US20220027867A1 - Cryptographic token with separate circulation groups - Google Patents
Cryptographic token with separate circulation groups Download PDFInfo
- Publication number
- US20220027867A1 US20220027867A1 US17/339,790 US202117339790A US2022027867A1 US 20220027867 A1 US20220027867 A1 US 20220027867A1 US 202117339790 A US202117339790 A US 202117339790A US 2022027867 A1 US2022027867 A1 US 2022027867A1
- Authority
- US
- United States
- Prior art keywords
- cryptographic
- cryptographic tokens
- smart contract
- circulation group
- tokens
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
- G06Q20/0658—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash e-cash managed locally
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/02—Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/04—Payment circuits
- G06Q20/06—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
- G06Q20/065—Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/30—Payment architectures, schemes or protocols characterised by the use of specific devices or networks
- G06Q20/36—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
- G06Q20/367—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes
- G06Q20/3678—Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes involving electronic purses or money safes e-cash details, e.g. blinded, divisible or detecting double spending
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q20/00—Payment architectures, schemes or protocols
- G06Q20/38—Payment protocols; Details thereof
- G06Q20/389—Keeping log of transactions for guaranteeing non-repudiation of a transaction
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/32—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
- H04L9/3247—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials involving digital signatures
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L9/00—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
- H04L9/50—Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06Q—INFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q2220/00—Business processing using cryptography
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/56—Financial cryptography, e.g. electronic payment or e-cash
Definitions
- the disclosure relates to generation and management of custom cryptographic tokens and more specifically smart contracts that dictate rules for cryptographic tokens.
- Cryptocurrencies such as Bitcoin and Ethereum circulate on distributed consensus networks and are recorded by blockchain data structures.
- a blockchain is an immutable, append-only public ledger.
- a benefit of such a data structure is that it is reliable, secure, and open.
- Some cryptocurrencies, such as Bitcoin and Ethereum, can be further configured to execute smart contracts via virtual machines.
- Cryptographic tokens are cryptographic elements that are generated on a blockchain data structure and are generally linked to a cryptocurrency via connection to that blockchain. Examples include the ERC-20 and ERC-721 specifications on the Ethereum blockchain.
- FIG. 1 is a block diagram of a blockchain data structure according to the prior art.
- FIG. 2 is a block diagram illustrating a data structure of a smart contract according to the prior art.
- FIG. 3 illustrates a process to obtain Avits.
- FIG. 4 illustrates a process to redeem Avits.
- FIG. 5 is a block diagram illustrating cryptographic token transaction locations.
- FIG. 6 is a block diagram of an exemplary computing system.
- An Avit is a cryptographic token implemented via a smart contract (e.g., such as an ERC-20 token on the Ethereum platform) and representative of an electronic negotiable instrument—a bank obligation issued as the electronic equivalent of a promissory note, which can be endorsed to a new payee and can be redeemed by the most recent payee. It is akin to a cashier's check but is legally and structurally distinct. Avit has no direct analogue to an existing payment product. Avits are not legal tender, securities, or commodities.
- Avits are electronic negotiable instruments that provide a private sector solution to the problems of inefficiency and counterparty risk in traditional payment systems. While the Avit relies primarily on the uniform electronic transmissions act (UETA) and similar e- sign laws in states that have not enacted UETA, Avit also maps onto existing uniform commercial code (UCC) law.
- UETA uniform electronic transmissions act
- UCC uniform commercial code
- the most guaranteed form of money transfer is wire transfers, which are processed slower than digital asset transactions (sometimes taking multiple days while digital asset transactions are nearly instantaneous). Transferring funds via ACH has additional downfalls for use in digital asset transactions as there are chargebacks, adjustments, and errors that can be reversed via this type of electronic payment, which is a risk management problem since most digital asset transactions are irreversible.
- Regulation E which applies to banks and certain other financial intermediaries, requires that a consumer be permitted to dispute an electronic transfer up to the date that is 60 days following the statement cycle (meaning as long as 90 days). This means value, in the form of goods and services, is often provided long before the provider thereof is guaranteed final receipt of funds.
- Avit provides a regulated alternative to stablecoins that solves these structural and fraud problems. It is important to add, though, that there are also legitimate reasons why stablecoins are popular—because they solve the delay, chargeback, dispute, adjustment, and error problems that pose particularly high risks to the seller of a digital asset when the buyer pays with ACH or wire transfer. Moreover, stablecoins are “programmable” with software in a way that neither bank deposits nor central bank money is currently, as we will explain in more detail below. S tablecoins settle faster, offer better settlement finality, provide more functionality, and are often cheaper to use than traditional payment systems. For these reasons, legitimate businesses are beginning to use stablecoins in lieu of traditional US dollar payment services.
- FIG. 1 is a block diagram of a blockchain data structure according to the prior art.
- Cryptocurrency networks operate on a distributed network architecture. Key to understanding cryptocurrency is the data structure upon which the network operates. For example, the Bitcoin and Ethereum networks use a data structure referred to as a blockchain.
- the blockchain includes a history of all transactions that have ever occurred on the network. Each full node in the distributed network holds a full copy of the blockchain. To participate in the network at all, the blockchain history must be consistent with the history achieved by at least a majority of consensus. This consistency rule has an important effect of causing the blockchain to be immutable. In order to effectively attack a blockchain, one must control 51%+ of the processing power of the entire network. Where the network is comprised of thousands or hundreds of thousands of nodes, assembling the requisite 51% of processing power is exceedingly difficult. While it is true that many nodes often group together in pools that work together to solve for nonces to propagate the Bitcoin blockchain, for example, the grouped nodes of the pool do not necessarily share common control. While they have agreed to pay any mined coins to a central pot that is shared amongst the pool, this does not mean they are able to collude to make changes to the blockchain.
- a given node intends to generate a transaction
- the transaction is propagated throughout the nodes until it reaches a node or group of nodes that can assemble into a block that transaction and other transactions generated during a contemporaneous period of time. Until a transaction appears in a block it is not published or public. Often a transaction isn't considered confirmed in the Bitcoin blockchain, for example, until 5 additional blocks have been added for a total of 6 confirmations.
- Bitcoin blocks are limited to a static size and are generated approximately every 8 to 15 minutes. This illustrates an important limitation of the Bitcoin network: it only processes approximately 7 transactions per second. Conversely, Ethereum limits block size based on the amount of processing the contracts in the given block call for and are appended every 5 to 15 seconds. While cryptocurrency networks technically begin processing transactions in real-time, and the existence of a block including a given transaction verifies that transaction's authenticity, until that block is published to the blockchain, the transaction is not considered verified.
- Gaps in verification time introduces the issue within the Bitcoin network at a given moment of “who has the money.”
- transactions that have been submitted may not actually process. This would occur when a user spends money they didn't have, or “double spends.” This is not to say the network has no verification mechanism between blocks.
- the system may easily query older blocks to inspect the given user's balance as of at least the most recently published block. If the given user has sufficient funds, it is moderately safe to trust the transaction prior to its inclusion in a block published to the blockchain.
- Bitcoin has been discussed as a network for trading Bitcoins.
- Bitcoin transactions have additional utility in that they can embed additional data.
