WO2020256681A1 - Système de transfert d'actifs numériques - Google Patents

Système de transfert d'actifs numériques Download PDF

Info

Publication number
WO2020256681A1
WO2020256681A1 PCT/UA2020/000005 UA2020000005W WO2020256681A1 WO 2020256681 A1 WO2020256681 A1 WO 2020256681A1 UA 2020000005 W UA2020000005 W UA 2020000005W WO 2020256681 A1 WO2020256681 A1 WO 2020256681A1
Authority
WO
WIPO (PCT)
Prior art keywords
communicator
authentication
payer
transaction
received
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/UA2020/000005
Other languages
English (en)
Inventor
Aleksandr KUD
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tovarystvo Z Obmezhenoiu Vidpovidalnistiu "simcord"
Original Assignee
Tovarystvo Z Obmezhenoiu Vidpovidalnistiu "simcord"
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tovarystvo Z Obmezhenoiu Vidpovidalnistiu "simcord" filed Critical Tovarystvo Z Obmezhenoiu Vidpovidalnistiu "simcord"
Publication of WO2020256681A1 publication Critical patent/WO2020256681A1/fr
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/40Authorisation, e.g. identification of payer or payee, verification of customer or shop credentials; Review and approval of payers, e.g. check credit lines or negative lists
    • G06Q20/401Transaction verification
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/02Payment architectures, schemes or protocols involving a neutral party, e.g. certification authority, notary or trusted third party [TTP]
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/32Payment architectures, schemes or protocols characterised by the use of specific devices or networks using wireless devices
    • G06Q20/322Aspects of commerce using mobile devices [M-devices]
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q2220/00Business processing using cryptography

