GB2572339A - System and method for data processing using tokens - Google Patents

System and method for data processing using tokens Download PDF

Info

Publication number
GB2572339A
GB2572339A GB1804834.8A GB201804834A GB2572339A GB 2572339 A GB2572339 A GB 2572339A GB 201804834 A GB201804834 A GB 201804834A GB 2572339 A GB2572339 A GB 2572339A
Authority
GB
United Kingdom
Prior art keywords
tokens
transient
data
transactions
persistent
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Withdrawn
Application number
GB1804834.8A
Other versions
GB201804834D0 (en
Inventor
William Simpson Toby
Rønnow Troels
Ward Jonathan
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Fetch AI Ltd
Original Assignee
Fetch AI Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Fetch AI Ltd filed Critical Fetch AI Ltd
Priority to GB1804834.8A priority Critical patent/GB2572339A/en
Publication of GB201804834D0 publication Critical patent/GB201804834D0/en
Priority to PCT/EP2019/055850 priority patent/WO2019170861A1/en
Priority to US16/978,844 priority patent/US12002045B2/en
Publication of GB2572339A publication Critical patent/GB2572339A/en
Withdrawn legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • G06Q20/367Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
    • G06Q20/3674Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes involving authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3821Electronic credentials
    • G06Q20/38215Use of certificates or encrypted proofs of transaction rights
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/382Payment protocols; Details thereof insuring higher security of transaction
    • G06Q20/3825Use of electronic signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L67/00Network arrangements or protocols for supporting network services or applications
    • H04L67/01Protocols
    • H04L67/10Protocols in which an application is distributed across nodes in the network
    • H04L67/104Peer-to-peer [P2P] networks
    • H04L67/1074Peer-to-peer [P2P] networks for supporting data block transmission mechanisms
    • H04L67/1078Resource delivery mechanisms
    • H04L67/1082Resource delivery mechanisms involving incentive schemes
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3247Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Finance (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Disclosed is a method and system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network. Some of these tokens are Persistent Tokens that are representative of one or more values of one or more resources. The Persistent Tokens are tradable within the system. Some of the tokens are Transient Tokens that represent one or more data processing resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens. The Transient Tokens have a defined lifetime after their creation, and the data processing arrangement transacts or executes the Persistent Tokens as supported by Transient Tokens accompanying the Persistent Tokens. The transient tokens represent CPU cycles, energy dissipation, access time and/or access to memory for the system.

