain storage.
Stage 2. Public to participate in token
Sales using Xenchain KYC service.
Stage 3. Campaign in leading Asia,
Europe cities.
3
May 2018
Quarter 3 + Ongoing.
Acquiring 10 million XenUser
and 3,000 XenDataConsumer.
Quarter 4 + Ongoing.
Token allocation to 10 x strategic
XenValidator partnership.
4
Quarter 3 2018
Malaysia, Singapore, Brunei, Philippines,
Thailand.
5
Quarter 4 2018
Africa.
6
Quarter 1 2019
Middle East.
7
Quarter 2 2019
Hong Kong, Tokyo, Korea.
8
Quarter 3 2019
UK & European Region.
9
Quarter 4 2019
Ukrain, Russia.
Steve Rao
Steve Rao Founder/CEO

Vincent Wong
Vincent Wong Founder/CTO

Daniel Pacheco
Daniel Pacheco Vice President - Product Development

Hui Yong Sia
Advisor Hui Yong Sia

Mark Pui
Advisor Mark Pui

Mark Pui
Mark Pui
Kuala Lumpur Executive Director, PricewaterhouseCoopers