Definitions

  • the claimed utility model is related to information technologies and intended to be used in the financial field, for managing the rights to digital assets, and for transfer of the rights to digital assets.
  • the utility model can be used by companies, entrepreneurs, and ordinary individuals.
  • non-cash payments between private persons have also become widespread. For example, it is a typical situation where one person finds information about the sale of goods placed by another person on a classified website and makes a non-cash payment to the seller’s card account.
  • the system designed to implement this method includes a processing server, a storage server for storing recipients’ data and payment rules information, and a fax server (patent application US20130226798, IPC G06Q20/10, G06Q20/40, publication date 29.08.2013).
  • the known system is focused on automation of processing invoices for payment received by a payer from recipients and is not intended for processing transactions initiated by the payer.
  • the system is not able to perform transactions in favor of the recipients whose details have not been previously entered in the system and for whom the payment rules have not been established.
  • the closest analogue of the claimed system is the known system for transferring funds, containing at least one processing server and an authentication artifact storage server (patent application EP 2743873, IPC G06Q20/40, publication date 18.06.2014).
  • the disadvantage of the known system is the inability to enter and store additional authentication conditions and additional transaction execution conditions specified by the payer.
  • Another analogue of the claimed system is the known system for performing payment transactions that contains at least one processing server and an authentication data storage server (patent application US2016/0071097, IPC G06Q20/38, publication date 10.03.2016).
  • the disadvantage of the known system is the centralization of the storage of transaction data that reduces the reliability of the system as a whole.
  • An additional disadvantage is the inadequate protection of the system against DoS attacks, which can be executed through the mass sending to the system of large amounts of graphic, audio, and video data under the guise of bogus transaction identifiers.
  • the objective of the utility model is the development of the digital asset transfer system, which allows the payer, when initiating a request to the system for performing a transaction, to determine and enter at his/her own discretion additional transaction execution conditions (in particular, date and time of the transaction, desired time period for the transaction, data on the recipient’s geographic location), to establish and enter additional authentication parameters (alphanumerical code, graphic image, audio record, video record, and text), to reliably store the information about the completed transaction with the possibility of subsequent review whenever necessary.
  • additional transaction execution conditions in particular, date and time of the transaction, desired time period for the transaction, data on the recipient’s geographic location
  • additional authentication parameters alphanumerical code, graphic image, audio record, video record, and text
  • the set task is achieved in such a way that in the known digital asset transfer system which includes a network of hardware and software complexes interconnected by communication means, each of which consists of a processing server, and an authentication artifact storage server;
  • the authentication artifact storage server according to the proposed technical solution includes a processor and at least one storage medium for saving data with the programmed instructions to the processor, data about additional conditions for transaction execution, alphanumeric code, and created authentication artifacts received from the payer’s communicator
  • the system includes the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution, which is configured as a separate hardware and software complex, which includes a processor and a storage medium with instructions for the processor, and is capable to compare the authentication artifacts and alphanumeric code received from the payer’s communicator with the authentication artifacts and alphanumeric code received from the recipient’s communicator;
  • the system includes a public distributed ledger for storing transaction details, which is configured as a network of
  • the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution is configured with the ability to compare the authentication artifact created on the basis of the graphic image received from the payer’s communicator and the authentication artifact created on the basis of the graphic image received from the recipient’s communicator.
  • the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution is configured with the ability to compare the authentication artifact created on the basis of the audio record received from the payer’s communicator and the authentication artifact created on the basis of the audio record received from the recipient’s communicator.
  • the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution is configured with the ability to compare the authentication artifact created on the basis of the video record received from the payer’s communicator with the authentication artifact created on the basis of the video record received from the recipient’s communicator.
  • the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution is configured with the ability to compare the authentication artifact created on the basis of the text received from the payer’s communicator with the authentication artifact created on the basis of the text received from the recipient’s communicator. It is possible to implement a system, in which the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution is configured with the ability to compare the transaction execution date received from the payer’s communicator with the current date.
  • the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution is configured with the ability to compare the data about the geographic location of the recipient received from the payer’s communicator with the data about the current geographic location of the recipient received from the recipient’s communicator.
  • the technical result of the claimed utility model is an increase in operation reliability of the digital asset transfer system.
  • the said technical result is accomplished by including the module for verification of authentication artifacts, alphanumeric code, and additional conditions for transaction execution in the system.