Description

SYSTEM AND METHOD FOR DATA PROCESSING USING TOKENS
TECHNICAL FIELD
The present disclosure relates to systems and methods for data processing using tokens, wherein the tokens are representative of, for example, technical resources or technical services having a technical effect, for example a reduction in processing hardware machine cycles being employed Moreover, the present disclosure also relates to computer program products comprising a non-transitory computerreadable storage medium having computer-readable instructions stored thereon, the computer-readable instructions being executable by a computerized device comprising processing hardware to execute the aforementioned methods.
BACKGROUND
Since mediaeval times, tokens representing physical resources have been employed when organizing and implementing technical work, for example when constructing buildings and infrastructure. Modern economies largely depend upon transactions involving one or more currencies, wherein the one or more currencies are a representation, amongst other things, of a potential access to resources, for example to materials or to an amount of work that can be performed on materials; there has been an evolution to employing fiat currencies in transactions, later digital currencies, and crypto-currencies. Furthermore, such digital currencies can be used as tokens when trading assets and other digital currencies. Additionally, as aforementioned, the tokens may also be digital representations of a value associated with a physical resource, which in turn, can be used when executing transactions that determine how the physical resource is used and/or transformed. For example, the
2tokens can be a representation of the processing of a physical (real) resource. Such transactions involving tokens are, for example, executed within a system that is configured to perform authentication and verification of the tokens, using for example, security mechanisms such as encryption of data.
Furthermore, existing systems for transacting tokens involve temporally frequent, namely high velocity, exchange of tokens between two or more entities such as a person, an organization and so forth. Consequently, tokens often need to be directly bound with a value of at least one fiat currency in order to maintain uniformity in exchange of the tokens. However, such temporally frequent exchange of tokens significantly reduces chances of an increase in value of tokens over a given period of time.
Alternatively, the existing systems may involve temporally infrequent, namely low velocity, exchange of tokens between two or more entities. Such temporally infrequency transactions usually occur when a value of the tokens change based upon a value of assets associated thereto. Such tokens may be held by the one or more entities for an extensive period of time with expectations of making a profit crediting to an increase in value of the tokens. However, such temporally infrequent transactions of the tokens may impair utility thereof to be used, for example, as a medium of exchange. Furthermore, it may also lead to stagnation of the system and financial network using such tokens for executing transactions. Consequently, the one or more entities having the tokens may suffer as it becomes difficult to use fully the tokens and the system. Consequently, the existing systems are unreliable and non-scalable for executing data processing associated with transacting tokens therein. Such unreliability and non-scalability is especially relevant for peer-to-peer communication networks, such that a solution to a technical problem of scalability of distributed peer-to
3peer networks for performing data processing is an issue that the present disclosure seeks to address.
Therefore, in light of the foregoing discussion, there exists a need to overcome the aforementioned drawbacks associated with a lack of reliability and scalability of systems for performing data processing using tokens.
SUMMARY
The present disclosure seeks to provide a solution to the existing problem of usage of low velocity and high velocity tokens in transaction networks. Furthermore, the present disclosure also seeks to provide a solution that overcomes at least partially the problems encountered in prior art, and to provide efficient ways of processing and transacting tokens.
The present disclosure seeks to provide a system including a decentralised data communication network, wherein a data processing arrangement of the network transacts tokens therein when performing data processing to reduce a number of processor cycles required for performing the data processing.
The present disclosure also seeks to provide a method of using a system including a de-centralised data communication network, wherein the method includes transacting tokens when using a data processing arrangement to perform data processing to reduce a number of processor cycles required for performing the data processing.
In one aspect, an embodiment of the present disclosure provides a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network, characterised in that:
(i) at least a first portion of the tokens are Persistent Tokens (PT) that are representative of one or more values of one or more resources, wherein the Persistent Tokens are transacted within the system, and at least a second portion of the tokens are Transient Tokens (TT) that represent one or more data processing resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens, wherein the Transient Tokens have a defined lifetime after creation thereof within the system; and (ii) the data processing arrangement transacts or executes the Persistent Tokens as supported by consuming Transient Tokens accompanying the Persistent Tokens;
wherein the Transient Tokens are representative of at least one of: computer central processing unit (CPU) cycles executable within the system, energy dissipation within the system, access time taken by data processing resources of the system during execution of transactions of Persistent Tokens, access to data memory of the system for storing and/or retrieving data.
Optionally, in the system, the Transient Tokens are representative of CPU cycles executable within the system, wherein the CPU cycles are a measure of a representative quantity (referred henceforth as a representative quantity of CPU cycles), wherein the representative quantity of CPU cycles include a measure of at least one of: access to data storage, memory, access to data communication system bandwidth, data communication channels or ports, data processor energy use, data processor energy dissipation, access time taken by data processing resources during transactions, heat generation, cooling energy applied or any other measure associated with one or more CPU cycles.
5Optionally, the representative quantity of CPU cycles is assigned a value. More optionally, the value of the representative quantity of CPU cycles is associated with a value defined in one or more currencies, including fiat currencies or cryptocurrencies (the currency value), wherein the currency value is defined by the value, typically a local financial value, of the one or more measures associated with the representative quantity of CPU cycles or with the one or more CPU cycles (the cost of CPU cycles).
Optionally, any measure of one or more representative quantity of CPU cycles is carried out via use of software or via hardware such as sensors, either being local or anywhere within the de-centralised network.
Optionally, Transient Tokens are generated via smart contracts where in smart contracts are optionally defined as one or more transformations that can be executed on data. For example, a smart contract may be a transformation of sensor data, for example captured image data.
Optionally, smart contracts may be defined as one or more executable instructions that affect data. For example, data related to a cryptocurrency or a digital token. More optionally, smart contracts may be defined as the digitally executable legal relationships, for example peer-to-peer relationship in cryptocurrencies.
Optionally, the system is configured to use Transient Tokens that have been generated by data mining activities.
Optionally, the system is configured to use Transient Tokens that have a corresponding currency value. Optionally, the system is configured to use Transient Tokens that have a corresponding cryptocurrency value.
6Optionally, the system includes a ledger arrangement for recording transactions implemented within the system and corresponding token exchanges.
Optionally, in the system, the de-centralised data communication network is implemented as a peer-to-peer network, and the data processing arrangement is spatially distributed within the peer-to-peer network.
Optionally, the system is configured to use Transient Tokens that have been generated by execution of smart contracts.
Optionally, in the system, the smart contracts are executed for implementing the transactions within the system.
Optionally, in the system, the smart contract includes a first address field containing a first address of the Transient Tokens accompanying the Persistent Tokens, a second address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred and a signature field that verifies the transaction.
Optionally, in the system, the verification is performed by providing at least one of: replication, proof of work, proof of stake.
Optionally, in the system, during the lifetime of the Transient Tokens, the value of the Transient Tokens may depreciate according to a depreciation rate, wherein the depreciation rate may be defined by one or more mathematical functions or by one or more pre-set rules, or by one or more pre-set values. More optionally, in the system, during the lifetime of the Transient Tokens, the value of the Transient Tokens may depreciate until the value of the of the Transient Tokens is zero or approximately zero. For example, a value considered to be approximately zero, may be a value that is significantly smaller than the
7value of a typical transaction. For example, a value taken as approximately zero may be a value that is one or two orders of magnitude smaller than the value representative of CPU cycles required for a typical transaction.
Optionally, the system is configured to consider Transient Tokens with value is zero or approximately zero, to be expired. Optionally, in the system, the data processing arrangement is configured to automatically consider Transient Tokens expired at the time in which the value of Transient Tokens is set to, or reaches by depreciation, zero or approximately zero. Optionally, the data processing arrangement is configured to lock or remove the user access to expired Transient Tokens. For example, the action of locking or removing access may be carried out via an encryption or for example by removing one or more authorisation keys or for example via preventing one or more wireless or wired connections in the de-centralised data communication network.
Optionally, in the system, the Transient Tokens are added to a pool of tokens after expiring the defined lifetime thereof.
Optionally, in the system, the number of Transient Tokens available for transaction within the system are associated with the number of Transient Tokens in the pool of tokens. For example, limiting by the number of the number of Transient Tokens available for transaction may be limited by or calculated as a function of the number of Transient Tokens in the pool of tokens.
In another aspect, an embodiment of the present disclosure provides a method of using a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network, characterised in that the method includes:
(i) arranging for at least a first portion of the tokens to be Persistent Tokens that are representative of one or more values of one or more resources, wherein the Persistent Tokens are transacted within the system, and at least a second portion of the tokens are Transient Tokens that represent one or more values of one or more resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens, wherein the Transient Tokens have a defined lifetime after creation thereof within the system; and (ii) transacting or executing using the data processing arrangement the Persistent Tokens as supported by consuming Transient Tokens accompanying the Persistent Tokens;
wherein the Transient Tokens are representative of at least one of: CPU cycles executable within the system, energy dissipation within the system, access time taken by data processing resources of the system during execution of transactions of Persistent Tokens, access to data memory of the system for storing and/or retrieving data.
Optionally, in the method, the Transient Tokens are representative of at least one of: CPU cycles, energy dissipation, access time taken by data processing resources during transactions.
Optionally, in the method, the Transient Tokens are representative of CPU cycles executable within the system, wherein the CPU cycles are a measure of a representative quantity (referred henceforth as a representative quantity of CPU cycles), wherein the representative quantity of CPU cycles include a measure of at least one of: access to data storage, memory, access to data communication system bandwidth, data communication channels or ports, data processor energy use, data processor energy dissipation, access time taken by data processing resources during transactions, heat generation, cooling
9energy applied or any other measure associated with one or more CPU cycles.
Optionally, the method includes assigning a value to the representative quantity of CPU cycles, wherein, the value of the representative quantity of CPU cycles is, optionally, associated with a value defined in one or more currencies, including fiat currencies or cryptocurrencies (the currency value), wherein the currency value is defined by the value, typically a local financial value, of the one or more measures associated with the representative quantity of CPU cycles or with the one or more CPU cycles (the cost of CPU cycles).
Optionally, the method includes measuring of one or more representative quantity of CPU cycles via use of software or via use of hardware such as sensors, either being local or anywhere within the decentralised network.