- Bitcoin can be used to purchase and record the existence of data at a given point in time. Recording data is performed by including hashed data within an output field of a given transaction. In this manner, the proof of existence for any document or recorded data may be embedded into the immutable history of the blockchain.
- Smart contracts are in effect software that runs on the blockchain, which could be Bitcoin, Ethereum or other similar smart contract system. Smart contract software is often open source and subject to inputs that are related to the blockchain itself.
- FIG. 2 is a block diagram illustrating a data structure of a smart contract on the Ethereum blockchain.
- Smart contracts and dApps distributed applications
- the EVM is instantiated on available network nodes.
- Smart contracts and dApps are applications that execute; thus, the processing power to do so must come from hardware somewhere. Nodes must volunteer their processors to execute these operations based on the premise of being paid for the work in Ethereum coins, referred to as Ether, measured in “gas.”
- Gas is the name for a unit of work in the EVM. The price of gas can vary, often because the price of Ether varies, and is specified within the smart contract/dApp.
- Every operation that can be performed by a transaction or contract on the Ethereum platform costs a certain number of gas, with operations that require more computational resources costing more gas than operations that require few computational resources.
- a multiplication instruction may require 5 gas
- an addition instruction may require 3 gas.
- more complex instructions such as a Keccak256 cryptographic hash may require 30 initial gas and 6 additional gas for every 256 bits of data hashed.
- gas The purpose of gas is to pay for the processing power of the network on execution of smart contracts at a reasonably steady rate. That there is a cost at all ensures that the work/processing being performed is useful and valuable to someone.
- transaction fees in the Ethereum network represent processing power. This differs from transaction fees in the Bitcoin network, which are based on the size in kilobytes of a transaction.
- Ethereum's gas costs are rooted in computations, even a short segment of code can result in a significant amount of processing performed.
- the use of gas further incentivizes coders to generate efficient smart contracts/algorithms to minimize the cost of execution . Unrestricted, an exponential function may bankrupt a given user.
- gas has a “gas price” measured in ether.
- Transactions specify a given gas price in ether for each unit of gas. The fixing of price by transaction enables the market to decide the relationship between the price of ether and the cost of computing operations (as measured in gas). The total fee paid by a transaction is the gas used multiplied by gas price.
- a given transaction offers very little in terms of a gas price, that transaction will have low priority on the network.
- the network miners may place a threshold on the gas price each is willing to execute/process for. If a given transaction is below that threshold for all miners, the process will never execute.
- a transaction does not include enough ether attached (e.g., because the transaction results in so much computational work that the gas costs exceed the attached ether) the used gas is still provided to the miners.
- the miner will stop processing the transaction, revert changes made, and append to the blockchain with a “failed transaction.” Failed transactions may occur because the miners do not directly evaluate smart contracts for efficiency.
- Miners will merely execute code with an appropriate gas price attached. Whether the code executes to completion or stalls out due to excessive computational complexity is of no consequence to the miner.
- Miners will process transactions in order of economic value. Priority on the Ethereum blockchain works similarly as that of the Bitcoin blockchain. Where a user attaches more ether to a given transaction than necessary, the excess amount is refunded back to that user after the transaction is executed/processed. Miners only charge for the work that is performed. A useful analogy regarding gas costs and price is that the gas price is similar to an hourly wage for the miner, whereas the gas cost is like a timesheet of work performed.
- ERC-20 tokens (Ethereum Request for Comment-20).
- ERC-20 is a technical specification for fungible tokens.
- ERC-20 defines a common list of rules for Ethereum tokens to follow within the larger Ethereum ecosystem, allowing developers to accurately predict interaction between tokens. These rules include how the tokens are transferred between addresses and how data within each token is accessed.
- ERC-20 provides a framework for a means to build a token on top of a base cryptocurrency. In some embodiments herein, enhancements are built on top of the ERC-20 framework, though use of the ERC-20 technical specification is not inherently necessary and is applicable to circumstances where Ethereum is used as the base cryptocurrency.
- custom token shares many of the characteristics of both fungible (ERC-20) and non-fungible tokens (ERC-721).
- An Avit may be represented by either of these Ethereum specifications, or other token specifications on other blockchain and cryptographic finance data structures.
- Custom tokens may be designed to represent complete or fractional ownership interests in assets and/or entities. While tokens have no limitations on who can send or receive the token, custom tokens are subject to many restrictions based on identity, jurisdiction and asset category.
- Tokens represent access to a network, and a given token purchase represents the ability to buy goods or services from that network—for example, an arcade token allows users to play an arcade game machine. Tokens give users that same type of access to a product or service.
- custom tokens represent complete or fractional ownership in an asset (such as shares in a company, a real-estate asset, artwork, etc.). Owning a stake in a company, real estate, or intellectual property can all be represented by custom tokens.
- Custom tokens offer the benefit of bringing significant transparency over traditional paper shares through the use of the blockchain and its associated public ledger. Custom token structure, distribution, or changes that could affect investors are now accessible to all via the blockchain.
- FIG. 3 illustrates a process to obtain Avits.
- an administrator provides a smart contract that dictates the protocol for creation and management of Avits.
- Avits are custom cryptographic tokens that are issued via smart contracts on one or more blockchain platforms. Operation of the smart contract on Ethereum, for example, is performed via processing that is “paid for” using gas prices of the executed commands in the contract. Gas is paid for via use of an underlying cryptocurrency, such as ether.
- a distinction is drawn between a cryptographic token and a cryptocurrency in that one (the token) is a cryptographic object that is created and belongs to a smart contract, whereas the other (the currency) is a cryptographic object that is generated through appending blocks to a blockchain maintained by a distributed consensus network. Typically, the currency is attributed financial value based on market interest in that currency.
- the token is managed, at least initially, by a central authority (the smart contract provider) whereas the currency is distributed and not managed by any specific entity.
- the cryptographic tokens are data constructs that are subject to rules of the smart contract.
- the smart contract's rules are configured upon execution of the smart contract and cause the cryptographic tokens to exist in either a circulation group or a non-circulation group.
- Avit tokens existing in the circulation group are associated with cryptographic wallets of at least one account holder at a bank or depository institution.
- Avit tokens in the non-circulation group are associated with the administrator and not any of the users/account holders.
- the group with which each Avit is associated is a function of a protocol of the smart contract that imposes transfer restrictions on the Avits.
- Avits of the non-circulation group cannot be associated with a user's cryptographic wallet due to protocol limitations of the first smart contract. However, the Avits still exist in a cryptographic wallet, but it is one that is not associated with any individual user but rather with the bank or depository institution itself.
- an account holder submits a request to obtain Avits.
- the account holder had already completed appropriate BSA/KYC/AML checks in order to be issued a fiat deposit account at a bank.
- the account holder will have available funds in their existing deposit account at the bank or depository institution.
- the exchange for Avits using fiat currency is initiated via an online portal. In some embodiments, the exchange is initiated using a multifactor authentication device.
- the account holder inputs an amount of Avits desired (less than or equal to the amount of fiat currency available via their deposit account balance).
- the account holder indicates whether the Avits should be delivered into a custodial wallet account associated with the smart contract or, alternatively, an external blockchain-based destination outside the smart contract platform.
- the bank or depository institution initiates a demand deposit (debit) from the customer's fiat deposit account for the Avit purchase and a Trust General Ledger is the offsetting credit.
