OA21314A - System and method for authentication and association of multi-platform accounts. - Google Patents

System and method for authentication and association of multi-platform accounts. Download PDF

Info

Publication number
OA21314A
OA21314A OA1202300231 OA21314A OA 21314 A OA21314 A OA 21314A OA 1202300231 OA1202300231 OA 1202300231 OA 21314 A OA21314 A OA 21314A
Authority
OA
OAPI
Prior art keywords
wallet
unregulated
regulated
public
nft
Prior art date
Application number
OA1202300231
Inventor
David Peter Smith
Joseph Michael William Lyske
Original Assignee
Tintra 3.0 Limitedd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tintra 3.0 Limitedd filed Critical Tintra 3.0 Limitedd
Publication of OA21314A publication Critical patent/OA21314A/en

Links

Abstract

The present invention concerns the verification and authentication of independent digital wallets and, particularly, the linking of regulated and unregulated digital wallets on a public blockchain. An unregulated trading system has a public certificate module arranged selectively to write NFTs into specific unregulated accounts. A public ledger database of the blockchain system stores unregulated accounts which each contain: (i ) a document type identifier having a related minted unique non-transferable NFT linked to an externally generated certificate hash and where each non-transferable NFT is obtained via writing of a smart contract and each non-transferable NFT is a permanent record for a description of the document type: and (ii) a link to a private wallet of a regulated account of a regulated trading platform. The link relates directly to the minted non-transferable NFT issued from the certificate module. Each non-transferable NFT is configured to be changed or moved from the unregulated wallet only through an interaction that directly involves the certificate module.

