WO2016101016A1 - Random encryption tag generator - Google Patents

Random encryption tag generator Download PDF

Info

Publication number
WO2016101016A1
WO2016101016A1 PCT/AU2015/000768 AU2015000768W WO2016101016A1 WO 2016101016 A1 WO2016101016 A1 WO 2016101016A1 AU 2015000768 W AU2015000768 W AU 2015000768W WO 2016101016 A1 WO2016101016 A1 WO 2016101016A1
Authority
WO
WIPO (PCT)
Prior art keywords
weapd
balls
row
symbols
ball
Prior art date
Application number
PCT/AU2015/000768
Other languages
French (fr)
Inventor
Ronald Ian JOHNSTON
Original Assignee
Johnston Ronald Ian
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Johnston Ronald Ian filed Critical Johnston Ronald Ian
Publication of WO2016101016A1 publication Critical patent/WO2016101016A1/en

Links

Classifications

    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C5/00Ciphering apparatus or methods not provided for in the preceding groups, e.g. involving the concealment or deformation of graphic data such as designs, written or printed messages
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09CCIPHERING OR DECIPHERING APPARATUS FOR CRYPTOGRAPHIC OR OTHER PURPOSES INVOLVING THE NEED FOR SECRECY
    • G09C1/00Apparatus or methods whereby a given sequence of signs, e.g. an intelligible text, is transformed into an unintelligible sequence of signs by transposing the signs or groups of signs or by replacing them by others according to a predetermined system
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/56Financial cryptography, e.g. electronic payment or e-cash

