WO2020016457A1 - Integrated monetary system based on network technology - Google Patents

Integrated monetary system based on network technology Download PDF

Info

Publication number
WO2020016457A1
WO2020016457A1 PCT/EP2019/069704 EP2019069704W WO2020016457A1 WO 2020016457 A1 WO2020016457 A1 WO 2020016457A1 EP 2019069704 W EP2019069704 W EP 2019069704W WO 2020016457 A1 WO2020016457 A1 WO 2020016457A1
Authority
WO
WIPO (PCT)
Prior art keywords
session
knowledge
token
coin
user
Prior art date
Application number
PCT/EP2019/069704
Other languages
French (fr)
Inventor
Hardy Schloer
Original Assignee
Zoe Life Technologies Holding AG
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Zoe Life Technologies Holding AG filed Critical Zoe Life Technologies Holding AG
Priority to EP19744665.1A priority Critical patent/EP3811311A1/en
Publication of WO2020016457A1 publication Critical patent/WO2020016457A1/en

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/04Payment circuits
    • G06Q20/06Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme
    • G06Q20/065Private payment circuits, e.g. involving electronic currency used among participants of a common payment scheme using e-cash
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • Fig. 1 illustrates the Global Value Exchange in 5 Steps
  • Fig. 2 illustrates the features of the knowledge coin vault (KCV);
  • Fig. 3 to 5 illustrate a money transaction step-by-step;
  • Fig. 6 illustrates the administrative KCV transaction network
  • Fig. 7 illustrates how the currency transaction system works
  • Fig. 8 illustrates additional features of the present invention related to vehicle, plane and vessel ownership/operations.
  • the present invention is a fully integrated monetary system based on qualified and quantifiable units of knowledge.
  • KBC knowledge based currency
  • the knowledge based currency (KBC) has the following technical properties: KBC is based on the creation of quantifiable IP (i.e., knowledge) in form of units of analyzed data; the concept of money, and the leveraging of IPv6 network tech nology unified into one functional product.
  • IP i.e., knowledge
  • the most verifiable and most meaning ful way to measure knowledge is, to unitize the elements of causality in in a given set of information over various resolutions of impact, and over a set of environ- ments, in which it can become relevant.
  • Such measurement can be done very easily for example with C+8 Technology, where a constant flow of knowledge units is a centrally guarantied effect of generalized data analysis. Each such unit then can be used as the supporting value of a unit of money.
  • the KBC allows establishment of a currency based on a stable and ever-expanding asset (knowledge) versus FIAT currency, based speculative commodities (unstable, prone to manipulation and of finite value).
  • This system promotes or incentivizes value contribution in the form of knowledge.
  • the system even intrinsically creates new knowledge from a universally collective effort.
  • the KBC is a system that allows every human the ability to earn money through participation in it.
  • KBC Knowledge Coin
  • KCT Knowledge Coin Token
  • the purpose of the knowledge based currency is to act as a stable payment system and currency, and secondarily, as financial crime prevention enablement.
  • the KCT is a Crypto Currency based on the concepts of money (value), based on information (knowledge), and enabled through IPv6 (network technology).
  • Each unit of the currency is fully trackable though its own permanent IPv6 number in real-time, internally and externally accountable, with all recent transaction his- tory preserved inside the token, and all transaction history externally with the issu ing authority
  • a knowledge coin is only with 3rd-party permission (KC authority) transfer able, requiring 4 separate encryption keys to permit any movement of this currency.
  • KC is built on a system of stable and sustainable value, that is the continuously evolving pool of global knowledge, and provides a significant technical foundation, to detect and eradicate currently known financial crimes (tax evasion, money laun dering, illegal transactions, theft of money, money based corruption, investment fraud, etc.).
  • KC is designed to take advantage of the internet backbone, cloud computing and powerful encryption technologies, to fuel and enable modem information based economies to act and transact locally and globally through stable mechanisms.
  • Fig. 1 illustrates the five functional steps for creating the global value exchange (GVE) system based on the inventive KC, in particular the production of knowledge units (KNUs), and gives an oversight of its relation with currency and Central Bank regulations.
  • GVE global value exchange
  • the first main functional step (1) is to control selection of knowledge aggregators.
  • a knowledge aggregation licensing process is implemented.
  • One preferred implementation to create measurable knowledge is the C+8 Technology.
  • knowledge aggregation may also take place in private environment.
  • knowledge aggregators may be licensed.
  • Licensed extemal/private knowledge aggregators keep their own knowledge, but use it commercially and educationally, so that its benefit becomes globally availa ble, either directly or indirectly.
  • the knowledge producer is enabled to pass the evidence of all new knowledge creation through a C+8 standardized and quantified method to the GVE, where it is validated and accounted.
  • Second main functional step (2) is to enforce processing and raw data selection standards. This can best be implemented under the C+8 data model.
  • the third main functional step (3) is performed by a KNU Reserve 3 which serves to hold and secure KNU and to supply currency.
  • Fourth (4) and fifth (5) main functional steps relate to the creation of money. They comprise control and audit accounting.
  • the regulatory accounting comprises to pro- cess accounting of KNU (Knowledge Units) into Currency, also denoted here as KNC Token.
  • the Central Bank manages currency and money supply. Further, the Central Bank manages the electronic KNC Token Records.
  • the GVE will issue new Global Value units in exact proportion of the Knowledge Unit Output and of the respective subscriber (Knowledge Aggregator) output
  • Fig. 2 illustrates the features of the knowledge coin vault (KCV).
  • KCV knowledge coin vault
  • the KCV is a strong encrypted software/hardware device, which carries a base set of embedded software instructions, which cannot be erased or altered by unauthorized third par ties without destroying the device itself. The user must use his/her biometric fea tures to interact with the KCV.
  • Several strong encrypted Smart Apps and licensed third party hosted process servers are required to receive, instruct and transfer cur- rency (Knowledge Coin) in any commercial transaction.
  • the Knowledge Coin can be instructed by its holder to change possession/ownership through biometric and otherwise encrypted real-time 3rd party authorization via the internet, or dedicated terminals, designed to transact virtual crypto currency using biometrics, plus 4 sep arate encryption keys, and other security measures, which are sequentially execute by the security protocol.
  • the KCV facilitates all money related transactions and handles all documents which are shared between a person and the various federal government and state agencies of any country.
  • the KCV has a permanent IPv6 number.
  • a network call (session and token) at dedicated COM Port 1 module arrives, to negotiate a peer-to-peer session with KCV.
  • COM1 module logs caller info and Ipv6, and
  • IPv6 ID check compares the sender IPv6 to the list of permitted IPv6 numbers to start session, or block the call. After that, if
  • COM2 starts Peer-to-peer session to request 3 rd Party (a dedicated GOV server) to verify that a authentic transaction request call was made, and in fact by a legitimate entity (ID Check).
  • 3 rd Party a dedicated GOV server
  • Session Mapping else, call is automatically reported to GOV server as intrusion attempt and all relevant data is transmitted to GOV server (3) Session Mapping parks original session together with Token info in Session Hold, creates new session and passes new info only to Global Security frame to wait for new token belong to new session to appear.
  • Session Mapping passes session to User Biometric ID Check (BIDC).
  • BIDC User Biometric ID Check
  • Com port Management sends relevant session requests now to Local Security frame. 4 different types of sessions are possible. This is described in connection with Fig. 4:
  • Vault Core Security Frame exchanges security procedure (4th line of security) and passes session request to transaction Corridor for implementation of request together with user interactive selections (receive funds, accept documents, pay invoices, vote on polls or elec- tions, request, update medical records, etc.);
  • Core Security Frame calls Local Security Frame and clears session for passing to COM port Management and Outbox;
  • Fig. 6 illustrates the administrative KCV transaction network.
  • the authorized and licensed regulatory agency i.e. a central bank, or the regulated department of finance or commerce
  • the process is designed to eliminate compliance issues associated with commercial transactions.
  • the authorized and licensed regulatory agency i.e. a central bank, or the regulated department of finance or commerce
  • the authorized and licensed regulatory agency can use the technical features inside the KCV, to interact with the user, send receive messages, add, change, and remove electronic documents (Driver Licenses, Certificates, Property Titles, Academic Degrees (Master, PhD, etc.) and all Health Care Records.
  • the authorized and licensed government agency can use the technical features inside the KCV, to conduct Blind Queries (Confidential) by sending a Vault Questionnaire Token (VQT) to the device, to let the qualifying user state opinions about specific issues.
  • VQT Vault Questionnaire Token
  • the government can therefore target the most appropriate user for the most relevant Opinion (doctors about health care, woman about woman issues, etc.).
  • the KCV Function enables secure voting.
  • the KCV Function enables fully automated escrow transactions.
  • the KCV enables real-time transaction related tax collection, prevents money laun dering, corruption, financial crimes
  • the KCV enables governments to direct deliver and enable for its citizens time/re- gion/demographic sensitive economic incentives through use of tax breaks and other special benefit delivered through the KCV.
  • Fig. 7 illustrates how the currency transaction system works.
  • ICV2 The biometrically permissioned owner/operator of ICV2 makes a request for payment to ICV 1. It is assumed for this example, that ICV2 is a business, and that this is a commercial transaction between a seller and a retail cus- tomer. However, this system works for any other transaction as well (B2B; G2B; G2C; B2C; C2C, X2Y).
  • ICV1 (2) Operator of ICV1 responds by authorizing payment to ICV2.
  • ICV1 device opens an encrypted peer-to-peer session to the authorized Payment facilita tion system, to make a request to pay the requested or partial amount to the regulatory unit guarded technical computer server system, here called “Global Unit for Application Processing of Transfer Requests.” (Unit A) During the various due- diligence takes the system now performs, the virtual payment.
  • the Unit D is now internally processing the payment request.
  • First step is Law Enforcement (Unit E), to check locally and globally, if any reasons exist in there global and local databases to stop, delay, or impound the pay- ment.
  • Unit D has already applied general rules to classify the payment as legal or illegal. Law enforcement only gets to check data of other open cases, involving either party of the payment transaction, if there is any pending issue.
  • Unit D (Regu- latory Clearing Center) passes the payment request token to the regulatory
  • Unit F (Regulatory Authority) for implementation/update of instructions for transaction taxes, fees, tariffs, incentives, subsidies, and also, if appropriate, the issue of electronic documentation, certificates, titles, permits, and other such ele ments.
  • Unit F (Regulatory Authority) sends Unit D (Regulated Clearing Center) the software Token with permission added to facilitate now the payment process.
  • Unit F passes to Unit D also all instructions about taxes, fees, and receipts relating to this transaction.
  • Unit D passes Token with instruc tion to Unit B, to release virtual currency to Unit C and and finalize process to deliver payment.
  • Unit C passes now Session Token to the Taxation Fees and Tariffs depart ment (Unit G) to get instructions for any pending deductions that become due in relation to the current transaction.
  • Unit G responds, by notifying Unit C of the deductions (10) Unit C responds by deducting the requested amounts for Taxes, Fees and Tariffs, and passes them to Unit G
  • Unit C sends full transaction record with all deductions to message system of requestor (12) Unit C now passes the net amount of money to payment requestors
  • ICV of payment requesting user passes all information together with all relevant info to Unit H. This process is done by the ICV of recipient (of
  • Unit H Passing executions, Reports, Statistics, results to Unit F (Regulatory Authority) for further action.
  • Unit I opens a encrypted peer to peer connection, to deliver the elec- tronic documents.
  • Unit F also is in charge of all administrative and regulated docu- ments, such as certificates, tax statements, Medical records, Permits, and Educational Records. Unit F also guards the anonymous pooling and voting process. Whenever appropriate, Unit F prepares and transmits such docu- ments directly into the Vault of the ICV, using strong encryption, and mul- tiple high-security features.
  • Unit F (Regulations) shares with Unit F (Law Enforcement) and Unit G (Taxes, Fees and Tariffs) Information in real time, to detect any asymmetric problems.
  • Unit F Unit F (Regulations) shares with Unit F (Law Enforcement) and Unit G (Taxes, Fees and Tariffs) Information in real time, to detect any asymmetric problems.
  • Unit F Unit F (Law Enforcement) and Unit G (Taxes, Fees and Tariffs) Information in real time, to detect any asymmetric problems.
  • Unit F has Omni Knowledge of the status and whereabouts of all money (every unit of currency has its own IPv6 number), all certificates, permits, academic records, healthcare records, titles, and any other regulated documents. Unit F possesses also a copy of every ICV in the system, and therefore can reinstate any lost, destroyed or stolen ICV by using the last known status and content of the ICV, which is always up-to-date to the last transaction. All units of money, and documents, which have been compromised, are immediately retired, and if reap pearing anywhere, known to be fraudulent, and its user will be targeted for ban- gation/arrest for handling, or attempting to use lost or stolen money or documents.
  • the access to Unit F is highly restricted, and can only be excessed under very strict and predefined procedures by the system itself, and predefined purposes.
  • the sys tem is built to give maximum privacy to individuals, by restricting people from accessing information without consent of the individual itself, and selecting, who can see what and when (money, credit ratings, tax returns, permits, certificates, ac- ademic records, healthcare records, licenses, police records, security clearances, ti tles, and other regulated records).
  • Any transaction which constitutes a crime or violation of regulation is automatically stopped. For example, a minor at age 15 cannot buy alcohol, or cigarettes, or a blind person cannot receive a driver license, etc.
  • owner/operator can issue a temporary reg- istration request of any of its legally owned Units for a temporary registration to legally operate the Unit for a set time and date window and geographical area by a 3rd party.
  • 3rd party will receive temporary 3rd party registration token automati cally in 3rd parties’ ICV.
  • ICV units have location Service, which can be shown optionally to a 3 rd party, but they are mandatory enabled by the regulatory authority, to validate operations, and impose restrictions.
  • Regulatory Authority can collect fees, taxes, permits and levies always through the ICV to ICV money flow, always at transaction time. Regulatory Authority has therefore a more direct and transaction related way to fulfil tax revenue needs on all levels, locally and federally.
  • ICV Units All individuals, all companies, all NGOs and all institutions have ICV Units. When the ICV is registered to an organization, more then one authorized user can be reg- istered at the Regulatory Authorities to a ICV device. Ultimately, each individual is responsible for its own transactions which are recorded in the history records of the Unit D and Unit F. of the Regulatory authorities. The financial responsible ad- ministrator of record is able to give permits to registered individuals of a organiza tion to be registered.