Optionally, the method includes generating Transient Tokens via smart contracts where in smart contracts are, optionally, defined as one or more transformations that can be executed on data. For example, in the method, a smart contract may be a transformation of sensor data, for example captured image data.
Optionally, in the method, smart contracts may be defined as one or more executable instructions that affect data, for example, data related to a cryptocurrency or a digital token. More optionally, in the method, smart contracts may be defined as the digitally executable legal relationships, for example peer-to-peer relationship in cryptocurrencies.
Optionally, the method includes using Transient Tokens that have been generated by data mining activities.
Optionally, the method includes using Transient Tokens that have a corresponding cryptocurrency value.
10Optionally, the method includes arranging for a ledger arrangement for recording transactions implemented within the system and corresponding token exchanges.
Optionally, in the method, de-centralised data communication network is implemented as a peer-to-peer network, and the data processing arrangement is spatially distributed within the peer-to-peer network.
Optionally, the method includes using Transient Tokens that have been generated by execution of smart contracts.
Optionally, in the method, the smart contracts are executed for implementing the transactions within the system.
Optionally, in the method, smart contract includes one address field containing a first address of the Transient Tokens accompanying the Persistent Tokens, another address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred and a signature field that verifies the transaction.
Optionally, in the method, the verification is performed by providing at least one of: replication, proof of work, proof of stake.
Optionally, during the lifetime of the Transient Tokens, the method includes depreciating the value of the Transient Tokens according to a depreciation rate, wherein the depreciation rate may be defined by one or more mathematical functions or by one or more pre-set rules, or by one or more pre-set values. More optionally, the method includes depreciating the value of the Transient Tokens until the value of the of the Transient Tokens is zero or approximately zero.
Optionally, the method includes expiring the Transient Tokens with value zero or approximately zero. Optionally, in the method, the data processing arrangement automatically expires Transient Tokens at the time in which the value is of Transient Tokens is set to, or reaches by depreciation, zero or approximately zero. Optionally, in the method, the data processing arrangement locks or removes user access to expired Transient Tokens.
Optionally, the method includes adding the Transient Tokens to a pool of tokens after expiring the defined lifetime thereof.
Optionally, the method includes associating the number of Transient Tokens available for transaction within the system with the number of Transient Tokens in the pool of tokens. For example, the method may optionally include limiting the number of the number of Transient Tokens available for transaction by the number of Transient Tokens in the pool of tokens. For example, the method may optionally include calculating the number of the number of Transient Tokens available for transaction based on a mathematical function which considers the number of Transient Tokens in the pool of tokens.
In yet another aspect, an embodiment of the present disclosure provides a computer program product comprising a non-transitory computer-readable storage medium having computer-readable instructions stored thereon, the computer-readable instructions being executable by a computerized device comprising processing hardware to execute a method of using a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network.
The present disclosure provides a system and a method of using the system for processing transactions of tokens within the system. The present disclosure provides a scalable and non-stagnant system for trading, exchanging and transacting tokens. Additionally, the present
12disclosure provides a common platform for investing in tokens, which may be, for example, a digital currency, or any asset which may be represent by such token. The tokens may be a medium of exchange which may be a digital currency such as a cryptocurrency or any asset or technical operation which is exchanged or transacted within a decentralised network. For example, the de-centralised network may be a distributed peer-to-peer data communication network, where, for examples, the tokens exchanged are a technical representation of an asset such as an amount of energy transmitted or consumed (i.e. a physical resource).
Moreover, the present disclosure provides an easy to implement system for transacting tokens. Additionally, the system substantially reduces the problem of validation of tokens during transaction thereof. Consequently, the system provides an efficient, faster and optimal approach for performing transactions.
Additional aspects, advantages, features and objects of the present disclosure would be made apparent from the drawings and the detailed description of the illustrative embodiments construed in conjunction with the appended claims that follow.
It will be appreciated that features of the present disclosure are susceptible to being combined in various combinations without departing from the scope of the present disclosure as defined by the appended claims.
BRIEF DESCRIPTION OF THE DRAWINGS
The summary above, as well as the following detailed description of illustrative embodiments, is better understood when read in conjunction with the appended drawings. For the purpose of illustrating the present disclosure, exemplary constructions of the disclosure are shown in the
13drawings. However, the present disclosure is not limited to specific methods and instrumentalities disclosed herein. Moreover, those in the art will understand that the drawings are not to scale. Wherever possible, like elements have been indicated by identical numbers.
Embodiments of the present disclosure will now be described, by way of example only, with reference to the following diagrams wherein:
FIG. 1 is a schematic illustration of a system including a de-centralised data communication network, for example a peer-to-peer data communication network including a plurality of nodes, wherein a structure of the peer-to-peer network is dynamically changing, with network nodes joining and other network nodes leaving at various temporal instances. The data communication network includes a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network in accordance with an embodiment of the present disclosure;
FIG. 2 is an illustration of steps of a method for using the system of FIG. 1 that processes tokens that are transacted via the de-centralised data communication network, in accordance with an embodiment of the present disclosure; and
FIG. 3 is a schematic illustration of an exemplary implementation of transactions of tokens within the system of FIG. 1, in accordance with an exemplary embodiment of the present disclosure.
In the accompanying drawings, an underlined number is employed to represent an item over which the underlined number is positioned or an item to which the underlined number is adjacent. A non-underlined number relates to an item identified by a line linking the non-underlined number to the item. When a number is non-underlined and
14accompanied by an associated arrow, the non-underlined number is used to identify a general item at which the arrow is pointing.
DETAILED DESCRIPTION OF EMBODIMENTS
The following detailed description illustrates embodiments of the present disclosure and ways in which they can be implemented. Although some modes of carrying out the present disclosure have been disclosed, those skilled in the art would recognize that other embodiments for carrying out or practicing the present disclosure are also possible.
The present disclosure seeks to provide a system including a decentralised data communication network, wherein a data processing arrangement of the network transacts tokens therein when performing data processing to reduce a number of processor cycles required for performing the data processing.
The present disclosure also seeks to provide a method of using a system including a de-centralised data communication network, wherein the method includes transacting tokens when using a data processing arrangement to perform data processing to reduce a number of processor cycles required for performing the data processing.
In one aspect, an embodiment of the present disclosure provides a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network, characterised in that:
(I) at least a first portion of the tokens are Persistent Tokens that are representative of one or more values of one or more resources, wherein the Persistent Tokens are transacted within the system, and at least a second portion of the tokens are Transient Tokens
15that represent one or more data processing resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens, wherein the Transient Tokens have a defined lifetime after creation thereof within the system; and (ii) the data processing arrangement transacts or executes the Persistent Tokens as supported by consuming Transient Tokens accompanying the Persistent Tokens;
wherein the Transient Tokens are representative of at least one of: computer central processing unit (CPU) cycles executable within the system, energy dissipation within the system, access time taken by data processing resources of the system during execution of transactions of Persistent Tokens, access to data memory of the system for storing and/or retrieving data.
Optionally, in the system, the Transient Tokens are representative of CPU cycles executable within the system, wherein the CPU cycles are a measure of a representative quantity (referred henceforth as a representative quantity of CPU cycles), wherein the representative quantity of CPU cycles include a measure of at least one of: access to data storage, memory, access to data communication system bandwidth, data communication channels or ports, data processor energy use, data processor energy dissipation, access time taken by data processing resources during transactions, heat generation, cooling energy applied or any other measure associated with one or more CPU cycles.
Optionally, the representative quantity of CPU cycles is assigned a value. More optionally, the value of the representative quantity of CPU cycles is associated with a value defined in one or more currencies, including fiat currencies or cryptocurrencies (the currency value),
16wherein the currency value is defined by the value, typically the local financial value, of the one or more measures associated with the representative quantity of CPU cycles or with the one or more CPU cycles (the cost of CPU cycles).
Optionally, any measure of one or more representative quantity of CPU cycles is carried out via use of software or via hardware such as sensors, either being local or anywhere within the de-centralised network.
Optionally, Transient Tokens are generated via smart contracts where in smart contracts are optionally defined as one or more transformations that can be executed on data. For example, a smart contract may be a transformation of sensor data, for example captured image data.
Optionally, smart contracts may be defined as one or more executable instructions that affect data. For example, data related to a cryptocurrency or a digital token. More optionally, smart contracts may be defined as the digitally executable legal relationships, for example peer-to-peer relationship in cryptocurrencies.
Optionally, the system is configured to use Transient Tokens that have been generated by data mining activities.
Optionally, the system is configured to use Transient Tokens that have a corresponding currency value. Optionally, the system is configured to use Transient Tokens that have a corresponding cryptocurrency value.
Optionally, the system includes a ledger arrangement for recording transactions implemented within the system and corresponding token exchanges.
Optionally, in the system, the de-centralised data communication network is implemented as a peer-to-peer network, and the data
17processing arrangement is spatially distributed within the peer-to-peer network.
Optionally, the system is configured to use Transient Tokens that have been generated by execution of smart contracts.
Optionally, in the system, the smart contracts are executed for implementing the transactions within the system.
Optionally, in the system, the smart contract includes a first address field containing a first address of the Transient Tokens accompanying the Persistent Tokens, a second address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred and a signature field that verifies the transaction.
Optionally, in the system, the verification is performed by providing at least one of: replication, proof of work, proof of stake.
Optionally, in the system, the Transient Tokens are added to a pool of tokens after expiring the defined lifetime thereof.
Optionally, in the system, the number of Transient Tokens available for transaction within the system are associated with the number of Transient Tokens in the pool of tokens. For example, limiting by the number of the number of Transient Tokens available for transaction may be limited by or calculated as a function of the number of Transient Tokens in the pool of tokens.
Optionally, in the system, during the lifetime of the Transient Tokens, the value of the Transient Tokens may depreciate according to a depreciation rate, wherein the depreciation rate may be defined by one or more mathematical functions or by one or more pre-set rules, or by one or more pre-set values. In an example, at the start of the period
18(i.e. at the start of day 1), a wallet contains 15 TT; at the start of day 3, the value of the TT depreciates at a rate of 2% per hour; at a point in time which is approximately at the end of day 3, the value of the TT, of the TT depreciates at a rate of 20% per hour; at a point in time during day 4, the value of the TT is set to zero (by rule) when the value of the TT reaches a critical value wherein, for example, the critical value may be a value considered as being approximately zero.