  • the mentioned module allows comparing the authentication artifacts received from the payer’s communicator with the authentication artifacts received from the recipient’s communicator.
  • the mentioned module also allows comparing the data about compliance with additional conditions for transaction execution that were previously received from the payer’s communicator with the current data about compliance with additional conditions for transaction execution received from the recipient’s communicator. This module enhances the system’s ability to operate without failing and withstand potential hacker attacks, since the module will block requests to the system in the event of mismatch of authentication artifacts, or if additional conditions for transaction execution are not being met.
  • the technical result of the claimed utility model is also an increase in the reliability of storing transaction details. Improved reliability in this case implies a decrease in the average recovery time of the system in case of software or hardware failure, intentional or unintentional damage to data storage media, and data falsification.
  • This technical result is accomplished by including a public distributed ledger in the system, and its configuration as a network of interconnected hardware and software complexes. Since the public distributed ledger is stored on interconnected hardware and software complexes (the number of which can be unlimited), the possibility of forgery of transaction information is excluded. In case of corruption or falsification of the data in the ledger maintained in one of the hardware and software complexes, they will be automatically replaced with an undamaged copy from other hardware and software complexes within the shortest possible time.
  • Digital Asset means an information resource derivative of the right to a value and circulating in a public distributed ledger (blockchain) in the form of a unique identifier.
  • a Digital Asset has a unique identifier and the nominal value in the amount determined by the procedure established by the Protocol, which corresponds to a certain part of property rights to assets. Any transactions with a Digital Asset (issue, transfer from one owner to another, splitting of nominal value, and other transactions) are recorded in a public distributed ledger as the records that cannot be deleted or modified.
  • Digital Asset attributes include:
  • Nominal value is a positive real number corresponding to the part of the user’s property rights to Assets
  • Protocol means a digital document that defines the attributes and properties of Digital Asset, rules and conditions of its creation and circulation in the public distributed ledger (blockchain), as well as the procedure for implementing the Protocol of Digital Asset.
  • Metadata means information about other information or data related to additional information about the content or the object. Metadata discloses information about the characteristics and properties describing any entities that allow automatically searching and managing them in large information flows. Payer means a user of the system who initiates a transaction to transfer the Digital Asset owned by him/her to another user.
  • Recipient means a user of the system receiving the Digital Asset from the
  • Payer s Authentication Parameters mean a sequence of data, which is determined in accordance with the Protocol and identifies the Payer.
  • Recipient s Authentication Parameters mean a sequence of data, which is determined in accordance with the Protocol and identifies the Recipient.
  • Authentication Artifact means a sequence of digital data describing the characteristics of a physical object or a phenomenon.
  • the Authentication Artifact may be digital data describing the appearance of a postcard.
  • Primary Authentication Artifact means the data which describe created by the Payer digital graphic image (or a series of images) of any physical object.
  • the data are processed by the system, which creates on this basis a mathematical model with a specified error level.
  • the mathematical model is a system of characteristic equations, coefficient tensors, and a set of initial conditions (configuration).
  • the Primary Authentication Artifact is created by the system on the basis of the coefficient tensors, configuration, type (and/or complexity) of the mathematical model, and the specified error level.
  • Secondary Authentication Artifact means the data that describe a digital audio record (video record, text) entered by the Payer.
  • the data are processed by the system, which creates on this basis a mathematical model with a specified error level.
  • the mathematical model is a system of characteristic equations, coefficient tensors, and a set of initial conditions (configuration).
  • the Secondary Authentication Artifact is created by the system on the basis of coefficient tensors, configuration, type (and/or complexity) of the mathematical model, and the specified error level.
  • Conditions for Transaction Execution mean general Transaction Conditions in the system defined by the Payer in the Protocol.
  • Additional Conditions for Transaction Execution mean conditions specified in the Protocol by the Payer for each specific transaction in the system, in particular, the transaction date, the data about the desired time period of the transaction, and the data about the Recipient’s geographic location.
  • Fig. 1 composition of the digital asset transfer system and interaction of its components.
  • Fig. 2 flow chart of the system implementation when executing a digital asset transfer transaction using electronic money as an example.
  • Fig. 3 flow chart of the system implementation when executing a digital asset transfer transaction using electronic money as an example (flow chart continued from Fig. 2).
  • Fig. 4 flow chart of the system implementation when executing a digital asset transfer transaction in favor of an anonymous recipient using electronic money as an example.
  • Fig. 5 flow chart of the system implementation when executing a digital asset transfer transaction in favor of an anonymous recipient using electronic money as an example (flow chart continued from Fig. 4).
  • Fig. 6 flow chart of the system implementation when executing a digital asset transfer transaction using a Bitbon as an example.
  • Fig. 7 flow chart of the system implementation when executing a digital asset transfer transaction using a Bitbon as an example (flow chart continued from Fig. 6).
  • the composition of the declared system is shown in Fig. 1.