Description

SYSTEM AND METHOD FOR AUTHENTICATION AND ASSOCIATION OF MULTI-PLATFORM ACCOUNTS
FIELD OF THE INVENTION
This invention relates, in general, to a client authentication process establishing account associations across multiple independent and disparate trading platforms. More particularly, but not exclusively, the invention is applicable to a blockchain System in which a wallet of an unregulated trading platform can be linked to a wallet on a regulated trading platform when common account ownership is authenticated between 10 those wallets.
SUMMARY OF THE PRIOR ART
Blockchain is essentially a distributed database that is shared among the nodes of a public computer network. As a database, a blockchain stores information electronically 15 in digital format. Blockchains are best known for their rôle in cryptocurrency Systems, such as Bitcoin, and are arranged to maintain a secure and decentralized record of transactions. The concept behind blockchain is that it guarantees the fidelity, integrity, and security of a record of data and generates trust without the need for a trusted third party. However, on a generally never basis, an individual or organization cannot control 20 or manipulate the protocol behind a cryptocurrency because it is cryptographically secure. Furthermore, there is no, little or limited and ineffectual régulation of certain aspects of blockchains on both a national or international governmental level, with this lack of oversight leading to questionable use of block technology in potentially dubious or otherwise entirely illégal activities, such as money laundering, terrorist financing or 25 narcotics trafficking in the latter case.
One key différence between a typical database and a blockchain is how the data is structured. A blockchain collects information together in groups, known as blocks, which hold sets of information. Blocks hâve certain storage capacities and, when filled, 30 are closed and linked to the previously filled block thus forming the “blockchain”. Ail new information that follows that freshly added block is compiled into a newly formed block that will then also be added to the chain once filled. A conventional database
-2usually structures its data into tables, whereas a blockchain, like its name implies, structures its data into chunks (blocks) that are strung together. This data structure inherently makes an irréversible timeline of data when implemented in a decentralized nature. When a block is filled, it is set in stone and becomes a part of this timeline. Each 5 block in the chain is given an exact time stamp when it is added to the chain.
Blockchain technology is, for example, the basis for cryptocurrency transactions, such as supported by Bitcoin. Another platform is Ethereum which is both similar and dissimilar to Bitcoin. For example, both are cryptocurrencies that can be traded, and 10 both are acquired through mining activity of a numerically limited pool of coins or tokens. Cryptocurrencies are fungible in that one ETH can be exchanged for a different ETH without any conséquence or loss.
Other blockchain technologies, such as Solano, exist. These may hâve certain advantages 15 or disadvantages relative to more accepted mainstream blockchains of Bitcoin and
Ethereum.
In dealing with blockchain cryptocurrencies, it is typical to use a cryptocurrency exchange firm, such as CoinBase. Coinbase is a cryptocurrency trading and investing 20 platform that offers users the ability to buy, sell, and exchange over one hundred tradable cryptocurrencies such as Bitcoin, Ethereum, and Dogecoin. Unlike traditional brokerage fïrms, cryptocurrency exchanges are generally not members of the Securities Investor Protection Corp. (SIPC) and the like. Therefore, unless user terms specify otherwise, investors with cryptocurrency assets commingled on a custodial cryptocurrency 25 exchange could potentially lose their funds as unsecured creditors. Coinbase, however, is regulated in the UK by the UK Financial Conduct Authority because such blockchain Financial transactions are subject to regulatory approval/control, although the spécifie form of account/wallet holder validation is not known.
Contrastingly, non-fungible tokens “NFTs” are unique digital assets addressing certifiable things, for example, photographe, music, videos, and trading cards. Consequently, NFTs are not mutually interchangeable/fungible since each NFT is in
-3itself unique. NFTs are managed in a digital ledger and traded on the web. For instance, rather than buying a genuine photo to show on a divider, the purchaser gets a unique digital file. Nearly any digital asset, for example, a piece of collectible advanced characters, virtual land, or unique online media posts, can be made and bought as an 5 NFT. NFTs are joined to explicit qualities with certificates of authenticity, which means that the digital assets cannot be traded or supplanted with each other because each NFT exists on a decentralized digital platform.
Ethereum is a decentralized global software platform having its own native 10 cryptocurrency, the ether or “ETH”, and it has an operational protocol that offers incentives to process transactions and computational activities. The ETH is compatible with and enables use of NFTs. Moreover, the ETH supports decentralized finance, decentralized autonomous organizations, and the unregulated Metaverse. Ethereum can be used by anyone to create any secured digital technology they can think of. It has a 15 token designed for use in the blockchain network, but it can also be used by participants as a method to pay for work done on the blockchain. The blockchain technology that powers Ethereum enables secure digital ledgers to be publicly created and maintained.
Decentralized applications (dApps) are digital applications or programs that exist and 20 run on a blockchain or peer-to-peer (P2P) network of computers instead of a single computer. DApps (also called “dapps”) are outside the purview and control of a single authority. DApps can be developed for a variety of purposes including gaming, finance, and social media. Since dApps are decentralized, they are free from the control and interférence of a single authority and therefore safeguard user privacy but hâve a lack of 25 censorship.
With non-regulated platforms, such as Bitcoin and Ethereum, the setting up of the account simply requires an account hash or account/wallet address to be established. For example, it would be possible to set up a blockchain account based on a user 30 pseudo-name “Yogi Bear rather than conventionally just a wallet address, and then to fill the résultant established wallet with mined currency or acquired cryptocurrency having Financial real-world tradeable worth/value. The wallet may also include NFTs.
-4In other words, in setting up such unregulated wallets there is no need to supply or validate personal identification “ID”, with the resulting cryptocurrency wallet not linked to a person in any way. The lack of any relationship means that, in the exemplary case of monetary transaction in commercial transactions, the non-regulated platform cannot 5 be broken down (1) to identify the owners of particular wallets [which is evidently advantageous for anyone who is morally corrupt and involved in illégal activities, such as blackmail and trafficking], (2) to identify the chain of custody of any value in the wallet, (3) to identify or track the value in a particular wallet, and (4) is problematic for those individuals who hâve legitimate business reasons for trading in blockchain 10 coins/tokens on non-regulated platforms and for whom establishment of trust is important.
There is also a second, flip side to the problem of anonymity in non-regulated platforms. That is, when the need arises to communicate personal data through a non15 regulated platform for reasons of validation of an individual, it either cannot be done or otherwise the communicated personal data must be entirely open/visible to the récipient and thus subject to potential unwanted hacking, data scraping and subséquent general misuse.
With Ethereum wallets and similar wallets on other unregulated platforms, a particular commercial issue arises with banking transactions. Particularly, there is no présent way to establish (a) the actual real identity of the owner (i.e., the user of the wallet is a proxy/front for someone else or otherwise is fake) and/or (b) the provenance of the wallet’s content value since the wallet’s owner has not gone through any validating sign-off. Consequently, use of an (exemplary) Ethereum wallet is restricted in monetary/banking commerce because of the failure to confirm compliance with antimoney laundering “AML” régulations. This is a technical security problem
In terms of banking transaction security and protection measures, these can in fact be 30 broadly classified as issues relating either to AML and/or Know Your Customer “KYC”.
To date, commercial banking institutions attempt to restrict use of transaction, especially cryptocurrencies, by imposing unrealistic or préjudiciai levels of AML and/or KYC
-5compliance based on the identification of countries of perceived concem , e.g., Albania, Cayman Islands, Malta, Iran and others [at June 2022], as reflected by the Law Society (see https://www.lawsociety.org.uk/topics/anti-money-laundering/high-risk-thirdcountries-for-aml-purposes). This list of affected countries varies with time based on 5 global économie and political reports that weight and/or préjudice individuals based on association with the individual’s movements and geography. The présent banking régime simply makes compliance with AML/KYC very difficult in these countries of concern principally because there presently exists no robust technical solution that links unregulated accounts [making use of blockchain] into a regulated environment [in which 10 an individual would be concemed trustworthy based on a verified legitimate identity of a person who is both determined legally safe/regulatory compilant and who is operating a crypto-wallet]. KYC accréditation is, in other words, presently based on hard-coded and inflexible questions and a rule-based ground truth where the risk is assessed as either black (high) or low (white/approved) and in which shades of grey are either forcibly 15 ignored and subjected to frequently unnecessary, resource expansive and unproductive enhanced due diligence considération.
For cross-geographical financial transactions using cryptocurrencies traded over web 3.0, more efficient mechanisms are required to see both or either the effective usage of 20 enhanced web facilities and the non-prejudice treatment of individuals having respectively legitimate commercial trading intent and crédible and vérifiable physical presence, i.e., the account holder is a real and honest individual.
SUMMARY OF THE INVENTION
According to a first aspect of the invention there is provided an unregulated trading System being part of a public domain blockchain System, the unregulated trading System comprising: a public certificate module arranged selectively to write NFTs, received by the blockchain System, into spécifie unregulated accounts of the unregulated trading System configured to be impervious to being broken down to (i) identify ownership of 30 individual accounts stored on the public ledger, or (ii) identify a chain of custody of any item stored in its respective unregulated wallet; and a public ledger database coupled to the block chain System and responsive to the public certificate module, wherein the
-6public ledger database is configured to store a plurality of unregulated accounts each having at least a public wallet address for a user account and wherein at least some of the public wallet addresses further hâve stored therewith: a document type identifier with a related minted unique non-transferable NFT linked to an extemally generated certificate 5 hash and where each non-transferable NFT is obtained via writing of a Smart contract and each non-transferable NFT is a permanent record for a description of the document type; and a link to a private wallet of a regulated account of a regulated trading platform, the link related directly to the minted non-transferable NFT issued from the certificate module; and wherein each non-transferable NFT being configured to be changed or 10 moved from the unregulated wallet only through an interaction that directly involves the certificate module.
In an embodiment, the unregulated trading System further comprises System intelligence arranged to cause, at a point of linking the unregulated wallet with a user-authenticated 15 regulated wallet, any non-transferable NFTs in the regulated wallet to be identically replicated by the certificate module and minted into the unregulated wallet.
In an embodiment, the unregulated trading System further comprises System intelligence arranged to cause, after linking of the unregulated wallet with a user-authenticated 20 regulated wallet, any later issued non-transferable NFTs in the regulated wallet to be identically replicated by the certificate module and minted into the unregulated wallet.
The unregulated trading platform is configured to be impervious to being broken down to: i) identify ownership of individual wallets stored on the public ledger, or (ii identify a 25 chain of custody of any value in each stored wallet.
Each non-transferable NFT is configured to be changed or moved from the unregulated wallet only through an interaction that directly involves the certificate module and a linked private wallet.