In another aspect, an embodiment of the present disclosure provides a method of using a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network, characterised in that the method includes:
(i) arranging for at least a first portion of the tokens to be Persistent Tokens that are representative of one or more values of one or more resources, wherein the Persistent Tokens are transacted within the system, and at least a second portion of the tokens are Transient Tokens that represent one or more values of one or more resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens, wherein the Transient Tokens have a defined lifetime after creation thereof within the system; and (ii) transacting or executing using the data processing arrangement the Persistent Tokens as supported by consuming Transient Tokens accompanying the Persistent Tokens;
wherein the Transient Tokens are representative of at least one of: CPU cycles executable within the system, energy dissipation within the system, access time taken by data processing resources of the system during execution of transactions of Persistent Tokens, access to data memory of the system for storing and/or retrieving data.
19Optionally, in the method, the Transient Tokens are representative of at least one of: CPU cycles, energy dissipation, access time taken by data processing resources during transactions.
Optionally, in the method, the Transient Tokens are representative of CPU cycles executable within the system, wherein the CPU cycles are a measure of a representative quantity (referred henceforth as a representative quantity of CPU cycles), wherein the representative quantity of CPU cycles include a measure of at least one of: access to data storage, memory, access to data communication system bandwidth, data communication channels or ports, data processor energy use, data processor energy dissipation, access time taken by data processing resources during transactions, heat generation, cooling energy applied or any other measure associated with one or more CPU cycles.
Optionally, the method includes assigning a value to the representative quantity of CPU cycles, wherein, the value of the representative quantity of CPU cycles is, optionally, associated with a value defined in one or more currencies, including fiat currencies or cryptocurrencies (the currency value), wherein the currency value is defined by the value, typically the local financial value, of the one or more measures associated with the representative quantity of CPU cycles or with the one or more CPU cycles (the cost of CPU cycles).
Optionally, the method includes measuring of one or more representative quantity of CPU cycles via use of software or via use of hardware such as sensors, either being local or anywhere within the decentralised network.
Optionally, the method includes generating Transient Tokens via smart contracts where in smart contracts are, optionally, defined as one or more transformations that can be executed on data. For example, in the
20method, a smart contract may be a transformation of sensor data, for example captured image data.
Optionally, in the method, smart contracts may be defined as one or more executable instructions that affect data, for example, data related to a cryptocurrency or a digital token. More optionally, in the method, smart contracts may be defined as the digitally executable legal relationships, for example peer-to-peer relationship in cryptocurrencies.
Optionally, the method includes using Transient Tokens that have been generated by data mining activities.
Optionally, the method includes using Transient Tokens that have a corresponding cryptocurrency value.
Optionally, the method includes arranging for a ledger arrangement for recording transactions implemented within the system and corresponding token exchanges.
Optionally, in the method, de-centralised data communication network is implemented as a peer-to-peer network, and the data processing arrangement is spatially distributed within the peer-to-peer network.
Optionally, the method includes using Transient Tokens that have been generated by execution of smart contracts.
Optionally, in the method, the smart contracts are executed for implementing the transactions within the system.
Optionally, in the method, smart contract includes one address field containing a first address of the Transient Tokens accompanying the Persistent Tokens, another address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred and a signature field that verifies the transaction.
Optionally, in the method, the verification is performed by providing at least one of: replication, proof of work, proof of stake.
Optionally, the method includes adding the Transient Tokens to a pool of tokens after expiring the defined lifetime thereof.
Optionally, the method includes associating (for example limiting or for example calculating as a function of) the number of Transient Tokens available for transaction within the system with the number of Transient Tokens in the pool of tokens.
In yet another aspect, an embodiment of the present disclosure provides a computer program product comprising a non-transitory computer-readable storage medium having computer-readable instructions stored thereon, the computer-readable instructions being executable by a computerized device comprising processing hardware to execute a method of using a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network. In yet another aspect, a computer program product comprising a non-transitory computer-readable storage medium having computer-readable instructions stored thereon, the computerreadable instructions being executable by a computerized device comprising processing hardware to execute a method of using a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network.
Throughout the present disclosure, the term Persistent token refers to a parameter that, for example, represents a sensed value or quantity of a real physical resource or derivative thereof; the term may also be understood as a digital unit or element that serves as a medium of exchange. Furthermore, the value token allows for instantaneous
22transactions and borderless transfer-of-ownership. Moreover, the number of Persistent Tokens in the system may be predefined, or may be determined dynamically, when the system is in operation. Additionally, such Persistent Tokens can be used when buying, exchanging or performing other transactions. At an instance, such values tokens may refer to digital currency, cryptocurrency, alternative currency and the like, but are not limited thereto.
Throughout the present disclosure, the term transactions refers to exchange of physical products, services affecting physical products, persons or entities, information and so forth between two or more entities. Such a transaction may involve remuneration of the one or more resources by one entity, for services offered by another entity. Furthermore, the entities of the one or more resources may be parties (such as owners) that hold control of the tokens.
As an example, a transaction may be data within a data processor which represent a parameter describing a sensed or measured voltage, current, mass or similar.
As mentioned previously, the tokens are transacted via the decentralised data communication network, for example implemented as a peer-to-peer network including a plurality of mutually interconnected nodes; the peer-to-peer network is potentially temporally dynamically changing in its nodal interconnectivity, and the trustworthiness of some of the nodes is often unverified. Moreover, in the de-centralised data communication network, the Persistent Tokens are employed when performing interactions between the nodes; the one or more nodes connected by the de-centralised data communication network perform transactions of the Persistent Tokens therebetween. Furthermore, as aforementioned, the one or more nodes connected by the de-centralised data communication network are non-uniform and dynamic, for example mobile and therefore varying in spatial location thereof.
23Additionally, the one or more nodes connected by the de-centralised data communication network are potentially spread over an extensive geographical area, for example over a given country or continent. Moreover, the de-centralised data communication network relates to an arrangement of interconnected programmable and/or nonprogrammable components that are configured to facilitate data communication between one or more electronic devices and/or databases, for example one or more spatially distributed databases. Furthermore, the network may include, but is not limited to, one or more peer-to-peer network, a hybrid peer-to-peer network, local area networks (LANs), radio access networks (RANs), metropolitan area networks (MANS), wide area networks (WANs), all or a portion of a public network such as the global computer network known as the Internet®, a private network, a cellular network and any other communication system or systems at one or more spatial locations. Additionally, the de-centralised data communication network includes wired or wireless communication links and channels that can be carried out via any number of known protocols, including, but not limited to, Internet® Protocol (IP), Wireless Access Protocol (WAP), Frame Relay, or Asynchronous Transfer Mode (ATM). Moreover, any other suitable protocols using voice, video, data, or combinations thereof, can also be employed. Moreover, although the system is frequently described herein as being implemented with TCP/IP communications protocols, the system may also be implemented using IPX®, Appletalk®, IP-6®, NetBIOS®, OSI®, any tunnelling protocol (e.g. IPsec®, SSH®), for example. Furthermore, the transactions performed via the decentralised data communication network are processed by the data processing arrangement, as aforementioned.
Optionally, the de-centralised data communication network is implemented as a peer-to-peer network, as aforementioned, and the data processing arrangement is spatially distributed within the peer-to
24peer network. Additionally, each of the one or more nodes in the decentralised data communication network may have a direct association therebetween. Specifically, the direct association occurs when the peerto-peer network performs one or more transactions directly between the one or more nodes (such as owners) corresponding to the Persistent Tokens.
The data processing arrangement is operable to perform computational operations associated with the transactions; as will be described in more detail later, processing the transactions requires use of a computing arrangement that is configured to process data in a deterministic von Neumann synchronous computing architecture. Such a computing architecture employs clock cycles to implement processing tasks, wherein the computing architecture is typically multitasking when in operation and is costly in terms of initial hardware and energy consumption when in operation. It is therefore highly desirable for the data communication network when performing transactions that its computing cycles are employed effectively to process transactions rather than merely idling to little benefit to the data communication network. Such issues are of a technical nature and pertain to computing efficacy. Additionally, the data processing arrangement controls the transactions of the tokens between each of the one or more nodes. Specifically, the data processing arrangement communicates with each of the one or more nodes participating in processing the transactions. Additionally, the data processing arrangement is further operable to maintain one or more records associated with the transactions between one or more nodes connected by the de-centralised data communication network. In an example embodiment of the present disclosure, the data processing arrangement is a server that controls transactions and maintain records associated with the transactions. Furthermore, the data processing arrangement relates to a structure and/or module that include programmable and/or non-programmable components
25configured to store, process and/or share information related to the transactions. Optionally, the data processing arrangement includes any arrangement of physical or virtual computational entities capable of enhancing information to perform various computational tasks. Furthermore, it will be appreciated that the data processing arrangement optionally implemented as a hardware server and/or plurality of hardware servers operating in a parallel or in a distributed architecture; optionally, the servers are supplemented with additional computation devices, such as neural networks and hierarchical clusters of pseudo-analog variable state machines implementing artificial intelligence algorithms. In an example, the data processing arrangement may include components such as memory, a processor, a network adapter and the like, to store, process and/or share information with other computing components, such as user device/user equipment. Optionally, the data processing arrangement is implemented as a computer program that provides various services (such as database service) to other devices, modules or apparatus. Moreover, the data processing arrangement relates to a computational element that is operable to respond to and processes instructions to perform the transactions. Optionally, the data processing arrangement includes, but is not limited to, a microprocessor, a microcontroller, a complex instruction set computing (CISC) microprocessor, a reduced instruction set (RISC) microprocessor, a very long instruction word (VLIW) microprocessor, or any other type of processing circuit, for example as aforementioned. Furthermore, the data processing arrangement may refer to one or more individual processors, processing devices and various elements associated with a processing device that may be shared by other processing devices. Additionally, data processing arrangement is arranged in various architectures for responding to and processing the instructions for performing the transactions related to the tokens.