Landscapes

  • Business, Economics & Management (AREA)
  • Engineering & Computer Science (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Theoretical Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Strategic Management (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Computer Security & Cryptography (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A coin token, characterized in that it is related to predefined knowledge, and represents a coin of a predefined currency. Further provided is a knowledge coin vault device, comprising a memory for storing information relating to a virtual crypto currency, means for interaction with a user via biometric features of the user.

Description

Integrated Monetary System Based on Network Technology
Introduction
Over the past few years, there has been significantly increasing discussion in fi nance, technology and public administration circles that the‘new’ global currency will become information. The amount of data together with the processing speed to analyze this data and take action, has moved beyond the cognitive reaction abilities of humans. Generally, there are two megatrends, which force the entire world of business and trade into electronic currencies. First of all, the competition is driven by Artificial Intelligence programs, which take advantage of big data to implement within milliseconds com- plex trades across borders and competition lines. Secondly, the business model of FIAT currencies is about to end, as transparency of information systems expose the true problems with these financial instruments. Beyond this, the business model of B2C and B2B is about to disappear and be replaced by C2M and B2M trades. There- fore, the true value of the future is data and knowledge, which enables fast and profitable trade strategies ahead of the competition.
This deluge of data is growing fast. The total amount of data in the world was 4.4 zettabytes in 2013. That is set to rise steeply to 44 zettabytes by 2020. To put that in perspective, one zettabyte is equivalent to 44 trillion gigabytes. This sharp rise in data will be driven by rapidly growing daily production of data. But how much data is produced everyday today?
This truth in this discussion only becomes more obvious and logical with the pass- ing of time. Since the term“big data” was fashioned explain what any large volume of data possesses when interconnected and the immense value in aggregating knowledge that could come from its possession began to become realized, ‘knowledge currency’ has gained continued momentum.
Summary of invention The invention is defined in the appended claims.
Short description of the Figures.
Fig. 1 illustrates the Global Value Exchange in 5 Steps;
Fig. 2 illustrates the features of the knowledge coin vault (KCV); Fig. 3 to 5 illustrate a money transaction step-by-step;
Fig. 6 illustrates the administrative KCV transaction network;
Fig. 7 illustrates how the currency transaction system works
Fig. 8 illustrates additional features of the present invention related to vehicle, plane and vessel ownership/operations.
Detailed description
The present invention is a fully integrated monetary system based on qualified and quantifiable units of knowledge.
The knowledge based currency (KBC) has the following technical properties: KBC is based on the creation of quantifiable IP (i.e., knowledge) in form of units of analyzed data; the concept of money, and the leveraging of IPv6 network tech nology unified into one functional product. The most verifiable and most meaning ful way to measure knowledge is, to unitize the elements of causality in in a given set of information over various resolutions of impact, and over a set of environ- ments, in which it can become relevant. Such measurement can be done very easily for example with C+8 Technology, where a constant flow of knowledge units is a centrally guarantied effect of generalized data analysis. Each such unit then can be used as the supporting value of a unit of money. Under C+8 about 500 units/per minute/per 24 7i Intel processor cores at 2.7GHz of generalized causality elements extracted and recorded, cost about 1 (one) Euro in July 2018. It is now easy to con- struct from this the value of one unit of Knowledge Currency. Due to the increasing efficiency of processing equipment (a direct effect of increasing knowledge), the machine can therefore also process more knowledge, in the same time, given the same level of continuous investment to produce knowledge. This means, that infla tion of money is forever eliminated. Moreover, by choosing lowering processing cost per units of T ime/ over expanding processing cycles as constant, the continuous loading of more knowledge units per currency unit is a built-in result. More knowledge = more value/money. This eliminates the need for interest, as money given has a lower value, as money returned later. The later the money is returned, the more valuable it is. This reverses negative effects of the current monetary sys- tern, where interest seems to cripple most countries, especially developed counties, where interest on debt begins to take a severe toll on finance, society and govern ment
The KBC allows establishment of a currency based on a stable and ever-expanding asset (knowledge) versus FIAT currency, based speculative commodities (unstable, prone to manipulation and of finite value).
It is a system that can be used for standardizing value for all of the world’s data.
This system promotes or incentivizes value contribution in the form of knowledge.
The system even intrinsically creates new knowledge from a universally collective effort. The KBC is a system that allows every human the ability to earn money through participation in it.
A key feature of KBC is that throughout the entire system, all instructions are passed through software token technology. The Knowledge Coin (KC) Token (KCT) is a strongly encrypted computational object, with a unique IPv6 number, fully network-transactable but addressable and usable only by specifically dedicated programs, which have the ability to read per mitted information inside the token, or write new information to its records.
Because each access and each transaction involving the token is very strictly orga nized, the KCT offers an unusually high level of security.
The purpose of the knowledge based currency is to act as a stable payment system and currency, and secondarily, as financial crime prevention enablement.