- Avits are exchanged for fiat currency at a one-to-one correspondence.
- the issuer of Avits removes the fiat currency from the account holder's debit account.
- the Avits are drawn from the non-circulation group and shifted into the circulation group. When shifted into the circulation group, the Avits are transferred to the indicated custodial wallet/blockchain destination.
- the bank or depository institution's balance at its master account with the federal reserve bank does not change.
- step 312 further includes a new Avit minting transaction (on a blockchain) sending the new Avit into the Avit Pooled Fungible account (a custodial trust account) on behalf of the customer.
- the minting transaction deposits all of the new Avits into the non-circulation group.
- the minting transaction is a multi-signature transaction as dictated by the smart contract. Signatures may be held by multiple entities within the bank or depository institution.
- the minting transaction skips the non-circulation group and goes directly to the account holder's wallet (e.g., personal wallet, external wallet, or custody wallet).
- step 314 the account holder's Avit custody account is credited to reflect ownership of Avits in one-on-one correspondence with the exchanged fiat currency.
- the account holder owns a pro rata share of the pool of Avits held in custody by Avanti's trust department in the form of a fungible bailment.
- each Avit is unique. Uniqueness enables the administrator of the smart contract, a bank or depository institution, to track movement of all of the cryptographic tokens across any chosen blockchain platform. Examples of unique cryptographic tokens are those generated according to the ERC-721 standard. Alternatively, those generated via ERC-20 standard may still be unique. Uniqueness of a cryptographic token does not necessarily alter fungibility thereof. Uniqueness may be based on serial numbers that enable clear tracking without a meaningful difference in functionality.
- FIG. 4 illustrates a process to redeem Avits.
- the account holder submits a request to redeem Avits.
- the account holder will have already completed appropriate KYC/AML checks in order to be issued a fiat deposit account.
- the account holder additionally must have available balance in its existing Avits Account (be that account be managed via a custodial wallet or some other external wallet).
- the request is performed via a mobile application of a web browser application.
- step 404 the account holder's account is debited to reflect redemption of Avits and exchanged for fiat currency to that account holder's deposit account.
- Exchanging the relevant Avits shifts, by operation of the smart contract, those Avits from the circulation group to the non-circulation group.
- the exchange is performed via a blockchain recorded transaction.
- the transaction is issued or broadcast by the smart contract administrator.
- the smart contract responds to the published blockchain transaction to transfer the Avits.
- the Avits exist on the blockchain (e.g., in circulation) until an exchange back to fiat occurs.
- the bank or depository institution executes an internal transfer (debit) of fiat from the Avits General Ledger (a trust account holding cash backing Avits) to the account holder's deposit account (e.g., a bank account) and the bank or depository institution's balance at its master account with the federal reserve bank does not change.
- the Avits General Ledger a trust account holding cash backing Avits
- the account holder's deposit account e.g., a bank account
- the bank or depository institution's balance at its master account with the federal reserve bank does not change.
- step 406 in response to the exchange and the reacquisition of the Avits into the non-circulation group, the bank or depository institution initiates a new Avit burning transaction (on a blockchain) removing the non-circulation Avits from existence.
- Avanti would “burn” (i.e., destroy) unassigned excess Avits on some regular schedule, such as once per month.
- Authorized but unassigned Avits would remain in the Avits Pooled Fungible Account in the name of an Avanti house account.
- the burning transaction is performed on the Avits while still in the circulation group.
- FIG. 5 is a block diagram illustrating cryptographic token transaction locations.
- the bank or depository institution 502 has control over a number of the transaction locations including the non-circulation group 504 and the circulation group 506 .
- Tokens present in the non-circulation group 504 are not associated with any particular account holder.
- Tokens present in the circulation group 506 are associated with account holders.
- the account holders choose whether their tokens are held in an account holder wallet 508 that is controlled by the bank or depository institution 502 , held in custody within the circulation group 506 , or held in an external account holder wallet 510 outside of the bank or depository institution 502 control.
- the account holders may trade their tokens with third party users 512 who are similarly outside the bank or depository institution 502 .
- FIG. 6 is a high-level block diagram showing an example of a processing device 600 that can represent a system to run any of the methods/algorithms described above.
- a system may include two or more processing devices such as represented in FIG. 6 , which may be coupled to each other via a network or multiple networks.
- a network can be referred to as a communication network.
- the processing device 600 includes one or more processors 610 , memory 611 , a communication device 612 , and one or more input/output (I/O) devices 613 , all coupled to each other through an interconnect 614 .
- the interconnect 614 may be or include one or more conductive traces, buses, point-to-point connections, controllers, scanners, adapters, and/or other conventional connection devices.
- Each processor 610 may be or include, for example, one or more general-purpose programmable microprocessors or microprocessor cores, microcontrollers, application-specific integrated circuits (ASICs), programmable gate arrays, or the like, or a combination of such devices.
- the processor(s) 610 control the overall operation of the processing device 600 .
- Memory 611 may be or include one or more physical storage devices, which may be in the form of random access memory (RAM), read-only memory (ROM) (which may be erasable and programmable), flash memory, miniature hard disk drive, or other suitable type of storage device, or a combination of such devices. Memory 611 may store data and instructions that configure the processor(s) 610 to execute operations in accordance with the techniques described above.
- the communication device 612 may be or include, for example, an Ethernet adapter, cable modem, Wi-Fi adapter, cellular transceiver, Bluetooth transceiver, or the like, or a combination thereof.
- the I/O devices 613 can include devices such as a display (which may be a touch screen display), audio speaker, keyboard, mouse or other pointing device, microphone, camera, etc.
- ASICs application-specific integrated circuits
- PLDs programmable logic devices
- FPGAs field-programmable gate arrays
- Machine-readable medium includes any mechanism that can store information in a form accessible by a machine (a machine may be, for example, a computer, network device, cellular phone, personal digital assistant (PDA), manufacturing tool, any device with one or more processors, etc.).
- a machine-accessible medium includes recordable/non-recordable media (e.g., read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; etc.), etc.
- Physical and functional components associated with processing device 600 can be implemented as circuitry, firmware, software, other executable instructions, or any combination thereof.
- the functional components can be implemented in the form of special-purpose circuitry, in the form of one or more appropriately programmed processors, a single board chip, a field-programmable gate array, a general-purpose computing device configured by executable instructions, a virtual machine configured by executable instructions, a cloud computing environment configured by executable instructions, or any combination thereof.
- the functional components described can be implemented as instructions on a tangible storage memory capable of being executed by a processor or other integrated circuit chip (e.g., software, software libraries, application program interfaces, etc.).
- the tangible storage memory can be computer-readable data storage.
- the tangible storage memory may be volatile or non-volatile memory.
- the volatile memory may be considered “non-transitory” in the sense that it is not a transitory signal.
- Memory space and storages described in the figures can be implemented with the tangible storage memory as well, including volatile or non-volatile memory.
Landscapes
- Business, Economics & Management (AREA)
- Accounting & Taxation (AREA)
- Engineering & Computer Science (AREA)
- Finance (AREA)
- General Business, Economics & Management (AREA)
- Strategic Management (AREA)
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Theoretical Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Computer Security & Cryptography (AREA)
- Signal Processing (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
Description
- This application claims priority to U.S. Provisional Patent Application No. 63/057,057, entitled “AVIT: A BANK-ISSUED ELECTRONIC NEGOTIABLE INSTRUMENT,” filed Jul. 27, 2020, which is incorporated by reference herein in its entirety.