The unregulated trading System may coupled to a regulated trading platform over a wide area network, wherein the regulated trading platform includes: System intelligence that is
-7based in at least one private server and that is configured for administering operational aspects of the regulated platform; and a private ledger database that is coupled to the at least one private server configured to oversee storing of and access to a plurality of regulated wallets each referenced with a unique private wallet address and an association to an account holder; and wherein the system intelligence is arranged configured to: establish each regulated wallet by verifying an identified account holder through authenticating a plurality of instances of personal data for the identified account holder as submitted electronically to the regulated trading platform; and issue a uniquely coded certificate for each instance of personal data; store in the private ledger an association between each said issued coded certificate and its respective established wallet, where the association includes an indication of the nature of the instance of the personal data; and cause said each stored coded certificate to be minted into the public ledger database and associated with an unregulated public wallet, wherein minting of the coded certificate produces the non-transferable non-fungible token.
Non-transferrable NFTs are configured to store metadata related to at least one of: the nature of a related transaction, an event involving the regulated wallet, and a document type.
The certificate module may be configured to cooperate with a private certificate module of a regulated platform through a smart contract supported by the public domain blockchain, the smart contract being configured to prevent alteration of the non-transferable NFT within its unregulated public wallet but allowing access to the non-transferable NFT.
Cryptocurrency may be stored in the unregulated wallet(s).
In a second aspect of the invention there is provided a method of linking, on a blockchain System, a uniquely addressable regulated private wallet of a regulated trading platform with an unregulated wallet on an unregulated trading platform, wherein the unregulated trading platform is résistant to being broken down to (i) identify ownership of individual wallets stored on a public ledger, or (ii) identify a chain of
-8custody of any item stored in its respective unregulated wallet, and the public ledger is configured to store a plurality of unregulated accounts each having at least a unique public wallet address for a user account, the method comprising: selectively issuing, using a public certificate module, non-fungible tokens “NFTs” into selectively identified 5 unregulated wallets, wherein each issued NFT is characterised as one of a nontransferable NFT and a transférable NFT; in a first unregulated wallet storing: a document type identifier with a related minted unique non-transferable NFT linked to an extemally generated certificate hash and where the non-transferable NFT is obtained from writing a Smart contract and the non-transferable NFT is a permanent record for a 10 description of the document type; and a link to a first private wallet addressable on the regulated trading platform, the link related directly to the minted non-transferable NFT issued from the certificate module; and permitting onward distribution of the nontransferable NFT from the first unregulated wallet only through an interaction that directly involves the certificate module; and permitting the non-transferable NFT in the 15 first unregulated wallet to be changed only through an interaction that directly involves the certificate module; and wherein System intelligence of the blockchain System otherwise freely allows transfer and change of any transférable NFTs issued to any wallet regardless of a nature of the trading platform.
In a further aspect of the invention there is provided a trading System having: a regulated platform comprising: System intelligence that is based in at least one private server and that is configured for administering operational aspects of the regulated platform; and a private ledger database that is coupled to the at least one private server and that is configured to store storing a plurality of regulated wallets each referenced 25 with a unique private wallet address and an association to an account holder; and an unregulated platform comprising at least a public ledger database that is configured to store a plurality of unregulated wallets, wherein the unregulated trading platform is configured to be impervious to being broken down to: (i) identify ownership of individual wallets stored on the public ledger, or (ii) identify a chain of custody of any 30 value in each stored wallet; and wherein the System intelligence is configured to: establish each regulated wallet by verifying an identified account holder through authenticating a plurality of instances of personal data for the identified account holder
-9as submitted electronically to the regulated trading platform; issue a uniquely coded certificate for each instance of personal data; store in the private ledger an association between each issued coded certificate and its respective established wallet, where the association includes an indication of the nature of the instance of the personal data; and 5 cause each stored coded certificate to be minted into the public ledger database and associated with an unregulated public wallet, wherein minting of the coded certificate produces a non-transferable non-fungible token “NFT” locked to the unregulated public wallet, the non-transferable NFT being configured to be changed or moved from the unregulated wallet only through an interaction that directly involves the linked 10 regulated wallet.
Non-transferrable NFTs are configured to store metadata related to at least one of: the nature of a related transaction, an event involving the regulated wallet, and a document type.
The System intelligence of the regulated trading platform can include a private certificate module, and the unregulated trading platform can include a public certificate module that is operationally coupled to the public ledger database , and the public certificate module is configured to cooperate with the private certificate module through 20 a Smart contract with a public domain blockchain, the smart contract being configured to prevent alteration of the non-transferable NFT within its unregulated public wallet but allowing access to the non-transferable NFT.
The coded certificate includes a hash.
In yet another aspect of the invention there is provided a method comprising: linking an unregulated digital wallet on an unregulated trading platform to a regulated digital wallet on a regulated trading platform, wherein the regulated digital wallet is associated with a known client and wherein the unregulated trading platform is impervious to 30 being broken down to (i) identify ownership of individual wallets stored on a public ledger thereof and to (ii) identify a chain of custody of any value in each stored individual wallet within the public ledger; during establishment of a first regulated
-10digital wallet, generating a first hash for each of a plurality of personal documents submitted electronically to the regulated trading platform to satisfy regulatory requirements for establishing the regulated digital wallet in the name of the known client, and storing in the regulated trading platform an association between the first hash 5 and the first regulated digital wallet;
using each generated hash to mint respective non-transferable non-fungible tokens “NFTs” locked to the unregulated public wallet of the unregulated trading platform; and linking the unregulated public digital wallet to the first regulated digital wallet 10 when the non-transferable non-fungible tokens “NFTs” are within the unregulated public wallet, wherein the non-transferable NFT is configured to be changed or moved from the unregulated public digital wallet only through an interaction directly involving the linked first regulated digital wallet.
Each non-transferrable NFT may be configured to store metadata relating to at least one of: the nature of a related transaction, an event involving the regulated wallet, and a document type.
In another aspect there is provided a method comprising linking an unregulated digital 20 wallet having a digital address on an unregulated trading platform to a regulated digital wallet on a regulated trading platform, wherein the regulated digital wallet is associated with a known client, and wherein the unregulated trading platform is impervious to being broken down to (i) identify ownership of individual wallets stored on a public ledger thereof, and (ii) identify a chain of custody of any value in each stored wallet;
verifying an identity of a prospective account holder seeking to establish a first regulated digital wallet by authenticating a plurality of instances of personal data submitted by the prospective account holder; issuing, as a hash, a certificate for each instance of personal data and associating, in a private ledger database of the regulated trading platform, each hash with at least a document type and the first regulated digital wallet to establish a cryptocurrency account for the prospective account holder; receiving, via an app configured to provide an interface to an operational System intelligence of the regulated trading platform, a link to a first unregulated digital wallet
-11including a first digital address therefor; using the link, automatically interrogating the first unregulated digital wallet to recover data entries reflecting at least one of transactional entries, recorded wallet interactions, NFTs, general personal data and uses of cryptocurrency; based on recovered data entries, identifying searchable links to third5 party databases independent of the unregulated trading platform and independent of the regulated trading platform, scraping the third-party databases for personal data or further links related to operation of the first unregulated digital wallet, and returning scraped data to generate a profile of a registrant of the first unregulated digital wallet; based on the profile, parsing the retumed scraped data to generate a list of different document 10 types each with a respective associated document; within the private ledger database, identifying any commonality between the list of different document types and the document type linked to the first regulated digital wallet; when there is at least one identified commonality in the document type and a content match exists between the respective associated document and a verified document associated with the first 15 regulated digital wallet, evaluating an honesty score associated with the content match;
and when the honesty score exceeds a threshold, linking the first unregulated digital wallet to the first regulated digital wallet by minting a non-transferable non-fungible token “NFT” for storage in at least the first unregulated digital wallet, wherein the nontransferable NFT is configured to be changed or moved from the unregulated public 20 digital wallet only through an interaction directly involving the linked first regulated digital wallet.
The minted non-transferable NFT is further stored in the first regulated digital wallet of the private ledger database.
Retumed personal data can include at least one of: a personal téléphoné number, an employment history, transactions involving NFTs, cryptocurrency transaction historiés, Smart interactions, events stored in the ledger of the unregulated wallet, addresses of other unregulated wallets, user-related géographie locations, images/pictures, email 30 addresses, public govemment data, and company affiliations.
-12When commonality fails to be identified, the method of linking can include generating at least one random challenge from selected content in the retumed scraped data and displaying the at least one random challenge on the interface of the app; monitoring a response to the at least one random challenge and assessing correctness of the response; 5 when the response is correlated to the selected content of the random challenge, generating a second hash for the selected content; associating the second hash with at least one of the first regulated digital wallet and the First unregulated digital wallet; and using the second hash to verify a common ownership of the first regulated digital wallet and the first unregulated digital wallet.
In still yet another aspect of the invention there is provided a computer-implemented system comprising: an unregulated digital wallet having a digital address on an unregulated trading platform linked to a regulated digital wallet on a regulated trading platform, wherein the regulated digital wallet is associated with a known client and the 15 unregulated trading platform is configured to be impervious to being broken down to (i) identify ownership of individual wallets stored on a public ledger thereof and (ii) identify a chain of custody of any value in each stored individual wallet; a first server arranged to verify an identity of a prospective account holder seeking to establish a first regulated digital wallet by authenticating a plurality of instances of personal data 20 submitted by the prospective account holder; a certificate module configured to issue, as a hash, a certificate for each instance of personal data, wherein each hash has a stored association, stored within a private ledger database of the regulated trading platform, with at least a document type and the first regulated digital wallet and wherein issued certificates confirm the identity of the prospective account holder to permit 25 establishment of a legitimized cryptocurrency account in the name of the prospective account holder that is linked to first regulated digital wallet; a communications device running an app providing an interface to operational system intelligence of the regulated trading platform, the app being configured to receive a link to a first unregulated digital wallet having a first digital address therefor; a linkage module responsive to the link, 30 the linkage module being configured to automatically to interrogate the first unregulated digital wallet to recover data entries in the first unregulated wallet (70) reflecting at least one of transactional entries, recorded wallet interactions, NFTs, general personal data