26Optionally, the system includes a ledger arrangement for recording transactions implemented within the system and corresponding token exchanges; such a ledger arrangement is important for a peer-to-peer data communication network when data propagation within the network is not instantaneous, and nodes are joining and leaving the network as a function of time (namely, the network is temporally dynamically changing in respect of its participating nodes that are capable of implementing computing tasks). Furthermore, the ledger arrangement may be configured to store and maintain records associated with the transactions of the tokens. Furthermore, the ledger may also be capable of keeping information associated with previous as well as related transactions associated with the tokens. For example, the ledger arrangement may be implemented as a distributed ledger arrangement, for example that is operable to use a distributed database. Such a distributed ledger arrangement may exist as a plurality of copies thereof on various nodes in the system, wherein the nodes may be arranged at different geographical locations, for example in different countries or continents. Furthermore, the plurality of copies of the distributed ledger arrangement optionally communicate with each other, such as to converge on a single consensus (such as an absolute state of the system) without a centralized authority to supervise the communication. Such a ledger arrangement may be implemented using a public and non-permissioned ledger. However, it will be appreciated that the resource ledger may be implemented in any other implementation, such as a private and permissioned ledger. Yet alternatively, a public permissioned ledger or a private nonpermissioned ledger is optionally employed.
Furthermore, at least a first portion of the tokens are Persistent Tokens that are representative of one or more values of one or more resources. Additionally, the Persistent Tokens are associated with the one or more values representing merit (such as worth, significance, usefulness,
27technical functionality, and so forth) of one or more resources such as a fiat currency, cryptocurrency, gems, or any other asset having an economic value associated thereto. Furthermore, the one or more values of one or more resources are dynamic in nature. Consequently, the one or more values of one or more resources associated with the Persistent Tokens increases or decreases depending upon economic value of the one or more resources. At an instance, a person having one or more Persistent Tokens may intend to hold thereto until an increase in the one or more values of one or more resources associated with the Persistent Tokens is observed. At such an instance, holding on to the Persistent Tokens leads to a profit to the person having the one or more Persistent Tokens. Furthermore, the number of Persistent Tokens in the system may be predefined or may be defined dynamically based on requirement thereof in the system. Furthermore, the Persistent Tokens are tradable within the system. Specifically, the Persistent Tokens may be exchanged for one or more tokens, alternative currency, or any other asset in the system that has an economic value associated thereto. Moreover, the transactions in the system are supported by the Transient Tokens.
Moreover, at least a second portion of the tokens are Transient Tokens that represent one or more data processing resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens; a given TT may, therefore, be understood as a representation of an integer or quantum of data processing capacity within the system, that has associated therewith a corresponding number of computing devices with associated power dissipation within associated computing hardware. The data processing arrangement comprises one or more data processing resources that can be used to process the transactions. Additionally, the data processing resources may be one or more processing units connected to each other in any architecture (such as centralized, distributed, pipelined client-server and
28so forth). In an example embodiment, a transaction may require one or more data processing resources for execution thereof. Furthermore, in such an embodiment, the Transient Tokens represent the cost of one or more data processing resources associated with processing, namely executing, the transaction. Additionally, a number of the Transient Tokens in the system may be predefined. Alternatively, the Transient Tokens may be created based on technical requirements in the system, for example a total aggregate computation load required to maintain the system in operation.
Optionally, the system may create new types of tokens such as tertiary tokens, quaternary tokens, quinary tokens and the like. Such new types of tokens may be used in the transactions being executed within the system. Additionally, the new types of tokens may have constraints upon utilization and transactions thereof. Furthermore, creation and lifetime properties of the new types of tokens may be decided based upon constraints thereof. Moreover, such new types of tokens may be used within the system as well as outside the system as per requirements thereof.
Optionally, each of the aforementioned tokens may have a unique identifier thereof. Such an identifier may be operable to identify uniquely types of the tokens, a temporal lifetime of the tokens and so forth. Furthermore, the identifiers may also be used to retrieve information associated with the tokens, for example from a distributed database within the system. In an example embodiment of the present disclosure, such identifiers may be a string of one or more binary digits, numbers, alphabets, alphanumeric strings, a symbol or any other combination that may be operable to identify the tokens uniquely.
Optionally, the system is configured to use Transient Tokens that have been generated by data mining activities; the TT's are, for example, awarded by the system for computational effort that has been
29previously provided by various nodes of the system. Specifically, the Transient Tokens may be created by solving mathematical problems and generating a certain number of Transient Tokens in exchange. Mining of the Transient Tokens may be performed by using conventional hardware or may require an advanced hardware and software.
Furthermore optionally, the system is configured to consume Transient Tokens that have been generated by executing smart contracts within the system. The smart contracts may require, for example, more Transient Tokens than a number of Transient Tokens than are available for executing the transactions. Consequently, Transient Tokens required for performing the transactions may be created by executing the smart contracts. Moreover optionally, the Transient Tokens generated for use in transactions may be destroyed as soon as the transactions are completed. In other words, by arranging for the system to use Transient Tokens that are a measure representative of CPU cycles, or a measure of effort required in the system for performing computational tasks, nodes of the system are incentivised when implementing transactions to execute them in a most computationally efficient manner; in turn, this results in computing hardware of the system being used in a most efficient manner (avoiding inconsequential computing activity that merely wastefully dissipates energy within the system), thereby reducing waste of energy and expensive computing hardware.
Optionally, the Transient Tokens are representative of a quantity or amount of at least one of: CPU cycles, data processing hardware energy dissipation, access time taken by data processing resources during execution of transactions. Additionally, the Transient Tokens may represent number of CPU clock cycles required for executing instructions for implementing the transactions.
As an example, the Transient Tokens may also represent energy consumption in executing the transactions; such energy consumption
30corresponds to atmospheric carbon dioxide (CO2) emissions if the energy is generated from combusting fossil fuels alleged to cause anthropogenically-forced climate change, or generation of dangerous nuclear waste if the energy is generated from conventional fission nuclear reactors. Reducing such atmospheric emissions or nuclear waste may, directly or indirectly, be a resulting effect associated with the present invention.
Moreover, the Transient Tokens may represent time taken by data processing resources when retrieving records (namely, information, data), for example from a distributed database implemented within the system, and other resources required for executing the transactions. In an example embodiment, the Transient Tokens may also be representative of any one of: data processing resources, energy dissipation, CPU cycles required in mining thereof.
More optionally, the system is configured to use Transient Tokens that have a corresponding cryptocurrency value. The transaction enabling token may have a corresponding alternate currency value that may be used in exchange thereof as and when required; using financial incentives to improve an efficiency of operation of the system is also beneficial. Furthermore, the corresponding cryptocurrency may allow one or more new nodes to enter the system, such that the system is dynamically reconfiguring itself in real-time concurrently as it is executing transactions therein. The one or more new nodes may enter the system by exchanging the cryptocurrency with one or more Transient Tokens. At an instance, exchange of Transient Tokens with cryptocurrency may also allow trade outside the system.
Furthermore, the Transient Tokens have a defined lifetime after creation thereof within the system, as aforementioned. Optionally, the system employs only one type of transaction enabling token having a defined lifetime and a defined equivalent computing cycles. Alternatively, optionally, the system employs a plurality of different types of Transient Tokens, that are mutually different in respect of their respective lifetimes and/or their defined equivalent computing cycles. Optionally, the lifetime or lifetimes of the Transient Tokens are made temporally variable depending upon a total aggregate computing load experienced by the system and/or as a function of how many nodes are participating in the system at a given time.
Specifically, the Transient Tokens have a lifetime within which the Transient Tokens are valid for use executing the transactions within the system. In an example embodiment of the system, the defined lifetime of the Transient Tokens may get reset during transaction thereof. Furthermore, the defined lifetime is optionally decided at a time of creation of the Transient Tokens. Additionally, the defined lifetime of the Transient Tokens is changed as per requirement later in the system, for example in manner as described in the foregoing.
A frequency of transactions involving the Transient Tokens is relatively high and a frequency of transactions involving Persistent Tokens is relatively low as compared to the Transient Tokens. Specifically, the defined lifetime of Transient Tokens ensures high frequency of transactions involving the Transient Tokens. In an example embodiment, such a frequency of transactions may be called analogously a velocity of transactions, wherein velocity is not employed in a normal kinematic sense. In such an embodiment, the Transient Tokens may have a high frequency of transaction, namely a high velocity of transactions, and the Persistent Tokens may have a low frequency, namely a low velocity of transactions.
Optionally, the smart contracts are executed for implementing the transactions within the system. Furthermore, the smart contracts may include instructions for implementing the transactions associated thereto. Additionally, the smart contracts may include a defined number
32of Persistent Tokens and/or Transient Tokens to be exchanged in the transactions. Furthermore, the smart contracts may also include a defined number of Transient Tokens required for executing the transactions.
Furthermore optionally, the smart contract includes:
(i) a first address field containing a first address of the Transient Tokens accompanying the Persistent Tokens;
(ii) a second address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred; and (ill) a signature field that verifies the transaction; for example, verification can be achieved by using a hash function associated with private-public key encryption.
The smart contract may include information such as number of Transient Tokens required for executing the transactions associated thereto as well as a location (such as, an identification number, an associated account, a memory address or any such identifier that may uniquely identify specific Transient Tokens) of the Transient Tokens defined in the first address field.
Specifically, the Transient Tokens required for executing the transactions may be used for performing network operations and validations performed by miners, for example moving data about within the system from a server of a first node of the system to a server of a second node of the system, for providing data duplication for enhancing data security against data loss within the system. Furthermore, the transactions may use the Transient Tokens for such operations and for paying miners as well for work thereof. Such network operations and
33validations may be subject to various constraints such as availability of computing resources of the system, waiting time in the system for resources becoming available to implement a transaction, and so forth that may affect number of the Transient Tokens required in executing the transactions. It is to be understood that the smart contracts optionally contain (or otherwise identify) a maximum number of Transient Tokens that may be required for executing the transactions. Consequently, at an instance when a given number of the Transient Tokens actually used in executing the transactions is less than number of the Transient Tokens available for execution of the transactions. At such an example, remaining (namely, unused) Transient Tokens may be transferred (namely, sent) to an address included in the second address field. Furthermore, the signature field may be used to verify that the transaction issuer owns the Transient Tokens that are being spent.