- The disclosure relates to generation and management of custom cryptographic tokens and more specifically smart contracts that dictate rules for cryptographic tokens.
- Cryptocurrencies such as Bitcoin and Ethereum circulate on distributed consensus networks and are recorded by blockchain data structures. A blockchain is an immutable, append-only public ledger. A benefit of such a data structure is that it is reliable, secure, and open. Some cryptocurrencies, such as Bitcoin and Ethereum, can be further configured to execute smart contracts via virtual machines.
- Cryptographic tokens are cryptographic elements that are generated on a blockchain data structure and are generally linked to a cryptocurrency via connection to that blockchain. Examples include the ERC-20 and ERC-721 specifications on the Ethereum blockchain.
-
FIG. 1 is a block diagram of a blockchain data structure according to the prior art. -
FIG. 2 is a block diagram illustrating a data structure of a smart contract according to the prior art. -
FIG. 3 illustrates a process to obtain Avits. -
FIG. 4 illustrates a process to redeem Avits. -
FIG. 5 is a block diagram illustrating cryptographic token transaction locations. -
FIG. 6 is a block diagram of an exemplary computing system. - The emergence of cryptocurrency has posed problems for regulatory bodies such as the United States Government. In some circumstances, it behooves users to cooperate with regulatory bodies by seeking permission to operate within existing regulatory frameworks instead of asking for forgiveness after the fact for innovations that do not fit neatly into them. In those circumstances, the distributed nature of the cryptographic coins impedes the ability to comply. Thus, there is a need to implement a cryptographic coin that retains many of the benefits of the distributed system but includes data structures that enable compliance with laws, rules and regulations
- This section discusses a new product, a bank-issued electronic negotiable instrument called “Avit.” An Avit is a cryptographic token implemented via a smart contract (e.g., such as an ERC-20 token on the Ethereum platform) and representative of an electronic negotiable instrument—a bank obligation issued as the electronic equivalent of a promissory note, which can be endorsed to a new payee and can be redeemed by the most recent payee. It is akin to a cashier's check but is legally and structurally distinct. Avit has no direct analogue to an existing payment product. Avits are not legal tender, securities, or commodities. Avits are electronic negotiable instruments that provide a private sector solution to the problems of inefficiency and counterparty risk in traditional payment systems. While the Avit relies primarily on the uniform electronic transmissions act (UETA) and similar e- sign laws in states that have not enacted UETA, Avit also maps onto existing uniform commercial code (UCC) law.
- To illustrate a problem solved by Avit, an example company previously ran an experiment regarding cash trapped in the company's 700+ bank accounts globally. The company's commercial banks required it to hold extra cash—which the company's treasurer nicknamed “comfort deposits”—to fund latency in settling payments. These “comfort deposits” were required by its banks in order to ensure that this company, which had a high cost of capital, would never overdraw its bank accounts due to timing mismatches in settling its payments. The experiment showed that if same-day payment settlement were possible, approximately $200 million of the company's trapped (and expensive) capital could be unlocked and put to more efficient use.
- An additional motivation for the disclosure herein was recognition of a major problem with mismatches with timing of securities and payment settlement that affect pension funds. A pension fund's brokerage statement displayed an accurate list of all of the securities (legally, “security entitlements”) held in its custodial account, but the custody bank did not in fact have several of those securities in its custody and was unable to deliver them per the instructions of the pension fund. This problem was able to occur because the custodian lent the securities from its omnibus account without flagging in its ledger systems that a quantity of the omnibus account securities should not have been available for lending. Due to the inherent mismatches in the ledger systems, this problem could not have been discovered by the pension fund in advance. These and other similar experiences led the inventors to look for technology solutions to improve financial sector operations that were inefficient and slow due to high levels of friction, caused inaccurate accounting and were harming consumers.
- A fundamental problem was that traditional ledger systems were built to solve for technology constraints that no longer exist. And those same outdated ledger systems remain ubiquitous. The systems dictate that multiple layers of intermediaries be involved, and each intermediary settles in sequence instead of all settling simultaneously. Accordingly, the intermediaries duplicate and reconcile information. The sequential settling among multiple intermediaries causes friction and is why transaction settlement is slow and expensive. It also ties up capital in unsettled transactions. Because of the inherent inability to simultaneously settle both sides of a trade, these ledger systems also introduce counterparty credit risk where it would not otherwise exist. These traditional ledger systems also inhibit transparency and make regulatory oversight more difficult.
- Wire Transfers and ACH Cause Problems for Digital Asset Investors:
- ACH transfers pose serious structural problems for digital asset investors. The most guaranteed form of money transfer is wire transfers, which are processed slower than digital asset transactions (sometimes taking multiple days while digital asset transactions are nearly instantaneous). Transferring funds via ACH has additional downfalls for use in digital asset transactions as there are chargebacks, adjustments, and errors that can be reversed via this type of electronic payment, which is a risk management problem since most digital asset transactions are irreversible. Regulation E, which applies to banks and certain other financial intermediaries, requires that a consumer be permitted to dispute an electronic transfer up to the date that is 60 days following the statement cycle (meaning as long as 90 days). This means value, in the form of goods and services, is often provided long before the provider thereof is guaranteed final receipt of funds. As a consequence, many digital asset traders, fintech companies, and even more traditional merchants are moving towards other forms of payment, such as stablecoins, that provide faster settlement finality and certainty of payment. The use by these merchants of traditional ACH payments necessitates that they manage cumbersome ACH backstop facilities to account for inevitable disputes and clawbacks. Further, ACH fraud is becoming more prevalent as it becomes easier to access or compromise the private information that is used to conduct fund transfers via ACH. All these factors are driving businesses to seek alternatives to the traditional banking payment methods.
- Avit provides a regulated alternative to stablecoins that solves these structural and fraud problems. It is important to add, though, that there are also legitimate reasons why stablecoins are popular—because they solve the delay, chargeback, dispute, adjustment, and error problems that pose particularly high risks to the seller of a digital asset when the buyer pays with ACH or wire transfer. Moreover, stablecoins are “programmable” with software in a way that neither bank deposits nor central bank money is currently, as we will explain in more detail below. S tablecoins settle faster, offer better settlement finality, provide more functionality, and are often cheaper to use than traditional payment systems. For these reasons, legitimate businesses are beginning to use stablecoins in lieu of traditional US dollar payment services.
-
FIG. 1 is a block diagram of a blockchain data structure according to the prior art. Cryptocurrency networks operate on a distributed network architecture. Key to understanding cryptocurrency is the data structure upon which the network operates. For example, the Bitcoin and Ethereum networks use a data structure referred to as a blockchain. - The blockchain includes a history of all transactions that have ever occurred on the network. Each full node in the distributed network holds a full copy of the blockchain. To participate in the network at all, the blockchain history must be consistent with the history achieved by at least a majority of consensus. This consistency rule has an important effect of causing the blockchain to be immutable. In order to effectively attack a blockchain, one must control 51%+ of the processing power of the entire network. Where the network is comprised of thousands or hundreds of thousands of nodes, assembling the requisite 51% of processing power is exceedingly difficult. While it is true that many nodes often group together in pools that work together to solve for nonces to propagate the Bitcoin blockchain, for example, the grouped nodes of the pool do not necessarily share common control. While they have agreed to pay any mined coins to a central pot that is shared amongst the pool, this does not mean they are able to collude to make changes to the blockchain.