The KCT is a Crypto Currency based on the concepts of money (value), based on information (knowledge), and enabled through IPv6 (network technology).
Technical realization of KCV through deep-encrypted network enabled token tech nology
Each unit of the currency is fully trackable though its own permanent IPv6 number in real-time, internally and externally accountable, with all recent transaction his- tory preserved inside the token, and all transaction history externally with the issu ing authority
A knowledge coin (KC) is only with 3rd-party permission (KC authority) transfer able, requiring 4 separate encryption keys to permit any movement of this currency.
KC is built on a system of stable and sustainable value, that is the continuously evolving pool of global knowledge, and provides a significant technical foundation, to detect and eradicate currently known financial crimes (tax evasion, money laun dering, illegal transactions, theft of money, money based corruption, investment fraud, etc.).
KC is designed to take advantage of the internet backbone, cloud computing and powerful encryption technologies, to fuel and enable modem information based economies to act and transact locally and globally through stable mechanisms.
Fig. 1 illustrates the five functional steps for creating the global value exchange (GVE) system based on the inventive KC, in particular the production of knowledge units (KNUs), and gives an oversight of its relation with currency and Central Bank regulations.
The first main functional step (1) is to control selection of knowledge aggregators. Hereto, a knowledge aggregation licensing process is implemented. One preferred implementation to create measurable knowledge is the C+8 Technology.
As knowledge is obviously mainly created by individuals, knowledge aggregation may also take place in private environment. In order to have common standards, knowledge aggregators may be licensed.
Licensed extemal/private knowledge aggregators keep their own knowledge, but use it commercially and educationally, so that its benefit becomes globally availa ble, either directly or indirectly. The knowledge producer is enabled to pass the evidence of all new knowledge creation through a C+8 standardized and quantified method to the GVE, where it is validated and accounted.
Second main functional step (2) is to enforce processing and raw data selection standards. This can best be implemented under the C+8 data model.
The third main functional step (3) is performed by a KNU Reserve 3 which serves to hold and secure KNU and to supply currency.
Fourth (4) and fifth (5) main functional steps relate to the creation of money. They comprise control and audit accounting. The regulatory accounting comprises to pro- cess accounting of KNU (Knowledge Units) into Currency, also denoted here as KNC Token.
The Central Bank manages currency and money supply. Further, the Central Bank manages the electronic KNC Token Records.
The GVE will issue new Global Value units in exact proportion of the Knowledge Unit Output and of the respective subscriber (Knowledge Aggregator) output
Fig. 2 illustrates the features of the knowledge coin vault (KCV). The KCV is a strong encrypted software/hardware device, which carries a base set of embedded software instructions, which cannot be erased or altered by unauthorized third par ties without destroying the device itself. The user must use his/her biometric fea tures to interact with the KCV. Several strong encrypted Smart Apps and licensed third party hosted process servers are required to receive, instruct and transfer cur- rency (Knowledge Coin) in any commercial transaction. The Knowledge Coin can be instructed by its holder to change possession/ownership through biometric and otherwise encrypted real-time 3rd party authorization via the internet, or dedicated terminals, designed to transact virtual crypto currency using biometrics, plus 4 sep arate encryption keys, and other security measures, which are sequentially execute by the security protocol.
The KCV facilitates all money related transactions and handles all documents which are shared between a person and the various federal government and state agencies of any country. The KCV has a permanent IPv6 number.
In the following, several functionalities of the KCV are described. The numbering in the following text refers to the numbering in the corresponding figure.
First, a money transaction is described step-by-step in connection with Figs. 3 to 5.
(1) A network call (session and token) at dedicated COM Port 1 module arrives, to negotiate a peer-to-peer session with KCV. COM1 module logs caller info and Ipv6, and (lb) IPv6 ID check compares the sender IPv6 to the list of permitted IPv6 numbers to start session, or block the call. After that, if
ID is permissioned, sends info peer-to-peer encrypted for external verifica tion to COM2 (lc) COM2 starts Peer-to-peer session to request 3rd Party (a dedicated GOV server) to verify that a authentic transaction request call was made, and in fact by a legitimate entity (ID Check). (2) When positive check comes back from Entity, COM1 passes session to
“Session Mapping,” else, call is automatically reported to GOV server as intrusion attempt and all relevant data is transmitted to GOV server (3) Session Mapping parks original session together with Token info in Session Hold, creates new session and passes new info only to Global Security frame to wait for new token belong to new session to appear.
(4) Session Mapping passes session to User Biometric ID Check (BIDC). Next BICD calls user on device to report a session request. If user accepts, session is now sent with Token to COM Port Management to facilitate the interac- tive session part together with the user.
Com port Management sends relevant session requests now to Local Security frame. 4 different types of sessions are possible. This is described in connection with Fig. 4:
(4a) Standardized Document INFO (Installing or updating or erasing of Licenses, Permits, Titles, Certificates, Academic Records,
(4b) Money
(4c) Public Polling and Voting
(4d) Healthcare Records of the user or User’s minor children
(5) Local security frame facilitates all communication with the KCV;