Optionally, the system performs a verification wherein nodes of the system are operable to provide at least one of: replication of data or information associated with a given transaction, proof of work performed in respect of a given transaction, proof of stake in a given transaction. Furthermore, verification (namely, validation) of tokens may be performed by replication thereof. Additionally, a successful replication of tokens may authenticate validity of the tokens and an unsuccessful replication may indicate that the tokens may have been tampered or illegitimate. Moreover, the verification by proof of work indicates that the number of Transient Tokens that are issued to a miner would be proportional to a computational power put by the miner into the proof of work. Furthermore, such a proof of stake may authenticate ownership of the Transient Tokens by establishing a stake of an owner in the Transient Tokens and the transactions associated thereto. In an example, such verifications may be carried out by applying zk-SNARK proofs. Additionally, zk-SNARK stands for ZeroKnowledge Succinct Non-Interactive Argument of Knowledge, and
34refers to a proof construction where one can prove possession of the tokens without revealing any information associated thereto, and without any interaction between owner of the tokens and verifier. The tokens may be transacted after verification of validity and ownership thereof.
As mentioned previously, the data processing arrangement transacts or executes the Persistent Tokens as supported by Transient Tokens accompanying the Persistent Tokens; in an anomalous manner, the Transient Tokens are akin to a fuel for an engine that functions to execute transactions, wherein the transactions affect Persistent Tokens that are representative of real physical resources and processes; it is desirable that the transactions are executed in a manner that is most efficient in respect of consumption of the fuel. Furthermore, the transaction involving the Persistent Tokens must have the Transient Tokens required for network operations in execution thereof. The data processing arrangement is capable of performing operations and executing instructions required for execution of the transactions. Furthermore, the data processing arrangement is also operable to communicate between one or more nodes in order to access and retrieve information required for executing the transactions within the system.
In an example embodiment, the transactions may optionally include an exchange of Persistent Tokens for Transient Tokens. For example, a user may need Transient Tokens for executing a transaction of (PT) Persistent Tokens. The user may trade Persistent Tokens from a miner or any other user having possession of Transient Tokens within the system. In return, the user may obtain or otherwise acquire Transient Tokens required for performing the transaction of Persistent Tokens.
In another embodiment, the transactions may optionally include exchange of Transient Tokens for Persistent Tokens. For example, a
35user having possession of Transient Tokens may not need to perform any transaction for a long period of time, for example weeks, months, even years. The user may exchange the Transient Tokens (having a defined lifetime or defined lifetimes) thereof for Persistent Tokens from another user or miner within the system. Optionally, the user having ownership of the Transient Tokens may always pay for any additional Transient Tokens required for executing the transactions.
In yet another example embodiment, the transactions may include an exchange of Transient Tokens for other Transient Tokens, for example where the Transient Tokens have mutually different associated defined lifetimes. For example, a user A may lend a certain number of Transient Tokens to another user B. Later, the user B may return the certain number of Transient Tokens to the user A. Optionally, the transactions including exchange of the Transient Tokens only may not require the Transient Tokens to execute the transactions.
In an exemplary implementation of transaction using the system, a user A wants to buy a used mobile phone from another user B using the system. Furthermore, list price of mobile phone may be 12,000 TT, and cost of a smart contract associated with the transaction may be 200 TT. Additionally, lifetime of TT may be maximum 4 hours. Moreover, the user A may have 4,000 TT that may be expiring in 1 hour and 17 TT (namely, low velocity token) in wallet thereof. Additionally, user B may have 3,000 TT that may be expiring in 30 minutes in wallet thereof. During the transaction, user A may agree to buy the mobile phone from the user B for the list price of 12,000 TT. Moreover, user A has 4,000 TT in wallet thereof that is insufficient for the transaction. Therefore, the user A may convert 9 VT into 9,000 TT via an exchange arrangement. It is to be understood that, for the purpose of simplicity of the exemplary implementation, there are no charges considered for the exchange of VT and TT. Furthermore, the smart contract may be configured, written
36and subsequently executed. Additionally, execution of the smart contract (that is 200 TT) may be paid by user A. Subsequently, 200 TT are credited to a miner's wallet that has executed the smart contract associated with the transaction. After execution of the transaction, user A may have 800 TT (expiring in 1 hour) and 6 VT in wallet thereof. Additionally, user B may have 15,000 TT in wallet thereof, wherein 3,000 TT (that were already owned by the user B) have expiration time of 30 minutes and 12,000 TT (that were exchanged during the transaction) have expiration time 4 hours. It is to be understood that lifetime of TT invoked before reaching expiration time thereof get restored.
Optionally, the method includes using Transient Tokens that have been generated by data mining activities.
Optionally, the method includes using Transient Tokens that have a corresponding cryptocurrency value.
Optionally, the method includes arranging for a ledger arrangement for recording transactions implemented within the system and corresponding token exchanges.
Optionally, in the method, the de-centralised data communication network is implemented as a peer-to-peer network, and the data processing arrangement is spatially distributed within the peer-to-peer network.
Optionally, the method includes using Transient Tokens that have been generated by execution of smart contracts.
Optionally, in the method, the smart contracts are executed for implementing the transactions within the system.
37Optionally, in the method, the smart contract includes: one address field containing a first address of the Transient Tokens accompanying the Persistent Tokens, another address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred and a signature field that verifies the transaction.
Optionally, in the method, the verification is performed by providing at least one of: replication, proof of work, proof of stake.
In an example of an embodiment of the present disclosure, the Transient Tokens are added to a pool of tokens after expiring the defined lifetime thereof. Such a pool of Transient Tokens optionally contains only Transient Tokens.
In an embodiment of the present disclosure, the value of Transient Tokens earned for computational work are used in a similar way of Persistent Tokens.
Optionally, in the system or in the method, the Transient Tokens are representative of the time, measured or calculated, for signals to propagate through a circuit, optionally taking into account a variation of energy dissipation. Optionally, in the system or in the method, the Transient Tokens are representative of any measureable or identifiable computer work. More optionally, the Transient Tokens are representative of any kind of verifiable physical work that can be quantified by a sensor.
Optionally, in the system or in the method, any measure of one or more representative quantity of CPU cycles is carried out via use of software or via hardware such as sensors, either being local or anywhere within the de-centralised network.
38In the present invention, tokens and CPU cycles are referred to in plural form since these are the more likely implementation of the system and method. The embodiments of the present invention apply mutatis mutandis to the singular and plural references of Token and CPU cycle. Moreover, the embodiments of the present disclosure also apply mutatis mutandis for a system which considers portions (or fractions) of a single token as the basic unit.
DETAILED DESCRIPTION OF THE DRAWINGS
Referring to FIG. 1, there is shown a schematic illustration of a system 100 including a de-centralised data communication network 102 (shown by dotted lines) and a data processing arrangement 104 that processes tokens that are transacted via the de-centralised data communication network 102 in accordance with an embodiment of the present disclosure. Furthermore, the de-centralised data communication network 102 includes, for example, nodes A, B, C, D and E, namely five (5) nodes. However, it will be appreciated that the de-centralised data communication network 102 may include a plurality of nodes, for example more than five (5) nodes, or less than five (5) nodes. The nodes A-E have Persistent Tokens and Transient Tokens. Optionally, a distributed database is provided that services data storage and retrieval needs of the nodes. Furthermore, the nodes A-E are communicably coupled to each other and are operable to exchange the Persistent Tokens and Transient Tokens therebetween. Furthermore, the data processing arrangement 104 is operable to transact or execute the exchange of the Persistent Tokens and Transient Tokens between the nodes A-E.
Referring to FIG. 2, there is shown an illustration of steps of a method 200 for (of) using a system including a de-centralised data
39communication network 102 (as shown in FIG. 1), and a data processing arrangement 104 (as shown in FIG. 1) that processes tokens that are transacted via the de-centralised data communication network, in accordance with an embodiment of the present disclosure. At a step 202, at least a first portion of tokens are arranged to be Persistent Tokens that are representatives of one or more values of one or more resources, wherein the Persistent Tokens are tradable within the system. Furthermore, at the step 202, at least a second portion of tokens are arranged to be Transient Tokens that represent one or more data processing resources of data processing arrangement used for processing one or more transactions of Persistent Tokens.
At a step 204, the data processing arrangement 104 is used to transact or execute the Persistent Tokens as supported by the Transient Tokens accompanying the Persistent Tokens. The steps 202 and 204 are only illustrative and other alternatives can also be provided where one or more steps are added, one or more steps are removed, or one or more steps are provided in a different sequence without departing from the scope of the claims herein.
Referring to FIG. 3, there is shown a schematic illustration of an exemplary implementation 300 of transactions of tokens within the system 100 (as shown in FIG. 1), in accordance with an exemplary embodiment of the present disclosure. As shown, the system includes a node 302 associated with a miner M. The node 302 is operable to validate transactions and perform authentication of terms and instructions mentioned in the smart contracts. The miner M is rewarded with one or more Transient Tokens as a reward for executing various computing tasks, wherein the one or more Transient Tokens are usable within the system 100 for implementing one or more transaction that affect one or more Persistent Tokens. At a given first time, a user L performs a transaction 306 with the miner M via the node 302. The
40user L provides Persistent Tokens and receives Transient Tokens in return from the miner M. At a given second time, after the first given time, the user L performs a transaction 308 with another user N. In the transaction 308, the user L lends Transient Tokens to the user N, and the user N returns the Transient Tokens later to the user L. At a third time, after the second time, the user N performs a transaction 310 with another user 0. The user N gives Transient Tokens to the user 0 and receives Persistent Tokens in return. Additionally, a smart contract associated with the transaction 310 is executed by the miner M using the node 302. The user N pays Transient Tokens to the miner M via the node 302 for validating terms and executing the smart contract associated with the transaction 310.
It will be appreciated that aforementioned tokens can be moved around as data packets within the system 100. Alternatively, or additionally, the tokens are stored in data memory, for example in one or more user accounts providing data storage and data access. Optionally, the user accounts are stored in a distributed database that spans the system 100 and is accessible to nodes of the system 100. Optionally, nodes of the system 100 have to be verified or otherwise authorized before they are able to access any data associated with a user account. Such verification is implemented based upon permission given by the users, and/or by a management arrangement of the system 100, subject to certain verification conditions being satisfied, for example that the nodes are trustworthy. Trustworthiness is determined by way of the system 100 performs tests on the nodes and/or on previous reliable conduct of the nodes when implementing transactions within the system 100. Optionally, consensus voting or other nodes or users of the system 100 is employed to determine a degree of trustworthiness of a given node.
Modifications to embodiments of the present disclosure described in the foregoing are possible without departing from the scope of the present disclosure as defined by the accompanying claims. Expressions such as including, comprising, incorporating, have, is used to describe and claim the present disclosure are intended to be construed in a nonexclusive manner, namely allowing for items, components or elements not explicitly described also to be present. Reference to the singular is also to be construed to relate to the plural.