-13and uses of cryptocurrency; System intelligence, response to recovered data entries, configured to identify searchable links to third-party databases that are independent of the unregulated trading platform and also independent of the regulated trading platform, an open-source intelligence “OSINT” module configured to scrape the third-party 5 databases for personal data or further links related to operation of the first unregulated digital wallet, and further configured to retum scraped data to generate a profile of a registrant of the first unregulated digital wallet; System intelligence, responsive to the generated profile, configured to parse the return scraped data to generate a list of different document types each with a respective associated document; System 10 intelligence configured to identify any commonality between the list of different document types and the document type, within the private ledger database, linked to the first regulated digital wallet; System intelligence configured to evaluate an honesty score associated with a content match identified as arising between the respective associated document and a verified document associated with the first regulated digital wallet; and 15 System intelligence configured to détermine if the honesty score exceeds a threshold;
and, for each honesty score exceeding the threshold, the System intelligence is configured to cause the certificate module to mint a non-transferable non-fungible token “NFT” for storage in at least the first unregulated digital wallet, thereby linking the first unregulated digital wallet to the first regulated digital wallet, the non-transferable NFT 20 being configured to be moved from the unregulated wallet or changed only through an interaction directly involving the linked regulated wallet.
The System intelligence may be configured to, in response to failing to identify commonality, generate at least one random challenge based on selected content in the 25 retumed scraped data and to communicate the at least one random challenge to the communications device for display on the interface, and the System intelligence may be further configured to monitor a response to the at least one random challenge and to assess correctness of that response.
The certificate module may be configured to: in response to identified corrélation between the selected content of the random challenge and the response thereto provided to the System intelligence, generate a second hash for the selected content; and associate
-14the second hash with at least one of the first regulated digital wallet and the first unregulated digital wallet; and wherein System intelligence in the computerimplemented System is configured to use the second hash to verify a common ownership of the first regulated digital wallet and the first unregulated digital wallet.
Returned personal data authenticated by the System intelligence may be weighted according to a value classification for the personal data such that different authenticated Personal data contributes differently to the honesty score.
The regulated wallets and the unregulated wallets will generally contain cryptocurrency.
At least some of the various embodiments of the présent invention provide for a , technically validated approach to linking together of regulated (private) and unregulated (public) cryptocurrency wallets to produce and approved/compliant hybrid System 15 supporting a global transaction scheme that functions irrespective of client location. The antiquated former approach where individuals are simply assessed based on a géographie préjudice is removed by a new approach to interrogation that makes use of sélective scraping of data, in third-party database resources, relating to or associated with events or transaction recorded in the public (unregulated) wallet that belongs to an 20 initially unknown individual whose identity requires vérification for linking purposes.
The embodiments thus avoid assessment of documents that can be fraudulently presented or faked, since responses to randomly generated queries raised in the linkage process are based on relevant data scraped from third party providers with whom the public wallet - and thus its real owner - has monitored and recorded interactions. In the 25 event of a verified response to such a randomly generated query, a non-transferrable
NFT is generated by the System intelligence of the regulated platform and these nontransferable NFTs are placed within an accessible public ledger 66 as well as the purview of the private ledger. When sufficient corrélation of responses occurs, linking can be established. The certificates provide a record of associations and go to the 30 credibility and integrity of transactions, documents and wallet owners.
-15Embodiments of the present invention provide separate coded (hash) certificates for each document or reported interaction entry, including proactively providing recordable updates reporting monthly repayment of loans and other relevant client-orientated transactions, with those certifîcates preferably being in the form of non-transferrable 5 NFTs containing metadata imbued with descriptive data pertaining to the nature of the related transaction, event or document type. The approaches described thus allow for a third-party FINTECH to avoid KYC based on former accréditation and vérification of Personal identity by and through a regulated platform and an established private cryptowallet.
In overview, the various complementary embodiments concem, amongst other concepts, a vérification and authentication process of independent digital wallets and, particularly, the linking of regulated and unregulated digital wallets when there is established common ownership and a desire to achieve rapid linking of those different accounts 15 supported across disparate platforms for inter-dependent wallet operation.
System intelligence makes use of sélective scraping of data, in third-party database resources, relating to or associated with events or transaction recorded in the public (unregulated) wallet that belong to an initially unknown individual whose identity 20 requires vérification for linking purposes. In the event of a verified response to such a randomly generated query, a non-transferrable NFT is generated by the System intelligence of the regulated platform and these non-transferable NFTs are placed within an accessible public ledger as well as the purview of the private ledger. When sufficient corrélation of responses occurs, linking can be established. The non-transferable NFTs 25 provide a record of associations and go to the credibility and integrity of transactions, documents and wallet owners.
BRIEF DESCRIPTION OF THE DRAWINGS
Exemplary embodiments of the present invention will now be described with reference 30 to the accompanying drawings in which:
FIG. 1 (comprised from FIGs. la and 1b) is a System architecture of a preferred embodiment; and
FIG. 2 is a function interaction flow process diagram showing preferred messaging interactions and content delivery between functional blocks within the System architecture of FIG. 1.
DETAILED DESCRIPTION OF A PREFERRED EMBODIMENT
Referring to FIG. 1, there is shown a System architecture 10 of a preferred embodiment. The System architecture in based around a communications network 12, such as a wide area network, through which a multiplicity of servers, databases and client devices interact through any suitable messaging protocol, as will be readily appreciated. Server 10 functionality may be localised but equally it may also be distributed, especially aspects that are based on the use of blockchain technology. FIG. 1 therefore provides an overview of the functions and high-level database content without being limited to the spécifie structures shown. Messaging into, through and out of the network 12 may be supported by wireless and/or wireline communication protocols with ail messaging 15 preferably being securely end-to-end encoded on a point-to-point basis.
In more detail, the System will include multiple client devices 14, although for simplicity of the diagram only a single client device is shown. The client device 14 may be a smartphone or a computer or the like. The client device 14 includes an interface 16 20 through which a user 18 can enter and receive data. The user interface will include a display and other input/output devices, as is conventional. The client device also includes processing intelligence 20 that Controls operation of the device, and which executes programs and/or apps 22 stored in memory (“mem”) 24. Functional software used by the client device may be web-based, i.e., supported by a browser. The 25 operational software may be based on artificial intelligence that permits interprétation of data and an évaluation of user credibility based on a threshold score derived or implied from available data.
A private ledger database 26 is part of a regulated platform 27 in which user 30 identification is validated. The regulated platform thus includes one or more servers 30 supporting local and/or distributed processing as required, for example, in relation to cryptocurrency banking Systems [such as those provided by the company Tintra] that
-77make use of private blockchain technology. Server functions, which are explained below in terms of interactions and effects, include:
i) a linkage module function 42;
ii) an open-source intelligence “OSINT” module 44, although this is optional and may be replaced or supplemented by a third-party extemal OSINT 50 to the private server but accessible via the network 12;
iii) a certificate module 46 for issuing hashed certificates; and iv) a vérification module 48 which, again, is optional and dépendent upon how linking between a regulated private wallet and one or more unregulated public wallets is validated for an identified common user.
The private ledger 26, of the regulated platform, typically includes for each registered user:
i) a username/unique identity 32;
ii) a private wallet address 34 (such as supported by blockchain) linked to the username/unique identity 32;
iii) a document description 36 identifying the nature of different forms of documents held in the private wallet address 34;
iv) a unique secure hash 38 coded for a document certificate issued against each type of document stored within a wallet; and a
v) at least one link 40 to one or more public wallets supported on one or more unregulated platforms, such as Ethereum and Tezos.
Registration of each user 18 into the regulated platform is based on establishing proof of identity. This is a conventional process for regulated Systems and is well-known to typically include provision of official original or certified documents, biométrie data entry, proof of recent résidence and/or proof of existing employment. Other validation metrics exist. The point is simply that the private platform, e.g., Tintra account and Tintra cryptocurrency wallet, has a confirmed real person as owner and which real person is appropriately validated by substantiating documentation compilant with législation.
-18As indicated above, at least one independent third-party external OSENT module 50 [in the sense that the third-party OSINT module is outside of the regulated private platform] may be connected to the network 12. Irrespective of whether the OSINT modules is intemally located within a private/regulated platform or extemally and independent, the 5 OSINT module 44, 50 opérâtes as a backend application programming interface “api” arranged, in response to available personal data, to scrape additional personal data from one or more different source databases through one or more publicly available independent servers. For example, given a social media account, the OSINT module may fetch named photographie data posted on the social media account, or other information 10 including (but not limited to) employment, éducation, family history and onwards into convictions and other personal data (such as high-level Insurance policy information), etc. In FIG. 1, these data sources are represented by social media server 52 and connected database 54, with user data typically self-entered into the database by an identifiable user having some form of public account, such as a FaceBook® page or other 15 searchable online record, such as a Linkedln® business account. Whilst the OSINT module 46, 50 is described as having access to public databases, it may also hâve approved access to private databases and thus personal confidential information.