- When a given node intends to generate a transaction, the transaction is propagated throughout the nodes until it reaches a node or group of nodes that can assemble into a block that transaction and other transactions generated during a contemporaneous period of time. Until a transaction appears in a block it is not published or public. Often a transaction isn't considered confirmed in the Bitcoin blockchain, for example, until 5 additional blocks have been added for a total of 6 confirmations.
- At the time of this filing, Bitcoin blocks are limited to a static size and are generated approximately every 8 to 15 minutes. This illustrates an important limitation of the Bitcoin network: it only processes approximately 7 transactions per second. Conversely, Ethereum limits block size based on the amount of processing the contracts in the given block call for and are appended every 5 to 15 seconds. While cryptocurrency networks technically begin processing transactions in real-time, and the existence of a block including a given transaction verifies that transaction's authenticity, until that block is published to the blockchain, the transaction is not considered verified.
- Gaps in verification time introduces the issue within the Bitcoin network at a given moment of “who has the money.” During the 10-15 minute span between block generation, transactions that have been submitted may not actually process. This would occur when a user spends money they didn't have, or “double spends.” This is not to say the network has no verification mechanism between blocks. For example, when a given user attempts to pay another user, the system may easily query older blocks to inspect the given user's balance as of at least the most recently published block. If the given user has sufficient funds, it is moderately safe to trust the transaction prior to its inclusion in a block published to the blockchain.
- However, if the given user is attempting to double spend all their money, only one of those transactions will publish in the next block. The other will be rejected (which one is rejected, and which one processes is the subject of a so-called race condition and not necessarily dependent on time of generation).
- Thus far, Bitcoin has been discussed as a network for trading Bitcoins. However, Bitcoin transactions have additional utility in that they can embed additional data. As contemplated above, Bitcoin can be used to purchase and record the existence of data at a given point in time. Recording data is performed by including hashed data within an output field of a given transaction. In this manner, the proof of existence for any document or recorded data may be embedded into the immutable history of the blockchain.
- Systems that utilize the Bitcoin blockchain to transfer the ownership of non-coin assets require software that is separate from and merely relies upon the immutability of the blockchain. The separate software is not necessarily secure or immutable itself. Ethereum takes the ability to buy and sell non-coin assets a step further.
- Smart contracts are in effect software that runs on the blockchain, which could be Bitcoin, Ethereum or other similar smart contract system. Smart contract software is often open source and subject to inputs that are related to the blockchain itself.
-
FIG. 2 is a block diagram illustrating a data structure of a smart contract on the Ethereum blockchain. Smart contracts and dApps (distributed applications) execute on an Ethereum virtual machine (“EVM”). The EVM is instantiated on available network nodes. Smart contracts and dApps are applications that execute; thus, the processing power to do so must come from hardware somewhere. Nodes must volunteer their processors to execute these operations based on the premise of being paid for the work in Ethereum coins, referred to as Ether, measured in “gas.” Gas is the name for a unit of work in the EVM. The price of gas can vary, often because the price of Ether varies, and is specified within the smart contract/dApp. - Every operation that can be performed by a transaction or contract on the Ethereum platform costs a certain number of gas, with operations that require more computational resources costing more gas than operations that require few computational resources. For example, a multiplication instruction may require 5 gas, whereas an addition instruction may require 3 gas. Conversely, more complex instructions, such as a Keccak256 cryptographic hash may require 30 initial gas and 6 additional gas for every 256 bits of data hashed.
- The purpose of gas is to pay for the processing power of the network on execution of smart contracts at a reasonably steady rate. That there is a cost at all ensures that the work/processing being performed is useful and valuable to someone. Thus, transaction fees in the Ethereum network represent processing power. This differs from transaction fees in the Bitcoin network, which are based on the size in kilobytes of a transaction. Because Ethereum's gas costs are rooted in computations, even a short segment of code can result in a significant amount of processing performed. The use of gas further incentivizes coders to generate efficient smart contracts/algorithms to minimize the cost of execution . Unrestricted, an exponential function may bankrupt a given user.
- While operations in the EVM have a gas cost, gas has a “gas price” measured in ether. Transactions specify a given gas price in ether for each unit of gas. The fixing of price by transaction enables the market to decide the relationship between the price of ether and the cost of computing operations (as measured in gas). The total fee paid by a transaction is the gas used multiplied by gas price.
- If a given transaction offers very little in terms of a gas price, that transaction will have low priority on the network. In some cases, the network miners may place a threshold on the gas price each is willing to execute/process for. If a given transaction is below that threshold for all miners, the process will never execute. Where a transaction does not include enough ether attached (e.g., because the transaction results in so much computational work that the gas costs exceed the attached ether) the used gas is still provided to the miners. When the gas runs out, the miner will stop processing the transaction, revert changes made, and append to the blockchain with a “failed transaction.” Failed transactions may occur because the miners do not directly evaluate smart contracts for efficiency. Miners will merely execute code with an appropriate gas price attached. Whether the code executes to completion or stalls out due to excessive computational complexity is of no consequence to the miner.
- Where a high gas price is attached to a transaction, the transaction will be given priority. Miners will process transactions in order of economic value. Priority on the Ethereum blockchain works similarly as that of the Bitcoin blockchain. Where a user attaches more ether to a given transaction than necessary, the excess amount is refunded back to that user after the transaction is executed/processed. Miners only charge for the work that is performed. A useful analogy regarding gas costs and price is that the gas price is similar to an hourly wage for the miner, whereas the gas cost is like a timesheet of work performed.
- A type of smart contract that exists on the Ethereum blockchain are ERC-20 tokens (Ethereum Request for Comment-20). ERC-20 is a technical specification for fungible tokens. ERC-20 defines a common list of rules for Ethereum tokens to follow within the larger Ethereum ecosystem, allowing developers to accurately predict interaction between tokens. These rules include how the tokens are transferred between addresses and how data within each token is accessed. ERC-20 provides a framework for a means to build a token on top of a base cryptocurrency. In some embodiments herein, enhancements are built on top of the ERC-20 framework, though use of the ERC-20 technical specification is not inherently necessary and is applicable to circumstances where Ethereum is used as the base cryptocurrency.
- Thus far discussion has been focused around Bitcoin and Ethereum. As applicable in this disclosure, these are base cryptocurrencies. Other base cryptocurrencies exist and more will likely be introduced in the future. This disclosure is not limited to application on specifically the Bitcoin or Ethereum blockchains.
- A custom cryptographic token as described in this disclosure (hereafter, “custom token”) described herein shares many of the characteristics of both fungible (ERC-20) and non-fungible tokens (ERC-721). An Avit may be represented by either of these Ethereum specifications, or other token specifications on other blockchain and cryptographic finance data structures. Custom tokens may be designed to represent complete or fractional ownership interests in assets and/or entities. While tokens have no limitations on who can send or receive the token, custom tokens are subject to many restrictions based on identity, jurisdiction and asset category.
