Currency as a form of legal tender for debts permits governments to stabilize and simplify commerce. It also provides a convenient medium of exchange for individuals and businesses. Simply paying cash for a purchase is the easiest way to complete a transaction in most situations.
However, currency has various limitations. For example, counterfeit currency can often be produced at a fraction of the nominal value of the currency. This potentially yields far-reaching effects. Not only is an individual inconvenienced when counterfeit currency ruins a transaction, but follow-on effects come into play as well. Lack of faith in a currency due to counterfeiting can destabilize the markets depending on that currency, and can eventually wreak havoc with government functions overall as the money supply fails to live up to its main purpose.
Thus, it can be useful to provide a form of currency which can be validated. Some responses to this situation involve various indicia of validity incorporated into a bill, such as security strips, watermarks, holographic features and other measures. However, these responses do not provide for third-party validation of currency, only for a check on validity of a bill or note based on physical features. Finding a way to allow for validation based on an authoritative third party can allow for greater confidence in physical currency, while still providing flexibility in transactions.
The present invention is illustrated by way of example in the accompanying drawings. The drawings should be understood as illustrative rather than limiting.
A system, method and apparatus is provided for provisioning a note backed by cryptocurrency. The specific embodiments described in this document represent exemplary instances of the present invention, and are illustrative in nature rather than restrictive.
In the following description, for purposes of explanation, numerous specific details are set forth in order to provide a thorough understanding of the invention. It will be apparent, however, to one skilled in the art that the invention can be practiced without these specific details. In other instances, structures and devices are shown in block diagram form in order to avoid obscuring the invention.
Reference in the specification to “one embodiment” or “an embodiment” means that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the invention. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments.
Notes can be created through a variety of processes resulting in a note which has two identifiers, including a first identifier such as a serial number and a second identifier such as a hidden identifier. Providing such a note and recording some form of blockchain transaction involving the two identifiers can provide for a system of commerce which can be authenticated in an effective fashion that may counteract many attempts to tamper with commerce or counterfeit currency.
To produce the note with a hidden identifier and blockchain associations, additional processing occurs.
At module 210, a note is received. To add value to the note associated with the denomination, the note is provisioned in a blockchain-recorded transaction. Thus, a government may purchase bitcoin or some other cryptocurrency to back up the value of the note and record the transaction in a blockchain associated with the cryptocurrency. Alternatively, other options may be exercised to use a designated blockchain in some embodiments, or to record a transaction related to the note, such as the creation and/or maintenance of its own unique cryptocurrency and associated blockchain, for example. The recorded transaction includes a serial number or first identifier for a note and a second identifier such as a hidden identifier generated at module 230, for example. In some embodiments, the hidden identifier is generated as a result of the blockchain transaction, and may encode identifying information for the blockchain transaction, for example.
The hidden identifier of module 230 is matched to the serial number of the note or bill at module 240, and is applied to the note at module 250. Application may involve adhering a separate layer of material, for example, or printing the hidden identifier on the note, for example, in various embodiments. Moreover, application of the hidden identifier typically involves applying a covering layer above the hidden identifier which is removable in a tamper-evident manner, either by applying a cover layer or by printing or otherwise covering the hidden identifier. A layer which can be scratched off or a layer adhered to the note atop the hidden identifier may be used, for example. Application of the hidden identifier also involves applying a backing layer to the note. The backing layer may be adhered to the note, for example, and may be expected to be opague to visual and non-visual frequencies of electromagnetic radiation, for example, to avoid an attempt to read the hidden identifier without uncovering it. The backing layer may be produced as part of the preparation process for the note in process 100 as well in some embodiments.
With the note provisioned, it is inspected at module 260. If the note is acceptable, this is determined at module 265, and the note is transferred to inventory at module 270 leading to circulation of the note in commerce at module 280. If there is a problem with the note, it is rejected at module 290, and the provisioning process is cancelled, undone, or reversed through a second transaction at module 295, for example, to extract the value of the note as recovery. This may involve cancelling or more likely a second reversing transaction on the blockchain used for provisioning.
Various processes may be used generally for making a note.
At module 330, the note is provisioned by associating a serial number or first identifier such as serial number 140 of the note with a second identifier such as a hidden identifier of the note. The second identifier is recorded in association with the first identifier in a blockchain system selected as authoritative by an issuer of the note. Thus, the blockchain system may be that associated with bitcoin, for example, or may be a blockchain system otherwise provided for. Recording with the blockchain of bitcoin, for example, may occur through a transaction using bitcoin with the first and second identifiers recorded as part of the transaction. This recording then allows for third-party verification by checking the hidden identifier (second identifier) is properly recorded against the first identifier (e.g. serial number) when one seeks to use the value of the note.