The system of FIG. 1 further includes public blockchain servers 60 such as those 20 supporting the Ethereum platform described above. At least one of these public servers (on a non-regulated platform) include a public certificate module 62 as well as other functional processing technology 64. The public blockchain servers 60 hâve access to a public database ledger 66 in which is stored, as a minimum, a public wallet address 70 for a user account and non-transferable NFTs (typically obtained by writing a smart 25 contract). The public database ledger 66 may include additional information such as NFTs (and ail that they represent) and transaction historiés. An optional user account identity 68 and related information may be included but generally, for the reasons given above, this is not the case for current blockchains. The non-transferable NFT placed onto the unregulated wallet are, in effect, a permanent record for a description 72 of document 30 types (e.g., driving licence, crédit report, passport) and a secure certificate code hash 74 unique to each document. Each non-transferable NFT is written to the account by a public certificate module 62 in response to (in one path) the certificate module 46 in the
-19private platform 27. For example, a smart contract on the public blockchain server(s) 60 would permit a private wallet address to be basis for the génération (by the certificate [issuance] module 46 in the private regulated platform 27) of certificates and related descriptions that verify the legitimacy of documents that unequivocally are 5 attributable/link to a vérifiable identity of a real person who owns/accesses the address of the unregulated wallet. Further, the smart contract would permit the storage of these unique non-transferable NFTs, and limited subséquent access. More specifically, the nature of each non-transferable NFT is that it cannot be moved from the unregulated wallet or in any way changed by any interaction other than an interaction directly 10 involving the linked regulated wallet.
Finally, the System 10 of FIG. 1, can include further service providers having general access privilèges to public space, such privilèges supported by servers and databases of the service provider. For example, the service provider could be a university admissions 15 départaient or an on-line retailer. The nature of the interaction with the functional aspects of the System, particularly in the context of the obfuscation of verified personal data, will be described subsequently.
The public wallet may include coins or tokens of value, including cryptocurrencies and 20 NFTs.
FIG. 2 is a function interaction flow process diagram 100 showing preferred messaging interactions and content delivery between functional blocks within the System 10 of FIG. 1. References to performance of functions by spécifie software/program modules 25 on servers with the System of FIG. 1 should therefore be understood to include the génération of push and pull messages and/or query and return messages in a data message format suitable for the communication network, e.g., encoded packet-based data messages.
The different registration processes for a regulated and non-regulated wallet are well documented, are outlined generally above and regardless are well-known. In the context of the invention, it is sufficient to understand that establishing a regulated on-line
-20currency account (such as provided by Cex.io - Bitcoin & Cryptocurrency Exchange & Trading - Buy & Sell Crypto - CEX.IO - and Tintra) requires user identity vérification and that vérification requirements can vary between different platforms. Conversely, an unregulated wallet which can include NFTs, can be obtained using a less stringent 5 process that seldom if ever requires, during set-up and use, any form of account holder identification other than an account name (which could be a pseudo-name) and/or limited other data, such as a pay-as-you-go mobile phone number acquired with an offthe-shelf SIM purchase. As indicated above, non-regulated accounts, such as Ethereum, can therefore be established without any identity vérification and indeed without a 10 corrélation to a real-world individual.
For each piece of vérification data supplied by the user [for KYC and account opening purposes] and stored in the private ledger database 26 against (i) a document description and original document data 36 that articulâtes the nature and content of the vérification 15 data [such as a passport number, biométrie data, a driving licence number and/or other
Personal data such as jobs and employment dates, home addresses and dates and/or surnames of parents, etc.], against (ii) a regulated account identifier 32 for the user 18, and/or against (iii) a unique private wallet address 34, System intelligence within the domain of the regulated platform generates and stores a unique document certificate 38. 20 The storage of the document content and document nature data 36 may be on a separate database which can be remote from the private ledger. The storage location is a design option and determined by whether the personal data 36 has wider but potentially confidential uses.
Preferably, the document certificate is in the form of an encrypted hash, such as an exemplary 256-bit hash for an SHA-2 cryptography structure. Consequently, each regulated wallet (simplistic account addresses “xyz#2...” and “Αγδ$*...” for respective user/account names A. Smith and B. Jones in the simplistic and exemplary data table of FIG. 1, noting that addresses are conventionally hexadécimal of varying length) will 30 contain a plurality of different unique document certificate hashes 38, with each hash mapped to a spécifie form of verifying document needed to establish the account.
-21Consequently, the certificate hashes (or whatever securely encrypted form the certificates take) provide a yardstick measure of trust for the regulated wallet.
One of the issues addressed by the embodiments of the présent invention relates to the 5 establishment of an appropriate level of trust in the owner of the unregulated account, and how the level of trust (i.e., a KYC concem) can be surpassed to permit an unregulated wallet to be linked with a regulated wallet, thereby allowing access to the summed level of value held in ail linked wallets whilst ensuring that integrity of the regulated platform [in which the regulated wallet opérâtes] is not compromised.
Regardless of whether the wallet is a regulated wallet or an unregulated wallet, the skilled person will appreciate that there will typically be a private key/private log-in process that allows a user to open the respective wallet.
A) REGULATED ACCOUNT LOG-IN
On their computer or smartphone 14, the user instantiates 102 the banking app 22 to effect sign-in into their regulated wallet on the regulated platform 27. The app 22 - or other form of software - may be locally stored in memory or accessed in an active web session, with sign-in conducted using the interface 16. In response to the sign-in request 20 [and assuming that the sign-in is validly authenticated for a valid regulated wallet address], a general server 25 for the regulated platform accesses 104 the private ledger database 26 to locate and retum 106 prior stored wallet contents which, in additional to a stored cryptocurrency balance, may include certificates and related descriptions associated with spécifie activities that hâve been concluded successfully through 25 operation of the regulated wallet. The information supplied to the client’s device, e.g., the smartphone 14, is displayed to permit instructions to be sent into the general server 25, as will be understood. Ail this is conventional.
B) LINKAGE OF AN UNREGULATED WALLET TO A REGULATED 30 WALLET
The preferred embodiment supports a user-driven request for linkage to be established with an unregulated cryptocurrency wallet distributed in an unregulated platform. To
-22achieve this, the user firstly enters/adds 110 a wallet address (of an unregulated platform) into the app 22. [Evidently, this wallet address must pre-exist and be valid.]
The first issue to be addressed is how can the System be suitably certain that the pre5 existing unregulated wallet address belongs to a bona fide individual with satisfactory
Financial integrity? The app 22 firstly interacts with the linkage module 42 by forwarding 112 the address of the unregulated wallet. The linkage module communicates 114 the address of the 10 unregulated wallet to the OSINT module 44, 50, with the OSINT module 46, 50 arranged to verify the unregulated cryptocurrency wallet address on unregulated (public) blockchain ledger 66, e.g., Ethereum or the like. Particularly, from the unregulated ledger 66, the OSINT module retrieves at least one and generally a plurality of candidate identifying data entries that are stored/listed within the unregulated wallet. Preferably, 15 the OSINT module pulls 116, i.e., interrogates, the wallet to identify ail wallet usages (i.e., transactional entries or recorded interactions and uses) to identify candidate identifying data entries. These candidate data entries may be NFTs but generally will be personal data relating to social and/or commercial interactions of the [possibly unnamed] account holder of the unregulated wallet to other online entities.
Armed with candidate identifying data entries, the OSINT module 46, 50 is arranged to parse each candidate identifying data entry to identify searchable links to social media platforms 52 and/or third-party databases, and then to establish a link to those social media platforms and/or third-party database in order to scrape 118 related databases 54 25 for identifying personal data 55 (such as personal téléphoné numbers, employment history, transactions involving NFTs, cryptocurrency transaction historiés and smart interactions and events stored in the ledger of the unregulated wallet, addresses of other unregulated wallets, user-related géographie locations, images/pictures, email addresses, public government data and company affiliations, etc.) and/or further links that lead to 30 additional databases further down the chain and which are associated with any other previously retumed information. The retumed data to the OSINT module thus yields a profile of the owner of the unregistered wallet through the retum thereto of scraped
-23identifying data sources that can be used in a test to verify the identity of an individual having either ownership of or access to the address of the unregulated wallet, and thus related direct use of cryptocurrency through the unregulated wallet or indirect use of cryptocurrency by a secondary unregulated wallet traced by the inquisitions made by the 5 OSINT module.
The OSINT module 46, 50 retums 120 identifying data sources to the linkage module 44 of the private server(s) 30 in the regulated platform 27.
The identifying data sources that are independently scraped from outside of the regulated platform 27 can now be used intemally with the regulated platform to assess whether the KYC verified account holder of the regulated wallet is the same as the actual account holder/user of the unregulated wallet. For example, embodiments may use web 2.0 opensource tech to scrape information about a person who own the unregulated public 15 wallet (such as an Ethereum wallet) to provide insight, based on a generated honesty score for replies or commonly existing pre-registered data, as to whether the public unregulated wallet belongs to one and the same person.
As an alternative to the user 18 providing the address of the unregulated (Ethereum) 20 wallet, an alternative process could involve the user logging into the regulated system and the system leveraging the existing KYC data used to establish the regulated account. In this arrangement, server functionality (e.g., the linkage module 42) uses selected data (such as an email address or other verified personal information) to engage the OSINT function to cause that function to search for unregulated wallet(s) addresses linked to 25 KYC verified data. The alternative system therefore éliminâtes the need for the user to provide the address of the unregulated wallet. From this point onwards, the regulated/unregulated wallet linkage mechanism is as described above in the preferred embodiment.
Since the private ledger database 26 contains a record of submitted documents verified during KYC and AML clearance during set-up of the regulated wallet for a spécifie account holder, OSINT retumed identifying data sources can be cross-referenced to and
-24compared 122 with pre-existing document type and document content 36 whether stored in the private ledger database 26 or stored securely elsewhere, as indicated above. If there is a match between an item of the identifying data sources and the document type and pre-stored verified document content 36 for KYC/AML, then the already existing 5 and corresponding unique document certificate hash for the spécifie document [used for
KYC and AML for the regulated wallet in the regulated platform 27] can be retumed to the linkage module 42 to ensure a closing of the enquiry. If there is a sufficient number of OSINT-retumed identifying data sources that match precisely with corresponding prestored document types and document content 36 entries, then this in itself can justify 10 linking of the regulated wallet to the unregulated wallet.