- The concept of tokens is understood in the blockchain space today. Tokens represent access to a network, and a given token purchase represents the ability to buy goods or services from that network—for example, an arcade token allows users to play an arcade game machine. Tokens give users that same type of access to a product or service. On the other hand, custom tokens represent complete or fractional ownership in an asset (such as shares in a company, a real-estate asset, artwork, etc.). Owning a stake in a company, real estate, or intellectual property can all be represented by custom tokens. Custom tokens offer the benefit of bringing significant transparency over traditional paper shares through the use of the blockchain and its associated public ledger. Custom token structure, distribution, or changes that could affect investors are now accessible to all via the blockchain.
-
FIG. 3 illustrates a process to obtain Avits. Instep 302, an administrator provides a smart contract that dictates the protocol for creation and management of Avits. Avits are custom cryptographic tokens that are issued via smart contracts on one or more blockchain platforms. Operation of the smart contract on Ethereum, for example, is performed via processing that is “paid for” using gas prices of the executed commands in the contract. Gas is paid for via use of an underlying cryptocurrency, such as ether. A distinction is drawn between a cryptographic token and a cryptocurrency in that one (the token) is a cryptographic object that is created and belongs to a smart contract, whereas the other (the currency) is a cryptographic object that is generated through appending blocks to a blockchain maintained by a distributed consensus network. Typically, the currency is attributed financial value based on market interest in that currency. The token is managed, at least initially, by a central authority (the smart contract provider) whereas the currency is distributed and not managed by any specific entity. - The cryptographic tokens (Avits) are data constructs that are subject to rules of the smart contract. The smart contract's rules are configured upon execution of the smart contract and cause the cryptographic tokens to exist in either a circulation group or a non-circulation group. Avit tokens existing in the circulation group are associated with cryptographic wallets of at least one account holder at a bank or depository institution. Conversely, Avit tokens in the non-circulation group are associated with the administrator and not any of the users/account holders. The group with which each Avit is associated is a function of a protocol of the smart contract that imposes transfer restrictions on the Avits. Avits of the non-circulation group cannot be associated with a user's cryptographic wallet due to protocol limitations of the first smart contract. However, the Avits still exist in a cryptographic wallet, but it is one that is not associated with any individual user but rather with the bank or depository institution itself.
- In
step 304, an account holder submits a request to obtain Avits. In some embodiments, the account holder had already completed appropriate BSA/KYC/AML checks in order to be issued a fiat deposit account at a bank. The account holder will have available funds in their existing deposit account at the bank or depository institution. Instep 306, the exchange for Avits using fiat currency is initiated via an online portal. In some embodiments, the exchange is initiated using a multifactor authentication device. Instep 308, the account holder inputs an amount of Avits desired (less than or equal to the amount of fiat currency available via their deposit account balance). - In
step 310, the account holder indicates whether the Avits should be delivered into a custodial wallet account associated with the smart contract or, alternatively, an external blockchain-based destination outside the smart contract platform. Instep 312, the bank or depository institution initiates a demand deposit (debit) from the customer's fiat deposit account for the Avit purchase and a Trust General Ledger is the offsetting credit. Avits are exchanged for fiat currency at a one-to-one correspondence. The issuer of Avits removes the fiat currency from the account holder's debit account. The Avits are drawn from the non-circulation group and shifted into the circulation group. When shifted into the circulation group, the Avits are transferred to the indicated custodial wallet/blockchain destination. The bank or depository institution's balance at its master account with the federal reserve bank does not change. - In some embodiments, step 312 further includes a new Avit minting transaction (on a blockchain) sending the new Avit into the Avit Pooled Fungible account (a custodial trust account) on behalf of the customer. In some embodiments, the minting transaction deposits all of the new Avits into the non-circulation group. In some embodiments, the minting transaction is a multi-signature transaction as dictated by the smart contract. Signatures may be held by multiple entities within the bank or depository institution. In some embodiments, the minting transaction skips the non-circulation group and goes directly to the account holder's wallet (e.g., personal wallet, external wallet, or custody wallet).
- In
step 314, the account holder's Avit custody account is credited to reflect ownership of Avits in one-on-one correspondence with the exchanged fiat currency. The account holder owns a pro rata share of the pool of Avits held in custody by Avanti's trust department in the form of a fungible bailment. - In some embodiments, each Avit is unique. Uniqueness enables the administrator of the smart contract, a bank or depository institution, to track movement of all of the cryptographic tokens across any chosen blockchain platform. Examples of unique cryptographic tokens are those generated according to the ERC-721 standard. Alternatively, those generated via ERC-20 standard may still be unique. Uniqueness of a cryptographic token does not necessarily alter fungibility thereof. Uniqueness may be based on serial numbers that enable clear tracking without a meaningful difference in functionality.
-
FIG. 4 illustrates a process to redeem Avits. Instep 402, the account holder submits a request to redeem Avits. Similarly to the process for obtaining Avits, the account holder will have already completed appropriate KYC/AML checks in order to be issued a fiat deposit account. The account holder additionally must have available balance in its existing Avits Account (be that account be managed via a custodial wallet or some other external wallet). In some embodiments, the request is performed via a mobile application of a web browser application. - In
step 404, the account holder's account is debited to reflect redemption of Avits and exchanged for fiat currency to that account holder's deposit account. Exchanging the relevant Avits shifts, by operation of the smart contract, those Avits from the circulation group to the non-circulation group. The exchange is performed via a blockchain recorded transaction. The transaction is issued or broadcast by the smart contract administrator. The smart contract responds to the published blockchain transaction to transfer the Avits. The Avits exist on the blockchain (e.g., in circulation) until an exchange back to fiat occurs. - The bank or depository institution executes an internal transfer (debit) of fiat from the Avits General Ledger (a trust account holding cash backing Avits) to the account holder's deposit account (e.g., a bank account) and the bank or depository institution's balance at its master account with the federal reserve bank does not change.