Definitions

  • the present invention relates to a device and method for generating random encryption tags, processing transactions and is particularly useful for securing foreign exchange transactions.
  • a builder's labourer or a cleaner can work anywhere in the world and convert their time into any number of fiat currencies.
  • the 'working hour' is a universal currency.
  • Fiat currencies can be converted back into working hours by using the same universal common denominator that reflects the exchange rate of the uneducated and unskilled effort of the builder's labourer. That common denominator is the official minimum hourly rate (mHR) paid within fiat currency systems to the lowest paid uneducated unskilled member of the national work force.
  • mHR minimum hourly rate
  • the object of this invention is to provide a method to generate random encryption tags that overcomes the above problems by generating billions of un-calculated unpredictable random encryption tags for use with a currency that circumvents the fluctuating exchange rates inherent in fiat currency transfers, or at least provides the public with a useful alternative.
  • the invention comprises a method of generating a series of pseudo-random encryption tags, said encryption tags comprising a row of N symbols, comprising firstly generating a circular queue of random symbols for each of the N symbols of a row, then for each row in the series of tags: selecting each of the symbols of the row from the front of each symbol queue; and then progressing every symbol queue.
  • the queues of random symbols are generated by associating each symbol with a unique ball, placing the balls in a mixing chamber, sequentially releasing balls from the chamber and entering the symbol associated with each released ball into a queue.
  • the balls comprises a RFID (Radio Frequency Interactive Device) used to identify the symbol associated with the ball.
  • RFID Radio Frequency Interactive Device
  • each set of symbols is a unique set of two digit alphanumeric symbols and each ball associated with a particular set of symbols is colored a particular color or color combination unique to that particular set of symbols.
  • Each set of symbols may be replicated.
  • Each ball may be tested as it enters the mixing chamber to ensure that it can be associated with a unique symbol.
  • each of the queues has its own random set of symbols and each circular queue is of a different length.
  • the queues associated with adjacent symbols of a row preferably have an odd length for one of the symbols and an even length for the other symbol.
  • More than one mixing chamber may be utilized.
  • the mixing chamber is adjacent to and interfaced with a computerized processing database.
  • Preferably placing of balls in the chamber employs robotic technology.
  • Each of the balls may comprise a visible mark used to identify the symbol associated with the ball.
  • the visible mark may be a barcode or a QR (quick response) code.
  • the invention provides a device for generating a series of pseudo-random encryption tags, said encryption tags comprising a row of N symbols, said device comprising: N circular queues; a means for filling each of the circular queues with random symbols, and a means for reading a symbol from each of the queues to form an encryption tag then progressing every symbol queue.
  • the device further comprises a series of balls, each ball representing a unique symbol, and a mixing chamber for mixing the balls into a random sequence.
  • Each of the balls may comprise a RFID (Radio Frequency Interactive Device) used to identify the symbol associated with the ball or a visible mark used to identify the symbol associated with the ball.
  • RFID Radio Frequency Interactive Device
  • any one of the aspects mentioned above may include any of the features of any of the other aspects mentioned above and may include any of the features of any of the embodiments described below as appropriate.
  • the present invention draws from two disparate existing concepts to produce a device capable of generating billions of un-calculated un-predictable random encryption tags. It incorporates the principles used in the Mayan Calendar in itself a system for measuring time with a tumbling chamber and balls similar to that used in the well-known game of Lotto where choosing the right numbers results in a win paid in fiat currency.
  • the Mayan Calendar can be described as a series of cogs within cogs.
  • each cog represents a time-frame found in the solar system.
  • one cog has teeth equivalent to the number of days in a year.
  • Another cog has 28 teeth representing each day of the thirteen full moon cycles per year.
  • Other cogs represent various planets and the time-frames they each take to complete an orbit around the sun.
  • Each cog time-frame is different.
  • the end result was a calendar with a starting point that took over 4 billion years to complete a full cycle.
  • the Lotto system is comprised of a transparent tumbling chamber and externally numbered balls both required for public scrutiny and confirmation of the validity of the selection. This gambling process is limited to one series of externally numbered balls in the tumbler at a time. In the device being described the externally numbered balls as used in Lotto have been replaced by un-numbered, un-marked balls each containing a computer readable device. [0032] Also public scrutiny of the tumbling chamber is not required; in fact the selection process requires that the selection of balls be completely random and secret so the tumbling chamber is not necessarily transparent.
  • Each computer readable device contained within the ball is programmed with its own unique two digit alpha-numeric combination.
  • a series of alpha-numeric combinations constitutes a family.
  • Each family of combinations is indicated by the external colour of the balls. Either a single colour or a combination of colours is used to differentiate each family.
  • the device being described utilizes multiple unmarked family groups of alpha-numeric balls used simultaneously in the tumbler.
  • the use of multiple families in the mixing chamber at the same time greatly increases the number of possible random combinations when a collection of balls is randomly selected.
