Multiple Format Crypto Currency System and Method
20220383312 · 2022-12-01
Inventors
Cpc classification
International classification
G06Q20/40
PHYSICS
Abstract
A cryptocurrency system that allows multiple different forms of coins to be handled by a single system, and using a single distributed ledger, where each operation iterates through the mathematical operations for each of the different forms of coins.
Claims
1. A cryptocurrency system that allows multiple different coin forms to be handled by a single system, and uses a single distributed ledger for each of the multiple different coin forms, where the distributed ledger is stored by multiple different parties and stores a history of multiple different coins of each of the different coin forms, and where each form of coin is established as being valid or invalid based on a cryptographic algorithm, and where a first cryptographic algorithm for a first of the forms of coins is different than a second cryptographic algorithm for a second of the form of coins, and where an operation on the cryptocurrency system checks one or more coins for validity according to both the first cryptographic algorithm and the second cryptographic algorithm.
2. The system as in claim 1, wherein there are multiple additional cryptographic algorithms.
3. The system as in claim 2, where said operation iterates through the multiple cryptographic algorithms at least until finding a cryptographic algorithm that properly validates a coin.
4. The system as in claim 2, wherein there are n different forms of coins.
5. The system as in claim 4, wherein the system assigns a maximum number of coins from each coin form, and after assigning the maximum number of coins from the coin form, chooses a different coin form for additional coins after the maximum number and iterating n to a new value of n+1.
6. The system as in claim 3, the system forms a loop from one to n, and checks each coin using algorithm a.sub.n, which represents a mathematical algorithm used to verify/create/encrypt coins for the coin form n.
7. The system as in claim 1, wherein the cryptographic system assigns and maintains a fixed value for each coin.
8. A method of assigning, verifying and using cryptocurrency, comprising: Assigning multiple different coin forms to be handled by a single system, each coin form having a different cryptographic algorithm; using a single distributed ledger for each of the multiple different coin forms, for storing a history of the multiple different coins of each of the different coin forms; storing the distributed ledger by multiple different parties; establishing each form of coin as being valid or invalid based on a cryptographic algorithm, and where a first cryptographic algorithm for a first of the forms of coins is different than a second cryptographic algorithm for a second of the form of coins, and checking one or more coins for validity according to both the first cryptographic algorithm and the second cryptographic algorithm.
9. The method as in claim 8, wherein there are multiple additional cryptographic algorithms.
10. The method as in claim 9, where said operation iterates through the multiple cryptographic algorithms at least until finding a cryptographic algorithm that properly validates a coin.
11. The method as in claim 9, wherein there are n different forms of coins.
12. The method as in claim 11, further comprising assigning a maximum number of coins from each coin form, and after assigning the maximum number of coins from the coin form, selecting a different coin form for additional coins after the maximum number and iterating n to a new value of n+1.
13. The method as in claim 10, further comprising forming a loop from one to n, and checking each coin using using algorithm a.sub.n, which represents a mathematical algorithm used to verify/create/encrypt coins for the coin form n.
14. The method as in claim 8, wherein the cryptographic system assigns and maintains a fixed value for each coin.
15. A method of assigning and verifying cryptocurrency, comprising: assigning a fixed value to coins of cryptocurrency; using multiple coins of crypto currency until reaching a maximum number of coins for a specific cryptographic algorithm of the crypto currency; and after reaching the maximum number of coins, selecting a new cryptographic algorithm for the crypto currency and distributing subsequent coins of the crypto currency using the new cryptographic algorithm, while maintaining the fixed value of the coins.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0016] These and other aspects will now be described with reference to the accompanying drawings wherein:
[0017]
[0018]
[0019]
[0020]
[0021]
DETAILED DESCRIPTION
[0022] The present invention describes a completely new kind of crypto currency system, which uses cryptographic “tokens” or “coins” to represent amounts of money, but uses them in a way that provides an infinite supply of the coins, to maintain the value of the coins at a specified level amount, since there are an infinite number of coins.
[0023] The system maintains the infinite supply of coins by allowing multiple different formats of coins to be used.
[0024] Each time a new coin format is added to the format of the system, that new system of coin identification is added as an alternative decryption or encryption system as part of the different crypto currency operations.
[0025] The different crypto currency operations can include, for example, wallets which store the crypto currency, shopping carts which accept the crypto currency, repositories which issue the crypto currency in return for cash, and distributed ledger systems.
[0026] An embodiment describes a computer based client and computer based server for selling, purchasing, storing, transferring, using, and otherwise interacting with, computer based coins that represent currency, henceforth referred to as coins, with the understanding, for the purpose of this patent application, that the coins are in essence just large numbers that meet a specified cryptographic criterion.
[0027] An embodiment describes a cryptographic currency, where the currency has value beyond its inherent value as a number, because it was purchased from a repository. A distributed ledger, which is stored by multiple different parties, stores the history of each coin since the moment it was purchased.
[0028] A key to making the coin have a constant value, is making sure that there are always enough coins or coins to meet demand. Many of the current coin systems, such as bitcoin, have gone up greatly in price because there were not enough coins to meet demands. This technique described in this specification, ensures that cryptographic coins can have a fixed value relative to some financial system.