Claims (45)

1. A system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network, characterised in that:
(i) at least a first portion of the tokens are Persistent Tokens that are representative of one or more values of one or more resources, wherein the Persistent Tokens are transacted within the system, and at least a second portion of the tokens are Transient Tokens that represent one or more data processing resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens, wherein the Transient Tokens have a defined lifetime after creation thereof within the system; and (ii) the data processing arrangement transacts or executes the Persistent Tokens as supported by consuming Transient Tokens accompanying the Persistent Tokens;
wherein the Transient Tokens are representative of at least one of: computer central processing unit (CPU) cycles executable within the system, energy dissipation within the system, access time taken by data processing resources of the system during execution of transactions of Persistent Tokens, access to data memory of the system for storing and/or retrieving data.
2. A system of claim 1, characterized in that the Transient Tokens are representative of CPU cycles executable within the system, wherein the CPU cycles are a measure of a representative physical quantity.
3. A system of claim 1 or 2, characterized in that the representative quantity of CPU cycles include a measure of at least one of: access to
43data storage, memory, access to data communication system bandwidth, data communication channels or ports, data processor energy use, data processor energy dissipation, access time taken by data processing resources during transactions, heat generation, cooling energy applied or any other measure associated with one or more CPU cycles.
4. A system of any one of the preceding claims, characterized in that the representative quantity of CPU cycles is assigned a value, wherein the value of the representative quantity of CPU cycles is associated with a value defined in one or more currencies, wherein the currency value is defined by the value of the one or more measures associated with the representative quantity of CPU cycles or with the one or more CPU cycles.
5. A system of any one of the preceding claims, characterized in that any measure of one or more representative quantity of CPU cycles is carried out via use of software or via hardware such as sensors, either deployed locally or deployed in a distributed manner within the decentralised network.
6. A system of any one of the preceding claims, characterized in that Transient Tokens are generated via smart contracts wherein smart contracts are defined as one or more transformations that are executed on data.
7. A system of claim 6, characterized in that the smart contracts are transformations of sensor data.
8. A system of any one of the claims 6 or 7, characterized in that the smart contracts are captured image data.
9. A system of any one of the claims 6, 7 or 8, characterized in that the smart contracts are defined as one or more executable instructions that
44affect data, wherein the data relates to a cryptocurrency or a digital token.
10. A system of any one of the claims 6 to 9, characterized in that the smart contracts are defined as digitally executable legal relationships.
11. A system of claim 10, characterized in that the digitally executable legal relationships are peer-to-peer relationships in cryptocurrencies.
12. A system of any one of the preceding claims, characterized in that the system is configured to use Transient Tokens generated by data mining activities.
13. A system of any one of the preceding claims, characterized in that the system is configured to use Transient Tokens having a corresponding currency value.
14. A system of any one of the preceding claims, characterized in that the system includes a ledger arrangement for recording transactions implemented within the system and corresponding token exchanges.
15. A system of claim 1, characterized in that the de-centralised data communication network is implemented as a peer-to-peer network, and the data processing arrangement is spatially distributed within the peerto-peer network.
16. A system of any one of the preceding claims, characterized in that the system is configured to use Transient Tokens generated by execution of smart contracts.
17. A system of any one of the preceding claims, characterized in that the smart contracts are executed for implementing the transactions within the system.
18. A system of any one of the preceding claims, characterized in that at least one of the smart contracts includes a first address field containing a first address of the Transient Tokens accompanying the Persistent Tokens, a second address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred and a signature field that verifies the transaction.
19. A system of claim 18, characterized in that the verification is performed by providing at least one of: replication, proof of work, proof of stake.
20. A system of any one of the preceding claims characterised in that the value of the Transient Tokens depreciates according to at least one depreciation rate.
21. A system of any one of the preceding claims, characterized in that the Transient Tokens are added to a pool of tokens after expiring the defined lifetime thereof.
22. A system of any one of the preceding claims, characterized in that the number of Transient Tokens available for transaction within the system are associated with the number of Transient Tokens in the pool of tokens.
23. A method of using a system including a de-centralised data communication network, and a data processing arrangement that processes tokens that are transacted via the de-centralised data communication network, characterised in that the method includes:
(i) arranging for at least a first portion of the tokens to be Persistent Tokens that are representative of one or more values of one or more resources, wherein the Persistent Tokens are transacted within the system, and at least a second portion of the tokens are
46Transient Tokens that represent one or more values of one or more resources of the data processing arrangement used for processing one or more transactions of the Persistent Tokens , wherein the Transient Tokens have a defined lifetime after creation thereof within the system; and (ii) transacting or executing using the data processing arrangement the Persistent Tokens as supported by consuming Transient Tokens accompanying the Persistent Tokens ;
wherein the Transient Tokens are representative of at least one of: CPU cycles executable within the system, energy dissipation within the system, access time taken by data processing resources of the system during execution of transactions of Persistent Tokens, access to data memory of the system for storing and/or retrieving data.
24. A method of claim 23, characterized in that the Transient Tokens are representative of CPU cycles executable within the system, wherein the CPU cycles are a measure of a representative quantity.
25. A method of any one of the claims 23 or 24, characterized in that the representative quantity of CPU cycles include a measure of at least one of: access to data storage, memory, access to data communication system bandwidth, data communication channels or ports, data processor energy use, data processor energy dissipation, access time taken by data processing resources during transactions, heat generation, cooling energy applied or any other measure associated with one or more CPU cycles.
26. A method of any one of the claims 23, 24 or 25, characterized in that the method includes assigning a value to the representative quantity of CPU cycles, wherein the value of the representative quantity of CPU cycles is associated with a value defined in one or more currencies, wherein the currency value is defined a value of the one or more measures associated with the representative quantity of CPU cycles or with the one or more CPU cycles.
27. A method of any one of the claims 23 to 26, characterized in that the method includes measuring one or more representative quantity of CPU cycles via use of software or via use of hardware such as sensors, either being deployed locally or in a distributed manner within the decentralised network.
28. A method of any one of the claims 23 to 27, characterized in that the method includes generating Transient Tokens via smart contracts wherein the smart contracts are defined as one or more transformations that are executed on data.
29. A method of claim 28, characterized in that the smart contracts are transformations of sensor data.
30. A method of claim 28 or 29, characterized in that the smart contracts are captured image data.
31. A method of any one of the claims 28, 29 or 30 characterized in that the smart contracts are defined as one or more executable instructions that affect data, wherein the data relates to a cryptocurrency or a digital token.
32. A method of any one of the claims 28 to 31, characterized in that the smart contracts are defined as digitally executable legal relationships.
33. A method of claim 32, characterized in that the digitally executable legal relationships are peer-to-peer relationship in cryptocurrencies.
34. A method of any one of the claims 23 to 33, characterized in that the method includes using Transient Tokens generated by data mining activities.
35. A method of any one of the claims 23 to 34, characterized in that the method includes using Transient Tokens having a corresponding cryptocurrency value.
36. A method of any one of the claims 23 to 35, characterized in that the method includes arranging for a ledger arrangement to record transactions implemented in the method and corresponding token exchanges.
37. A method of any one of the claims 23 to 36, characterized in that the de-centralised data communication network is implemented as a peer-to-peer network, and the data processing arrangement is spatially distributed within the peer-to-peer network.
38. A method of any one of the claims 23 to 37, characterized in that the method includes using Transient Tokens generated by execution of smart contracts.
39. A method of any one of the claims 23 to 38, characterized in that the smart contracts are executed for implementing the transactions in the method.
40. A method of any one of the claims 23 to 39, characterized in that at least one of the smart contracts includes one address field containing a first address of the Transient Tokens accompanying the Persistent Tokens, another address field containing a second address, wherein the second address associates with an address to which unused Transient Tokens related to the first address are to be transferred and a signature field that verifies the transaction.
41. A method of claim 40, characterized in that the verification is performed by providing at least one of: replication, proof of work, proof of stake.
42. A method of any one of claims 23 to 41, characterized in that the method includes depreciating the value of the Transient Tokens according to at least one depreciation rate.
43. A method of any one of the claims 23 to 42, characterized in that the method includes adding the Transient Tokens to a pool of tokens after expiring the defined lifetime thereof.
44. A method of any one of the claims 23 to 43, characterized in that the method includes associating the number of Transient Tokens available for transaction with the number of Transient Tokens in the pool of tokens.
45. A computer program product comprising a non-transitory computer-readable storage medium having computer-readable instructions stored thereon, the computer-readable instructions being executable by a computerized device comprising processing hardware to execute the method as claimed in any of the claims 23 to 44.
GB1804834.8A 2018-03-08 2018-03-26 System and method for data processing using tokens Withdrawn GB2572339A (en)