  • the Digital Asset transfer system consists of a network of interconnected hardware and software complexes capable of providing redundant data storage, each of which includes a processing server 101, authentication artifact storage server 102, module 103 for verification of Authentication Artifacts, alphanumeric code, and Additional Conditions for Transaction Execution, public distributed ledger 104.
  • the Payer interacts with the system using the communicator 105
  • the Recipient interacts with the system using the communicator 106.
  • the communicators 105 and 106 may be programmable devices with the ability to connect to the Internet, in particular, smartphones, desktop computers, laptops, tablets, etc.
  • the server 102 is configured with the ability to save the Additional Conditions for Transaction Execution, alphanumeric code, and created Authentication Artifacts received from the Payer’s communicator 105.
  • the server 102 contains at least one storage medium for recording data on it with the program instructions to the processor and the data about Additional Conditions for Transaction Execution and Authentication Artifacts.
  • the server 102 also contains the processor capable of executing instructions recorded on the storage medium that describes the procedure of receiving and consequent storage of the data about Additional Conditions for Transaction Execution and Authentication Artifacts in digital form.
  • the module 103 for verification of Authentication Artifacts, alphanumeric code, and Additional Conditions for Transaction Execution is configured with the ability to compare the Authentication Artifacts and alphanumeric code received from the Payer’s communicator 106 with the Authentication Artifacts and alphanumeric code received from the Recipient’s communicator.
  • the verification module 103 is configured as a separate hardware and software complex containing the processor capable of executing instructions recorded on the storage medium.
  • the public distributed ledger 104 of transactions is configured as a network of interconnected hardware and software complexes.
  • Example 1 The system implementation when executing a Digital Asset transfer transaction using electronic money as an example (Fig. 2, Fig. 3).
  • Processing servers 101 receive a request from the Payer’s communicator 105 for executing a transfer transaction of the Digital Asset as a certain amount of electronic money from the Payer to the Recipient (step 210).
  • the step includes the authentication of the Payer in the system according to the Protocol (for example, by entering login and password).
  • the communicator 105 interacts with the system using modern means of communication.
  • the Payer’s communicator 105 sends the Recipient’s name (for example, John Smith) and the nominal value of the Digital Asset expressed as an amount of electronic money to the servers 101 (step 220).
  • Servers 102 receive the transaction type (for example, private), alphanumeric code (for example,“12345pineapple”), and Additional Conditions for Transaction Execution from the Payer’s communicator 105.
  • the Payer’s communicator 105 also sends the Primary Authentication Artifact to the server 102 (step 230).
  • the Additional Conditions for Transaction Execution may be the date of September 01, 2019, as well as the name of the city of Baden-Baden, from which the request to receive the transaction must be sent by the Recipient’s communicator 106.
  • the Payer can use, for example, a postcard with the image of the Tower of Pisa.
  • the Payer’s communicator 105 saves the postcard image as a digital graphic file, which, in addition to the image data, contains the Metadata related to the image.
  • the entered data are processed by the system, which use them to create a mathematical model with a specified error level.
  • the mathematical model is a system of characteristic equations, coefficient tensors, and a set of initial conditions (configuration).
  • the Primary Authentication Artifact is created by the system on the basis of the coefficient tensors, configuration, type (and/or complexity) of the mathematical model, and the specified error level.
  • the server 102 saves the Primary Authentication Artifact, alphanumeric code, transaction type, and Additional Conditions for Transaction Execution on its storage medium (step 240).
  • the public distributed ledger 104 saves the information about the created transaction including the Recipient’s name, nominal value of the Digital Asset, and transaction type (step 250).
  • Processing servers 101 block the Digital Asset of the specified nominal value in the Payer’s account (step 260).
  • the processing servers 101 send a message about the physical object used to create the Primary Authentication Artifact, about the Additional Conditions for Transaction Execution, about the transaction identifier, and alphanumeric code to the Recipient’s communicator 106 (step 270).
  • the Recipient’s communicator 106 sends the request to receive the Digital Asset to the processing servers 101 (step 310).
  • the step includes the authentication of the Recipient in the system according to the Protocol (for example, by entering login and password).
  • the processing servers 101 validate the received request, and if its execution is possible, send the request for issuing the authentication artifacts to the artifact verification module 103, which, in turn, sends the request to the authentication artifact storage server 102.
  • the server 102 sends the instructions for creating the Primary Authentication Artifact to the Recipient’s communicator 106.
  • the Recipient’s communicator 106 sends the alphanumeric code “12345pineapple” to the verification module 103, reproduces the Primary Authentication Artifact on the basis of the postcard with the image of the Tower of Pisa and sends it to the verification module 103 as well (step 320).
  • the server 102 sends the Primary Authentication Artifact, which was received from the Payer’s communicator 105 and stored on it, to the verification module 103.
  • the server 102 also sends the Additional Conditions for Transaction Execution stored on it to the verification module 103.
  • the module 103 verifies Primary Authentication Artifact by comparing the Primary Authentication Artifact received from the Payer’s communicator 105 and the Primary Authentication Artifact received from the Recipient’s communicator 106 (step 330). Furthermore, the verification module 103 verifies the Additional Conditions for Transaction Execution.
  • the module 103 compares the date of September 01, 2019 received from the Payer’s communicator 105 with the current date, and the name of the city of Baden- Baden received from the Payer’s communicator 105 with the data about the current geographic location of the Recipient’s communicator 106.
  • the processing server 101 cancels the transaction of crediting the Digital Asset (step 340).