[0029] In theory anyway, there are an infinite number of cryptographic systems that can be used to create coins. A key to this system is that different cryptographic systems are approved for use each time a first cryptographic system reaches the end, or practical end, of its ability to produce new coins.
[0030] In an embodiment, the coins are purchased from a repository. That repository can be a bank, either a private bank or country own bank, or can be another website. For example, websites such as Facebook, Twitter and others can support their own coinage systems, so long as the coins are initially purchased, and are backed by some kind of value that is held by the repository. That value does not change no matter how many coins are sold.
[0031] An embodiment is shown with reference to the figures. It should be understood that many of these systems can use the cryptological, mathematical, distributed ledger, and security framework from existing coin trading systems such as bitcoin, ethereum, and from any others.
[0032] This includes encrypting and decrypting using the user's private key, hashing, and carrying out any of the other mathematical features necessary to buy, sell and trade coins between parties using a distributed ledger.
[0033] The figures show the overall basis and rationale behind this coin system, it should be understood that a person having ordinary skill in the art of cryptographic coin systems would understand how to make the basic mathematics that make this work.
[0034] The basic operation of forming the system and communicating information between the parties is shown in
[0035] The intermediary sells the coins 102 in return for cash or other payment 112 that is received by a coin recipient 120. The coin recipient or “person” exchanges “cash” 112 for the coins 102. As part of the exchange of cash for coins, the details on the transaction, along with cryptographic hashes and cryptographic encryptions are stored in a distributed ledger 130. The distributed ledger may be stored by the person, and may be stored by the intermediary and may be stored by hundreds or thousands or millions of other clients who are connected to the Internet. The many different clients storing the distributed ledger is shown generically as 135, all of whom store the distributed ledger or enough of the distributed ledger to prevent hacking of the distributed ledger.
[0036] Once the coins are received, they are stored in a user's cryptographic wallet 140, which has a wallet ID 145 and also includes encryption keys including private keys and identifying information. The wallet may also require 2 factor or multi-factor authentication prior to use of the wallet.
[0037] The user can spend the coins 102 that are in the user's wallet as described herein. The user can exchange coins from their wallet with other users, and can receive coins into their wallet from other users. The arrows 150 refer generally to the user using the cryptographic system from their wallet to exchange coins with other users.
[0038] The main flow of
[0039]
[0040] At multiple times during any transactions, one or more client computers may verify cryptographically that the user is authorized to carry out the information that they are carrying out. This ‘verify coin’ process is illustrated in
[0041] At 300, this computer, which may be any computer in the line of inter-connected network computers, gets the coin information. At 305, the computer gets the value n, which may be prestored in the computer, may be part of the distributed network, or may be communicated to the computer in any of a number of different ways. The value n represents information on the different cryptographic algorithms which are used for the coin system. There may be multiple different cryptographic algorithms used for the coin system, and in fact this is necessary to make this coin system work properly.
[0042] Each algorithm has a maximum number of coins it can support. Most cryptographic algorithms in reality do could go on forever supporting finding multiple values that uniquely represent the criterion in the cryptographic algorithm. However, as the numbers get larger, it becomes increasingly more difficult to find numbers that support the criterion. For this reason, many coin systems, including bitcoin, set a maximum number of coins which can be included within the system. This is to avoid the excess amount of computing power that would be necessary to support finding the coins.
[0043] Unlike systems such as bitcoin that allowed miners to find the coins, in the present system, the central repository must have all the coins it's going to use in advance for a specific algorithmic system. While there are computer costs involved in this, those computer costs could typically be spread in with the transaction costs that are charged to people for using the coin system.
[0044] In this system, the value n represents the different number of algorithms which can be verified to use the coin. At 310, the system forms a loop from one to n. For each of 1 to n, the coin is verified using algorithm a.sub.n. Algorithm a.sub.n represents the mathematical algorithm used to verify/create/encrypt coins for the value n. Each algorithm a.sub.n is different than each other algorithm.
[0045] For each value a, the system attempts to verify using that algorithm. If the coin is verified using the algorithm a (a1, a2, a3, etc. up to n), then the coin is established is verified at 320, and the system ends. If not, the next algorithm a is used to attempt to verify the coin, until the end of the value a's are received.
[0046] It should be understood that each value of n represents a different algorithm a.sub.n and represent hence represents a different verification mathematical operation being carried out at step 315.
[0047] If none of the value a s verify, then the coin is not verified at 330, and the transaction may be refused or not added to the distributed ledger or handled in some other way.
[0048]
[0049]
[0050] At 510, a crypto verification is carried out. This crypto verification requires that each of the coins be verified using the algorithms a.sub.1 through a.sub.n. Any time any of the coins are verified as being valid with any of the algorithms, they are taken as valid coins and sent out to the other recipient at 520.
[0051] The previous description of the disclosed exemplary embodiments is provided to enable any person skilled in the art to make or use the present invention. Various modifications to these exemplary embodiments will be readily apparent to those skilled in the art, and the generic principles defined herein may be applied to other embodiments without departing from the spirit or scope of the invention. Thus, the present invention is not intended to be limited to the embodiments shown herein but is to be accorded the widest scope consistent with the principles and novel features disclosed herein.