The number or type of matches needed can be seleçted to reflect the level of trust, termed an “honesty score”, deemed necessary to establish wallet linkages. Setting the threshold at a relatively high number of positive matches means that greater axioposity is 15 established for the personal credentials of the KYC-approved owner of the regulated wallet as correlating with those of the user of the unregulated wallet. Different categories of document may attract different weighting to the cumulative score, i.e., a driving licence may be allocated a score of twenty whilst an email address may attract a value of one unit. The cumulative threshold can therefore be achieved in a differing number of 20 ways, and the threshold set at differing levels to reflect perceived overall risk of the owner of the regulated and unregulated wallets being the same individual.
The System intelligence is configured to record the détermination of such common ownership in both the private ledger database 26 and the public ledger database 66 with 25 recording of appropriate cross-lining addresses 40, 76 stored in the respective wallets.
Altematively or complementarily, retumed identifying data sources for which there is no corresponding pre-stored and pre-certificated data, as established by the linkage module 42 interrogating the private ledger database (or associated database in which the KYC 30 data 36 is stored), can be used as a direct challenge 124 to the user 18 logged into to the regulated wallet via the app 22.
-25More particularly, the linkage module 44 créâtes one or more challenges 122 (based on the scraped identifying data sources) that require a confirmatory response through the app 22 during logged-on activity. For example, if the returned identifying data sources retum an employment history, System intelligence (based for example on natural 5 language processing “NLP” term extraction in an AI environment) may pose a question conceming employment dates with a particular company. Alternatively, if the returned identifying data sources is a téléphoné number, the query could require the insertion of deliberately obscured digits. Similar challenge queries can be formulated, as will be appreciated, for transactions involving NFTs, cryptocurrency transaction historiés and 10 Smart interactions and events stored in the ledger of the unregulated wallet, addresses of other unregulated wallets, user-related géographie locations, images/pictures and particularly tags for locations or individuals présent, email addresses, public govemment data and company affiliations, etc. If the linkage module receives a response 124 via the app 22 and the response to the query is correct and, preferably, delivered within a time 15 window set for response, then this represent new identity vérification data that is another step towards legitimizing user of the unregulated wallet as being the same individual who is the owner of the regulated wallet. The app 22 can retum the response directly for the linkage module to assess, or otherwise it may retum a match/no-match resuit based on local comparison of the response relative to the expected response supplied to the app 20 as part of the query génération function at the linkage module.
If the response to the query through the app is false (or timed out), then the System intelligence concludes either that the respondent user 18 cannot be trusted to the extent that a link between the registered and unregistered accounts cannot be justified, or 25 otherwise that at least one further challenge based on returned identifying data sources must be made and correctly answered. In the event that the user 18 correctly responses through the app 22, then the linkage module can either (i) raise further queries to increase confidence in the identity of the respondent user 18, or (ii) accept that a sufficient level of trust has been associated that warrants linkage of the regulated and 30 unregulated wallets. Linking of wallets follows the procedure described above.
-26Any correct reply to the query is stored in a database, such as but not limited to the private ledger database 26, with the reply cross-referenced to the document type. In this way, an appréciation of the user’s activities is grown and the fields of document type and document content 36 and related certificates expanded with time.
The linkage module 42, in response to a valid answer to a query, is thus further preferably arranged to send 130 the certificate module 46 (within the regulated platform) data relating to the nature of the query (e.g., document type) and the accurate usersupplied response. The certificate module 46 generates a new coded hash for the spécifie content and identified nature of the identifying data source query and its correct response, and links 132 this certificate to the relevant regulated private wallet address 34.
The certificate module 46 can now cross-reference and mint the certificate [relating to the returned data from the OSINT module] into at least one of:
(i) the private ledger database and, typically, in a look-up table or the like (flow 134 of FIG. 2). Assumingly that the requisite honesty score is met, then use of the unregulated wallet in the regulated environment will be enabled. The certificate would be a non-transferable NFT;
(ii) the public ledger database (flows 133 and 135 of FIG. 2) for the relevant unregulated wallet. This would increase direct public visibility of information/data related to the owner of the unregulated wallet, and confirms that the certificate has been validated in a regulated environment, thereby increasing levels of trust in public data. The certificate would be a non-transferable NFT;
(iii) minting duplicates of the certificate(s) generated for the KYC/AML process(es) [needed to validate the authenticity of the user and establish the regulated wallet] into the linked unregulated public wallet, with these certificates again presented as non-transferable NFTs; and/or (iv) both the private ledger database and the public ledger database for the reasons explained immediately above.
C) LINKAGE VIA A HARD WALLET
-27According to an alternative linking embodiment, the initial linking of private and public wallets on respectively regulated and unregulated platforms can be achieved using the following approach. The private cryptocurrency wallet is established by processes which satisfy KYC and AML requirements; these are known and outlined above. The verified 5 user of the private wallet instantiates the app 22 and logs-in via the interface (reference numéral 16 of FIG. 1) and identifies, for example, an Ethereum address. Should the verified user 18 of the private wallet then contemporaneously engage a hard wallet device containing a private key for an unregistered public cryptocurrency wallet, the reported contemporaneous logins establish, via message handshaking (e.g., through 10 interactions with the app 22), that there is a commonly known user and that the wallets can be linked/associated as described above. Particularly, the respective private ledger database and public ledger database appropriate are uploaded with cross-references to the respective wallets. The same principle may be applied to a browser-based software wallet.
D) SECURE VERIFICATION OF PERSONAL DATA
In linking a regulated wallet to an unregulated wallet, the System of the présent invention therefore generates and updates a public ledger 66 with one or more unique nontransferable NFTs each including a hash relating to spécifie documents or activity of user 20 with a verified identity. The issued/minted non-transferable NFTs are thus locked to an individual and the individual is locked to the private regulated wallet. This means that the public wallet data is expanded to include a coded hash 74 (stored on the nontransferable NFT) for a new document type and that any interrogation of the public unregulated wallet or, if accessible or otherwise linked, the private server(s) functions 30 25 of the regulated platform, reveals that a regulated platform has pre-confirmed the veracity and accuracy of the document type and its content. If a query is sent, for example, from a university admissions department (e.g., “service provider” 90 of FIG. 1) asking, via electronic messaging and server interaction, whether Jane Doe received a degree from Oxford University in 2021, then the existence of the document type and 30 hash (on the non-transferable NFT) establish that the document has been previously verified by a secure regulated platform 27. The vérification process may be coordinated through a dedicated vérification module 48 (of FIG. 1), with this meaning that the hash
-28is copied and sent back to the minting agent that will then confirm that the hash - and thus the document - are pre-authenticated. This approach to/within the minting agent is optional and is a supportive level of security. The presence of the hash and nontransferable NFT in the unregulated wallet may be taken as suffïcient in itself.
In practice, the owner of the unregulated wallet logs into the service provider’s website and, via the service provider’s interface, signs into the owner’s unregulated wallet. The service provider is thus given access to the wallet, via the log-in, to scrape publicly available data associated with the unregulated wallet. Particularly, the service provider 10 can identify a document class or category in the public wallet and then acknowledges and thus establishes the existence, via messaging over a public network, of the related hash. Since the hash is a secure code and the hash is only produced in response to a vérification of the unregulated wallet into a regulated wallet in a regulated system, the existence and/or provision/copy of the hash substantiates the authenticity of the personal 15 data without the need to communicate personal data from the service provider and across a public network 12. The service provider does not therefore need to independently verify the authenticity of personal data that has already been checked by and linked to the regulated system and, in fact, the service provider needs no access to the regulated system and private ledger thereof.
This obfuscation ability is particularly useful for expediting electronic delivery of personal documents whilst maintain as secret the content of such documents. Putting this differently, the supply of a hash generated by a regulated platform 27 for a particular document establishes the veracity of the data with no further checks or communication 25 necessary once the certificate hash has been retumed to address the service provider’s query.
The provision of a certificate/hash response therefore vérifiés that the latter supplied document under investigation has been previously authenticated by a regulated platform 30 compilant with AML and KYC, and thus avoids the sending of a potentially confidential and/or lengthy (and therefore data sizeable) document to the querying service provider.
-29Unless spécifie arrangements are mutually exclusive with one another, the various embodiments described herein can be combined to enhance System functionality and/or to produce complementary functions or System that support the effective identification of user-perceivable similarities and dissimilarities. Such combinations will be readily appreciated by the skilled addressee given the totality of the foregoing description. Likewise, aspects of the preferred embodiments may be implemented in standalone arrangements where more limited functional arrangements are appropriate. Indeed, it 10 will be understood that unless features in the particular preferred embodiments are expressly identified as incompatible with one another or the surrounding context implies that they are mutually exclusive and not readily combinable in a complementary and/or supportive sense, the totality of this disclosure contemplâtes and envisions that spécifie features of those complementary embodiments can be selectively combined to provide 15 one or more comprehensive, but slightly different, technical solutions. In terms of the suggested process flows of the accompanying drawings, it may be that these can be varied in terms of the précisé points of execution for steps within the process so long as the overall effect or re-ordering achieves the same objective end results or important intermediate results that allow advancement to the next logical step. The flow processes 20 are therefore logical in nature rather than absolute. The functional architectures of, for example, FIGs. 1 to 3 may be implemented independently on one another, as will be understood. Further, in terms of the System’s distributed functions and, particularly, the System intelligence used to implement the various interactive messaging protocols, data calls and queries, these can be located one or multiple servers within, usually, the regulated platform. The private server/server functions block of FIG. 1 should, consequently, be viewed functionally as a block to typical operational functions. In this regard, labels such as “linkage module” and “certificate module” should be understood to be descriptive tags for the spécifie functionality and related interactions.
It will, of course, be appreciated that the above description has been given by way of example only and that modifications in detail may be made within the scope of the présent invention. For example, whilst the exemplary embodiment has focused on digital
-30accounts that, generally, will contain or support transactions using cryptocurrencies, the concepts and approaches to linking and identity vérification, especially using a scraped deeper-dive approach to different data sources, applies in general to linking of regulated with unregulated accounts of any nature.

