WO2021075080A1 - Système d'exploitation et procédé d'exploitation d'une monnaie numérique souveraine au moyen d'un identifiant - Google Patents

Système d'exploitation et procédé d'exploitation d'une monnaie numérique souveraine au moyen d'un identifiant Download PDF

Info

Publication number
WO2021075080A1
WO2021075080A1 PCT/JP2020/021503 JP2020021503W WO2021075080A1 WO 2021075080 A1 WO2021075080 A1 WO 2021075080A1 JP 2020021503 W JP2020021503 W JP 2020021503W WO 2021075080 A1 WO2021075080 A1 WO 2021075080A1
Authority
WO
WIPO (PCT)
Prior art keywords
user
information
operation system
identifier
data
Prior art date
Application number
PCT/JP2020/021503
Other languages
English (en)
Inventor
Jyuichiro NODA
Original Assignee
Loch Energy, Ltd.
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Loch Energy, Ltd. filed Critical Loch Energy, Ltd.
Publication of WO2021075080A1 publication Critical patent/WO2021075080A1/fr

Links

Images

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/008Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols involving homomorphic encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/02Banking, e.g. interest calculation or account maintenance
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present disclosure relates to an exemplary operation system and operation method of sovereign digital currency with an identifier, and, in particular, to a system and method for issuance of a non-anonymous sovereign digital currency operable to validate KYC of sovereign digital currency user by an authorized third party without data decryption, in other words, not revealing any personal data under an encryption scheme which achieve a full homeomorphism.
  • PPDM Principal Preserving Data Mining
  • FHE fully homomorphic encryption
  • PTL 1 discloses partitioning of data.
  • a system is desired to provide digital credit with trusted KYC data to be validated by an authorized third party without revealing input personal information of sovereign digital currency, and to ensure opt-in privacy, quasi anonymous usage as cash.
  • the system is also desired to satisfy the requirements for public validity and confidentiality protection originally to be conflicted each other.
  • an objective of the present invention is to provide a sovereign digital currency operation system and operation method, and further optionally estimate numerically the creditability of KYC through homomorphic computation of a credit rate scoring.
  • a system is desired to provide digital credit with trusted KYC data to be validated by an authorized third party without revealing input personal information of sovereign digital currency, and to ensure opt-in privacy, quasi anonymous usage as cash.
  • the system is also desired to satisfy the requirements for public validity and confidentiality protection originally to be conflicted each other.
  • a sovereign digital currency which encompasses credit creation/transfer means
  • ID two user identifier
  • VID verified identifier
  • Either ID entails the personal information of same subject masked by homomorphic computation. It is also desired that each party can access the information at each layer according to its authorized rank, for example some specific parties such as so-called validator are grant limited access to the similarity index value of input data, while cannot directly access a plurality of personal data. And furthermore, it allows to validate the trust of identifier through matching each personal-data-associated ID with the VID though homomorphic calculation without retrospectively retrieving input data, even from the remote validation nodes in foreign countries.
  • a general embodiment of the present invention relates to an operation system for a sovereign digital currency with a user identifier comprising: an encryption unit configured to encrypt user profile information of a user using a sovereign digital currency, by using a homomorphic encryption scheme; an identifier generating unit to generate (the first) user identifier corresponding to encrypted user profile; a storage configured to store the user identifier with corresponding user profile information encrypted; an output unit configured to output the user identifier obtained.
  • a more specific embodiment of the present invention is the sovereign digital currency operation system described above, wherein the user profile information includes at least one of personal attributes of the user, personal credit information, personal location information, business office information, management information, equipment and operating conditions of manufacturing facilities, information on hypothecated assets, already issued government bonds information and macroeconomic indexes of government bond issuing countries, and transactional information.
  • Another embodiment is the operation system for a sovereign digital currency with user identification wherein a reference unit configured to receive a user profile from trusted third party which identify the user to provide KYC, to match with user profile previously received, an encryption unit configured to encrypt user profile information of a user using a sovereign digital currency, by using a homomorphic encryption scheme an identifier generating unit to generate (the second) user identifier including KYC information coupled with who and/or which has provided KYC; a storage configured to store the (the second) user identifier; a output unit configured to output (the second) user identifier.
  • Still another embodiment is the operation system for a sovereign digital currency with user identification wherein a validation unit to confirm coincidence of user profile in homomorphically encrypted scheme included in (the first) user identifier with (the second) identifier.
  • Yet another embodiment is the operation system for a sovereign digital currency with user identifier wherein a scoring unit configured to process the creditability of KYC included in (the second) identifier to generate credit score; a storage configured to store the credit rating score with corresponding identifier; an output unit configured to output the credit rating score.
  • Another embodiment is the sovereign digital currency operation system according wherein the credit rating score is an index for correctness or incorrectness of KYC existence or non-existence of a target person, execution of a procedure for refreshing and/or terminating information including the KYC information, or involvement in illegal act such as money laundering and terrorist finance.
  • the credit rating score is an index for correctness or incorrectness of KYC existence or non-existence of a target person, execution of a procedure for refreshing and/or terminating information including the KYC information, or involvement in illegal act such as money laundering and terrorist finance.
  • Another embodiment is the sovereign digital currency operation system wherein a scoring unit to process the creditability of KYC with user profile and/ or transaction history to calculate credit rating score which is an index for investments, loans, credit grants, or escrow.
  • Another embodiment is the sovereign digital currency operation system according wherein the scoring unit uses a lower order polynomial obtained by linearly approximating a nonlinear function when computing the rating score by using deep learning.
  • Another embodiment is the sovereign digital currency operation system according further comprising a classifier configured to learn training data including user profile information and rating scores encrypted with the fully homomorphic encryption scheme, in a state that the user profile information is encrypted.
  • Another embodiment is the sovereign digital currency operation system further comprising a learning unit configured to adjust approximation of a model in machine learning in the classifier to a function.
  • Another embodiment is the sovereign digital currency operation system wherein part of an overall operation of the model for computing an inverse matrix is computed by a matrix operation by another server having another decryption key, and the sovereign digital currency operation system receives a computation result.
  • Another embodiment is the sovereign digital currency operation system according wherein the output unit discloses the rating score obtained, and the user profile information encrypted is stored in the storage without disclosing to outside.
  • a more practical embodiment is the sovereign digital currency operation system further comprising a hashing unit configured to hash identifier with homomorphically encrypted personal data, and add the hashed identifier in a block for a blockchain to store the block in the blockchain.
  • An embodiment of the present invention provides the sovereign digital currency operation system comprising an encryption server including the encryption unit and connected to a location of a client including the user of the sovereign digital currency; an evaluation server including the scoring unit and computing the rating score; a training server including a classifier configured to learn training data including user profile information and rating scores encrypted with the fully homomorphic encryption scheme, in a state that the user profile information is encrypted; an API server configured to control processing of the encryption server, the evaluation server and the training server; and a server configured to communicate with an external data source.
  • An embodiment of the present invention provides a sovereign digital currency operation method comprising: encrypting user profile information of a user using a sovereign digital currency, by using a fully homomorphic encryption scheme, storing the user profile information encrypted; processing the user profile information in an encrypted state to compute a rating score related to financial transactions; and outputting the first and/or the second identifier and/or credit rating score obtained.
  • FIG. 1 is a block diagram illustrating data flow of an operation system of sovereign digital currency with a user identifier according to the present embodiment.
  • FIG. 2 is a functional block diagram illustrating a configuration of an operation system of a sovereign digital currency with a user identifier according to the present embodiment.
  • FIG. 3 is a functional block diagram illustrating a configuration of an operation system of a validation system of KYC according to the present embodiment.
  • FIG. 4 illustrates a basic concept about structural risk to cause illicit proceeds such as money laundering.
  • FIG. 5 is a diagram for illustrating a substantial risk of existing financial and monetary systems.
  • FIG. 6 illustrates a diagram of a hardware configuration of the sovereign digital currency operation system according to the present embodiment.
  • FIG. 1 is a block diagram illustrating data flow of an operation system of sovereign digital currency with a user identifier according to the present embodiment.
  • FIG. 2 is a functional block diagram illustrating a configuration of an operation system of a sovereign digital currency with a user identifier according to the present embodiment
  • FIG. 7 illustrates a logical block diagram of a processor of the sovereign digital currency operation system according to the present embodiment.
  • FIG. 8 is a flowchart illustrating basic concept of the present embodiment.
  • FIG. 9 is a diagram illustrating a relationship between a client and a server in the present embodiment.
  • FIG. 10 is a flowchart illustrating an example of processing performed by a model training module.
  • FIG. 11 illustrates a diagram to compute an inverse matrix by another part of server.
  • FIG. 12 is a logical block diagram for storing of personal data encrypted with full homomorphic encryption in a blockchain.
  • FIG. 13 illustrates a block with the personal data encrypted with a secret key.
  • FIG. 14 illustrates a block with the verified identifier encrypted with a secret key.
  • FIG. 15 is a logical block diagram illustrating conceptual flow of an operational system of sovereign digital currency for a user validation.
  • Validation and privacy protection risk - CBDC is Anonymous as same as real cash and prepared money, lacks any information about KYC Identification that meets AML/CFT compliance in it.
  • the compliance relevant logwork depends on third parties amongst all only domestic intermediaries at each transaction, such as a commercial bank under the control of the Central bank in particular Foreign parties cannot access the information related to KYC identification to validate it.
  • CBDC does not involve jurisdiction required to take care higher risk profile.
  • SDC design principle of SDC is for example advocated by Joule consortium as follows. It should be well prioritized in accordance with strategic goal based on the country specific background which includes the legal framework, current status of payment system, level of technical literacy and so on.
  • CBDC or SDC the clux of matter is how to recover or improve the pecuriality of money which faces challenge now.
  • the Sumer token is interpreted as a receipt of stock, more specifically, livestock represented by sheep.
  • the tokenized receipt served as a ledger of accounting record that ensured the right of token holder to save and retrieve his proprietary asset.
  • Shumer token can be said to have a substantial pecuniary as money: (1) Receipt for securing the property in predictable future, through bridging the value between present ownership and forward delivery. (2) Ledger of accounting record to clarify numerically the amount of asset to be stored. (3) Legal tender in which the obligor such as depository could not refuse the settlement of underlying liability. (4) Liquidity by employing a standard and definite form of token.
  • Sumer token Backing to Sumer token, as we acknowledge, it was featured by four dimensions of money: the receipt for storing value, the ledger for recording account, the legal tender for enforceability and the transferability for transaction.
  • Such attributes taught us Sumer money is analogue to what we call credit with securing value not to what we call cash or medium of exchange, because it primarily represented the credit of token holder to receive his asset, namely what made it money was bridging credit (of token holder) with demand for value (of sheep).
  • the blog points out six possible risks: (1) The bank's mediation function becomes unnecessary. (2) Combining financial services and information services creates a new exclusive monopoly. (3) Capital flight from weaker currencies occurs. (4) Capital is diverted to money laundering and terrorist finance. (5) The gain on issuance of currencies, i.e., seigniorage disappears. (6) Policy makers is required to strengthen consumer protection and financial stabilization.
  • Social media are a treasure of information about individual behavior, preferences, and social characteristics. By positioning such information as life logs and analyzing the information in association with purchase history, GPS data, and the like, patterns between their own attributes and behavior that are even unknown to the person himself/herself are found. Furthermore, its potential is in proportion to the amount of collected data and the computational capability, and more recently, to the progress of the learning capability on the computer side, and is unlimited. Among them, currency transactions may provide an optimal source of information for product recommendation and conversion to advertising. Therefore, it can be understood without analyzing big data that service providers do not leave this point. The concerns above is based on that, from the past bad data management of data breach for more than 50 million persons occurred in 2017 and others, it would be possible to save a great deal of trouble in the future if the actions are now decided to be problematic.
  • a mirror plays an essential part as “third-party identifier “to give you the first identity in infancy.
  • a mirror can be said to be an ideal apparatus to generate identification in a universal and furthermore quasi-digital manner.
  • Identity constitutes three-layer structure, i.e., includes Natural Identity by which you distinguish yourself or your daughter distinguishes you from others by watching a mirror, Private Identity by which company or school distinguishes you through issuing credential, and finally Legal Identity by which a governmental body distinguishes you in a legally stipulated manner, for example. It would cause a great confusion by crossing the different layers without clear distinction for sake of establishing a kind of universal KYC top on trustworthy network claimed.
  • KYC is preferably be limited for purpose to assert that an identity holder is capable to acquire credit at a distance at the same time to eliminate illegal behaviors such as AML as well as CTF, otherwise it would be gripped by much confusion that make it impractical as following.
  • the embodiment avoids various implicit behaviors (e.g., money laundering) caused by providing a sovereign digital currency with an anonymity.
  • the embodiment does not allow the user profile data to be presented to even the issuer of the sovereign digital currency and to the algorithm to furnish an environment in which users can anonymously use the sovereign digital currency.
  • the profile data and the transaction data are encrypted and converted into general data in a form of similarity index vale with a distinctive serial number and VID. Therefore, it is not possible to retrospectively specify the original data of explanatory variables by calculation. Further, even if the explanatory variables are found, it is not possible to associate the explanatory variables with an individual user itself on more upstream.
  • the present embodiment relates to issuing and operation systems, apparatus, computer software, methods for sovereign digital currency with a user identifier to identity who exactly hold it, and to whom exactly transfer it, namely in which a source and destination of transfer of the currency can be traced back in a verifiable manner, while simultaneously protect user information from exposing to even for an issuer of sovereign digital currency.
  • the present embodiment to provide sovereign digital currency with a user identifier contains KYC data in a form of a homomorphically calculated and encrypted plural user profile data. Encrypted scheme fully conceals the original user information for ensuring de-fact opt-in privacy of sovereign digital currency user.
  • the issuing and operation system may be referred to as a sovereign digital currency operation system, an operation system for a sovereign digital currency, and the like in the embodiments.
  • Another specific embodiment relates to issuing the combination of two kinds of user identifier; a first identifier associated with homomorphically encrypted user information of a sovereign digital currency user presented by a form of serial number (ID), the second identifier associated with the information about who and when identify the subject in a trusted manner, namely, in compliance with legal framework and relevant guideline.
  • the second identifier is enough verifiable by a third party, alternatively called as a verified identifier (VID).
  • the VID is to be issued limitedly to a verifier itself and(or) for example, if necessary, to a validation node of the authorized third party, while, not presented to sovereign digital currency user itself to hamper data falsification and manipulation by the user itself and/or insider attack.
  • an issuing and operation system presents the ID and VID on a network and delivers them through an API in response to a query, for example, adds the ID and VID to a block of private blockchain with distributed ledger system through hashing them to build block of private blockchain which make it more immutable and accountable. It may be, for example, applied to cross-border money transfer by retrieving blockchain information. In the case, cross-border money transfer can be validated on the condition that the first ID coincidents with the second (VID). It could be helpful to discourage money launder to try to transfer money offshore through anonymous instruments.
  • the issuing and operation system is, for example, configured to present a quantitative risk score to calculate deviation from standard as to risk due to the fraud and fault of KYC.
  • KYC risk scoring routine starts with reception of risk information from multiple third parties and partitions them into accidents not due to KYC risk and KYC risk, and the latter is to be further broken down to segmented behaviors such as simple fault (error or neglect of refreshing), an involvement to crime includes identity theft, account takeover, swindle, money laundering and terrorist finance.
  • the risk scoring module processes KYC risk at three different layers; first risk score is associated with total population of country wherein sovereign digital currency in particular is used, second risk score is associated with of a segment of each issuer of KYC belongs to such as public authority, bank, exchange, attorney and so on, third and final risk score is associated with individual management of KYC, for example when and who (and how) certify the identifiable natural person to issue KYC exactly.
  • the issuing and operation system is, for example, configured to process a financial risk score to determine comprehensive credit from the viewpoints of bankability of sovereign digital currency user, in which the creditability related to KYC is estimated as a part of the financial creditability of user for credit supply.
  • the issuing and operation system includes a scoring module configured to perform credit rating related to credit or investments while the data for credit rating is encrypted, an encryption training module including a classifier configured to input the user data being encrypted, to perform learning about scoring, and to find a solution of an inference by using a gradient descent method or a matrix operation with an inverse matrix calculation, an external cooperation module including an application programming interface (API) server configured to present the converted score to a client(s), and a decryption module configured to decrypt the data by using a private key paired with a public key in the fully homomorphic encryption.
  • API application programming interface
  • the present embodiment relates to an operational and operation system, apparatus, computer software, methods for sovereign digital currency with identifier, that comprises, for example, a reference module configured to refer to KYC data received from multiple institutions with personal data applied by an applicant of digital user, a partitioning module (partition module) configured to issue data, KYC data and management data, an HE module configured to process input data to be homomorphically encrypted, an identifier (serial number) generating module configured to issue the identifier (ID), a verified identifier (VID) generating module configured to issue the second identifier or VID, a decryption module configured to decrypt each of the ID and VID, an API module configured to communicate with an external party.
  • a reference module configured to refer to KYC data received from multiple institutions with personal data applied by an applicant of digital user
  • partitioning module partitioning module
  • HE module configured to issue data, KYC data and management data
  • an HE module configured to process input data to be homomorphically encrypted
  • a sovereign digital currency operation system includes, for example, an extraction module configured to select and extract, from KYC data, data to be concealed among sovereign digital currency user information, an encryption module configured to encrypt the data to be concealed by applying fully homomorphic encryption (fully homomorphic public key encryption), a scoring module configured to perform credit rating related to credit or investments while the data for credit rating is encrypted, an encryption training module including a classifier configured to input the user data being encrypted, to perform learning about scoring, and to find a solution of an inference by using a gradient descent method or a matrix operation with an inverse matrix calculation, an external cooperation module including an application programming interface (API) server configured to present the converted score to a client(s), and a decryption module configured to decrypt the data by using a private key paired with a public key in the fully homomorphic encryption.
  • the sovereign digital currency operation system ensures anonymous use of a sovereign digital currency, i.e.
  • the definition of “currency” in the present embodiment satisfies the following three conditions at the same time, no matter who is issue of currency, for example.
  • the currency itself is transferable each other (while credit cards, for example, only can represent just claim to transfer money at bank account).
  • the currency intends to indicate value (while gold, for example, does not intend to indicate value).
  • the currency in the present embodiment is compatible with other settlement means including fiat currency (while point mileage, for example, can be exchanged for specific goods or services, but cannot be exchanged for money).
  • Another definition of “digital” currency in the present embodiment is a currency of which information relating to ownership, transfer, or the like is electromagnetically recorded in an accountable manner through a connection of a terminal or the like to a communication network.
  • the currency may be backed by a collateral value of credit or another financial assets.
  • non-anonymous sovereign digital currency is a sovereign digital currency of which a user or a holder can be specified without referring to a bank account.
  • the sovereign digital currency itself may be a popular name that broadly encompasses, for example, cryptocurrency, virtual currency, cards, point cards, and the like.
  • the sovereign digital currency operation system is, as an example, a system for issuing a sovereign digital currency when an applicant is certificated and identified in a legally verified manner.
  • the issuer of the sovereign digital currency may be a central bank, a P2P (Peer to Peer) network scheme, or a P2P network scheme including an administrator.
  • P2P Peer to Peer
  • the sovereign digital currency operation system is not limited to the system described above.
  • FIG. 2 is a block diagram illustrating a configuration of the sovereign digital currency operation system and data flow according to the present embodiment.
  • the sovereign digital currency operation system includes, for example, a reference module 1, a partitioning module 2, encryption modules 3, a scoring module 4, a model training module 5, a first identifier generating module 6 a second identifier generating module 7, decryption modules 8 and 9, and external cooperation modules 10 and 11.
  • the sovereign digital currency operation system also includes one or more databases 14 to 19.
  • the sovereign digital currency operation system also includes a validation module 12 and a hashing module 13.
  • the reference module 1 receives personal data contributed by an applicant of sovereign digital currency in a fixed entity form on web site, and then receives KYC (know your customer) data of the same applicant which is certificated and verified by a third party (also referred to as a verifier) to match them.
  • KYC knowledge your customer
  • the partitioning module 2 partitions received data into KYC data, and other data such as verifier and management data.
  • the encryption module 3 (also referred to as an HE module or an FHE module) encrypts the user profile data partitioned by the partitioning module 2 by applying fully homomorphic public key encryption. This conceals the user profile data and process of identification data.
  • the encryption module 2 may store the encrypted user profile data in the database 14.
  • the scoring module 4 calculates deviation score from standard to estimate creditability of KYC in which all the personal data of digital user is masked by fully homomorphic encryption scheme without decryption.
  • the obtained score may be stored in the database 15.
  • the model training module 5 inputs the user KYC data and other data being encrypted and learns an algorithm related to scoring from the input data set.
  • the model training module 5 can reduce an inference error and achieve higher inference accuracy.
  • the encryption module 3 includes a key generation device and an encryption device.
  • This module may be a computer coupled by wireless and/or wired communication means.
  • the computer includes a processor for performing arithmetic processing, a communication interface, an input and output interface, a storage medium, and a program to be executed by a component for program execution.
  • the first identifier generating module 6 process KYC data of each user to issue a corresponding identifier (the first identifier), for example, in a form of serial number (also referred to as ID).
  • the first identifier generating module 6 may store the ID in the database 16.
  • the second identifier generating module 7 processes KYC data of each user coupled with the data of KYC verifier and management data to issue the second identifier (also referred to as verified identifier or VID).
  • the second identifier module may store the VID in the database 17.
  • the decryption module 8 decrypts the ID with a private key paired with the fully homomorphic public key.
  • the decryption module 7 may store the ID in the database 18.
  • the decryption module 9 decrypts the VID with a private key paired with the fully homomorphic public key.
  • the decryption module 9 may store the VID in the database 19.
  • the external cooperation module 10 (also referred to as an application programming interface (API) module) includes, for example, an API server.
  • the external cooperation module 10 outputs to a terminal(s) of a third party such as each user of sovereign digital currency.
  • API application programming interface
  • the external cooperation module 11 (also referred to as an application programming interface (API) module) includes, for example, an API server.
  • the external cooperation module 11 outputs to a terminal(s) of a third party such as each verifier who originally issued KYC to each user of sovereign digital currency.
  • FIG. 3 illustrates a diagram of hardware configuration and data flow as regards validation module.
  • the validation module 12 which is furnished with a third party such as a validator, receives the first ID and the second ID (VID) through respective external corporation modules, and then calculates to identify the coincidence of personal data homomorphically encrypted in the ID and personal data homomorphically encrypted in the VID. If they are coincident, the ID can be trusted, and further validated. In addition to that the validator knows who or which verifier provided the VID, however, cannot access the personal data concealed in a HE scheme.
  • a third party such as a validator
  • FIG. 6 illustrates a diagram of a hardware configuration of the sovereign digital currency operation system according to the present embodiment.
  • FIG. 7 illustrates a configuration diagram of the sovereign digital currency operation system constituted with a single apparatus.
  • each of the apparatuses may include the constitution illustrated in FIG. 7.
  • the sovereign digital currency operation system includes, for example, a processor 21, a storage 22, an input unit 23, an output unit 24, and a communication controller 25.
  • the processor 21 is, for example, a processor such as a central processing unit (CPU) and executes processing in the sovereign digital currency operation system.
  • the storage 22 corresponds to the databases 14 to 19 in FIG. 2.
  • the storage 22 includes a storage medium such as a random-access memory (RAM), and/or a storage medium such as a hard disc drive (HDD) and a flash memory.
  • the storage 22 stores various types of data and information, and stores a program read and executed by the processor 21.
  • the input unit 23 is, for example, a keyboard, a mouse, a touch panel, or the like.
  • the input unit 23 inputs training data for machine-learning.
  • the output unit 24 is, for example, a display unit for displaying information such as the credit score obtained by the credit scoring module 4, a transmission unit for transmitting information to the outside via the communication controller 25, a browsing management unit for allowing access to the information from the outside via the communication controller 25, or the like.
  • the output unit 24 corresponds to the API module 10 and 11 illustrated in FIG. 2.
  • the output unit 24 may be a component (block) that discloses at least part of information in the databases 18 and 19 illustrated in FIG. 2 to the outside.
  • the communication controller 25 is an interface with communication networks.
  • the communication controller 25 performs communication control in accordance with a predetermined communication protocol.
  • FIG. 7 illustrates a logical block diagram of the processor 21 of the sovereign digital currency operation system according to the present embodiment.
  • FIG. 7 illustrates a configuration diagram of a processor when the sovereign digital currency operation system is constituted with a single apparatus.
  • each of the apparatuses may include one or more units of the processor illustrated in FIG. 7.
  • the units of the processor illustrated in FIG. 7 may be located in any of the apparatuses in a distributed manner.
  • the processor 21 includes, for example, an encryption unit 31, a scoring unit 32, a learning unit (training unit) 33, an ID generating unit 34, a decryption unit 35, a data partitioning unit 36, a reference unit 37, a validation unit 38, and a hashing unit 39.
  • the encryption unit 31 corresponds to the HE modules 3 illustrated in FIG. 2.
  • the scoring unit 32 corresponds to the credit scoring module 4 illustrated in FIG. 2.
  • the learning unit (training unit) 33 corresponds to the model training module 5 illustrated in FIG. 2.
  • the ID and VID generating unit 34 corresponds to the ID and VID modules 6 and 7 illustrated in FIG. 2.
  • the decryption unit 35 corresponds to the decryption modules 8 and 9 illustrated in FIG. 2.
  • the data partitioning unit 36 corresponds to the partitioning module 2 illustrated in FIG. 2.
  • the reference unit 37 corresponds to the ID and VID reference module 1 illustrated in FIG. 2.
  • the validation unit 38 corresponds to the validation module 12 illustrated in FIG. 3.
  • the hashing unit 39 corresponds to the hashing module 13 illustrated in FIG. 12.
  • the user profile data obtained by the reference module 1 is processed as follows: data that is entered in accordance with an entry form on a web site requested by an issuer, by an operation of a user, from a terminal such as a personal computer (PC), a mobile terminal, or a tablet; and data transmitted (provided) from a third party (organization, entity) such as a public or private credit information agency, and an ID information management agency (India, Bangladesh) in a predetermined form.
  • a third party organization, entity
  • a public or private credit information agency such as a public or private credit information agency, and an ID information management agency (India, Bangladesh) in a predetermined form.
  • the data entered in accordance with the input form may include, in a case that the user is an individual, gender, address, age, place of work, length of service, contract status of public insurance, annual income, loans, credit history, or the like.
  • an ID of guarantor, a certificate of assets held, or the like may be included.
  • the data may include corporate registration information, a profit and loss statement (PL), a balance sheet (BS), or the like.
  • PL profit and loss statement
  • BS balance sheet
  • the data may include an ID of a party concerned, facility conditions, and operating conditions.
  • the data may be various types of data, and may be determined by an issuer of an electronic means of settlement in general cases.
  • the partitioning module 2 selects and extracts the user profile information from the KYC information.
  • the information belonging to KYC generally includes name, address, date of birth, or the like, but in some cases, the information further includes a telephone number, place of birth, an identification number, a taxpayer identification number, a marital status, or the like.
  • Biometric data, advanced electric signature, and the like may be included in the information belonging to KYC, for example, depending on the progress of technology, the local technical literacy, the preparations of regulations, or social demands related thereto.
  • a method of acquiring KYC data, methods of identification, certification and verification, a method of storing the KYC data, and a form and process in these methods may be different depending on timing, and the country or area to which the issuer or the user belongs, i.e., the preparation status of the relevant laws and regulations (including anti-money laundering (AML) and combating the financing of terrorism (CFT)).
  • AML anti-money laundering
  • CFT combating the financing of terrorism
  • some countries force a face-to-face procedure for opening a new bank account in the bank, and further combines sending of identification card or paper and the receipt of a transfer-prohibited postal item, to intentionally avoid completing the procedure only in an electronic procedure nor on-line.
  • a quasi-identifier such as an address and a passport number from which the person is immediately identified is also classified into the KYC.
  • Inquiry about the registered person is made to lists of AML, CFT, economic sanctions, antisocial forces, and the like, and the registration is rejected if the registered person matches the lists.
  • Filtering/screening is performed in accordance with predetermined conditions, and an KYC is provided to each party passing the filtering/screening (FIG. 1).
  • Identifier also referred to as ID
  • the degree of trust on KYC entirely depends on such institutes which perform the identification. Identifying the issuer of KYC is a key issue to determine the trust of it, when it is verified. The management data such as when the identification is performed, refreshed (updated) and terminated. Getting and presenting the identification issued and verified by the institute allows beneficially economically each user to be able to acquire the proprietary credit. It draws our attention to that the identification which provides such credit varies according to who issues the KYC, and what regulated framework of the nation or region is, particularly in term of its enforceability.
  • a verified identifier (Verified ID, VID, also referred to as a second ID) is issued to each user in addition to the ID (also referred to as a first ID) described above.
  • VID is not presented to each user to hamper possible manipulation and falsification by anyone but presented to a verifier and if necessary, a third party (cf. FIGS. 1 and 2).
  • the VID represents a verified identifier and makes it clear which institute has performed the identification, and when the identification is performed, for example, the identification may be a refresh or termination of the identification. As described above, it is associated with the user profile information encrypted in an HE encryption scheme.
  • the combination of ID and VID is possible to give great advantage and improved efficiency to a circulate KYC verifiable, without revealing a plurality of input of individual information and furthermore the trust of KYC could be confirmed by the only coincidence of ID with VID and the latter is traceable to legally authorized institutes.
  • the present embodiment provides an integrated KYC in a verified and traceable manner by a third party, without revealing personal data for example, and thus allows cross-border money transfer.
  • a system is desired to provide digital credit with trusted KYC data to be validated by an authorized third party without revealing input personal information of sovereign digital currency, and to ensure opt-in privacy, quasi anonymous usage as cash.
  • the system is also desired to satisfy the requirements for public validity and confidentiality protection originally to be conflicted each other.
  • a sovereign digital currency which encompasses credit creation/transfer means
  • ID two user identifiers
  • VID verified identifier
  • Either ID entails the personal information of same subject masked by homomorphic computation. It is also desired that each party can access the information at each layer according to its authorized rank, for example some specific parties such as so-called validator are grant limited access to the similarity index value of input data though homomorphic calculation, while cannot directly access a plurality of personal data. And furthermore, it allows to validate the trust of identifier through matching each personal-data-associated ID with VID though homomorphic calculation without retrospectively retrieving input data, even from the remote validation nodes in foreign countries.
  • FIG. 12 is a logical block diagram for storing of personal data encrypted with full homomorphic encryption in a blockchain.
  • FIG. 13 illustrates a block with the personal data encrypted with a secret key.
  • FIG. 14 illustrates a block with the verified identifier encrypted with a secret key.
  • the sovereign digital currency operation system further includes a hashing module 13 configured to hash personal data encrypted with full homomorphic encryption.
  • the hashing module 13 adds the hashed personal data in a block for a blockchain (e.g., private blockchain), and stores the block in the blockchain.
  • the hashing module 13 may be a hashing unit configured with the processor 21 illustrated in FIGS. 2 and 3.
  • the hashing module 13 may be included in a server with other modules (units) or in a dedicated server.
  • the ID and/or the VID with encrypted personal data homomorphically encryption scheme is to be stored in a blockchain through hashing, for example by using SHA256 (Secure Hash Algorithm 256-bit).
  • SHA256 Secure Hash Algorithm 256-bit
  • This further boosts a security level through integration of encryption of personal data with a distributed manner of a blockchain.
  • Encrypted personal data is to be shared by all the nodes on a blockchain or by some nodes thereon.
  • the personal data of the former could be administrated in an appropriate way by an exchanger or institute where the buyer purchases the sovereign digital currency. Otherwise, although it does not matter technically, a buyer (or investor) is viewed as a part of users. Therefore, the personal data of buyer (or investor) is to be administrated in the same encryption scheme as that for a sovereign digital currency user.
  • each KYC remarkably depends on a verifier coupled with regulation with where the verifier belongs to, and hence each V-ID’s trust is desirable to be estimated properly through scoring.
  • the degree of trust of the V-ID itself in other words, the existence/non-existence of the person, the accuracy of profile information constituting KYC, the negligence of refresh and/or termination, moreover the involvement in interfaring AML or other illegal act is different depending on the V-ID. Therefore, the credit of the V-ID itself may be calculated using machine learning under the FHE scheme together with the credit score of the user, and the result of the scoring may be presented to a third party.
  • a risk scoring module processes the credit risk due to KYC in accordance with three layers; first is associated with total population of country in particular, second is associated with segment of sector belongs to each verifier such as bank sector and exchange sector, third is associated with more individual factors, shown by FIG. 3.
  • the user profile data selectively extracted from the KYC data is encrypted with a public key of the applied fully homomorphic encryption.
  • a mathematical method for generating the public key differs from an encryption generation method used in secure shell (ssh) and the like.
  • the user profile data is encrypted, and after that, is classified into a set of encryption sequences for each predetermined parameter, based on an algorithm such as a predetermined function (hereinafter, also referred to as a scoring algorithm) to generate the credit score.
  • a predetermined function hereinafter, also referred to as a scoring algorithm
  • the fully homomorphic encryption is a protocol in which addition and multiplication are possible in the encrypted state.
  • the user profile data is encrypted by using fully homomorphic encryption (FHE), or encrypted by using somewhat HE (SHE) or labeled linear homomorphic encryption (LabLHE) that are derived from the FHE.
  • FHE fully homomorphic encryption
  • SHE somewhat HE
  • LHE labeled linear homomorphic encryption
  • personal data or the like may be encoded from one bit to a plurality of bits in a plain text space by using a BGV scheme, and encrypted while keeping an integer data type.
  • the encryption method is not limited to these methods. Encryption by which transform into an approximate polynomial is possible may be appropriately selected taking into consideration of the depth of circuits, compatibility with algorithms, scalability, and the impact on throughputs due to the presence or absence of boot strapping.
  • the scoring algorithm described above may be determined by the issuer of the sovereign digital currency (or the operator of the sovereign digital currency operation system) from the types and amounts of items of the input data, determined by each local condition. For example, when a credit status of individual is to be scored, linear regression analysis may be used. Note that the scoring algorithm is not limited to these, and an appropriate algorithm capable of obtaining the score based on the user profile data may be used.
  • least squares method is used to a multi-variable line formed by a group of data points on the XY plane to find a solution.
  • variables can be obtained by calculations of an inner product and an outer product.
  • a nonlinear function is needed for performing the learning. Therefore, the nonlinear function is approximated to a lower order polynomial to obtain a solution in the encrypted state.
  • Matching processing is performed on the calculated credit score and a predetermined parameter, and the is suability of an electronic currency and the issuance conditions (limit amount, fee, interest rate, and the like) that are associated with the parameter corresponding to the score is generated.
  • the is suability and the issuance conditions are presented to the client.
  • the scoring algorithm calculates correlation and similarity from a large number of user profile information, and analyzes the relationship between data.
  • reinforcement learning is performed to achieve higher inference accuracy.
  • a classifier is structured which encrypts a training data set acquired from a financial institution or the like with the fully homomorphic encryption in the same manner as described above, and inputs the training data set in the encrypted state to a training server to perform reinforced learning.
  • An inference server receives an input of the user characteristics while being encrypted and outputs the inference result of the credit score, based on a predetermined learning model.
  • the algorithm is optimized and/or updated in the encrypted state, for the purpose of minimizing the risk of a bad debt in a case of scoring the credit status for individual.
  • the inference error i.e., a distance between the single inference result and the correct solution
  • the correct answer of the inference may be given by training data or may be input as appropriate.
  • a stochastic gradient descent method is used for the reinforcement learning, but the present embodiment is not limited thereto.
  • part of an overall operation for computing an inverse matrix may be computed by a matrix operation by another server having another decryption key, and only the result may be returned to the source server (FIG. 5).
  • the source server may receive the result of the inverse matrix. In this manner, a solution may be obtained by a matrix operation and the number of computations may be reduced, which increases the speed.
  • the server of the third party obtains a model by using a matrix and a vector in which a random factor is included in the original data and encrypts the result (W*) to returns the encrypted result to the source server.
  • the server may perform the following operations while the original model being encrypted to obtain a solution.
  • the computing result (reward data) in a reward computing module is decoded by the decryption module 8, 9 with a private key paired with the fully homomorphic public key.
  • the reward data is then provided to the user(s) and the investor(s) as reward data via an API server and an external data cooperation server (external cooperation server).
  • the sovereign digital currency operation system may be constituted with a plurality of servers (apparatuses).
  • the sovereign digital currency operation system may include an encryption server including the encryption unit and connected to a location of a client including the user of the sovereign digital currency, an evaluation server including the scoring unit and computing the rating score, a training server including a classifier, an API server configured to control processing of the encryption server, the evaluation server and the training server, and a server (communication server) configured to communicate with an external data source.
  • the sovereign digital currency operation system may further include a hashing server including the hashing unit (hashing module).
  • a sovereign digital currency which is issued non-anonymously, in other words, issued on the assumption that attribute information of a user is acquired, and can be used anonymously by concealing private information.
  • the effects described herein are illustrative, and the embodiments is not limited to the effects.
  • An operation system for a sovereign digital currency with a user identifier including: an encryption unit configured to encrypt user profile information of a user using the sovereign digital currency, by using a homomorphic encryption scheme; an identifier generating unit configured to generate the user identifier corresponding to encrypted user profile information; a storage configured to store the user identifier with corresponding user profile information encrypted; and an output unit configured to output the user identifier generated.
  • user profile information e.g., KYC
  • a digital currency e.g., sovereign digital currency
  • Supplementary Note 2 The operation system according to Supplementary Note 1, wherein the user profile information includes at least one of personal attributes of the user, personal credit information, personal location information, business office information, management information, equipment and operating conditions of manufacturing facilities, information on hypothecated assets, already issued government bonds information and macroeconomic indexes of government bond issuing countries, and transactional information.
  • the operation system further includes a reference unit configured to receive second user profile information from a trusted third party which identifies the user to provide KYC (Know Your Customer) information, to match with the first user profile information; and a second identifier generating unit configured to generate a second user identifier indicating at least one of an entity by which the KYC information is certified and data or time when the KYC information is certified, wherein the storage stores the second user identifier, and the output unit outputs the second user identifier.
  • the results of matching in the reference unit may be used for other processing.
  • the second identifier generating unit may generate the second user identifier in a case that the second user profile information from the trusted third party matches with the first user profile information.
  • Supplementary Note 4 The operation system according to Supplementary Note 3, further including a validation unit configured to confirm coincidence of the first user profile information encrypted in the homomorphic encryption scheme indicated by the first user identifier with the second user profile information indicated by the second identifier. In this regard, if the first user identifier is tampered with, the first user identifier and the second user identifier does not coincide. Therefore, such falsification can be detected.
  • Supplementary Note 5 The operation system according to any one of Supplementary Notes 1 to 4, further including a scoring unit configured to generate a credit rating score, based on creditability of the KYC information associated with the second user identifier, wherein the storage stores the credit rating score with the second user identifier, and the output unit outputs the credit rating score.
  • a scoring unit configured to generate a credit rating score, based on creditability of the KYC information associated with the second user identifier, wherein the storage stores the credit rating score with the second user identifier, and the output unit outputs the credit rating score.
  • Supplementary Note 7 The operation system according to any one of Supplementary Notes 1 to 4, further including a scoring unit configured to calculate credit rating score which is an index for investments, loans, credit grants, or escrow, based on creditability of KYC information with the user profile and/or transaction history.
  • a scoring unit configured to calculate credit rating score which is an index for investments, loans, credit grants, or escrow, based on creditability of KYC information with the user profile and/or transaction history.
  • Supplementary Note 9 The operation system according to any one of Supplementary Notes 1 to 8, further including a classifier configured to learn training data including user profile information and rating scores encrypted with the fully homomorphic encryption scheme, in a state that the user profile information is encrypted.
  • Supplementary Note 10 The operation system according to Supplementary Note 9, further including a learning unit configured to adjust approximation of a model in machine learning in the classifier to a function.
  • Supplementary Note 13 The operation system according to any one of Supplementary Notes 1 to 12, further including a hashing unit configured to hash the user identifier with homomorphically encrypted personal data, and add the hashed identifier in a block for a blockchain to store the block in the blockchain.
  • a hashing unit configured to hash the user identifier with homomorphically encrypted personal data, and add the hashed identifier in a block for a blockchain to store the block in the blockchain.
  • Supplementary Note 14 The operation system according to any one of Supplementary Notes 1 to 13, including an encryption server including the encryption unit and connected to a location of a client including the user of the sovereign digital currency; an evaluation server including the scoring unit and computing the credit rating score; a training server including a classifier configured to learn training data including user profile information and rating scores encrypted with the fully homomorphic encryption scheme, in a state that the user profile information is encrypted; an API server configured to control processing of the encryption server, the evaluation server and the training server; and a server configured to communicate with an external data source.
  • An operation method for a sovereign digital currency with a user identifier including: encrypting user profile information of a user using the sovereign digital currency, by using a homomorphic encryption scheme; generating the user identifier corresponding to encrypted user profile information; storing the user identifier with corresponding user profile information encrypted; and outputting the user identifier generated.
  • the personal data encrypted in FHE scheme is stored on a blockchain in the embodiments.
  • an identifier (Verified Identifier, V-ID) is issued.
  • Examples of the user include a fund raiser and an investor.
  • the user may be individual, and may be a legal entity such as a company.
  • the homomorphic encryption scheme may be other encryption scheme within the scope of the present invention is not changed.
  • the present invention is useful, for example, as a social system for issuing a sovereign digital currency, identifying KYC in its operation, meets the AML, and protecting privacy for individual users.

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Business, Economics & Management (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Accounting & Taxation (AREA)
  • Physics & Mathematics (AREA)
  • Bioethics (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • General Engineering & Computer Science (AREA)
  • Development Economics (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Strategic Management (AREA)
  • Technology Law (AREA)
  • General Business, Economics & Management (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

La présente invention concerne un système d'exploitation et un procédé d'exploitation pour une monnaie numérique souveraine au moyen d'un identifiant, et, en particulier, un système et un procédé d'émission d'une monnaie numérique souveraine non anonyme avec des données KYC de confiance devant être validées par un tiers autorisé, sans révéler de données personnelles d'entrée, assurant une confidentialité à option d'adhésion. Plus particulièrement, la présente invention concerne une monnaie numérique souveraine avec un identifiant vérifiable et immuable par émission de la combinaison de deux types d'identifiants avec un ensemble de mêmes données personnelles homomorphes ; les premières correspondant à l'identifiant d'un certain utilisateur, les secondes correspondant à un identifiant vérifié (VID), impliquant des données pertinentes en termes de l'identification du sujet et du moment d'identification du sujet sous la forme de KYC, et en outre, des données chiffrées homomorphes étant ajoutées, par hachage, à un bloc de chaîne de blocs privé pour un partage secret. Un dispositif de validation de tiers autorisé peut confirmer la confiance numérique du KYC par la coïncidence entre un ensemble de données personnelles chiffrées dans l'ID et le VID sans déchiffrement de données, c'est-à-dire sans exposer rétrospectivement des données personnelles d'entrée. De plus, un mode de réalisation de l'invention fournit un score d'évaluation de risque permettant d'évaluer un risque de crédit dû à la fraude et/ou à une défaillance de l'identification de KYC associée à trois couches différentes.
PCT/JP2020/021503 2019-10-18 2020-05-30 Système d'exploitation et procédé d'exploitation d'une monnaie numérique souveraine au moyen d'un identifiant WO2021075080A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
PCT/JP2019/041169 WO2021075057A1 (fr) 2019-10-18 2019-10-18 Système d'exploitation de monnaie numérique et procédé d'exploitation utilisant un schéma de chiffrement entièrement homologique
JPPCT/JP2019/041169 2019-10-18

Publications (1)

Publication Number Publication Date
WO2021075080A1 true WO2021075080A1 (fr) 2021-04-22

Family

ID=75537516

Family Applications (2)

Application Number Title Priority Date Filing Date
PCT/JP2019/041169 WO2021075057A1 (fr) 2019-10-18 2019-10-18 Système d'exploitation de monnaie numérique et procédé d'exploitation utilisant un schéma de chiffrement entièrement homologique
PCT/JP2020/021503 WO2021075080A1 (fr) 2019-10-18 2020-05-30 Système d'exploitation et procédé d'exploitation d'une monnaie numérique souveraine au moyen d'un identifiant

Family Applications Before (1)

Application Number Title Priority Date Filing Date
PCT/JP2019/041169 WO2021075057A1 (fr) 2019-10-18 2019-10-18 Système d'exploitation de monnaie numérique et procédé d'exploitation utilisant un schéma de chiffrement entièrement homologique

Country Status (1)

Country Link
WO (2) WO2021075057A1 (fr)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023039247A1 (fr) * 2021-09-10 2023-03-16 Sports Data Labs, Inc. Système et procédé de collecte, d'évaluation et de transformation de données animales destinées à être utilisées en tant que monnaie numérique ou garantie pour acquérir une contrepartie

Families Citing this family (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426206B (zh) * 2022-11-07 2023-03-24 中邮消费金融有限公司 一种基于同态加密技术的图反欺诈能力赋能的方法及系统

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110131122A1 (en) * 2009-12-01 2011-06-02 Bank Of America Corporation Behavioral baseline scoring and risk scoring
US20160350648A1 (en) * 2014-11-07 2016-12-01 Microsoft Technology Licensing, Llc. Neural networks for encrypted data
EP3477527A1 (fr) * 2017-10-31 2019-05-01 Twinpeek Gestion de la confidentialité
EP3509006A1 (fr) * 2016-08-30 2019-07-10 Soramitsu Co., Ltd. Système de partage d'informations
EP3553995A1 (fr) * 2017-12-15 2019-10-16 Seoul National University R & DB Foundation Dispositif terminal pour effectuer un chiffrement homomorphique, dispositif serveur pour traiter un texte chiffré de celui-ci, et procédés associés

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20150363770A1 (en) * 2014-06-16 2015-12-17 Bank Of America Corporation Cryptocurrency Transaction Payment System

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20110131122A1 (en) * 2009-12-01 2011-06-02 Bank Of America Corporation Behavioral baseline scoring and risk scoring
US20160350648A1 (en) * 2014-11-07 2016-12-01 Microsoft Technology Licensing, Llc. Neural networks for encrypted data
EP3509006A1 (fr) * 2016-08-30 2019-07-10 Soramitsu Co., Ltd. Système de partage d'informations
EP3477527A1 (fr) * 2017-10-31 2019-05-01 Twinpeek Gestion de la confidentialité
EP3553995A1 (fr) * 2017-12-15 2019-10-16 Seoul National University R & DB Foundation Dispositif terminal pour effectuer un chiffrement homomorphique, dispositif serveur pour traiter un texte chiffré de celui-ci, et procédés associés

Non-Patent Citations (6)

* Cited by examiner, † Cited by third party
Title
DATTA ANWITAMAN: "Blockchain in the Government Technology Fabric", 21 May 2019 (2019-05-21), XP055802310, Retrieved from the Internet <URL:https://arxiv.org/pdf/1905.08517.pdf> *
DYRAGA PIOTR: "Keeping Secrets in Public Places with Homomorphic Encryption", 24 May 2019 (2019-05-24), XP055802308, Retrieved from the Internet <URL:https://blog.keep.network/keeping-secrets-in-public-places-withhomomorphic-encryption-49995979acbc> *
FRANCISCO LOUZADA; ANDERSON ARA; GUILHERME B. FERNANDES: "Classification methods applied to credit scoring: A systematic review and overall comparison", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 5 February 2016 (2016-02-05), 201 Olin Library Cornell University Ithaca, NY 14853, XP080681826 *
KIRUTHIKA, M. T. AND SELVI, C.: "Ensure Data Privacy in Back Propagation Neural Network Learning over Encrypted Cloud Data", INTERNATIONAL JOURNAL OF INNOVATIVE RESEARCH IN COMPUTER AND COMMUNICATION ENGINEERING; ABSTRACT, 1. INTRODUCTION, III. PROBLEM FORMULATION, vol. 3, no. 5, May 2015 (2015-05-01), pages 4366 - 4372, XP009527497, ISSN: 2320-9801 *
SATOH KAYO S, YOSHIKAWA NOBUHIRO, YANG WON-JIK, NAKANO YOSHIAKI: "Whole learning algorithm for feedforward neural network by Moore-Penrose Generalized Inverse", TRANSACTIONS OF JSCES, 24 September 1999 (1999-09-24), XP055802305 *
VARUN RANGANATHAN; S. NATARAJAN: "A New Backpropagation Algorithm without Gradient Descent", ARXIV.ORG, CORNELL UNIVERSITY LIBRARY, 201 OLIN LIBRARY CORNELL UNIVERSITY ITHACA, NY 14853, 25 January 2018 (2018-01-25), 201 Olin Library Cornell University Ithaca, NY 14853, XP081211641 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2023039247A1 (fr) * 2021-09-10 2023-03-16 Sports Data Labs, Inc. Système et procédé de collecte, d'évaluation et de transformation de données animales destinées à être utilisées en tant que monnaie numérique ou garantie pour acquérir une contrepartie

Also Published As

Publication number Publication date
WO2021075057A1 (fr) 2021-04-22

Similar Documents

Publication Publication Date Title
Cai Triple‐entry accounting with blockchain: How far have we come?
Nian et al. Introduction to bitcoin
Franco Understanding Bitcoin: Cryptography, engineering and economics
Vora Cryptocurrencies: Are disruptive financial innovations here?
Schar et al. Bitcoin, blockchain, and cryptoassets: A comprehensive introduction
Astuti et al. Cryptocurrency blockchain technology in the digital revolution era
Godfrey-Welch et al. Blockchain in payment card systems
Garg Blockchain for real world applications
WO2021075080A1 (fr) Système d&#39;exploitation et procédé d&#39;exploitation d&#39;une monnaie numérique souveraine au moyen d&#39;un identifiant
Reddy COINSENSUS: The need for uniform national virtual currency regulations
Valente Bitcoin and virtual currencies are real: Are regulators still virtual
Liu et al. An efficient strategy to eliminate malleability of bitcoin transaction
Önkan et al. The Impact of Blockchain Technology on Tax and Accounting Practices
Selimović et al. CRYPTOCURRENCY-ADVANTAGES, DISADVANTAGES, DETERMINANTS: CASE OF BITCOIN.
Hutchison Acceptance of electronic monetary exchanges, specifically bitcoin, by information security professionals: A quantitative study using the unified theory of acceptance and use of technology (UTAUT) model
Pryzmont An empirical study of how Bitcoin related incidents impact its price volatility
Ashfaq et al. Central Bank Digital Currencies and the Global Financial System: Theory and Practice
Bhatt What’s new in computers: Cryptocurrencies: An introduction
Kamaleshwaran et al. Digital Certification–Certification Credential as Non Fungible Token (NFT)
Joy The Future of Crypto-Currency in the Absence of Regulation, Social and Legal Impact
Guadamuz et al. Bitcoin: The Wrong Implementation of the Right Idea at the Right Time
Madakam et al. The role of cryptocurrencies in business
Menard Cryptocurrency: Collateral for Secured Transactions?
Singh 'Show me the money’: a discussion of the cryptocurrency market and its potential regulation in South Africa.
Orlando Exploring Crypto & Blockchain in Finance: Present & Future

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20875941

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

NENP Non-entry into the national phase

Ref country code: JP

122 Ep: pct application non-entry in european phase

Ref document number: 20875941

Country of ref document: EP

Kind code of ref document: A1