At module 340, a hidden identifier is generated which provides the second identifier which was recorded against the first identifier (e.g. a serial number of the note). At module 350, the hidden identifier is applied to the note such as through printing on the note or applying an adhesive backed material embodying the hidden identifier on the note. Moreover, at module 350, the hidden identifier is further obscured by applying the backing and cover for the hidden identifier. At module 360, the complete note is distributed, such as to a consumer facing bank for circulation.
With the note available, circulation commences.
If the bill is not acceptable, at module 470, the receiver may check the hidden identifier. The receiver may also simply refuse the bill at this point (not shown). If the hidden identifier is acceptable as determined at module 475, then at module 480 the receiver may fulfill obligations as at module 460, and may also transfer the value of the bill at module 485. If the hidden identifier is not acceptable, the receiver may refuse the bill at module 490.
Checking the hidden identifier involves additional aspects.
Other processes may also allow for use of the note when it is ready for circulation.
If the note is not considered sufficiently authenticated, a choice may be made at module 635 to not simply accept the note, but to check the hidden identifier. For embodiments, where the hidden identifier is tamper-resistant or tamper-proof, this may effectively destroy the value of the note. At module 640, the hidden identifier is uncovered. At module 650, the user checks the hidden identifier against the recorded blockchain transaction for the hidden identifier and serial number, for example. This may involve referencing information provided by an issuing authority such as a central bank, for example. Alternatively, the process may involve searching the ledgers of the blockchain or otherwise querying the blockchain to find the transaction independently. Additionally, the blockchain registration information is checked for any further transactions which transfer the funds associated with the hidden identifier and the serial number. At module 655, results of the check of module 650 are evaluated to determine if the hidden identifier and serial number or first identifier and second identifier were properly recorded in the applicable blockchain and the value is still available (not further transferred). If they were, then at module 660, the funds from the transaction may be transferred through a further transaction on the blockchain, exhausting the funds backing the note. Alternatively, if the initial transaction provisioning the note is not found, or a further transaction exhausting the note is found, then the note may be rejected at module 680 as no longer having any value associated with it. Regardless, once the hidden identifier has been used and the value is either transferred or found to be lacking, at module 670, the note may be returned to a central authority as having had the value of the note transferred and thereby no longer having the same value available for circulation. In some embodiments, users may choose to circulate notes that have value exhausted as well, with the removal of tamper-evident cover showing the status of the note, for example.
The overall system in which a note operates may further be understood with reference to the type of entities using the note.
Notes of various kinds can be used with the processes described above, provided the notes include some form of hidden identifier which can be matched with a serial number in a cryptocurrency transaction.
Note 1000 may be made of typical materials such as cotton or linen thread woven to form note 1000, for example, some form of paper, or some other material such as a durable plastic. Note 1000 may also have embedded security features, such as a security strip, microprinting, holographic printed features, or other security features. Moreover, note 1000 may have other design elements provided for a range of purposes including aesthetic considerations and security features, for example. A signature of an official or a year of printing may be provided, for example.
Note 1000 also includes a serial number 1040, shown on front surface 1005. The serial number 1040 may be expected to be unique to a given instance or copy of the note 1000, although this may also be varied by the issuer of the note 1000. Note 1000 further includes hidden identifier 1050. Hidden identifier 1050 includes a cover material and a backing material, and may include a further overlay or additional material adhered to note 1000 in some instances. Hidden identifier 1050 is shown as visible on the front surface 1005 of note 1000, but it may also be visible from the back surface 1105 of note 1000, or both surfaces in some embodiments. Hidden identifier 1050 includes an identifier such as a unique QR (quick response) code, bar code, or other encoded format. The identifier of hidden identifier 1050 is recorded in conjunction with the serial number 1040 of note 1000 at the time of issuance, and the value of the note 1000 is stored on the note 1000 by virtue of the presence of hidden identifier 1050. At the time of issuance, or in conjunction therewith, the identifier of hidden identifier 1050 is recorded in a blockchain such as that of a cryptocurrency (e.g. Bitcoin or another cryptocurrency) or a blockchain chosen as authoritative by the issuer of the note 1000. Thus, the value of hidden identifier 1050 may be verified later by a third party. Hidden identifier 1050 is covered on both sides by opaque coverings to prevent misuse. The identifier of hidden identifier is either printed or otherwise provided on the surface of note 1000, or is applied, such as through an adhered surface to the surface of note 1000.
Considering the back surface of note 1000,
One skilled in the art will appreciate that although specific examples and embodiments of the system and methods have been described for purposes of illustration, various modifications can be made without deviating from present invention. For example, embodiments of the present invention may be applied to many different types of databases, systems and application programs. Moreover, features of one embodiment may be incorporated into other embodiments, even where those features are not described together in a single embodiment within the present document.