Claims (36)

1. A trading System having:
a regulated platform (27) comprising:
System intelligence (25, 30, 42-48) that is based in at least one private 5 server (25, 30) and that is configured for administering operational aspects of the regulated platform; and a private ledger database (26) that is coupled to the at least one private server and that is configured to store storing a plurality of regulated wallets each referenced with a unique private wallet address (34) and an association (32) to 10 an account holder; and an unregulated platform comprising at least a public ledger database (66) that is configured to store a plurality of unregulated wallets (70), wherein the unregulated trading platform is configured to be impervious to being broken down to:
(i) identify ownership of individual wallets stored on the public ledger, 15 or (ii) identify a chain of custody of any value in each stored wallet; and wherein the System intelligence is configured to:
establish each regulated wallet by verifying an identified account holder through authenticating a plurality of instances of personal data for the identified account holder 20 as submitted electronically to the regulated trading platform;
issue a uniquely coded certificate (38) for each instance of personal data;
store in the private ledger (26) an association between each issued coded certificate and its respective established wallet, where the association includes an indication of the nature (36) of the instance of the personal data; and
25 cause each stored coded certificate to be minted into the public ledger database (66) and associated with an unregulated public wallet (70), wherein minting of the coded certificate produces a non-transferable non-fungible token “NFT” locked to the unregulated public wallet, the non-transferable NFT being configured to be changed or moved from the unregulated wallet only through an interaction that directly involves the
30 linked regulated wallet.
2. The trading System of claim 1, wherein the non-transferrable NFTs are configured to store metadata related to at least one of:
the nature of a related transaction, an event involving the regulated wallet, and a document type.
3. The trading System of claim 1 or 2, wherein:
the System intelligence of the regulated trading platform (27) includes a private certificate module (46), and the unregulated trading platform includes a public certificate module (62) that is operationally coupled to the public ledger database (66), and the public certificate module (62) is configured to cooperate with the private certificate module (46) through a smart contract with a public domain blockchain (60), the smart contract being configured to prevent alteration of the non-transferable NFT within its unregulated public wallet but allowing access to the non-transferable NFT.
4. The trading System of claim 1, wherein the coded certificate includes a hash.
5. A method, comprising:
linking an unregulated digital wallet (70) on an unregulated trading platform (66) to a regulated digital wallet (34) on a regulated trading platform (27), wherein the regulated digital wallet is associated with a known client (18) and wherein the unregulated trading platform is impervious to being broken down to (i) identify ownership of individual wallets stored on a public ledger thereof and to (ii) identify a chain of custody of any value in each stored individual wallet within the public ledger;
during establishment of a first regulated digital wallet, generating a first hash for each of a plurality of personal documents submitted electronically to the regulated trading platform to satisfy regulatory requirements for establishing the regulated digital wallet in the name of the known client, and storing in the regulated trading platform an association between the first hash and the first regulated digital wallet;
-33using each generated hash to mint respective non-transferable non-fungible tokens “NFTs” locked to the unregulated public wallet of the unregulated trading platform; and linking the unregulated public digital wallet to the first regulated digital wallet when the non-transferable non-fungible tokens “NFTs” are within the unregulated public wallet, wherein the non-transferable NFT is configured to be changed or moved from the unregulated public digital wallet only through an interaction directly involving the linked first regulated digital wallet.
6. The method of claim 5, wherein each non-transferrable NFT is configured to store metadata relating to at least one of:
the nature of a related transaction, an event involving the regulated wallet, and a document type.
7. A method, comprising:
linking an unregulated digital wallet having a digital address on an unregulated trading platform to a regulated digital wallet on a regulated trading platform, wherein the regulated digital wallet is associated with a known client, and wherein the unregulated trading platform is impervious to being broken down to (i) identify ownership of individual wallets stored on a public ledger thereof, and (ii) identify a chain of custody of any value in each stored wallet;
verifying an identity of a prospective account holder seeking to establish a first regulated digital wallet by authenticating a plurality of instances of personal data submitted by the prospective account holder;
issuing, as a hash, a certificate for each instance of personal data and associating, in a private ledger database of the regulated trading platform, each hash with at least a document type and the first regulated digital wallet to establish a cryptocurrency account for the prospective account holder;
receiving, via an app configured to provide an interface (16) to an operational System intelligence of the regulated trading platform, a link to a first unregulated digital wallet including a first digital address therefor;
-34using the link, automatically interrogating the first unregulated digital wallet to recover data entries reflecting at least one of transactional entries, recorded wallet interactions, NFTs, general personal data and uses of cryptocurrency;
based on recovered data entries, identifying searchable links to third-party 5 databases independent of the unregulated trading platform and independent of the regulated trading platform, scraping (118) the third-party databases (54) for personal data or further links related to operation of the first unregulated digital wallet, and returning scraped data to generate a profile of a registrant of the first unregulated digital wallet;
10 based on the profile, parsing the retumed scraped data to generate a list of different document types each with a respective associated document;
within the private ledger database, identifying any commonality between the list of different document types and the document type linked to the first regulated digital wallet;
15 when there is at least one identified commonality in the document type and a content match exists between the respective associated document and a verified document associated with the first regulated digital wallet, evaluating an honesty score associated with the content match; and when the honesty score exceeds a threshold, linking the first unregulated digital 20 wallet to the first regulated digital wallet by minting a non-transferable non-fungible token “NFT” for storage in at least the first unregulated digital wallet, wherein the nontransferable NFT is configured to be changed or moved from the unregulated public digital wallet only through an interaction directly involving the linked first regulated digital wallet.
8. The method of linking according to claim 7, wherein the minted nontransferable NFT is further stored in the first regulated digital wallet of the private ledger database.
30
9. The method of linking according to claim 7 or 8, wherein the retumed personal data includes at least one of:
a personal téléphoné number,
-35an employment history, transactions involving NFTs, cryptocurrency transaction historiés, smart interactions, events stored in the ledger of the unregulated wallet, addresses of other unregulated wallets, user-related géographie locations, images/pictures, email addresses, public government data, and company affiliations.
10. The method of linking according to claim 7, 8 or 9, further comprising:
when commonality fails to be identified, generating at least one random challenge from selected content in the returned scraped data and displaying the at least one random challenge on the interface of the app (22);
monitoring a response to the at least one random challenge and assessing correctness of the response;
when the response is correlated to the selected content of the random challenge, generating a second hash for the selected content;
associating the second hash with at least one of the first regulated digital wallet and the first unregulated digital wallet; and using the second hash to verify a common ownership of the first regulated digital wallet and the first unregulated digital wallet.
11. The method of linking according to any of claims 7 to 10, wherein the minted non-transferable NFT is further stored in the first regulated digital wallet of the private ledger database.
12. A computer-implemented System comprising:
an unregulated digital wallet having a digital address (70) on an unregulated trading platform linked to a regulated digital wallet (34) on a regulated trading platform
-36(27), wherein the regulated digital wallet is associated with a known client and the unregulated trading platform is configured to be impervious to being broken down to (i) identify ownership of individual wallets stored on a public ledger thereof and (ii) identify a chain of custody of any value in each stored individual wallet;
5 a first server (25) arranged to verify an identity of a prospective account holder (18) seeking to establish a first regulated digital wallet (34) by authenticating a plurality of instances of personal data submitted by the prospective account holder;
a certificate module (46) configured to issue, as a hash, a certificate (38) for each instance of personal data, wherein each hash has a stored association, stored within 10 a private ledger database (26) of the regulated trading platform (27), with at least a document type (36) and the first regulated digital wallet and wherein issued certificates confirm the identity of the prospective account holder to permit establishment of a legitimized cryptocurrency account in the name of the prospective account holder that is linked to first regulated digital wallet;
15 a communications device running an app (22) providing an interface (16) to operational System intelligence (30) of the regulated trading platform, the app being configured to receive a link to a first unregulated digital wallet having a first digital address therefor;
a linkage module (42) responsive to the link, the linkage module being 20 configured to automatically to interrogate the first unregulated digital wallet to recover data entries in the first unregulated wallet (70) reflecting at least one of transactional entries, recorded wallet interactions, NFTs, general personal data and uses of cryptocurrency;
System intelligence, response to recovered data entries, configured to identify 25 searchable links to third-party databases (54, 54’) that are independent of the unregulated trading platform and also independent of the regulated trading platform, an open-source intelligence “OSINT” module configured to scrape (118) the third-party databases (54) for personal data or further links related to operation of the first unregulated digital wallet, and further configured to retum scraped data to generate 30 a profile of a registrant of the first unregulated digital wallet;
-37system intelligence, responsive to the generated profile, configured to parse the retum scraped data to generate a list of different document types each with a respective associated document;
System intelligence configured to identify any commonality between the list of different document types and the document type (36), within the private ledger database, linked to the first regulated digital wallet;
system intelligence configured to evaluate an honesty score associated with a content match identified as arising between the respective associated document and a verified document associated with the first regulated digital wallet; and
System intelligence configured to détermine if the honesty score exceeds a threshold; and, for each honesty score exceeding the threshold, the system intelligence is configured to cause the certificate module to mint a non-transferable non-fungible token “NFT” for storage in at least the first unregulated digital wallet, thereby linking the first unregulated digital wallet to the first regulated digital wallet, the non-transferable NFT being configured to be moved from the unregulated wallet or changed only through an interaction directly involving the linked regulated wallet.
13. The computer-implemented system of claim 12, wherein the minted nontransferable is further stored in the first regulated digital wallet of the private ledger database.
14. The computer-implemented System of claim 12 or 13, wherein the regulated wallets and the unregulated wallets contain cryptocurrency.
15. The computer-implemented System of claim 12, 13 or 14, wherein retumed personal data includes at least one of:
a personal téléphoné number, an employment history, transactions involving NFTs, cryptocurrency transaction historiés,
Smart interactions,
-38events stored in the ledger of the unregulated wallet, addresses of other unregulated wallets, user-related géographie locations, images/pictures,
5 email addresses, public govemment data, and company affiliations.
16. The computer-implemented System of any of daims 12 to 15, wherein:
10 the System intelligence is configured to, in response to failing to identity commonality, generate at least one random challenge based on selected content in the retumed scraped data and to communicate the at least one random challenge to the communications device for display on the interface, and the System intelligence is further configured to monitor a response to the at least 15 one random challenge and to assess correctness of that response.
17. The computer-implemented System of any of daims 12 to 15, wherein the certificate module is configured to:
in response to identified corrélation between the selected content of the random
20 challenge and the response thereto provided to the System intelligence, generate a second hash for the selected content; and associate the second hash with at least one of the first regulated digital wallet and the first unregulated digital wallet; and wherein
System intelligence in the computer-implemented System is configured to use the 25 second hash to verify a common ownership of the first regulated digital wallet and the first unregulated digital wallet.
18. The computer-implemented System of any of daims 12 to 17, wherein retumed Personal data authenticated by the System intelligence is weighted according to a value
30 classification for the personal data such that different authenticated personal data contributes differently to the honesty score.
19. The System of claim any preceding System claim or the method of any preceding method claim, wherein the regulated wallets and said unregulated wallets contain cryptocurrency.
20. An unregulated trading System being part of a public domain blockchain System, the unregulated trading System comprising:
a public certificate module arranged selectively to write NFTs, received by the blockchain System, into spécifie unregulated accounts of the unregulated trading System configured to be impervious to being broken down to (i) identity ownership of individual accounts stored on the public ledger, or (ii) identity a chain of custody of any item stored in its respective unregulated wallet; and a public ledger database coupled to the block chain System and responsive to the public certificate module, wherein the public ledger database is configured to store a plurality of unregulated accounts each having at least a public wallet address for a user account and wherein at least some of the public wallet addresses further hâve stored therewith:
a document type identifier with a related minted unique non-transferable
NFT linked to an externally generated certificate hash and where each nontransferable NFT is obtained via writing of a Smart contract and each nontransferable NFT is a permanent record for a description of the document type; and a link to a private wallet of a regulated account of a regulated trading platform, the link related directly to the minted non-transferable NFT issued from the certificate module; and wherein each non-transferable NFT being configured to be changed or moved from the unregulated wallet only through an interaction that directly involves the certificate module.
21. The unregulated trading System according to claim 20, further comprising System intelligence arranged to cause, at a point of linking the unregulated wallet with a userauthenticated regulated wallet, any non-transferable NFTs in the regulated wallet to be identically replicated by the certificate module and minted into the unregulated wallet.
22. The unregulated trading System according to claim 20 or 21, further comprising System intelligence arranged to cause, after linking of the unregulated wallet with a userauthenticated regulated wallet, any later issued non-transferable NFTs in the regulated wallet to be identically replicated by the certificate module and minted into the unregulated wallet.
23. The unregulated trading System of any of claims 20 to 22, wherein the unregulated trading platform is configured to be impervious to being broken down to:
i) identify ownership of individual wallets stored on the public ledger, or (ii) identify a chain of custody of any value in each stored wallet.
24. The unregulated trading System of claim 23, wherein each non-transferable NFT is configured to be changed or moved from the unregulated wallet only through an interaction that directly involves the certificate module and a linked private wallet.
25. The unregulated trading System of any of claims 20 to 24, the unregulated trading platform coupled to a regulated trading platform over a wide area network, wherein the regulated trading platform includes:
System intelligence that is based in at least one private server and that is configured for administering operational aspects of the regulated platform; and a private ledger database that is coupled to the at least one private server configured to oversee storing of and access to a plurality of regulated wallets each referenced with a unique private wallet address and an association to an account holder; and wherein the System intelligence is arranged configured to:
establish each regulated wallet by verifying an identified account holder through authenticating a plurality of instances of personal data for the identified account holder as submitted electronically to the regulated trading platform; and issue a uniquely coded certificate for each instance of personal data;
store in the private ledger an association between each said issued coded certificate and its respective established wallet, where the association includes an indication of the nature of the instance of the personal data; and
-41cause said each stored coded certificate to be minted into the public ledger database and associated with an unregulated public wallet, wherein minting of the coded certificate produces the non-transferable non-fungible token.
26. The unregulated trading system of any of daims 20 to 24, wherein the nontransferrable NFTs are configured to store metadata related to at least one of:
the nature of a related transaction, an event involving the regulated wallet, and a document type.
27. The unregulated trading system of any of daims 20 to 24 or 26, wherein:
the certificate module is configured to cooperate with a private certificate module of a regulated platform through a smart contract supported by the public domain blockchain, the smart contract being configured to prevent alteration of the non-transferable NFT within its unregulated public wallet but allowing access to the non-transferable NFT.
28. The unregulated trading system of any of daims 20 to 24 or 26, wherein cryptocurrency is stored in the unregulated wallet.
29. A method of linking, on a blockchain system, a uniquely addressable regulated private wallet of a regulated trading platform with an unregulated wallet on an unregulated trading platform, wherein the unregulated trading platform is résistant to being broken down to (i) identify ownership of individual wallets stored on a public ledger, or (ii) identify a chain of custody of any item stored in its respective unregulated wallet, and the public ledger is configured to store a plurality of unregulated accounts each having at least a unique public wallet address for a user account, the method comprising:
selectively issuing, using a public certificate module, non-fungible tokens “NFTs” into selectively identified unregulated wallets, wherein each issued NFT is characterised as one of a non-transferable NFT and a transférable NFT;
-42in a first unregulated wallet storing:
a document type identifier with a related minted unique non-transferable NFT linked to an extemally generated certificate hash and where the non-transferable NFT is obtained from writing a smart contract and the nontransferable NFT is a permanent record for a description of the document type; and a link to a first private wallet addressable on the regulated trading platform, the link related directly to the minted non-transferable NFT issued from the certificate module; and permitting onward distribution of the non-transferable NFT from the first unregulated wallet only through an interaction that directly involves the certificate module; and permitting the non-transferable NFT in the first unregulated wallet to be changed only through an interaction that directly involves the certificate module; and wherein System intelligence of the blockchain System otherwise freely allows transfer and change of any transférable NFTs issued to any wallet regardless of a nature of the trading platform.
30. The method of claim 29, further comprising:
causing, at a point of linking the unregulated wallet with a user-authenticated regulated wallet, any non-transferable NFTs in the regulated wallet to be identically replicated by the certificate module and minted into the unregulated wallet.
31. The method of claim 29, further comprising:
causing, after linking of the unregulated wallet with a user-authenticated regulated wallet, any later issued non-transferable NFTs in the regulated wallet to be identically replicated by the certificate module and minted into the unregulated wallet.
32. The method of any of claims 29 to 31, wherein the unregulated trading platform is configured to be impervious to being broken down to:
i) identify· ownership of individual wallets stored on the public ledger, or (ii ) identify a chain of custody of any value in each stored wallet.
33. The method of any of claims 29 to 32, wherein each non-transferable NFT is configured to be changed or moved from the unregulated wallet only through an interaction that directly involves the certificate module and a linked private wallet.
34. The method of any of claims 29 to 34, wherein System intelligence of a private server is configured to administer operational aspects of the regulated platform and a private ledger, coupled to the private server, is configured to oversee storing of and access to a plurality of regulated wallets each referenced with a unique private wallet 10 address and an association to an account holder; and wherein the method further comprises:
establishing each regulated wallet by verifying an identified account holder through authenticating a plurality of instances of personal data for the identified account holder as submitted electronically to the regulated trading platform; and
15 issuing a uniquely coded certificate for each instance of personal data;
storing in the private ledger an association between each said issued coded certificate and its respective established wallet, where the association includes an indication of the nature of the instance of the personal data; and causing said each stored coded certificate to be minted into the public ledger and 20 associated with an unregulated public wallet, wherein minting of the coded certificate produces the non-transferable non-fungible token.
35. The method of any of claims 29 to 34, wherein the non-transferrable NFTs are configured to store metadata related to at least one of:
25 the nature of a related transaction, an event involving the regulated wallet, and a document type.
36. The method of any of claims 29 to 35, wherein cryptocurrency is stored in the 30 first unregulated wallet.
OA1202300231 2022-06-14 2023-06-13 System and method for authentication and association of multi-platform accounts. OA21314A (en)

