Future AI
  • 📌Future-AI | Introduction
  • 🗣️Official social networks
  • 🥳Fairlaunch - Pinksale
  • Overview Future-AI
    • 🔹The beginning of AI
      • 🔹Success of IA
    • 🌐GPT-3
      • 🌐How does GPT-3 work?
      • 🌐What are the uses of GPT-3?
    • 🔹Telegram Bot
      • 🔹Twitter Bot
      • 🔹Discord Bot
      • 🔹More bots
    • 🌐Metaverse
      • 🌐Future-AI Metaverse
      • 🌐iNFT Protocol
    • 🔹Decentralized App
    • 🔹Brigde
      • ☑️Dapp Brigde
    • 🌐Future-AI Characters
    • 🔹Copy Trader
    • 🌐DAOGovernance
    • 🔹Wallet Future-AI
      • 🔹Download Trust Wallet
      • 🔹Future-AI integration with Trust Wallet
    • 🌐Staking
      • 🔹Parcels
    • 🔹Yield Farming
    • 🌐Future-AI Providers
      • AI Provider Integration
    • 🔹Future-AI Executors
      • 🔹AI Executor File Integrity
      • 🔹Data Source Provider
      • 🔹Thesis case provider
      • 🔹Script Developer
      • 🔹AI Executor
      • 🔹AI Executor with Docker
      • 🔹AI Executor Incentive Mechanism
  • token future-ai
    • 🌐Tokenomics
    • 🔹Token metrics
    • 🌐Roadmap
    • 🔹KYC & Audit
    • 🌐Team
Powered by GitBook
On this page
  1. Overview Future-AI
  2. Metaverse

iNFT Protocol

A smart contract layer on a blockchain that allows anyone to create a non-fungible smart token (iNFT).

Once merged with the Personality Pod, the NFT gains unique intelligence and personality. This is because the Personality Pod consists of several personality traits in a chain that shapes the iNFT's overall personality while dictating the iNFT's intelligence. In fact, the iNFT protocol has an immutable record of mergers between NFTs and Personality Pods. As long as the NFT remains merged with the Personality Pod, it is considered an iNFT.On a technical level, the merger act involves locking the Personality Pod within the iNFT protocol smart contracts, so that NFT users are not completely free.

This means that the iNFT protocol is designed with a non-binding structure. This architecture allows users to transform their NFTs into iNFTs without the protocol requiring custody (locking, staking, packaging, swapping) or applying other changes to the underlying NFT. Thus, users can use their NFTs outside of the iNFT protocol and reduce the risk of losing valuable NFTs due to a bug or attack on the iNFT protocol's smart contracts.

PreviousFuture-AI MetaverseNextDecentralized App

Last updated 2 years ago

🌐
🌐
Page cover image