(6) Vault Core Security Frame exchanges security procedure (4th line of security) and passes session request to transaction Corridor for implementation of request together with user interactive selections (receive funds, accept documents, pay invoices, vote on polls or elec- tions, request, update medical records, etc.);
(7) After user concludes interactive session, Core Security Frame calls Local Security Frame and clears session for passing to COM port Management and Outbox;
(8) Local Security frame sends money, votes, documents and applica tions, and Medical records, to the appropriate session client in the outbox; (9) Outbox wakes up session in global security frame;
(10) Global Security frame.
Fig. 6 illustrates the administrative KCV transaction network. Besides the user, only the authorized and licensed regulatory agency (i.e. a central bank, or the regulated department of finance or commerce) can use the technical features inside the KCV, to clear transfer transactions, by registering the purpose of the transaction, approve the parties for the transaction, and automatically collect for example due taxes, fees and tariffs, all at the same time, whenever such deduction is appropriate, and due. The process is designed to eliminate compliance issues associated with commercial transactions.
The authorized and licensed regulatory agency (i.e. a central bank, or the regulated department of finance or commerce) can use the technical features inside the KCV, to interact with the user, send receive messages, add, change, and remove electronic documents (Driver Licenses, Certificates, Property Titles, Academic Degrees (Master, PhD, etc.) and all Health Care Records.
The authorized and licensed government agency (department of interior) can use the technical features inside the KCV, to conduct Blind Queries (Confidential) by sending a Vault Questionnaire Token (VQT) to the device, to let the qualifying user state opinions about specific issues. The government can therefore target the most appropriate user for the most relevant Opinion (doctors about health care, woman about woman issues, etc.).
The KCV Function enables secure voting.
The KCV Function enables fully automated escrow transactions. The KCV enables real-time transaction related tax collection, prevents money laun dering, corruption, financial crimes The KCV enables governments to direct deliver and enable for its citizens time/re- gion/demographic sensitive economic incentives through use of tax breaks and other special benefit delivered through the KCV.
Fig. 7 illustrates how the currency transaction system works.
(1) The biometrically permissioned owner/operator of ICV2 makes a request for payment to ICV 1. It is assumed for this example, that ICV2 is a business, and that this is a commercial transaction between a seller and a retail cus- tomer. However, this system works for any other transaction as well (B2B; G2B; G2C; B2C; C2C, X2Y).
(2) Operator of ICV1 responds by authorizing payment to ICV2. ICV1 device opens an encrypted peer-to-peer session to the authorized Payment facilita tion system, to make a request to pay the requested or partial amount to the regulatory unit guarded technical computer server system, here called “Global Unit for Application Processing of Transfer Requests.” (Unit A) During the various due- diligence takes the system now performs, the virtual payment.
(3) In addition, the actual payment (the virtual currency) in form of a software token, is passed through to the“Global Unit for Transaction Fulfilment” (Unit C), however, the process cannot move forward, till the unit“Holding Virtual Cash for clearing” (Unit B) gives a“make payment” signal to Unit
C.
(4) The session with all payment instructions is now sent to the“Regulated Clearing Center” (Unit D) where the payment is checked to be legally trans ferred, for a legal purpose, and the recipient a legal receiver of the funds. Furthermore, the Unit D assesses which taxes, fees or tariffs must be paid, and the information passed to other units to track user statistics, generate economic incentives, and keep a record of every unit of money, its history, and present location, which can only be any ICV or the central bank. It is to be noted: All Government offices, specifically their pay units, have also ICV systems too, to control all government spending and prevent all forms of corruption, misappropriation and erroneous use of funds. Central control is implemented as technical feature through hard-coded software functions, and by conducting all movements of money, licenses, official documents, certificates, titles, and all related fees and taxes through this system central ized system.
(5) The Unit D is now internally processing the payment request. First step is Law Enforcement (Unit E), to check locally and globally, if any reasons exist in there global and local databases to stop, delay, or impound the pay- ment. At this point Unit D has already applied general rules to classify the payment as legal or illegal. Law enforcement only gets to check data of other open cases, involving either party of the payment transaction, if there is any pending issue.
(6) Upon receiving clearance from Unit E (Law Enforcement) Unit D (Regu- latory Clearing Center) passes the payment request token to the regulatory
Authority (Unit F) for implementation/update of instructions for transaction taxes, fees, tariffs, incentives, subsidies, and also, if appropriate, the issue of electronic documentation, certificates, titles, permits, and other such ele ments. (7) Unit F (Regulatory Authority) sends Unit D (Regulated Clearing Center) the software Token with permission added to facilitate now the payment process. Unit F passes to Unit D also all instructions about taxes, fees, and receipts relating to this transaction. Next, Unit D passes Token with instruc tion to Unit B, to release virtual currency to Unit C and and finalize process to deliver payment.
(8) Unit C passes now Session Token to the Taxation Fees and Tariffs depart ment (Unit G) to get instructions for any pending deductions that become due in relation to the current transaction.
(9) Unit G responds, by notifying Unit C of the deductions (10) Unit C responds by deducting the requested amounts for Taxes, Fees and Tariffs, and passes them to Unit G
(11) Unit C sends full transaction record with all deductions to message system of requestor (12) Unit C now passes the net amount of money to payment requestors
Vault.
(13) ICV of requesting user send automatically full transaction report, including all deductions back to
(14) ICV of payment requesting user passes all information together with all relevant info to Unit H. this process is done by the ICV of recipient (of
Money, documents, etc.) automatically, and a confirmation of the transac- tion is now prepared to the sending ICV to confirm all details for the records inside the ICV. Unit H.
(15) Unit H Passing executions, Reports, Statistics, results to Unit F (Regulatory Authority) for further action.
(16) The information of the Payment is now sent to Unit I for preparation of receipts, invoice copies, tax documentation, and other such records.
(17) Unit I opens a encrypted peer to peer connection, to deliver the elec- tronic documents. (18) Unit F also is in charge of all administrative and regulated docu- ments, such as certificates, tax statements, Medical records, Permits, and Educational Records. Unit F also guards the anonymous pooling and voting process. Whenever appropriate, Unit F prepares and transmits such docu- ments directly into the Vault of the ICV, using strong encryption, and mul- tiple high-security features.
(19) and (20) Unit F (Regulations) shares with Unit F (Law Enforcement) and Unit G (Taxes, Fees and Tariffs) Information in real time, to detect any asymmetric problems. Other Features of Unit F.
Unit F has Omni Knowledge of the status and whereabouts of all money (every unit of currency has its own IPv6 number), all certificates, permits, academic records, healthcare records, titles, and any other regulated documents. Unit F possesses also a copy of every ICV in the system, and therefore can reinstate any lost, destroyed or stolen ICV by using the last known status and content of the ICV, which is always up-to-date to the last transaction. All units of money, and documents, which have been compromised, are immediately retired, and if reap pearing anywhere, known to be fraudulent, and its user will be targeted for investi- gation/arrest for handling, or attempting to use lost or stolen money or documents.
The access to Unit F is highly restricted, and can only be excessed under very strict and predefined procedures by the system itself, and predefined purposes. The sys tem is built to give maximum privacy to individuals, by restricting people from accessing information without consent of the individual itself, and selecting, who can see what and when (money, credit ratings, tax returns, permits, certificates, ac- ademic records, healthcare records, licenses, police records, security clearances, ti tles, and other regulated records).
Any transaction which constitutes a crime or violation of regulation is automatically stopped. For example, a minor at age 15 cannot buy alcohol, or cigarettes, or a blind person cannot receive a driver license, etc.
In connection with Fig. 8, additional features of the present invention related to vehicle, plane and vessel ownership/operations are mentioned.
Regulatory authority has also the master registry of all land, sea and air registrations of its country’s cars, trucks, road-going machinery, air planes, and river, lake and sea vessels.
Legal Owner must apply for registration in form of encrypted token in the ICV - Ownership, Record, Title Unit. Copy of titles and/or registrations together with any restrictions against its operations and ownership of all related legal and commercial transactions (for example a loan by the bank against a vehicle is recorded inside both, the ownership Token and the registration Token) all tokens are in most current copy together with all its history stored at the regulatory Authority (Unit D and Unit
F).
Only a registered operator in the Registration token can operate a vehicle Unit, re- gardless of ownership. Permission to operate a vehicle must be set by the regulatory Authority (Unit D and Unit F) based on valid license to operate such vehicle.
Rightful owners of any vehicle, plane or vessel can allow use of such owned unit to a 3rd party, if title has no restriction in the token to prevent 3rd. party use, or if legal owner has no right, due to license validity issues, he still can authorize 3rd parties to operate such Vehicle. Registration processes are conducted on the same system as money is, and therefore only take seconds to conclude.
If no restriction recorded by a 3rd party, owner/operator can issue a temporary reg- istration request of any of its legally owned Units for a temporary registration to legally operate the Unit for a set time and date window and geographical area by a 3rd party. 3rd party will receive temporary 3rd party registration token automati cally in 3rd parties’ ICV.
Additionally regulatory can request for vehicles technology, to biometrically vali date any operators registration before the engine starts.
Regulatory can issue to temporary visitors of country or foreigners living long-term in country a none-citizen ICV permit as down-load which will have all features included, regulatory authority decides to provide.
Additional Functions, Solved Problems and Features of the ICV and the GVU Sys tem are given below.
All ICV units have location Service, which can be shown optionally to a 3rd party, but they are mandatory enabled by the regulatory authority, to validate operations, and impose restrictions.
Regulatory Authority can collect fees, taxes, permits and levies always through the ICV to ICV money flow, always at transaction time. Regulatory Authority has therefore a more direct and transaction related way to fulfil tax revenue needs on all levels, locally and federally.
By any country changing to the herein described system of Taxation, a) the country can remove the need to charge and enforce the payments of income tax, b) reduces nearly all administrative costs, c) taxes more fairly,
d) receives revenue instantly, rather than with great delays, e) eliminates tax evasion, f) eliminates nearly all financial fraud between system users, g) reduces crime extensively.
All individuals, all companies, all NGOs and all institutions have ICV Units. When the ICV is registered to an organization, more then one authorized user can be reg- istered at the Regulatory Authorities to a ICV device. Ultimately, each individual is responsible for its own transactions which are recorded in the history records of the Unit D and Unit F. of the Regulatory Authorities. The financial responsible ad- ministrator of record is able to give permits to registered individuals of a organiza tion to be registered.