- In
step 406, in response to the exchange and the reacquisition of the Avits into the non-circulation group, the bank or depository institution initiates a new Avit burning transaction (on a blockchain) removing the non-circulation Avits from existence. Avanti would “burn” (i.e., destroy) unassigned excess Avits on some regular schedule, such as once per month. Authorized but unassigned Avits would remain in the Avits Pooled Fungible Account in the name of an Avanti house account. In some embodiments, the burning transaction is performed on the Avits while still in the circulation group. -
FIG. 5 is a block diagram illustrating cryptographic token transaction locations. The bank ordepository institution 502 has control over a number of the transaction locations including thenon-circulation group 504 and thecirculation group 506. Tokens present in thenon-circulation group 504 are not associated with any particular account holder. Tokens present in thecirculation group 506 are associated with account holders. The account holders choose whether their tokens are held in anaccount holder wallet 508 that is controlled by the bank ordepository institution 502, held in custody within thecirculation group 506, or held in an externalaccount holder wallet 510 outside of the bank ordepository institution 502 control. - The account holders may trade their tokens with third party users 512 who are similarly outside the bank or
depository institution 502. -
FIG. 6 is a high-level block diagram showing an example of aprocessing device 600 that can represent a system to run any of the methods/algorithms described above. A system may include two or more processing devices such as represented inFIG. 6 , which may be coupled to each other via a network or multiple networks. A network can be referred to as a communication network. - In the illustrated embodiment, the
processing device 600 includes one ormore processors 610,memory 611, acommunication device 612, and one or more input/output (I/O)devices 613, all coupled to each other through aninterconnect 614. Theinterconnect 614 may be or include one or more conductive traces, buses, point-to-point connections, controllers, scanners, adapters, and/or other conventional connection devices. Eachprocessor 610 may be or include, for example, one or more general-purpose programmable microprocessors or microprocessor cores, microcontrollers, application-specific integrated circuits (ASICs), programmable gate arrays, or the like, or a combination of such devices. The processor(s) 610 control the overall operation of theprocessing device 600.Memory 611 may be or include one or more physical storage devices, which may be in the form of random access memory (RAM), read-only memory (ROM) (which may be erasable and programmable), flash memory, miniature hard disk drive, or other suitable type of storage device, or a combination of such devices.Memory 611 may store data and instructions that configure the processor(s) 610 to execute operations in accordance with the techniques described above. Thecommunication device 612 may be or include, for example, an Ethernet adapter, cable modem, Wi-Fi adapter, cellular transceiver, Bluetooth transceiver, or the like, or a combination thereof. Depending on the specific nature and purpose of theprocessing device 600, the I/O devices 613 can include devices such as a display (which may be a touch screen display), audio speaker, keyboard, mouse or other pointing device, microphone, camera, etc. - Unless contrary to physical possibility, it is envisioned that (i) the methods/steps described above may be performed in any sequence and/or in any combination, and that (ii) the components of respective embodiments may be combined in any manner.
- The techniques introduced above can be implemented by programmable circuitry programmed/configured by software and/or firmware, or entirely by special-purpose circuitry, or by a combination of such forms. Such special-purpose circuitry (if any) can be in the form of, for example, one or more application-specific integrated circuits (ASICs), programmable logic devices (PLDs), field-programmable gate arrays (FPGAs), etc.
- Software or firmware to implement the techniques introduced here may be stored on a machine-readable storage medium and may be executed by one or more general-purpose or special-purpose programmable microprocessors. A “machine-readable medium,” as the term is used herein, includes any mechanism that can store information in a form accessible by a machine (a machine may be, for example, a computer, network device, cellular phone, personal digital assistant (PDA), manufacturing tool, any device with one or more processors, etc.). For example, a machine-accessible medium includes recordable/non-recordable media (e.g., read-only memory (ROM); random access memory (RAM); magnetic disk storage media; optical storage media; flash memory devices; etc.), etc.
- Physical and functional components (e.g., devices, engines, modules, and data repositories, etc.) associated with
processing device 600 can be implemented as circuitry, firmware, software, other executable instructions, or any combination thereof. For example, the functional components can be implemented in the form of special-purpose circuitry, in the form of one or more appropriately programmed processors, a single board chip, a field-programmable gate array, a general-purpose computing device configured by executable instructions, a virtual machine configured by executable instructions, a cloud computing environment configured by executable instructions, or any combination thereof. For example, the functional components described can be implemented as instructions on a tangible storage memory capable of being executed by a processor or other integrated circuit chip (e.g., software, software libraries, application program interfaces, etc.). The tangible storage memory can be computer-readable data storage. The tangible storage memory may be volatile or non-volatile memory. In some embodiments, the volatile memory may be considered “non-transitory” in the sense that it is not a transitory signal. Memory space and storages described in the figures can be implemented with the tangible storage memory as well, including volatile or non-volatile memory. - Note that any and all of the embodiments described above can be combined with each other, except to the extent that it may be stated otherwise above or to the extent that any such embodiments might be mutually exclusive in function and/or structure.
- Although the present invention has been described with reference to specific exemplary embodiments, it will be recognized that the invention is not limited to the embodiments described, but can be practiced with modification and alteration within the spirit and scope of the appended claims. Accordingly, the specification and drawings are to be regarded in an illustrative sense rather than a restrictive sense.
Claims (24)
Priority Applications (6)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US17/339,790 US20220027867A1 (en) | 2020-07-27 | 2021-06-04 | Cryptographic token with separate circulation groups |
PCT/US2021/043159 WO2022026374A1 (en) | 2020-07-27 | 2021-07-26 | Cryptographic token with separate circulation groups |
EP21850423.1A EP4189554A4 (en) | 2020-07-27 | 2021-07-26 | Cryptographic token with separate circulation groups |
CA3183871A CA3183871A1 (en) | 2020-07-27 | 2021-07-26 | Cryptographic token with separate circulation groups |
US17/544,480 US11392906B2 (en) | 2020-07-27 | 2021-12-07 | Cryptographic token with separate circulation groups |
US18/335,442 US20230325793A1 (en) | 2020-07-27 | 2023-06-15 | Cryptographic token with separate circulation groups |
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US202063057057P | 2020-07-27 | 2020-07-27 | |
US17/339,790 US20220027867A1 (en) | 2020-07-27 | 2021-06-04 | Cryptographic token with separate circulation groups |
Related Child Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
PCT/US2021/043159 Continuation WO2022026374A1 (en) | 2020-07-27 | 2021-07-26 | Cryptographic token with separate circulation groups |
US18/335,442 Continuation US20230325793A1 (en) | 2020-07-27 | 2023-06-15 | Cryptographic token with separate circulation groups |
Publications (1)
Publication Number | Publication Date |
---|---|
US20220027867A1 true US20220027867A1 (en) | 2022-01-27 |
Family
ID=79688427
Family Applications (3)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/339,790 Abandoned US20220027867A1 (en) | 2020-07-27 | 2021-06-04 | Cryptographic token with separate circulation groups |