Priority Applications (3)

Application Number Priority Date Filing Date Title
GB1804834.8A GB2572339A (en) 2018-03-26 2018-03-26 System and method for data processing using tokens
PCT/EP2019/055850 WO2019170861A1 (en) 2018-03-08 2019-03-08 Resource management system and method of operation thereof
US16/978,844 US12002045B2 (en) 2018-03-08 2019-03-08 Resource management system and method of operation thereof

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
GB1804834.8A GB2572339A (en) 2018-03-26 2018-03-26 System and method for data processing using tokens

Publications (2)

Publication Number Publication Date
GB201804834D0 GB201804834D0 (en) 2018-05-09
GB2572339A true GB2572339A (en) 2019-10-02

Family

ID=62068238

Family Applications (1)

Application Number Title Priority Date Filing Date
GB1804834.8A Withdrawn GB2572339A (en) 2018-03-08 2018-03-26 System and method for data processing using tokens

Country Status (1)

Country Link
GB (1) GB2572339A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11334875B2 (en) 2018-11-02 2022-05-17 Verona Holdings Sezc Techniques for authenticating and tokenizing real-world items

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
None *

Cited By (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US11334875B2 (en) 2018-11-02 2022-05-17 Verona Holdings Sezc Techniques for authenticating and tokenizing real-world items
US11334876B2 (en) 2018-11-02 2022-05-17 Verona Holdings Sezc Techniques for transferring digital tokens
US12002024B2 (en) 2018-11-02 2024-06-04 Verona Holdings Sezc Tokenization platform
US12045789B2 (en) 2018-11-02 2024-07-23 Verona Holdings Sezc Techniques for locking and unlocking tokenized tokens
US12056676B2 (en) 2018-11-02 2024-08-06 Verona Holdings Sezc Techniques for facilitating transactions for real world items using digital tokens
US12086794B2 (en) 2018-11-02 2024-09-10 Verona Holdings Sezc Tokenization platform
US12118527B2 (en) 2018-11-02 2024-10-15 Verona Holdings Sezc Methods and systems for awarding non-fungible tokens to users using smart contracts

Also Published As

Publication number Publication date
GB201804834D0 (en) 2018-05-09

Similar Documents

Publication Publication Date Title
US11205172B2 (en) Factom protocol in blockchain environments
Kirli et al. Smart contracts in energy systems: A systematic review of fundamental approaches and implementations
Li et al. CrowdBC: A blockchain-based decentralized framework for crowdsourcing
KR101987692B1 (en) Registry and Automation Management Methods for Smart Contracts in Blockchain Enforcement
Liu et al. Distributed ledger technology
US12002045B2 (en) Resource management system and method of operation thereof
Guerar et al. A fraud-resilient blockchain-based solution for invoice financing
EP3983907A1 (en) System and method using a fitness-gradient blockchain consensus
Eklund et al. Factors that impact blockchain scalability
Bhattacharya et al. A blockchain based peer-to-peer framework for exchanging leftover foreign currency
Tkachuk et al. Towards efficient privacy and trust in decentralized blockchain-based peer-to-peer renewable energy marketplace
CN116235463A (en) Convergence consensus method for distributed ledger transaction
US20240005409A1 (en) Systems, methods, and storage media for managing digital liquidity tokens in a distributed ledger platform
Hannon et al. Bitcoin payment-channels for resource limited IoT devices
Hrga et al. Technical analysis of an initial coin offering
Dash et al. Artificial intelligence models for blockchain-based intelligent networks systems: Concepts, methodologies, tools, and applications
Drąsutis IOTA smart contracts
Tang et al. dMOBAs: A data marketplace on blockchain with arbitration using side-contracts mechanism
Pouwelse et al. Laws for creating trust in the blockchain age
Joseph et al. A blockchain based decentralized transaction settlement system in banking sector
Zhao et al. Applying blockchain layer2 technology to mass e-commerce
Arya et al. Blockchain: Basics, applications, challenges and opportunities
US20240113900A1 (en) Systems and methods for facilitating cryptographically backed coordination of complex computer communications
GB2572339A (en) System and method for data processing using tokens
Li et al. A fair, verifiable and privacy-protecting data outsourcing transaction scheme based on smart contracts

Legal Events

Date Code Title Description
WAP Application withdrawn, taken to be withdrawn or refused ** after publication under section 16(1)