Claims

Claims
1. A coin token, characterized in that
it is related to predefined knowledge, and
represents a coin of a predefined currency.
2. The coin token of claim 1, characterized in being implemented as an en crypted computational object, comprising information, and having a unique IPv6 number such that it is transactable via a communications network
3. The coin token of claim 2, characterized in that
it is addressable and usable by specifically dedicated programs which have the ability to read the information comprised in the coin token and/or to write information into the coin token.
4. A knowledge coin vault device, comprising
a memory for storing information relating to a virtual crypto currency, means for interaction with a user via biometric features of the user.
5. The knowledge coin vault device of claim 4, further comprising
a base set of embedded software instructions, which cannot be erased or altered by unauthorized third parties without destroying the device.
6. The knowledge coin vault device of claim 4, wherein the interaction com prises a transaction of virtual crypto currency.
7. The knowledge coin vault device of one of claims 4 to 6, further comprising encrypted Smart Apps for communicating with third party hosted process servers to receive, instruct and transfer currency.
8. The knowledge coin vault device of one of claims 4 to 7, being adapted for processing a coin token of one of claims 1 to 3.
9. A method of establishing a money transaction using at least one knowledge coin vault device, KCV, of one of claims 4 to 8, comprising the following steps: upon arrival of a network call of a caller at a dedicated COM Port (1) mod- ule;
negotiating a peer-to-peer session with a second knowledge coin vault de- vice; logging, by the COM1 module caller info and Ipv6, and comparing the caller IPv6 to the list of permitted IPv6 numbers to start ses- sion, or block the call; if session is to start, sending information peer-to-peer encrypted for external verification to C OM2 ; starting, by COM2, a peer-to-peer session with a third party server to request verification that an authentic transaction request call was made; when positive check comes back from the third party server, passing, by COM1, session to a session mapping module, else, call is automatically re- ported to third party server as intrusion attempt, and all relevant data is trans- mitted to third party server and transaction is terminated; parking, by a session mapping module, original session together with token info in a session hold module, creating a new session and passing new info only to Global Security frame to wait for new token belong to new session to appear; passing, by the session mapping module, session to user biometric ID check (BIDC) module.
calling, by BICD, the useron device to report a session request, upon user acceptance, sending session with token to a COM port manage- ment module on order to facilitate an interactive session part together with the user.
10. The method of claim 9, wherein the COM port management performs the following steps:
sending session requests to a local security frame, the session being selected from one of
Standardized Document INFO, being installing or updating or erasing of licenses, permits, titles, certificates, academic records
money
- public polling and voting
healthcare records of the user or user’s minor children;
the local security frame facilitating communication with the KCV; - exchanging, by a vault core security frame module, security procedure and passing session request to transaction corridor for implementation of request together with user interactive selections;
after concluding interactive session by user, calling, by the core security frame module, local security frame module, and clearing session for passing to COM port management and outbox module.
11. The method of claim 10, further comprising sending, by the local security frame module, money, votes, documents and/or applications, and/or medical records, to the session client in the out- box; and waking up, by the outbox module, the session in global security frame.
PCT/EP2019/069704 2018-07-20 2019-07-22 Integrated monetary system based on network technology WO2020016457A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
EP19744665.1A EP3811311A1 (en) 2018-07-20 2019-07-22 Integrated monetary system based on network technology

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US201862701056P 2018-07-20 2018-07-20
US62/701,056 2018-07-20

Publications (1)

Publication Number Publication Date
WO2020016457A1 true WO2020016457A1 (en) 2020-01-23

Family

ID=67439205

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/EP2019/069704 WO2020016457A1 (en) 2018-07-20 2019-07-22 Integrated monetary system based on network technology

Country Status (2)

Country Link
EP (1) EP3811311A1 (en)
WO (1) WO2020016457A1 (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4006795A1 (en) 2020-11-27 2022-06-01 ZOE Life Technologies AG Collaborative big data analysis framework using load balancing

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9177313B1 (en) * 2007-10-18 2015-11-03 Jpmorgan Chase Bank, N.A. System and method for issuing, circulating and trading financial instruments with smart features

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9177313B1 (en) * 2007-10-18 2015-11-03 Jpmorgan Chase Bank, N.A. System and method for issuing, circulating and trading financial instruments with smart features

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
ENJIN: "Why We Developed the Most Secure Mobile Crypto Wallet in the World", 19 January 2018 (2018-01-19), XP055630981, Retrieved from the Internet <URL:https://blog.enjincoin.io/why-we-developed-the-most-secure-mobile-crypto-wallet-in-the-world-6acb6887ea67> [retrieved on 20191011] *
ENJIN?: "Enjin Coin Smart cryptocurrency for gaming", 26 September 2017 (2017-09-26), XP055631046, Retrieved from the Internet <URL:https://whitepaper.io/document/390/enjin-coin-whitepaper> [retrieved on 20191011] *

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
EP4006795A1 (en) 2020-11-27 2022-06-01 ZOE Life Technologies AG Collaborative big data analysis framework using load balancing
WO2022112539A1 (en) 2020-11-27 2022-06-02 Zoe Life Technologies Ag Collaborative big data analysis framework using load balancing

Also Published As

Publication number Publication date
EP3811311A1 (en) 2021-04-28

Similar Documents

Publication Publication Date Title
CA2741408C (en) Systems and methods for processing transactions with online merchants
US8832809B2 (en) Systems and methods for registering a user across multiple websites
US8224753B2 (en) System and method for identity verification and management
US20060047605A1 (en) Privacy management method and apparatus
CN101140648A (en) Method for bank bill online authorisation and off line trading
CN103745397A (en) System and method for realizing electronic transaction risk control based on position scene identification
US11049202B2 (en) Emergency services/virtual travel wallet
CN114549194A (en) Right asset management service platform based on block chain and implementation method thereof
BR112013010092B1 (en) systems and network authentication method
KR102028286B1 (en) Remittance and withdraw management system based on real name account and method thereof
CN108428135A (en) Auth method
KR20210120249A (en) Transaction methods and systems that utilize based of block-chain technology to trade creative assets such as works of art using smart contracts and to track them to implement creator&#39;s resale royalty Right in a transparent and fair manner
Ismail Electronic land administration system in Malaysia: The need for new enabling provisions
EP3811311A1 (en) Integrated monetary system based on network technology
Jones Data Breaches, Bitcoin, and Blockchain Technology: A Modern Approach to the Data-Security Crisis
Sepec Slovenian Criminal Code and Modern Criminal Law Approach to Computer-related Fraud: A Comparative Legal Analysis
Stuhlmiller Mitigating virtual money laundering: An analysis of virtual worlds and virtual currencies
Rajpal et al. Frauds in Banking Sector in India: Analysis and Preventive Measures
Alliance Privacy and Secure Identification Systems: The role of smart cards as a privacy-enabling technology
KR102007431B1 (en) System and method for checking the truth to application information for automatic withdrawal registration
Rasel Blockchain in e-government: Case of Bangladesh
Naqvi E-commerce: general challenges and strive in combating e-frauds
Date Policy Detail
Ahmed Convention on Identity Crime
Toftegaard ID-fraud mitigation-A proposal of an EoI evaluation system operationalizing common objectives in ID proofing

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 19744665

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

ENP Entry into the national phase

Ref document number: 2019744665

Country of ref document: EP

Effective date: 20210222