  • the processing server 101 Upon successful verification of the Primary Authentication Artifact and the Additional Conditions for Transaction Execution, the processing server 101 executes the transaction (step 350) by withdrawing the Digital Asset from the Payer’s account and crediting it to the Recipient’s account. Next, the public distributed ledger 104 saves the details of the completed transaction (step 360).
  • the processing server 101 sends a message about the transaction completion to the Payer’s communicator 105 and the Recipient’s communicator 106.
  • the server 102 designates the Authentication Artifacts as extracted and deletes them from its storage medium.
  • Example 2 The system implementation when executing a Digital Asset transfer transaction in favor of an anonymous Recipient using electronic money as an example (Fig. 4, Fig. 5).
  • Processing servers 101 receive a request from the Payer’s communicator 105 for executing a transfer transaction of a Digital Asset as a certain amount of electronic money from the Payer to the anonymous Recipient (step 410).
  • the step includes the authentication of the Payer in the system according to the Protocol (for example, by entering login and password).
  • the Payer’s communicator 105 interacts with the system using modern means of communication.
  • the Payer’s communicator 105 sends the data about an anonymous
  • Servers 102 receive the transaction type (for example, public), alphanumeric code (for example,“12345pineapple”), and Additional Conditions for Transaction Execution from the Payer’s communicator 105.
  • the Payer’s communicator 105 sends the created Primary Authentication Artifact to the server 102 (step 430).
  • the Additional Conditions for Transaction Execution may be the date of September 01, 2019, as well as the name of the city of Kunststoff, from which the request to receive the transaction must be sent by the Recipient’s communicator 106.
  • the Payer can use, for example, a photo of a half-full Coca-Cola glass bottle.
  • the software of the communicator 105 saves the image of the bottle as a digital graphic file, which, in addition to the image data, contains the Metadata related to the image.
  • the entered data are processed by the system, which creates a mathematical model with a specified error level.
  • the mathematical model is a system of characteristic equations, coefficient tensors, and a set of initial conditions (configuration).
  • the Primary Authentication Artifact is created by the system on the basis of the coefficient tensors, configuration, type (and/or complexity) of the mathematical model, and the specified error level.
  • the“Yellow Submarine” song by the Beatles can be used, which was downloaded to the communicator 105.
  • the software of the communicator 105 saves the song as a digital audio file, which, in addition to the audio data, contains the Metadata related to the audio record (step 440).
  • the entered data are processed by the system, which creates a mathematical model with a specified error level.
  • the mathematical model is a system of characteristic equations, coefficient tensors, and a set of initial conditions (configuration).
  • the Secondary Authentication Artifact is created by the system on the basis of coefficient tensors, configuration, type (and/or complexity) of the mathematical model, and the specified error level.
  • the server 102 saves the Primary and Secondary Authentication Artifacts, alphanumeric code, transaction type, and Additional Conditions for Transaction Execution on its storage media (step 450).
  • the public distributed ledger 104 saves the information about the created transaction including the anonymous Recipient’s name, nominal value of the Digital Asset, and transaction type (step 460).
  • Processing servers 101 block the Digital Asset of the specified nominal value in the Payer’s account (step 470).
  • the processing servers 101 send a message about the physical object used to create the Primary Authentication Artifact, about the song that was used for creating the Secondary Authentication Artifact, about the Additional Conditions for Transaction Execution, about the transaction identifier, and alphanumeric code to the Recipient’s communicator 106 (step 480).
  • the message to the Recipient’s communicator 106 may be personal and be sent by e-mail, SMS or messenger. It is also possible to inform a large number of people by sending mass messages to their communicators. Such method of informing may be useful for conducting large-scale advertising campaigns and prize drawings, when it is not known in advance who exactly will be the Recipient.
  • the Recipient’s communicator 106 sends the request to receive the Digital Asset to the processing servers 101 (step 510).
  • the step includes the authentication of the Recipient in the system according to the Protocol (for example, by entering login and password).
  • the Processing servers 101 validate the received request, and if its execution is possible, send the request for issuing the authentication artifacts to the artifact verification module 103, which, in turn, sends the request to the authentication artifact storage server 102.
  • the server 102 sends the instructions for creating the Primary and Secondary Authentication Artifacts to the communicator 106.
  • the Recipient’s communicator 106 sends the alphanumeric code“12345pineapple” and, using the software, reproduces the Primary and Secondary Authentication Artifacts on the basis of the photo of a half-full Coca-Cola glass bottle, the “Yellow Submarine” song by the Beatles, and the relevant Metadata.
  • the Recipient’s communicator 106 sends the created Primary Authentication Artifact (step 520) and the created Secondary Authentication Artifact (step 530) to the verification module 103.
  • the server 102 sends the Primary and the Secondary Authentication
  • the server 102 also sends the Additional Conditions for Transaction Execution stored on it to the verification module 103.
  • the module 103 verifies the Primary and Secondary Authentication Artifacts, and Additional Conditions for Transaction Execution (step 540).
  • the Primary Authentication Artifact is verified by comparing the Primary Authentication Artifact received from the Payer’s communicator 105 and the Primary Authentication Artifact received from the Recipient’s communicator 106.
  • the Secondary Authentication Artifact is verified by comparing the Secondary Authentication Artifact received from the Payer’s communicator 105 and the Secondary Authentication Artifact received from the Recipient’s communicator 106.
  • the verification module 103 verifies the Additional Conditions for Transaction Execution (step 540). For this purpose, the module 103 compares the date of September 01 , 2019 received from the Payer’s communicator 105 with the current date, and the name of the city of Kunststoff received from the Payer’s communicator 105 with the data about the current geographic location of the Recipient’s communicator 106.
  • the processing server 101 cancels the transaction (step 550).
  • the processing server 101 Upon successful verification of the Primary Authentication Artifact and the Additional Conditions for Transaction Execution, the processing server 101 executes the transaction (step 560) by withdrawing the Digital Asset from the Payer’s account and crediting it to the Recipient’s account. Next, the public distributed ledger 104 saves the details of the completed transaction (step 570).
  • the processing server 101 sends a message about the transaction completion to the Payer’s communicator 105 and the Recipient’s communicator 106.
  • the server 102 designates the Authentication Artifacts as extracted and deletes them from its storage medium.
  • Example 3 The system implementation when executing a Digital Asset transfer transaction using Bitbon as an example (Fig. 6, Fig. 7).
  • the Processing servers 101 receive a request from the communicator 105 of the Payer (Bitbon owner) for executing a transfer transaction of the Digital Asset as Bitbon from the Payer to the Recipient according to the Protocol (step 610).
  • the Payer’s communicator 105 interacts with the system using modern means of communication.
  • the processing servers 101 receive the Recipient’s name (for example, John Smith) and the nominal value of the Digital Asset expressed as an amount of Bitbon from the Payer’s communicator 105 (step 620).
  • the servers 102 receive the transaction type (for example, private), alphanumeric code (for example,“12345pineapple”), Additional Conditions for Transaction Execution, and Primary Authentication Artifact from the Payer’s communicator 105 (step 630).
  • the Additional Conditions for Transaction Execution may be the date of September 01 , 2019, as well as the name of the city of London, from which the request to receive Bitbon must be sent by the Recipient’s communicator 106.
  • a photo of cat statuette can be used, which is entered into the Payer’s communicator 105.
  • the photo is saved as a digital image file, which, in addition to the image data, contains the Metadata related to the image.
  • the entered data are processed by the system, which use them to create a mathematical model with a specified error level.
  • the mathematical model is a system of characteristic equations, coefficient tensors, and a set of initial conditions (configuration).
  • the Primary Authentication Artifact is created by the system on the basis of the coefficient tensors, configuration, type (and/or complexity) of the mathematical model, and the specified error level.
  • the server 102 saves the Primary Authentication Artifact, alphanumeric code, transaction type, and Additional Conditions for Transaction Execution on its storage media (step 640).
  • the public distributed ledger 104 saves the information about the created transaction including the Recipient’s name, nominal value of Bitbon, and transaction type (step 650).
  • the processing servers 101 block Bitbon of the nominal value specified by the Payer in the Payer’s account (step 660).
  • the processing servers 101 send a message about the physical object used to create the Primary Authentication Artifact, about the Additional Conditions for Transaction Execution, about the transaction identifier, and alphanumeric code to the Recipient’s communicator 106 (step 670).
  • the Recipient’s communicator 106 sends the request to receive the Digital Asset to the processing servers 101 (step 710).
  • the step includes the authentication of the Recipient in the system according to the Protocol (for example, by entering login and password).
  • the Processing servers 101 validate the Recipient’s request, and if its execution is possible, send the request for issuing the authentication artifacts to the artifact verification module 103, which, in turn, sends the request to the authentication artifact storage server 102.
  • the server 102 sends the instructions for creating the Primary Authentication Artifact to the communicator 106.
  • the Recipient’s communicator 106 sends the alphanumeric code “12345pineapple” to the system and, using the software, reproduces the Primary Authentication Artifact on the basis of the cat statuette image and the Metadata of the image.
  • the communicator 106 sends the reproduced Primary Authentication Artifact to the verification module 103 (step 720).
  • the server 102 sends the Primary Authentication Artifact, which was received from the Payer’s communicator 105 and stored on it, to the verification module 103.
  • the server 102 also sends the Additional Conditions for Transaction Execution stored on it to the verification module 103.
  • the verification module 103 verifies the Primary Authentication Artifact, and Additional Conditions for Transaction Execution (step 730).
  • the Primary Authentication Artifact is verified by comparing the Primary Authentication Artifact received from the Payer’s communicator 105 and the Primary Authentication Artifact received from the Recipient’s communicator 106.
  • the verification module 103 verifies the Additional Conditions for Transaction Execution (step 730). For this purpose, the module 103 compares the date of September 01, 2019 received from the Payer’s communicator 105 with the current date and the name of the city of London received from the Payer’s communicator 105 with the data about the current geographic location of the Recipient’s communicator 106.
  • the processing server 101 cancels the transaction (step 740).
  • processing server 101 Upon successful verification of the Primary Authentication Artifact and the Additional Conditions for Transaction Execution, processing server 101 executes the Bitbon transfer transaction (step 750) by withdrawing it from the Payer’s account and crediting it to the Recipient’s account. Next, the public distributed ledger 104 saves the details of the completed transaction (step 760).
  • the processing server 101 sends a message about the transaction completion to the Payer’s communicator 105 and the Recipient’s communicator 106.
  • the server 102 designates the Authentication Artifacts as extracted and deletes them from its storage medium.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • Physics & Mathematics (AREA)
  • General Business, Economics & Management (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Finance (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

Selon la présente invention, un système de transfert d'actifs numériques est constitué d'un réseau de complexes matériels et logiciels interconnectés par des moyens de communication, dont chacun comprend un serveur de traitement (101) et un serveur de stockage d'artéfacts d'authentification (102). Le serveur de stockage d'artéfacts d'authentification comprend un processeur et au moins un support de stockage destiné à sauvegarder des données avec des instructions programmées destinées au processeur, des données concernant des conditions supplémentaires d'exécution de transaction, un code alphanumérique et des artéfacts d'authentification créés reçus en provenance d'un communicateur du payeur (105). Le système comprend un module (103) de vérification des artéfacts d'authentification, du code alphanumérique et des conditions supplémentaires d'exécution de transaction, lequel est configuré sous forme de complexe matériel et logiciel séparé, lequel comprend un processeur et un support de stockage doté d'instructions destinées au processeur et est apte à comparer les artéfacts d'authentification et le code alphanumérique reçu en provenance du communicateur du payeur aux artéfacts d'authentification et au code alphanumérique reçus en provenance d'un communicateur du destinataire (106). Le système comprend un registre distribué public (104) destiné à stocker des détails de transaction, lequel est configuré sous forme de réseau de complexes matériels et logiciels interconnectés aptes à stocker des détails d'une transaction créée et des détails d'une transaction achevée dans chacun des complexes matériels et logiciels.
PCT/UA2020/000005 2019-06-18 2020-01-27 Système de transfert d'actifs numériques Ceased WO2020256681A1 (fr)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
UAU201906842 2019-06-18
UAU201906842 2019-06-18

Publications (1)

Publication Number Publication Date
WO2020256681A1 true WO2020256681A1 (fr) 2020-12-24

Family

ID=74037519

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/UA2020/000005 Ceased WO2020256681A1 (fr) 2019-06-18 2020-01-27 Système de transfert d'actifs numériques

Country Status (1)

Country Link
WO (1) WO2020256681A1 (fr)

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160071097A1 (en) * 2014-09-05 2016-03-10 Silouet, Inc. Payment system that reduces or eliminates the need to exchange personal information
US20160110696A1 (en) * 2014-10-15 2016-04-21 Mastercard International Incorporated Bottom of the pyramid pay method and system
WO2016186869A1 (fr) * 2015-05-21 2016-11-24 Mastercard International Incorporated Procédé et système d'intégration de change du marché et de traitement de l'émetteur pour transactions fondées sur blockchain
US20170048235A1 (en) * 2015-07-14 2017-02-16 Fmr Llc Crypto Captcha and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
WO2017171733A1 (fr) * 2016-03-28 2017-10-05 Black Gold Coin, Inc. Systèmes et procédés de fourniture d'une vérification d'identité personnelle multifactorielle basée sur une chaîne de blocs
WO2017196289A2 (fr) * 2017-04-25 2017-11-16 Tovarystvo Z Obmezhenoiu Vidpovidalnistiu "Simcord" Procédé d'exécution de transaction de transfert de valeur numérique et système de transfert de valeur numérique pour sa mise en œuvre

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20160071097A1 (en) * 2014-09-05 2016-03-10 Silouet, Inc. Payment system that reduces or eliminates the need to exchange personal information
US20160110696A1 (en) * 2014-10-15 2016-04-21 Mastercard International Incorporated Bottom of the pyramid pay method and system
WO2016186869A1 (fr) * 2015-05-21 2016-11-24 Mastercard International Incorporated Procédé et système d'intégration de change du marché et de traitement de l'émetteur pour transactions fondées sur blockchain
US20170048235A1 (en) * 2015-07-14 2017-02-16 Fmr Llc Crypto Captcha and Social Aggregating, Fractionally Efficient Transfer Guidance, Conditional Triggered Transaction, Datastructures, Apparatuses, Methods and Systems
WO2017171733A1 (fr) * 2016-03-28 2017-10-05 Black Gold Coin, Inc. Systèmes et procédés de fourniture d'une vérification d'identité personnelle multifactorielle basée sur une chaîne de blocs
WO2017196289A2 (fr) * 2017-04-25 2017-11-16 Tovarystvo Z Obmezhenoiu Vidpovidalnistiu "Simcord" Procédé d'exécution de transaction de transfert de valeur numérique et système de transfert de valeur numérique pour sa mise en œuvre

Similar Documents

Publication Publication Date Title
US12518255B2 (en) Method and system for managing physical property information using a plurality of secure, immutable ledgers
Cockfield et al. Taxing global digital commerce
US10531230B2 (en) Blockchain systems and methods for confirming presence
US20220270084A1 (en) Leveraging Non-Fungible Tokens and Blockchain to Maintain Social Media Content
Horton Tomorrow's inheritance: The frontiers of estate planning formalism
WO2020119287A1 (fr) Procédé et appareil de création de facture basée sur une chaîne de blocs et dispositif électronique
US20190295083A1 (en) The method for executing a digital value transfer transaction and the digital value transfer system for its implementation
US20160203572A1 (en) Method to securely establish, affirm, and transfer ownership of artworks
WO2020119286A1 (fr) Procédé et appareil de création de facture fondée sur une chaîne de blocs et dispositif électronique
WO2020134699A1 (fr) Procédé et dispositif de remboursement de facture basés sur une chaîne de blocs et dispositif électronique
CN111213139A (zh) 基于区块链的无纸化文档处理
CN110322317B (zh) 一种交易数据处理方法、装置、电子设备及介质
Jakobsson Understanding social engineering based scams
EP3552172A1 (fr) Système et procédé de réduction de la fraude dans l'assurance du commerce et le financement
CN111989707A (zh) 管理基于区块链的海关清关服务的用户权限
Chander et al. Cyber laws and IT protection
US20250028790A1 (en) Systems and Methods for Token Use and Protection Using Blockchain
US20240364723A1 (en) Content-oblivious fraudulent email detection system
US12223070B2 (en) Multicomputer processing to protect data from unauthorized modification
Sharma et al. Implementation of Property Rental Website Using Blockchain with Soulbound Tokens for Reputation and Review System.
WO2020256680A1 (fr) Procédé d'exécution d'une transaction de transfert d'actif numérique
WO2020256681A1 (fr) Système de transfert d'actifs numériques
Cyphert et al. Blockchain Safe Harbor? Applying the Lessons Learned from Early Internet Regulation
US20250005592A1 (en) Techniques for storing unique item characteristics as non-fungible tokens on a blockchain
US12407533B1 (en) Method and system for NFT validation

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 20827779

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 20827779

Country of ref document: EP

Kind code of ref document: A1