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
GBGB2208742.3 2022-06-14
GBGB2209572.3 2022-06-29
USUS17/857,090 2022-07-04
USUS18/126,423 2023-03-25
USUS18/195,754 2023-05-10

Publications (1)

Publication Number Publication Date
OA21314A true OA21314A (en) 2024-04-18

Family

ID=

Similar Documents

Publication Publication Date Title
US11665154B1 (en) System and related method for authentication and association of multi-platform accounts
US10942994B2 (en) Multicomputer processing for data authentication using a blockchain approach
US20220277307A1 (en) Systems and methods for personal identification and verification
US10325090B2 (en) Digital identity system
US11159537B2 (en) Multicomputer processing for data authentication and event execution using a blockchain approach
Sas et al. Design for trust: An exploration of the challenges and opportunities of bitcoin users
US11803840B1 (en) Method and system for obfuscating sensitive personal data available on unregulated platforms
CN116671087A (en) System and method for building blockchains to validate smart contract assets
US20160241532A1 (en) Authentication of web content
US10484426B2 (en) Auto-generated synthetic identities for simulating population dynamics to detect fraudulent activity
Bacon et al. Blockchain demystified
Stapleton Security without obscurity: A guide to confidentiality, authentication, and integrity
WO2016193156A1 (en) Computer-implemented tracking mechanism and data management
Hsu et al. Design of an e-diploma system based on consortium blockchain and facial recognition
US20220172198A1 (en) Real-time blockchain settlement network
US20230401574A1 (en) System and method for authentication and association of multi-platform accounts
KR20200033785A (en) System and method for managing personal information based on private financial code
OA21314A (en) System and method for authentication and association of multi-platform accounts.
WO2023242173A1 (en) System and method for authentication and association of multi-platform accounts
CA3203338A1 (en) System and method for authentication and association of multi-platform accounts
AU2023203555A1 (en) System And Method For Authentication And Association Of Multi-Platform Accounts
WO2023242175A1 (en) Method and system for obfuscating senstive personal data available on an unregulated platforms
AU2023203557A1 (en) Method And System For Obfuscating Sensitive Personal Data Available On An Unregulated Platform
BR102023011554A2 (en) SYSTEM AND METHOD FOR AUTHENTICATION AND ASSOCIATION OF MULTI-PLATFORM ACCOUNTS
WO2022161225A1 (en) Method for storing data in blockchain, related payment management system and non-transitory computer-readable storage medium