US17/544,480 Active US11392906B2 (en) | 2020-07-27 | 2021-12-07 | Cryptographic token with separate circulation groups |
US18/335,442 Pending US20230325793A1 (en) | 2020-07-27 | 2023-06-15 | Cryptographic token with separate circulation groups |
Family Applications After (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US17/544,480 Active US11392906B2 (en) | 2020-07-27 | 2021-12-07 | Cryptographic token with separate circulation groups |
US18/335,442 Pending US20230325793A1 (en) | 2020-07-27 | 2023-06-15 | Cryptographic token with separate circulation groups |
Country Status (4)
Country | Link |
---|---|
US (3) | US20220027867A1 (en) |
EP (1) | EP4189554A4 (en) |
CA (1) | CA3183871A1 (en) |
WO (1) | WO2022026374A1 (en) |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11392906B2 (en) * | 2020-07-27 | 2022-07-19 | Custodia Bank, Inc. | Cryptographic token with separate circulation groups |
US20230092436A1 (en) * | 2021-09-23 | 2023-03-23 | International Business Machines Corporation | Framework for demaraction of digital assets |
US20240005354A1 (en) * | 2022-07-01 | 2024-01-04 | Redeem Technologies Inc. | System and method of providing mobile number linked to redeemable and shareable promotions and a checkout process |
Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180268382A1 (en) * | 2017-03-20 | 2018-09-20 | Steven Victor Wasserman | Blockchain digital currency: systems and methods for use in enterprise blockchain banking |
US20190081789A1 (en) * | 2017-09-13 | 2019-03-14 | Vijay K. Madisetti | Tokens or crypto currency using smart contracts and blockchains |
Family Cites Families (17)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7035854B2 (en) * | 2002-04-23 | 2006-04-25 | International Business Machines Corporation | Content management system and methodology employing non-transferable access tokens to control data access |
US11196747B2 (en) * | 2017-12-07 | 2021-12-07 | Bank Of America Corporation | Automated event processing computing platform for handling and enriching blockchain data |
US20190197518A1 (en) * | 2017-12-22 | 2019-06-27 | Mastercard Asia/Pacific Pte. Ltd. | System and method using stored value tokens |
US11531985B2 (en) * | 2018-01-17 | 2022-12-20 | Tzero Ip, Llc | Multi-approval system using M of N keys to generate a sweeping transaction at a customer device |
GB2570469A (en) * | 2018-01-26 | 2019-07-31 | Neuchatel Ltd | Arrangements relating to cryptocurrency |
US11200569B1 (en) * | 2018-02-12 | 2021-12-14 | Winklevoss Ip, Llc | System, method and program product for making payments using fiat-backed digital assets |
US11468412B2 (en) * | 2018-04-02 | 2022-10-11 | Royal Bank Of Canada | System and method for composite cryptographic transactions |
WO2019204794A1 (en) * | 2018-04-20 | 2019-10-24 | Infonetworks Llc | System for verification of pseudonymous credentials for digital identities with managed access to personal data on trust networks |
US20210012332A1 (en) * | 2018-04-24 | 2021-01-14 | Duvon Corporation | Autonomous exchange via entrusted ledger digital signature |
US11599875B2 (en) * | 2018-04-24 | 2023-03-07 | Duvon Corporation | Autonomous exchange via entrusted ledger application specific wallet |
US20200302433A1 (en) * | 2018-11-27 | 2020-09-24 | Its, Inc. | Distributed ledger settlement transactions |
US20200167769A1 (en) * | 2018-11-27 | 2020-05-28 | Its, Inc. | Distributed ledger settlement transactions |
US10505726B1 (en) * | 2018-12-07 | 2019-12-10 | Nike, Inc. | System and method for providing cryptographically secured digital assets |
US11398909B2 (en) * | 2019-05-05 | 2022-07-26 | Microsoft Technology Licensing, Llc | Reusable template for asset token |
US20210036855A1 (en) * | 2019-07-31 | 2021-02-04 | International Business Machines Corporation | Transfering tokens between blockchain networks |
US20220027867A1 (en) * | 2020-07-27 | 2022-01-27 | Avanti Financial Group, Inc. | Cryptographic token with separate circulation groups |
US11568376B2 (en) * | 2020-09-08 | 2023-01-31 | Flexa Network Inc. | Assignment of conditional access rights to assignable tokens based on an interaction |
-
2021
- 2021-06-04 US US17/339,790 patent/US20220027867A1/en not_active Abandoned
- 2021-07-26 CA CA3183871A patent/CA3183871A1/en active Pending
- 2021-07-26 EP EP21850423.1A patent/EP4189554A4/en active Pending
- 2021-07-26 WO PCT/US2021/043159 patent/WO2022026374A1/en active Application Filing
- 2021-12-07 US US17/544,480 patent/US11392906B2/en active Active
-
2023
- 2023-06-15 US US18/335,442 patent/US20230325793A1/en active Pending
Patent Citations (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20180268382A1 (en) * | 2017-03-20 | 2018-09-20 | Steven Victor Wasserman | Blockchain digital currency: systems and methods for use in enterprise blockchain banking |
US20190081789A1 (en) * | 2017-09-13 | 2019-03-14 | Vijay K. Madisetti | Tokens or crypto currency using smart contracts and blockchains |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11392906B2 (en) * | 2020-07-27 | 2022-07-19 | Custodia Bank, Inc. | Cryptographic token with separate circulation groups |
US20230092436A1 (en) * | 2021-09-23 | 2023-03-23 | International Business Machines Corporation | Framework for demaraction of digital assets |
US20240005354A1 (en) * | 2022-07-01 | 2024-01-04 | Redeem Technologies Inc. | System and method of providing mobile number linked to redeemable and shareable promotions and a checkout process |
Also Published As
Publication number | Publication date |
---|---|
WO2022026374A1 (en) | 2022-02-03 |
EP4189554A4 (en) | 2024-01-24 |
US11392906B2 (en) | 2022-07-19 |
EP4189554A1 (en) | 2023-06-07 |
US20230325793A1 (en) | 2023-10-12 |
CA3183871A1 (en) | 2022-02-03 |
US20220092562A1 (en) | 2022-03-24 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11908012B2 (en) | Global liquidity and settlement system | |
US11727401B1 (en) | System, method and program product for generating and utilizing stable value digital assets | |
US11314722B2 (en) | Systems and methods for blockchain rule synchronization | |
JP2022547130A (en) | Systems and methods for providing a blockchain-based process of record | |
EP3432240A1 (en) | Blockchain including linked digital assets | |
US20200151709A1 (en) | Crypto-currency backed stablecoin and token lending framework | |
CN110033377B (en) | Asset sorting method and device based on block chain and electronic equipment | |
US11392906B2 (en) | Cryptographic token with separate circulation groups | |
CN110020936B (en) | Asset management method and device based on block chain and electronic equipment | |
US20210110474A1 (en) | Blockchain-Based Method, Apparatus, and System to Accelerate Transaction Processing | |
WO2018060951A1 (en) | A system for trading in a contract-free manner | |
CN110020948B (en) | Asset tracing method and device based on block chain and electronic equipment | |
US20200118207A1 (en) | Blockchain based invoice sales | |
US20230065042A1 (en) | Blockchain marketplace for debt capital | |
KR20200006243A (en) | A Cryptographic Liquidity Borrowing Program Using Block Chain | |
Bagai | Payment systems in the United States and architectures enabled by digital currencies | |
Ciminelli et al. | Asset Tokenization: Potential Applications | |
Srisukvattananan | Overview of blockchain and possible use cases in the Thai payment system | |
Polikarpova | Settlement risk in cross-border transactions: traditional and new approaches | |
WO2023287326A1 (en) | Method and system for conversion and cross-currency transactions and cross-border transfers | |
KR20200006237A (en) | A Cryptographic Liquidity Borrowing Method Using Block Chain | |
KR20200006234A (en) | A Cryptographic Liquidity Borrowing System Using Block Chain | |
KR20190138926A (en) | A Cryptographic Liquidity Borrowing System Using Block Chain | |
KR20200006314A (en) | A Cryptographic Liquidity Borrowing Device Using Block Chain |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STPP | Information on status: patent application and granting procedure in general |
Free format text: DOCKETED NEW CASE - READY FOR EXAMINATION |
|
AS | Assignment |
Owner name: AVANTI FINANCIAL GROUP, INC., WYOMING Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:LONG, CAITLIN FRANCES;BISHOP, BRYAN ALLEN;SHIMKO, ZEV NAFTALI;AND OTHERS;REEL/FRAME:057694/0257 Effective date: 20210907 |
|
AS | Assignment |
Owner name: CUSTODIA BANK, INC., WYOMING Free format text: CHANGE OF NAME;ASSIGNOR:AVANTI FINANCIAL GROUP, INC.;REEL/FRAME:059953/0714 Effective date: 20220218 |
|
STPP | Information on status: patent application and granting procedure in general |
Free format text: NON FINAL ACTION MAILED |
|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |