WO2018204970A1 - Monetary transaction method and system - Google Patents
Monetary transaction method and system Download PDFInfo
- Publication number
- WO2018204970A1 WO2018204970A1 PCT/AU2018/050418 AU2018050418W WO2018204970A1 WO 2018204970 A1 WO2018204970 A1 WO 2018204970A1 AU 2018050418 W AU2018050418 W AU 2018050418W WO 2018204970 A1 WO2018204970 A1 WO 2018204970A1
- Authority
- WO
- WIPO (PCT)
- Prior art keywords
- tokens
- transferor
- transferee
- token
- monetary
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Ceased
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING OR CALCULATING; COUNTING
- G06K—GRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/04—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the shape
- G06K19/041—Constructional details
- G06K19/047—Constructional details the record carrier being shaped as a coin or a gambling token
-
- A—HUMAN NECESSITIES
- A44—HABERDASHERY; JEWELLERY
- A44C—PERSONAL ADORNMENTS, e.g. JEWELLERY; COINS
- A44C21/00—Coins; Emergency money; Beer or gambling coins or tokens, or the like
Definitions
- the present invention relates to monetary transaction tokens, methods and systems.
- the invention has been developed primarily as a secure means for transferring physical monetary tokens and will be described hereinafter with reference to this application. However, it will be appreciated that the invention is not limited to this particular field of use.
- Cryptographic systems such as bitcoin, provide traceability of the exchanges, however the bitcoin tokens are virtual and have no inherent value.
- a physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; and a predetermined amount of defined material disposed within the physical body; wherein tampering with the defined material disposed within the physical body causes the wirelessly readable identifier to cease being wirelessly readable.
- a physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; and a predetermined amount of defined material disposed within the physical body; wherein tampering with the physical body causes the tampering to become evident.
- a physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and one or both of a hologram and optically variable ink disposed within the physical body.
- the means for carrying the wirelessly readable identifier is a radio frequency identification (RFID) or near field communication (NFC) chip.
- RFID radio frequency identification
- NFC near field communication
- the physical monetary token for conducting monetary transactions according to any of the preceding claims wherein the wirelessly readable identifier includes a digital signature.
- the token for conducting monetary transactions according to any of the preceding claims wherein the rigid body is made from thermosetting polymer.
- the token for conducting monetary transactions according to any one of claims 1 to 6, wherein the defined material is a base metal.
- a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including : providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and operating the transferee device thereby to read, from the wirelessly readable identifiers of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature; providing data representative of the public key of the
- a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature notifying the transferee device of the request by the transferor device to alter the ledger; requesting the transfere
- each of the one or more physical tokens includes a tampering means, such that tampering with the defined material disposed within the physical body causes the wirelessly readable identifier to cease being wirelessly readable.
- each of the one or more physical tokens includes one or both of a hologram and optically variable ink disposed within the physical body.
- a system for conducting monetary transactions including : a plurality of tokens wherein each token is issued by an issuer and each token includes: a unique identifier; a predetermined amount of defined material; and a unique digital signature wherein the unique digital signature includes a public key; and an information repository for storing information about each token, the information including: the public key of each token's digital signature; the quantity and type of defined material in each token; the issuer of each token ; and the unique identifier of each token; a transaction ledger for recording transactions of tokens between users of the system; and a transaction ledger management system configured to perform a transaction method to effect the transaction of tokens from a transferor to a transferee.
- the method includes a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including : providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and operating the transferee device thereby to read, from the wirelessly readable identifies of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital
- the method includes a method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature; and altering the ledger to record the transfer of tokens from the
- each token includes an RFID or NFC chip for transmitting the unique digital signature of the token.
- the system for conducting monetary transactions according to claim 16 wherein the precious metal is a platinum group metal.
- a system for conducting monetary transactions according to any one of claims 13 to claim 22 wherein during an exchange of tokens from a transferor to a transferee, wherein each of the transferor and transferee have unique digital signatures which include respective public keys, the repository stores one or more of: the time of a transaction; the digital signatures of the exchanged tokens; the unique identifiers of the exchanged tokens; the public key of the digital signature of the transferee; and the digital signature of the transferor.
- a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; and operating the transferee device thereby to read, from the wirelessly readable identifiers of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature; providing data representative of the public key of the transferor device's digital signature; delivering, to the transferor device
- a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature altering the ledger to record the transfer of tokens from the transferor to the transferee.
- One embodiment provides a computer program product for performing a method as described herein.
- One embodiment provides a non-transitory carrier medium for carrying computer executable code that, when executed on a processor, causes the processor to perform a method as described herein.
- One embodiment provides a system configured for performing a method as described herein.
- any one of the terms comprising, comprised of or which comprises is an open term that means including at least the elements/features that follow, but not excluding others.
- the term comprising, when used in the claims should not be interpreted as being limitative to the means or elements or steps listed thereafter.
- the scope of the expression a device comprising A and B should not be limited to devices consisting only of elements A and B.
- Any one of the terms including or which includes or that includes as used herein is also an open term that also means including at least the elements/features that follow the term, but not excluding others. Thus, including is synonymous with and means comprising.
- exemplary is used in the sense of providing examples, as opposed to indicating quality. That is, an "exemplary embodiment” is an embodiment provided as an example, as opposed to necessarily being an embodiment of exemplary quality.
- module refers to a software component that is logically separable (a computer program), or a hardware component.
- the module of the embodiment refers to not only a module in the computer program but also a module in a hardware configuration.
- the discussion of the embodiment also serves as the discussion of computer programs for causing the modules to function (including a program that causes a computer to execute each step, a program that causes the computer to function as means, and a program that causes the computer to implement each function), and as the discussion of a system and a method.
- the phrases "stores information,” “causes information to be stored,” and other phrases equivalent thereto are used.
- modules may correspond to the functions in a one-to-one correspondence.
- one module may form one program or multiple modules may form one program.
- One module may form multiple programs.
- Multiple modules may be executed by a single computer.
- a single module may be executed by multiple computers in a distributed environment or a parallel environment.
- One module may include another module.
- connection refers to not only a physical connection but also a logical connection (such as an exchange of data, instructions, and data reference relationship).
- predetermined means that something is decided in advance of a process of interest.
- predetermined is thus intended to refer to something that is decided in advance of a process of interest in the embodiment. Even after a process in the embodiment has started, the term “predetermined” refers to something that is decided in advance of a process of interest depending on a condition or a status of the embodiment at the present point of time or depending on a condition or status heretofore continuing down to the present point of time. If “predetermined values” are plural, the predetermined values may be different from each other, or two or more of the predetermined values (including all the values) may be equal to each other.
- a statement that "if A, B is to be performed” is intended to mean “that it is determined whether something is A, and that if something is determined as A, an action B is to be carried out”. The statement becomes meaningless if the determination as to whether something is A is not performed.
- system and the term “device” refer to an arrangement where multiple computers, hardware configurations, and devices are interconnected via a communication network (including a one-to-one communication connection).
- system and the term “device” also refer to an arrangement that includes a single computer, a hardware configuration, and a device.
- system and the term “device” have the same definition and are interchangeable with each other.
- the system does not include a social system that is a social "arrangement” formulated by humans.
- the memory devices may include a hard disk, a random-access memory (RAM), an external storage medium, a memory device connected via a communication network, and a ledger within a CPU (Central Processing Unit).
- a CPU Central Processing Unit
- Figure 1 schematically illustrates a system for conducting transactions of physical monetary tokens according to one embodiment of the invention.
- Figure 2 schematically illustrates an exemplary user terminal.
- Figure 3 schematically illustrates an exemplary ledger management system.
- Figure 4A schematically illustrates an exemplary physical monetary token.
- Figure 4B schematically illustrates a profile view of the exemplary physical monetary token of Figure 4A.
- Figure 5A schematically illustrates an exemplary physical monetary token.
- Figure 5B schematically illustrates a profile view of the exemplary physical monetary token of Figure 5A.
- Figure 6 is a schematic representation of a transaction method according to one aspect of the invention.
- Figure 7 is a schematic representation of a transaction method according to one aspect of the invention.
- Figure 8 is a schematic representation of a transaction method according to one aspect of the invention.
- Figure 9 is a schematic representation of a transaction method according to one aspect of the invention.
- a system consisting of hardware and software elements, which are configured to interact in a manner that provides technological infrastructure for supporting the conducting of monetary transactions.
- the monetary transactions (or at least a subset thereof) are conducted using physical monetary tokens, which have some inherent value.
- a publicly accessible database is maintained (and controlled using specially adapted computing infrastructure) to contain various information relating to the tokens, making it possible to verify the authenticity of any individual token.
- the system uses asymmetric cryptographic techniques to identify individual users of the system as well as for identifying physical monetary tokens used for the monetary transactions.
- the cryptographic identification technique involves issuing a unique digital signature to each user and each token.
- the digital signatures include both a public key and a private key.
- the public keys can be disseminated widely and used to identify or specify a user or token in the system.
- the private key by contrast is kept secret and is known only to a user, and in the case of a token is stored on the token in such a way that it cannot be directly read.
- the private key can be used to confirm or authenticate a user's identity to the system, or, in the case of a token, can be used to verify the authenticity of the token.
- Figure 1 is a conceptual modular configuration diagram of a system 100 according to one embodiment.
- the system 1 00 includes at least two users who are represented here by their respective user terminals 102A and 1 02B, at least one physical monetary token 104 and a ledger management system 106.
- one of the users identifies the token being transferred and makes a request 108 to the ledger management system to register the transaction.
- the token is identified by way of a transmission 1 10, which is received by the user terminal and provides information indicative of the tokens digital signature.
- the request 108 to the ledger management system includes the identity of the other user 102B involved in the transaction.
- the ledger management system after receiving the request, transmits an alert 1 12 to the identified user 1 02B of the request 108 by user 102A. After receiving the alert 1 12, the identified user 102B can then selectively accept or reject the request by way of a return transmission 1 14.
- FIG. 200 An exemplary user terminal 200, representative of user terminals 1 02A and 102B from Figure 1 , is shown in greater detail in Figure 2.
- the terminal includes a microprocessor 202, a memory module 204, a communication module 206 and wireless reader hardware 208.
- the microprocessor 202 is configured to execute commands from the user and from computer executable code stored in the memory module 204.
- the memory module 204 is configured to store data related to the use of the monetary transacting system 100.
- the memory module includes an application 21 0 for facilitating the transaction and a user interface module 212 which allows a user to interact with the application.
- the application provides computer executable code/instructions to the microprocessor 202 thereby to control the various hardware components of the terminal.
- the application also relays information between the user interface module 212 and the ledger management system 106, which includes appropriate encryption and decryption, encoding and decoding, digitally signing the message and transmitting and receiving messages to and from the ledger management 106 system respectively.
- the user interacts with the user interface module 212 which allows the user to make a request 214 to amend the transaction ledger 314.
- the user request 1 08 is received from the user interface module 200 by the application 210, which controls the wireless reader 208 to read the wirelessly readable identifier in the physical monetary token thereby identifying the token 104 being transferred.
- the application then combines the request from the user with the token's identity (and in some cases its digital signature) to create a transfer request.
- the application 210 signs the transfer request with the user's digital signature 218 which is also stored in the memory module 204.
- the application 210 controls the transmitter 220 in the communication module 206 to transmit the signed transfer request 108 to the ledger management system 106.
- the ledger management system 106 Upon receipt of the signed transfer request 108, the ledger management system 106 transmits an alert message 1 12 to the other user 102B involved in the transaction.
- the user terminal 102B receives the alert 1 12 through the receiver 222 in the communication module 206.
- the application takes the received alert and provides it to the user inter face module 212 which allows the user to accept or reject the request 224 to register the transaction.
- the user's accept or reject response 224 is input through the user interface module 212, received by the application 21 0 and transmitted back to the ledger management system 106 through the transmitter 220 in the communication module 206.
- the ledger management system 1 06 from Figure 1 is shown again in Figure 3.
- the ledger management system 106 records transactions of physical monetary tokens 104 between users of system 100.
- the system includes a database module 302, a communication module 304 and a microprocessor 306.
- the communication module 304 includes a transmitter 308 and a receiver 310 which allows the ledger management system 106 to communicate with user terminals of system 100. Requests 108 and responses to requests 1 14 are received from the user terminals by the ledger management system 106 through the receiver 310 while alerts 1 12 are sent to the user terminals through the transmitter 308.
- the microprocessor is configured to process computer executable code which is stored in the database module 302.
- the database module 30 is configured to store data such as computer executable code 312 to manage the transaction ledger, the transaction ledger itself 314 as well as the information 31 6 about the physical monetary tokens 104 of system 100.
- the monetary transaction system includes a publicly accessible database.
- the database records information 316 relating to the tokens 104 such as the public key of each token's digital signature, the issuer of a token, the serial number of each token and the quantity and type of material embedded in the token providing the intrinsic value.
- the database is publicly accessible, this does not necessarily mean that all aspects of the database are accessible to everyone. For example, some aspects of the database may be kept private and/or only visible to users of the system.
- the database includes the transaction ledger 314.
- the transaction ledger 314 records information about each transaction such as the time of the transaction, the public key of the digital signature of the transferee of the token or tokens, the digital signature of the transferor of the token or tokens and the serial numbers and digital signatures of the token or tokens being transferred.
- the transaction ledger does not necessarily track the transactions of all tokens, and in some embodiments may restrict tracking to high denomination tokens only. In this case, enough information will still be available in the database to establish authenticity of tokens, although the transactions and therefore ownership of the tokens would not be recorded.
- the database can provide security measures which can be implemented in the system. For example, it may not be possible for a transferor to transfer a token to a transferee if the digital signature or serial number of the token being transferred is not recorded as being owned by the transferor. That is, the information in the transaction ledger would prevent a user from transacting with tokens that do not belong to them. In some embodiments, the transaction ledger may alert other users if a user attempted to transfer a token which did not belong to them.
- the transaction ledger takes the form of a block chain.
- the blockchain may be centrally maintained, only making part of the transaction information publicly available, while the rest of the information is kept private.
- This centrally maintained blockchain has the advantage of maintaining the privacy of users as the number of tokens owned by a given user may be kept secret along with their transactions.
- an open, distributed blockchain structure is used for the transaction ledger.
- the blockchain is maintained on a peer-to-peer network through consensus with each new block containing a hash of the previous block. Since this blockchain structure is not maintained centrally and relies on distributed consensus, it is inherently resistant to modification and therefore provides robust security for the transaction system.
- transaction ledger may be used including a combination of private and public blockchains wherein a user may transfer tokens from the private blockchain to the public blockchain as required.
- tokens acquire their inherent value via the inclusion of valuable materials into the physical structure of the tokens.
- tokens may include various amounts of precious metals such as gold silver or platinum or valuable base metals such as copper or nickel.
- precious metals will be used in higher denomination tokens, while the base metals may be used in the lower denomination tokens.
- the amount and type of metal used in each token will determine the exact denomination assigned to the token. It will be appreciated that other types of material can be used to provide the inherent value to the tokens.
- the token includes some wirelessly readable identifier or means for transmitting the unique digital signature.
- the tokens include RFID or NFC chips or antennas which are capable of digitally signing a transaction, thereby positively identifying the individual token.
- the serial number of each token may be displayed openly on the token and/or be transmitted by the wirelessly readable identifier.
- the wirelessly readable identifier can be used to verify the integrity and authenticity of the token. It will be appreciated that the wirelessly readable identifier is only a means to identify the token and that any other means is also intended to be covered.
- the token may have visual marks, QR codes, bar codes, some contact identification mechanism etc.
- the tokens may also be constructed to include any number of anti-tampering features.
- the valuable material is incorporated into the construction of the wirelessly readable identifier such that removal of the valuable material will cause the wirelessly readable identifier to cease functioning thereby rendering the token unable to be transacted.
- Another anti-tamper feature may be to integrally associate the wirelessly readable identifier with a more fragile material which will decompose when exposed to air or heat thereby destroying the wirelessly readable identifier and rendering the token valueless.
- anti-tampering features such as constructing the physical body of the token from a rigid material which cannot be readily manipulated such as a chemically inert thermosetting polymer, including optically variable inks or holograms on the physical body.
- the anti-tampering feature is such that tampering with the physical body causes the tampering to become evident.
- FIG. 4A illustrates one embodiment of a physical monetary token 400 with comparatively low strength anti-tamper features while Figure 4B shows the same token in profile.
- Flecks of valuable metal 402 which provide the inherent value to the token, are spread randomly throughout the body 404 of the token which is formed from a transparent thermosetting plastic.
- the wirelessly readable identifier 406 is an RFID or NFC chip embedded in the body 404 of the token 400 along with a hologram 408, which is located in the body 404 of the token to prevent damage to the RFID or NFC chip.
- Figure 5A illustrates another embodiment of a physical monetary token 500 with comparatively high strength anti-tamper features along with a greater amount of valuable metal 502 compared to the example of Figure 4A.
- Figure 5B shows the same token in profile.
- the body 504 of the token is again formed from a thermosetting plastic.
- the hologram 506 is distributed between the pieces of valuable metal 502 and an optically variable ink 508 at least partially overlays the valuable metal 502, the hologram 506 and the RFID or NFC chip 510.
- Example methods are described below. These methods are performed based on the operation of computing devices, such as devices configured to operate in the context of the example systems illustrated in Figure 1 and Figure 2.
- Figure 6 illustrates the method if the transfer is initiated 602 by a transferee, who is receiving the tokens from a transferor.
- the transferee begins by identifying the tokens to be transferred 604.
- the identification of the tokens is performed by reading a signal from the wirelessly readable identifier embedded in each of the tokens.
- the wirelessly readable identifier (406 or 510) can be read by any suitable device such as the user terminal 200 or any smart device running an appropriate application and including appropriate hardware.
- the transferee then makes a request to have a transaction ledger altered 606 to record the transaction.
- the transferee includes the serial numbers of the tokens being transferred as well as the public key of the transferor who presently owns the tokens.
- the private key of the digital signature of the transferee is used to authenticate the identification of the transferee at the time of making the request.
- a notification is sent to the transferor 608, reporting that request has been made to alter the transaction ledger.
- the notification includes the identity of the tokens being transferred and requires the transferor to selectively approve the transaction 610.
- the private key of the digital signature of the transferor is then used to digitally sign the response thereby to authenticate and selectively approve the transaction 612.
- the transaction ledger is altered 614 to reflect the transaction thereby concluding the token transfer 616.
- the transferor may reject the transfer, thereby preventing the transaction from occurring 618.
- no notification is sent to the transferor. Instead, the transferor simply sees the transferee's request in the transaction ledger and in response transmits a confirmation message to the ledger thereby effecting the transfer.
- the transferee By supplying the private key 716, the transferee is confirming the transaction thereby allowing the transaction ledger to be altered, in which case the transaction is registered in the ledger 718 and the token is transferred 720. Alternatively, the transferee may reject the transaction thereby preventing the transaction from occurring 722.
- Figure 8 illustrates an alternative embodiment to the method if the transfer is initiated 802 by a transferee, who is receiving the tokens from a transferor.
- the transferee begins by identifying the tokens to be transferred 804.
- the identification of the tokens is performed by reading a signal from the wirelessly readable identifier embedded in each of the tokens.
- the wirelessly readable identifier (406 or 510) can be read by any suitable device such as the user terminal 200 or any smart device running an appropriate application and including appropriate hardware.
- the transferee then generates a request to have a transaction ledger altered 606 to record the transaction.
- the transferor then digitally signs the request 808 which is sent to the ledger management system 810.
- the transaction ledger is altered 812 to reflect and effect the transaction 814.
- Figure 9 illustrates an alternative embodiment to the method if the transfer is initiated 902 by the transferor.
- the transferor requests the transaction ledger be altered 904 to indicate the exchange of tokens has occurred.
- the transferor's identity is authenticated using the transferor's digital signature 906 when making the request.
- the request further includes unique identifiers of the tokens being transferred 908, such as their serial numbers and the public key of the transferee's digital signature 910.
- the transaction ledger is altered 912 and the tokens are transferred 914.
- smart devices such as smart phones and tablets executing an appropriate application could perform the method.
- Such smart devices may be particularly convenient if they also include a means to read the wirelessly readable identifier and include other appropriate hardware.
- certified entities may be permitted to issue tokens.
- the certification of the issuing entities will be controlled centrally by a certifying entity.
- the certifying entity will publish all information relating to certified issuing entities in a publicly accessible location, such as online. Included in the published information will be the public key of the issuing entity, enabling a user of the system to verify the digital signature of the issuing entity.
- the issuing entities are able to register new users by verifying their identity and issuing them a digital signature.
- the issuing entity then publishes the public key of the digital signature in the database, enabling other users to see that the new user's identity has been verified.
- the database therefore provides some degree of confidence that a user's identity has been verified and could potentially allow a user to check whether the identity of all previous owners of a given token can be traced.
- issuing entities may have additional powers to enter various transactions into the transaction ledger. For example, where the previous owner's digital signature is lost or unavailable (e.g. tokens passed from a deceased to an heir), an issuing entity could verify the change of ownership and update the transaction ledger without cooperation from the owner of the tokens.
- Coupled when used in the claims, should not be interpreted as being limited to direct connections only.
- the terms “coupled” and “connected,” along with their derivatives, may be used. It should be understood that these terms are not intended as synonyms for each other.
- the scope of the expression a device A coupled to a device B should not be limited to devices or systems wherein an output of device A is directly connected to an input of device B. It means that there exists a path between an output of A and an input of B which may be a path including other devices or means.
- Coupled may mean that two or more elements are either in direct physical or electrical contact, or that two or more elements are not in direct contact with each other but yet still co-operate or interact with each other.
- any formulas given above are merely representative of procedures that may be used. Functionality may be added or deleted from the block diagrams and operations may be interchanged among functional blocks. Steps may be added or deleted to methods described within the scope of the present invention.
Landscapes
- Physics & Mathematics (AREA)
- General Physics & Mathematics (AREA)
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
Abstract
A system is disclosed, consisting of hardware and software elements, which are configured to interact in a manner that provides technological infrastructure for supporting the conducting of monetary transactions. The monetary transactions (or at least a subset thereof) are conducted using physical monetary tokens, which have some inherent value. A publicly accessible database is maintained (and controlled using specially adapted computing infrastructure) to contain various information relating to the tokens, making it possible to verify the authenticity of any individual token.
Description
MONETARY TRANSACTION METHOD AND SYSTEM
FIELD OF THE INVENTION
[0001] The present invention relates to monetary transaction tokens, methods and systems.
[0002] The invention has been developed primarily as a secure means for transferring physical monetary tokens and will be described hereinafter with reference to this application. However, it will be appreciated that the invention is not limited to this particular field of use.
BACKGROUND
[0003] Any discussion of the background art throughout the specification should in no way be considered as an admission that such art is widely known or forms part of common general knowledge in the field.
[0004] There are several systems for conducting monetary transactions such as bank transfers and physical money exchanges as well as virtual money exchange systems such as bitcoin.
[0005] Bank transfers and physical money exchanges lack traceability. Furthermore, the money exchanged in traditional systems lacks any inherent value.
[0006] Cryptographic systems, such as bitcoin, provide traceability of the exchanges, however the bitcoin tokens are virtual and have no inherent value.
SUMMARY OF THE INVENTION
[0007] It is an object of the present invention to overcome or ameliorate at least one of the disadvantages of the prior art, or to provide a useful alternative.
[0008] According to a first aspect of the invention, there is provided a physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; and a predetermined amount of defined material disposed within the physical body; wherein tampering with the defined material disposed within the physical body causes the wirelessly readable identifier to cease being wirelessly readable.
[0009] According to another aspect of the invention, there is provided a physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; and a predetermined amount of defined material disposed within the physical body; wherein tampering with the physical body causes the tampering to become evident.
[0010] According to a further aspect of the invention, there is provided a physical monetary
token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and one or both of a hologram and optically variable ink disposed within the physical body.
[0011] According to a further aspect of the invention, there is provided the physical monetary token for conducting monetary transactions according to any one of the preceding claims, wherein the means for carrying the wirelessly readable identifier is a radio frequency identification (RFID) or near field communication (NFC) chip.
[0012] According to a further aspect of the invention, there is provided the physical monetary token for conducting monetary transactions according to any of the preceding claims wherein the wirelessly readable identifier includes a digital signature.
[0013] According to a further aspect of the invention, there is provided the token for conducting monetary transactions according to any of the preceding claims wherein the rigid body is made from thermosetting polymer.
[0014] According to a further aspect of the invention, there is provided the token for conducting monetary transactions according to any one of preceding claims, wherein the defined material is a precious metal.
[0015] According to a further aspect of the invention, there is provided the token for conducting monetary transactions according to any one of claims 1 to 6, wherein the defined material is a base metal.
[0016] According to a further aspect of the invention, there is provided a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including : providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and operating the transferee device thereby to read, from the wirelessly readable identifiers of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature; providing data representative of the public key of the transferor device's digital signature; delivering, to the transferor device, a notification representative of the request to alter the ledger; and the operating the transferor device to selectively confirm or reject the request to alter the ledger, wherein the digital
signature of the transferor device is required to confirm or reject the request; and in the case that the transferor device confirms the request to alter the ledger, altering the ledger to record the transfer of tokens from the transferor to the transferee.
[0017] According to a further aspect of the invention, there is provided a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature notifying the transferee device of the request by the transferor device to alter the ledger; requesting the transferee device's digital signature; and in the case that the transferee device provides the digital signature, altering the ledger to record the transfer of tokens from the transferor to the transferee.
[0018] According to a further aspect of the invention, there is provided a method according to claim 9 or claim 10 wherein each of the one or more physical tokens includes a tampering means, such that tampering with the defined material disposed within the physical body causes the wirelessly readable identifier to cease being wirelessly readable.
[0019] According to a further aspect of the invention, there is provided a method according to claim 9 or claim 1 0 wherein each of the one or more physical tokens includes one or both of a hologram and optically variable ink disposed within the physical body.
[0020] According to a further aspect of the invention, there is provided a system for conducting monetary transactions, the system including : a plurality of tokens wherein each token is issued by an issuer and each token includes: a unique identifier; a predetermined amount of defined material; and a unique digital signature wherein the unique digital signature includes a public key; and an information repository for storing information about each token, the information including: the public key of each token's digital signature; the quantity and type of defined material in each token; the issuer of each token ; and the unique identifier of each token; a transaction ledger for recording transactions of tokens between users of the system; and a transaction ledger management system configured to perform a transaction method to effect the transaction of tokens from a transferor to a transferee.
[0021] According to a further aspect of the invention, there is provided a system according to
claim 13 wherein the method includes a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including : providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and operating the transferee device thereby to read, from the wirelessly readable identifies of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature; providing data representative of the transferor device's digital signature; and altering the ledger to record the transfer of tokens from the transferor to the transferee.
[0022] According to a further aspect of the invention, there is provided a system according to claim 13 wherein the method includes a method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature; and altering the ledger to record the transfer of tokens from the transferor to the transferee.
[0023] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to any one of claims 13 to 15 wherein each token includes an RFID or NFC chip for transmitting the unique digital signature of the token.
[0024] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to any one of claims 13 to 15 wherein the defined material is a precious metal.
[0025] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to any one of claims 13 to 15 wherein the defined material is a valuable base metal.
[0026] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to claim 1 6 wherein the precious metal is gold.
[0027] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to claim 16 wherein the precious metal is a platinum group metal.
[0028] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to claim 1 6 wherein the precious metal is silver.
[0029] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to claim 1 7 wherein the precious base metal is copper.
[0030] According to a further aspect of the invention, there is provided the system for conducting monetary transactions according to claim 1 7 wherein the precious base metal is nickel.
[0031] According to a further aspect of the invention, there is provided a system for conducting monetary transactions according to any one of claims 13 to claim 22 wherein during an exchange of tokens from a transferor to a transferee, wherein each of the transferor and transferee have unique digital signatures which include respective public keys, the repository stores one or more of: the time of a transaction; the digital signatures of the exchanged tokens; the unique identifiers of the exchanged tokens; the public key of the digital signature of the transferee; and the digital signature of the transferor.
[0032] According to a further aspect of the invention, there is provided a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; and operating the transferee device thereby to read, from the wirelessly readable identifiers of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature; providing data representative of the public key of the transferor device's digital signature; delivering, to the transferor device, a notification representative of the request to alter the ledger; operating the transferor device to selectively confirm or reject the request to alter the ledger, wherein the digital signature of the transferor device is required to confirm or reject the request; and in the case that the
transferor device confirms the request to alter the ledger, altering the ledger to record the transfer of tokens from the transferor to the transferee.
[0033] According to a further aspect of the invention, there is provided a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature altering the ledger to record the transfer of tokens from the transferor to the transferee.
[0034] One embodiment provides a computer program product for performing a method as described herein.
[0035] One embodiment provides a non-transitory carrier medium for carrying computer executable code that, when executed on a processor, causes the processor to perform a method as described herein.
[0036] One embodiment provides a system configured for performing a method as described herein.
[0037] Reference throughout this specification to "one embodiment", "some embodiments" or "an embodiment" means that a particular feature, structure or characteristic described in connection with the embodiment is included in at least one embodiment of the present invention. Thus, appearances of the phrases "in one embodiment", "in some embodiments" or "in an embodiment" in various places throughout this specification are not necessarily all referring to the same embodiment, but may. Furthermore, the particular features, structures or characteristics may be combined in any suitable manner, as would be apparent to one of ordinary skill in the art from this disclosure, in one or more embodiments.
[0038] As used herein, unless otherwise specified the use of the ordinal adjectives "first", "second", "third", etc., to describe a common object, merely indicate that different instances of like objects are being referred to, and are not intended to imply that the objects so described must be in a given sequence, either temporally, spatially, in ranking, or in any other manner.
[0039] In the claims below and the description herein, any one of the terms comprising, comprised of or which comprises is an open term that means including at least the elements/features that follow, but not excluding others. Thus, the term comprising, when used
in the claims, should not be interpreted as being limitative to the means or elements or steps listed thereafter. For example, the scope of the expression a device comprising A and B should not be limited to devices consisting only of elements A and B. Any one of the terms including or which includes or that includes as used herein is also an open term that also means including at least the elements/features that follow the term, but not excluding others. Thus, including is synonymous with and means comprising.
[0040] As used herein, the term "exemplary" is used in the sense of providing examples, as opposed to indicating quality. That is, an "exemplary embodiment" is an embodiment provided as an example, as opposed to necessarily being an embodiment of exemplary quality.
[0041 ] The term "module" refers to a software component that is logically separable (a computer program), or a hardware component. The module of the embodiment refers to not only a module in the computer program but also a module in a hardware configuration. The discussion of the embodiment also serves as the discussion of computer programs for causing the modules to function (including a program that causes a computer to execute each step, a program that causes the computer to function as means, and a program that causes the computer to implement each function), and as the discussion of a system and a method. For convenience of explanation, the phrases "stores information," "causes information to be stored," and other phrases equivalent thereto are used. If the embodiment is a computer program, these phrases are intended to express "causes a memory device to store information" or "controls a memory device to cause the memory device to store information." The modules may correspond to the functions in a one-to-one correspondence. In a software implementation, one module may form one program or multiple modules may form one program. One module may form multiple programs. Multiple modules may be executed by a single computer. A single module may be executed by multiple computers in a distributed environment or a parallel environment. One module may include another module. In the discussion that follows, the term "connection" refers to not only a physical connection but also a logical connection (such as an exchange of data, instructions, and data reference relationship). The term "predetermined" means that something is decided in advance of a process of interest. The term "predetermined" is thus intended to refer to something that is decided in advance of a process of interest in the embodiment. Even after a process in the embodiment has started, the term "predetermined" refers to something that is decided in advance of a process of interest depending on a condition or a status of the embodiment at the present point of time or depending on a condition or status heretofore continuing down to the present point of time. If "predetermined values" are plural, the predetermined values may be different from each other, or two or more of the predetermined values (including all the values) may be equal to each other. A statement that "if A, B is to be performed" is intended to mean "that it is determined whether something is A, and that if something is determined as A, an action B is to be carried out". The statement becomes meaningless if the determination as to
whether something is A is not performed.
[0042] The term "system" and the term "device" refer to an arrangement where multiple computers, hardware configurations, and devices are interconnected via a communication network (including a one-to-one communication connection). The term "system" and the term "device" also refer to an arrangement that includes a single computer, a hardware configuration, and a device. The term "system" and the term "device" have the same definition and are interchangeable with each other. The system does not include a social system that is a social "arrangement" formulated by humans.
[0043] At each process performed by a module, or at one of the processes performed by a module, information as a process target is read from a memory device, the information is then processed, and the process results are written onto the memory device. A description related to the reading of the information from the memory device prior to the process and the writing of the processed information onto the memory device subsequent to the process may be omitted as appropriate. The memory devices may include a hard disk, a random-access memory (RAM), an external storage medium, a memory device connected via a communication network, and a ledger within a CPU (Central Processing Unit).
BRIEF DESCRIPTION OF THE DRAWINGS
[0044] Embodiments of the invention will now be described, by way of example only, with reference to the accompanying drawings in which :
[0045] Figure 1 schematically illustrates a system for conducting transactions of physical monetary tokens according to one embodiment of the invention.
[0046] Figure 2 schematically illustrates an exemplary user terminal.
[0047] Figure 3 schematically illustrates an exemplary ledger management system.
[0048] Figure 4A schematically illustrates an exemplary physical monetary token.
[0049] Figure 4B schematically illustrates a profile view of the exemplary physical monetary token of Figure 4A.
[0050] Figure 5A schematically illustrates an exemplary physical monetary token.
[0051] Figure 5B schematically illustrates a profile view of the exemplary physical monetary token of Figure 5A.
[0052] Figure 6 is a schematic representation of a transaction method according to one aspect of the invention.
[0053] Figure 7 is a schematic representation of a transaction method according to one aspect of the invention.
[0054] Figure 8 is a schematic representation of a transaction method according to one aspect of the invention.
[0055] Figure 9 is a schematic representation of a transaction method according to one aspect of the invention.
DETAILED DESCRIPTION
Overview
[0056] A system is disclosed, consisting of hardware and software elements, which are configured to interact in a manner that provides technological infrastructure for supporting the conducting of monetary transactions. The monetary transactions (or at least a subset thereof) are conducted using physical monetary tokens, which have some inherent value. A publicly accessible database is maintained (and controlled using specially adapted computing infrastructure) to contain various information relating to the tokens, making it possible to verify the authenticity of any individual token.
[0057] The system uses asymmetric cryptographic techniques to identify individual users of the system as well as for identifying physical monetary tokens used for the monetary transactions. The cryptographic identification technique involves issuing a unique digital signature to each user and each token. The digital signatures include both a public key and a private key. The public keys can be disseminated widely and used to identify or specify a user or token in the system. The private key by contrast is kept secret and is known only to a user, and in the case of a token is stored on the token in such a way that it cannot be directly read. The private key can be used to confirm or authenticate a user's identity to the system, or, in the case of a token, can be used to verify the authenticity of the token.
Example Systems
[0058] Figure 1 is a conceptual modular configuration diagram of a system 100 according to one embodiment. The system 1 00 includes at least two users who are represented here by their respective user terminals 102A and 1 02B, at least one physical monetary token 104 and a ledger management system 106.
[0059] To transact a physical monetary token 104 between users 102A and 102B using the system 100, one of the users, in this case 1 02A, identifies the token being transferred and makes a request 108 to the ledger management system to register the transaction. In this embodiment, the token is identified by way of a transmission 1 10, which is received by the user terminal and provides information indicative of the tokens digital signature. The request 108 to the ledger management system includes the identity of the other user 102B involved in the transaction.
[0060] The ledger management system, after receiving the request, transmits an alert 1 12 to the
identified user 1 02B of the request 108 by user 102A. After receiving the alert 1 12, the identified user 102B can then selectively accept or reject the request by way of a return transmission 1 14.
User terminal
[0061 ] An exemplary user terminal 200, representative of user terminals 1 02A and 102B from Figure 1 , is shown in greater detail in Figure 2. The terminal includes a microprocessor 202, a memory module 204, a communication module 206 and wireless reader hardware 208.
[0062] The microprocessor 202 is configured to execute commands from the user and from computer executable code stored in the memory module 204.
[0063] The memory module 204 is configured to store data related to the use of the monetary transacting system 100. Specifically, the memory module includes an application 21 0 for facilitating the transaction and a user interface module 212 which allows a user to interact with the application. The application provides computer executable code/instructions to the microprocessor 202 thereby to control the various hardware components of the terminal. The application also relays information between the user interface module 212 and the ledger management system 106, which includes appropriate encryption and decryption, encoding and decoding, digitally signing the message and transmitting and receiving messages to and from the ledger management 106 system respectively.
[0064] To transact a physical monetary token 104, the user interacts with the user interface module 212 which allows the user to make a request 214 to amend the transaction ledger 314. The user request 1 08 is received from the user interface module 200 by the application 210, which controls the wireless reader 208 to read the wirelessly readable identifier in the physical monetary token thereby identifying the token 104 being transferred. The application then combines the request from the user with the token's identity (and in some cases its digital signature) to create a transfer request. The application 210 then signs the transfer request with the user's digital signature 218 which is also stored in the memory module 204. The application 210 then controls the transmitter 220 in the communication module 206 to transmit the signed transfer request 108 to the ledger management system 106.
[0065] Upon receipt of the signed transfer request 108, the ledger management system 106 transmits an alert message 1 12 to the other user 102B involved in the transaction. The user terminal 102B, receives the alert 1 12 through the receiver 222 in the communication module 206. The application takes the received alert and provides it to the user inter face module 212 which allows the user to accept or reject the request 224 to register the transaction. The user's accept or reject response 224 is input through the user interface module 212, received by the application 21 0 and transmitted back to the ledger management system 106 through the transmitter 220 in the communication module 206.
Ledger management system
[0066] The ledger management system 1 06 from Figure 1 is shown again in Figure 3. The ledger management system 106 records transactions of physical monetary tokens 104 between users of system 100. The system includes a database module 302, a communication module 304 and a microprocessor 306.
[0067] The communication module 304 includes a transmitter 308 and a receiver 310 which allows the ledger management system 106 to communicate with user terminals of system 100. Requests 108 and responses to requests 1 14 are received from the user terminals by the ledger management system 106 through the receiver 310 while alerts 1 12 are sent to the user terminals through the transmitter 308.
[0068] The microprocessor is configured to process computer executable code which is stored in the database module 302.
[0069] The database module 302, discussed in detail below, is configured to store data such as computer executable code 312 to manage the transaction ledger, the transaction ledger itself 314 as well as the information 31 6 about the physical monetary tokens 104 of system 100.
Database module
[0070] As previously mentioned, the monetary transaction system includes a publicly accessible database. The database records information 316 relating to the tokens 104 such as the public key of each token's digital signature, the issuer of a token, the serial number of each token and the quantity and type of material embedded in the token providing the intrinsic value. Although the database is publicly accessible, this does not necessarily mean that all aspects of the database are accessible to everyone. For example, some aspects of the database may be kept private and/or only visible to users of the system.
[0071 ] Additionally, the database includes the transaction ledger 314. The transaction ledger 314 records information about each transaction such as the time of the transaction, the public key of the digital signature of the transferee of the token or tokens, the digital signature of the transferor of the token or tokens and the serial numbers and digital signatures of the token or tokens being transferred. The transaction ledger does not necessarily track the transactions of all tokens, and in some embodiments may restrict tracking to high denomination tokens only. In this case, enough information will still be available in the database to establish authenticity of tokens, although the transactions and therefore ownership of the tokens would not be recorded.
[0072] The database can provide security measures which can be implemented in the system. For example, it may not be possible for a transferor to transfer a token to a transferee if the digital signature or serial number of the token being transferred is not recorded as being owned by the transferor. That is, the information in the transaction ledger would prevent a user
from transacting with tokens that do not belong to them. In some embodiments, the transaction ledger may alert other users if a user attempted to transfer a token which did not belong to them.
[0073] In some embodiments, the transaction ledger takes the form of a block chain. The blockchain may be centrally maintained, only making part of the transaction information publicly available, while the rest of the information is kept private. This centrally maintained blockchain has the advantage of maintaining the privacy of users as the number of tokens owned by a given user may be kept secret along with their transactions.
[0074] In other embodiments, an open, distributed blockchain structure is used for the transaction ledger. In this embodiment, the blockchain is maintained on a peer-to-peer network through consensus with each new block containing a hash of the previous block. Since this blockchain structure is not maintained centrally and relies on distributed consensus, it is inherently resistant to modification and therefore provides robust security for the transaction system.
[0075] It will be appreciated that other forms of transaction ledger may be used including a combination of private and public blockchains wherein a user may transfer tokens from the private blockchain to the public blockchain as required.
Tokens
[0076] As previously mentioned, at least a subset of the physical monetary tokens carry some inherent value and are each uniquely identifiable.
[0077] The tokens acquire their inherent value via the inclusion of valuable materials into the physical structure of the tokens. For example, in one embodiment tokens may include various amounts of precious metals such as gold silver or platinum or valuable base metals such as copper or nickel. Preferably, precious metals will be used in higher denomination tokens, while the base metals may be used in the lower denomination tokens. The amount and type of metal used in each token will determine the exact denomination assigned to the token. It will be appreciated that other types of material can be used to provide the inherent value to the tokens.
[0078] Identification of the tokens is made possible by a unique serial number and, as previously mentioned, a digital signature. To utilize the digital signature, the token includes some wirelessly readable identifier or means for transmitting the unique digital signature. In one embodiment, the tokens include RFID or NFC chips or antennas which are capable of digitally signing a transaction, thereby positively identifying the individual token. The serial number of each token may be displayed openly on the token and/or be transmitted by the wirelessly readable identifier. The wirelessly readable identifier can be used to verify the integrity and authenticity of the token. It will be appreciated that the wirelessly readable identifier is only a
means to identify the token and that any other means is also intended to be covered. For example, the token may have visual marks, QR codes, bar codes, some contact identification mechanism etc.
[0079] The tokens may also be constructed to include any number of anti-tampering features. In one embodiment, the valuable material is incorporated into the construction of the wirelessly readable identifier such that removal of the valuable material will cause the wirelessly readable identifier to cease functioning thereby rendering the token unable to be transacted. Another anti-tamper feature may be to integrally associate the wirelessly readable identifier with a more fragile material which will decompose when exposed to air or heat thereby destroying the wirelessly readable identifier and rendering the token valueless. Other more generic anti- tampering features such as constructing the physical body of the token from a rigid material which cannot be readily manipulated such as a chemically inert thermosetting polymer, including optically variable inks or holograms on the physical body. In some embodiments, the anti-tampering feature is such that tampering with the physical body causes the tampering to become evident.
[0080] Preferably, higher denomination tokens, which have a greater intrinsic value, will include stronger anti-tampering features. For Example, Figure 4A illustrates one embodiment of a physical monetary token 400 with comparatively low strength anti-tamper features while Figure 4B shows the same token in profile. Flecks of valuable metal 402, which provide the inherent value to the token, are spread randomly throughout the body 404 of the token which is formed from a transparent thermosetting plastic. The wirelessly readable identifier 406 is an RFID or NFC chip embedded in the body 404 of the token 400 along with a hologram 408, which is located in the body 404 of the token to prevent damage to the RFID or NFC chip.
[0081 ] Figure 5A illustrates another embodiment of a physical monetary token 500 with comparatively high strength anti-tamper features along with a greater amount of valuable metal 502 compared to the example of Figure 4A. Figure 5B shows the same token in profile. The body 504 of the token is again formed from a thermosetting plastic. In this embodiment, however, the hologram 506 is distributed between the pieces of valuable metal 502 and an optically variable ink 508 at least partially overlays the valuable metal 502, the hologram 506 and the RFID or NFC chip 510.
Example Methods
[0082] Example methods are described below. These methods are performed based on the operation of computing devices, such as devices configured to operate in the context of the example systems illustrated in Figure 1 and Figure 2.
[0083] The method used for exchanging the tokens will depend on who initiates a given transfer.
Figure 6 illustrates the method if the transfer is initiated 602 by a transferee, who is receiving the tokens from a transferor. The transferee begins by identifying the tokens to be
transferred 604. The identification of the tokens is performed by reading a signal from the wirelessly readable identifier embedded in each of the tokens. The wirelessly readable identifier (406 or 510) can be read by any suitable device such as the user terminal 200 or any smart device running an appropriate application and including appropriate hardware.
[0084] The transferee then makes a request to have a transaction ledger altered 606 to record the transaction. As part of the request, the transferee includes the serial numbers of the tokens being transferred as well as the public key of the transferor who presently owns the tokens. The private key of the digital signature of the transferee is used to authenticate the identification of the transferee at the time of making the request.
[0085] Upon receiving the request to alter the transaction ledger, a notification is sent to the transferor 608, reporting that request has been made to alter the transaction ledger. The notification includes the identity of the tokens being transferred and requires the transferor to selectively approve the transaction 610. The private key of the digital signature of the transferor is then used to digitally sign the response thereby to authenticate and selectively approve the transaction 612. Once the transaction is approved by the transferor, the transaction ledger is altered 614 to reflect the transaction thereby concluding the token transfer 616. Alternatively, the transferor may reject the transfer, thereby preventing the transaction from occurring 618. In some embodiments, no notification is sent to the transferor. Instead, the transferor simply sees the transferee's request in the transaction ledger and in response transmits a confirmation message to the ledger thereby effecting the transfer.
[0086] In the case illustrated in Figure 7 where the transaction is initiated by the transferor 702, who is transferring a set of tokens to the transferee, a similar method is used. The transferor requests the transaction ledger be altered 704 to indicate the exchange of tokens has occurred. The transferor's identity is authenticated using the private key of the transferor's digital signature 706 when making the request. The request further includes unique identifiers of the tokens being transferred 708, such as their serial numbers and the public key of the transferee's digital signature 710. Once the request has been successfully received, notification is sent to the transferee 712 of the request to alter the ledger and requiring confirmation from the transferee 714, along with a request for the private key of the transferee's digital signature. By supplying the private key 716, the transferee is confirming the transaction thereby allowing the transaction ledger to be altered, in which case the transaction is registered in the ledger 718 and the token is transferred 720. Alternatively, the transferee may reject the transaction thereby preventing the transaction from occurring 722.
[0087] Figure 8 illustrates an alternative embodiment to the method if the transfer is initiated 802 by a transferee, who is receiving the tokens from a transferor. The transferee begins by identifying the tokens to be transferred 804. The identification of the tokens is performed by reading a signal from the wirelessly readable identifier embedded in each of the tokens. The
wirelessly readable identifier (406 or 510) can be read by any suitable device such as the user terminal 200 or any smart device running an appropriate application and including appropriate hardware.
[0088] The transferee then generates a request to have a transaction ledger altered 606 to record the transaction. The transferor then digitally signs the request 808 which is sent to the ledger management system 810. When the ledger management system receives the signed request, the transaction ledger is altered 812 to reflect and effect the transaction 814.
[0089] Figure 9 illustrates an alternative embodiment to the method if the transfer is initiated 902 by the transferor. The transferor requests the transaction ledger be altered 904 to indicate the exchange of tokens has occurred. The transferor's identity is authenticated using the transferor's digital signature 906 when making the request. The request further includes unique identifiers of the tokens being transferred 908, such as their serial numbers and the public key of the transferee's digital signature 910. Once the request has been successfully received, the transaction ledger is altered 912 and the tokens are transferred 914.
[0090] It will be appreciated that the methods described above can be carried out by any suitable means. In particular, smart devices such as smart phones and tablets executing an appropriate application could perform the method. Such smart devices may be particularly convenient if they also include a means to read the wirelessly readable identifier and include other appropriate hardware.
Registering with the System
[0091 ] In the monetary transaction system, certified entities may be permitted to issue tokens. The certification of the issuing entities will be controlled centrally by a certifying entity. The certifying entity will publish all information relating to certified issuing entities in a publicly accessible location, such as online. Included in the published information will be the public key of the issuing entity, enabling a user of the system to verify the digital signature of the issuing entity.
[0092] The issuing entities are able to register new users by verifying their identity and issuing them a digital signature. The issuing entity then publishes the public key of the digital signature in the database, enabling other users to see that the new user's identity has been verified. The database therefore provides some degree of confidence that a user's identity has been verified and could potentially allow a user to check whether the identity of all previous owners of a given token can be traced.
[0093] If a registered user loses the private key of their digital signature, it will be possible for the issuing entity which registered them to provide them with a new digital signature (and public key) and register all of their tokens with their new digital signature. That is, their tokens will be transferred from their old digital signature to their new one.
[0094] In some embodiments, issuing entities may have additional powers to enter various
transactions into the transaction ledger. For example, where the previous owner's digital signature is lost or unavailable (e.g. tokens passed from a deceased to an heir), an issuing entity could verify the change of ownership and update the transaction ledger without cooperation from the owner of the tokens.
[0095] Similarly it should be appreciated that in the above description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.
[0096] Furthermore, while some embodiments described herein include some but not other features included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention, and form different embodiments, as would be understood by those skilled in the art. For example, in the following claims, any of the claimed embodiments can be used in any combination.
[0097] Furthermore, some of the embodiments are described herein as a method or combination of elements of a method that can be implemented by a processor of a computer system or by other means of carrying out the function. Thus, a processor with the necessary instructions for carrying out such a method or element of a method forms a means for carrying out the method or element of a method. Furthermore, an element described herein of an apparatus embodiment is an example of a means for carrying out the function performed by the element for the purpose of carrying out the invention.
[0098] In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
[0099] Similarly, it is to be noticed that the term coupled, when used in the claims, should not be interpreted as being limited to direct connections only. The terms "coupled" and "connected," along with their derivatives, may be used. It should be understood that these terms are not intended as synonyms for each other. Thus, the scope of the expression a device A coupled to a device B should not be limited to devices or systems wherein an output of device A is directly connected to an input of device B. It means that there exists a path between an output of A and an input of B which may be a path including other devices or
means. "Coupled" may mean that two or more elements are either in direct physical or electrical contact, or that two or more elements are not in direct contact with each other but yet still co-operate or interact with each other. 00] Thus, while there has been described what are believed to be the preferred embodiments of the invention, those skilled in the art will recognize that other and further modifications may be made thereto without departing from the spirit of the invention, and it is intended to claim all such changes and modifications as falling within the scope of the invention. For example, any formulas given above are merely representative of procedures that may be used. Functionality may be added or deleted from the block diagrams and operations may be interchanged among functional blocks. Steps may be added or deleted to methods described within the scope of the present invention.
Claims
1 . A physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; and a predetermined amount of defined material disposed within the physical body; wherein tampering with the defined material disposed within the physical body causes the wirelessly readable identifier to cease being wirelessly readable.
2. A physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; and a predetermined amount of defined material disposed within the physical body; wherein tampering with the physical body causes the tampering to become evident.
3. A physical monetary token for conducting monetary transactions, wherein the token includes: a physical body; a means for carrying a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and one or both of a hologram and optically variable ink disposed within the physical body.
4. The physical monetary token for conducting monetary transactions according to any one of the preceding claims, wherein the means for carrying the wirelessly readable identifier is a radio frequency identification (RFI D) or or near field communication (NFC) chip.
5. The physical monetary token for conducting monetary transactions according to any of the preceding claims wherein the wirelessly readable identifier includes a digital signature.
6. The token for conducting monetary transactions according to any of the preceding claims wherein the rigid body is made from thermosetting polymer.
7. The token for conducting monetary transactions according to any one of preceding claims, wherein the defined material is a precious metal.
8. The token for conducting monetary transactions according to any one of claims 1 to 6, wherein the defined material is a base metal.
9. A computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and operating the transferee device thereby to read, from the wirelessly readable identifiers of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature; providing data representative of the public key of the transferor device's digital signature; delivering, to the transferor device, a notification representative of the request to alter the ledger; and the operating the transferor device to selectively confirm or reject the request to alter the ledger, wherein the digital signature of the transferor device is required to confirm or reject the request; and in the case that the transferor device confirms the request to alter the ledger, altering the ledger to record the transfer of tokens from the transferor to the transferee.
10. A computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device,
wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature notifying the transferee device of the request by the transferor device to alter the ledger; requesting the transferee device's digital signature; and in the case that the transferee device provides the digital signature, altering the ledger to record the transfer of tokens from the transferor to the transferee.
1 1 . A method according to claim 9 or claim 10 wherein each of the one or more physical tokens includes a tampering means, such that tampering with the defined material disposed within the physical body causes the wirelessly readable identifier to cease being wirelessly readable.
12. A method according to claim 9 or claim 10 wherein each of the one or more physical tokens includes one or both of a hologram and optically variable ink disposed within the physical body.
13. A system for conducting monetary transactions, the system including: a plurality of tokens wherein each token is issued by an issuer and each token includes: a unique identifier; a predetermined amount of defined material ; and
a unique digital signature wherein the unique digital signature includes a public key; and an information repository for storing information about each token, the information including : the public key of each token's digital signature; the quantity and type of defined material in each token; the issuer of each token ; and the unique identifier of each token ; a transaction ledger for recording transactions of tokens between users of the system; and a transaction ledger management system configured to perform a transaction method to effect the transaction of tokens from a transferor to a transferee.
14. A system according to claim 13 wherein the method includes a computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and operating the transferee device thereby to read, from the wirelessly readable identifies of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred; operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature;
providing data representative of the transferor device's digital signature; and altering the ledger to record the transfer of tokens from the transferor to the transferee.
15. A system according to claim 13 wherein the method includes a method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including : providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; a predetermined amount of defined material disposed within the physical body; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature; and altering the ledger to record the transfer of tokens from the transferor to the transferee.
16. The system for conducting monetary transactions according to any one of claims 13 to 15 wherein each token includes an RFID or NFC chip for transmitting the unique digital signature of the token.
17. The system for conducting monetary transactions according to any one of claims 13 to 15 wherein the defined material is a precious metal.
18. The system for conducting monetary transactions according to any one of claims 13 to 15 wherein the defined material is a valuable base metal.
19. The system for conducting monetary transactions according to claim 1 6 wherein the precious metal is gold.
20. The system for conducting monetary transactions according to claim 1 6 wherein the precious metal is a platinum group metal.
21 . The system for conducting monetary transactions according to claim 1 6 wherein the precious metal is silver.
22. The system for conducting monetary transactions according to claim 1 7 wherein the precious base metal is copper.
23. The system for conducting monetary transactions according to claim 1 7 wherein the precious base metal is nickel.
24. A system for conducting monetary transactions according to any one of claims 13 to claim 22 wherein during an exchange of tokens from a transferor to a transferee, wherein each of the transferor and transferee have unique digital signatures which include respective public keys, the repository stores one or more of: the time of a transaction; the digital signatures of the exchanged tokens; the unique identifiers of the exchanged tokens; the public key of the digital signature of the transferee; and the digital signature of the transferor.
25. A computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated via a transferee device, and confirmed via a transferor device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; and operating the transferee device thereby to read, from the wirelessly readable identifiers of the one or more tokens, data representative of the unique identifiers of the one or more tokens being transferred;
operating the transferee device thereby to request a remotely accessible transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the unique identifiers of the one or more tokens being transferred along with the transferee device's digital signature; providing data representative of the public key of the transferor device's digital signature; delivering, to the transferor device, a notification representative of the request to alter the ledger; operating the transferor device to selectively confirm or reject the request to alter the ledger, wherein the digital signature of the transferor device is required to confirm or reject the request; and in the case that the transferor device confirms the request to alter the ledger, altering the ledger to record the transfer of tokens from the transferor to the transferee.
26. A computer implemented method for exchanging physical monetary tokens wherein the token exchange is initiated by a transferor device for transferring of tokens via a transferee device, wherein each of the transferor and transferee devices have unique digital signatures which include respective public keys and private keys, the method including: providing one or more physical monetary tokens, wherein each monetary token includes: a physical body; a wirelessly readable identifier; and inputting into the transferor device the wirelessly readable identifiers of the tokens being transferred; operating the transferor device thereby to request a transaction ledger be altered to indicate that the exchange of tokens has occurred, wherein the request includes: providing the identifiers of the tokens being transferred along with the transferor device's digital signature; providing the public key of the transferee device's digital signature altering the ledger to record the transfer of tokens from the transferor to the transferee.
Applications Claiming Priority (2)
| Application Number | Priority Date | Filing Date | Title |
|---|---|---|---|
| AU2017901699 | 2017-05-08 | ||
| AU2017901699A AU2017901699A0 (en) | 2017-05-08 | Monetary transaction method and system |
Publications (1)
| Publication Number | Publication Date |
|---|---|
| WO2018204970A1 true WO2018204970A1 (en) | 2018-11-15 |
Family
ID=64104219
Family Applications (1)
| Application Number | Title | Priority Date | Filing Date |
|---|---|---|---|
| PCT/AU2018/050418 Ceased WO2018204970A1 (en) | 2017-05-08 | 2018-05-07 | Monetary transaction method and system |
Country Status (1)
| Country | Link |
|---|---|
| WO (1) | WO2018204970A1 (en) |
Cited By (1)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3671674A1 (en) | 2018-12-20 | 2020-06-24 | DD Deutsche Diamant GmbH | Valuable item storage object |
Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20130062156A1 (en) * | 2011-09-13 | 2013-03-14 | Kitaru Innovations Inc. | Rfid embedded currency |
| US20150088721A1 (en) * | 2012-09-24 | 2015-03-26 | Gideon Samid | Digital transactional procedures & implements |
| US20150128694A1 (en) * | 2011-03-28 | 2015-05-14 | Peerless Worldwide, Llc | Precious metal authentication system and method |
-
2018
- 2018-05-07 WO PCT/AU2018/050418 patent/WO2018204970A1/en not_active Ceased
Patent Citations (3)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| US20150128694A1 (en) * | 2011-03-28 | 2015-05-14 | Peerless Worldwide, Llc | Precious metal authentication system and method |
| US20130062156A1 (en) * | 2011-09-13 | 2013-03-14 | Kitaru Innovations Inc. | Rfid embedded currency |
| US20150088721A1 (en) * | 2012-09-24 | 2015-03-26 | Gideon Samid | Digital transactional procedures & implements |
Cited By (4)
| Publication number | Priority date | Publication date | Assignee | Title |
|---|---|---|---|---|
| EP3671674A1 (en) | 2018-12-20 | 2020-06-24 | DD Deutsche Diamant GmbH | Valuable item storage object |
| DE102018133104A1 (en) * | 2018-12-20 | 2020-06-25 | Dd Deutsche Diamant Gmbh | Cryptocurrency with integrated value protection |
| WO2020125863A1 (en) | 2018-12-20 | 2020-06-25 | Dd Deutsche Diamant Gmbh | Physical payment means |
| DE102018133104B4 (en) | 2018-12-20 | 2021-08-05 | Dd Deutsche Diamant Gmbh | Physical tender |
Similar Documents
| Publication | Publication Date | Title |
|---|---|---|
| US20220321359A1 (en) | Methods and systems for ownership verification using blockchain | |
| US11664997B2 (en) | Authentication in ubiquitous environment | |
| US20160098730A1 (en) | System and Method for Block-Chain Verification of Goods | |
| KR20210158271A (en) | System to provide genuinity verification and ownership change records of product esset by using a blockchain and a genuine authentiation tag technologies | |
| US20160098723A1 (en) | System and method for block-chain verification of goods | |
| US20200092106A1 (en) | Blockchain entity, off-chain entity, certification device for blockchain operations and method for performing a cooperation between a blockchain entity and an off-chain entity | |
| CN113196813B (en) | Provisioning initiated from a contactless device | |
| US20160117673A1 (en) | System and method for secured transactions using mobile devices | |
| US20130226812A1 (en) | Cloud proxy secured mobile payments | |
| US20150142666A1 (en) | Authentication service | |
| CN114365449A (en) | Provisioning method and system with message conversion | |
| CN111476572B (en) | Block chain-based data processing method, device, storage medium and equipment | |
| JPWO2018043599A1 (en) | Information sharing system | |
| CN101454797A (en) | Methods and systems for secure transactions with electronic devices | |
| KR20160050876A (en) | Bitcoin dealing method using public key and private key stored in smart card | |
| CN116057554A (en) | Method for managing transaction data sets, participant unit, transaction register and payment system | |
| JPWO2023101879A5 (en) | ||
| MX2012013840A (en) | Method and devices for creating and using an identification document that can be displayed on a mobile device. | |
| CN113450092A (en) | Block chain network-based article safe and efficient transaction method, system and storage medium | |
| US20240054460A1 (en) | Devices, systems, and methods for public/private key authentication | |
| US12450615B2 (en) | Method, terminal, and coin register for transmitting electronic coin data sets | |
| CN110622193A (en) | Portable device with local authentication data | |
| KR102122555B1 (en) | System and Method for Identification Based on Finanace Card Possessed by User | |
| WO2018204970A1 (en) | Monetary transaction method and system | |
| KR20200022194A (en) | System and Method for Identification Based on Finanace Card Possessed by User |
Legal Events
| Date | Code | Title | Description |
|---|---|---|---|
| 121 | Ep: the epo has been informed by wipo that ep was designated in this application |
Ref document number: 18797643 Country of ref document: EP Kind code of ref document: A1 |
|
| NENP | Non-entry into the national phase |
Ref country code: DE |
|
| 122 | Ep: pct application non-entry in european phase |
Ref document number: 18797643 Country of ref document: EP Kind code of ref document: A1 |