  • the device incorporates the concept of Mayan cog time-frames without the planetary association. Instead it uses a pre-determined number of cogs each with its own pre-determined number of teeth. There can be any number of cogs and the teeth on each cog can number in the hundreds/thousands. Each tooth on a cog is represented by a randomly chosen ball containing the computer readable device programmed with its own two digit alpha-numeric combination. The alpha-numeric ball series combinations are rotated in sequence like cogs. When several cogs are used in conjunction they are revolved simultaneously one alpha-numeric ball/tooth at a time until they complete an entire cycle of all their possible alpha-numeric combinations before ending at their starting point.
  • An interface computer program system method capable of reading the computer readable device contained within selected balls memorizing deciphering their possible alpha numeric combinations and then releasing the combinations when as instructed is aided by mechanical systems within the device capable of moving the balls through the various stages of the process.
  • the invention is a device, method, system and computer generated set of tasks comprising of although not restricted to one each of the following: a series of spheres each containing a programmable computer readable device chip RFID; a series of two digit alpha-numeric units; a tumbling chamber; a mechanical system capable of moving the spheres around throughout the device as required; an interface capable of accessing reading the information programmed on the computer readable devices contained within the spheres; a processor; a memory; a keyboard; a computer screen; a printer connection; and at least one executable task.
  • the invention is referred to as the WORQOUR ENCRYTION and PROCESSING DEVICE, or WEAPD.
  • each ball includes one microcontroller device, which in one embodiment takes the form of an implanted "chip” capable of interfacing with an appropriate reader.
  • the "chip” forms part of a Radio Frequency Identification Device (RFID).
  • RFID device is a wireless information carrying device which includes a passive (i.e. battery-less) RFID technology and an antenna for transmitting and receiving radio frequency signals.
  • RFID devices are powered by harvested energy from radio waves transmitted from RFID readers.
  • the harvested energy operates a micro-controller which can perform a variety of simple tasks, such as receiving and sending data to and from the RFID reader, writing data to a memory or register in the RFID device and optionally, performing calculations (if the RFID device includes a processor module capable of performing arithmetic operations).
  • the RFID device is arranged to securely hold data in a manner that is described in more detail below.
  • the computer readable device is programmed either before or after fabrication to contain a series based on a two digit alpha-numeric sequence. In the example being described there are no visible external alpha-numeric indicators.
  • each alpha-numeric series or family is visibly represented by its own unique external colour or multi-colour combination.
  • External colour(s) is/are used to identify the family to which a damaged or non-functioning ball belongs.
  • An independent separate device capable of reading the balls can be programmed with the alpha numeric family series indicated by the external colour(s) and a faulty ball can be discovered using the process of elimination. This enables any damaged or nonfunctioning ball to be quickly identified and replaced.
  • the ball family groups are stored in transparent tubes.
  • the tubes are of a size to fit the diameter of the balls and long enough to hold the complete family series.
  • [0048] Although not restricted to the following examples they serve to illustrate families of alpha-numeric progressions programmable into the balls. Contemporary foreign or ancient alphabets and numerical sequences may also be used.
  • a family of balls may also be replicated so a number of Clones can be used in a WEAPD tumbler at the same time.
  • All the balls in the pre-selected alpha-numeric family(s) are subject to a visual inspection for obvious signs of damage. Each family of balls is then loaded independently by connecting the transparent tube to the WEAPD.
  • the tumbler loading and unloading process may be enhanced by the use of robotic technology.
  • a reading device checks every ball as it enters the machine. Once checked the ball drops into a holding tray until all the balls in the family group have been confirmed as functioning. If any ball proves to be unviable the whole family series will be retained in the holding tray and subsequently ejected from the machine. If all the balls prove viable the WEAPD will then release the entire family group from the holding tray into the tumbling chamber.
  • the combined tumbler(s) reader(s) mechanical mechanisms stand adjacent and are connected by cables to a computer.
  • cog is utilized in this description, it is used as a proxy for a linear series of units that is applied so as to repeat in a circular fashion. A cog is in effect a circular queue.
  • Each cog has its own unique number of teeth.
  • Balls loaded into the machine are mixed mechanically selected at random one ball at a time to represent each of the corresponding number of teeth on a particular cog, i.e. seventy balls are randomly selected for a cog with seventy teeth.
  • the selected balls supply a random mixture of two digit alpha-numeric units unique to that cog.
  • the machine is pre-programmed to either retain the selected balls in the collection tray thereby eliminating those balls from future selection or to return them via a mechanical method to the tumbler for reuse after each cog series has been drawn.
  • a predetermined number of cogs are programmed into the WEAPD. Each cog is then allocated its own predetermined number of teeth. There is virtually no limit to the number of cogs chosen or to the teeth allocated to each cog. (However in practice it would be sensible to restrict the cog number to a manageable size).
  • the cogs are addressed one at a time. Each cog has a different number of teeth. Each tooth will be represented by a ball released at random from the mixing chamber. When the ball selection for a cog has been completed balls for the next cog are selected and so on.
  • the cog can be considered as a circular queue, when a ball is added to a cog it is effectively inserted into the front of a queue with a length equivalent to the number of teeth.
  • each cog position, or tooth is read in turn. When the last tooth is reached the first tooth is read next and so on in a never ending circular manner.
  • the machine has been programmed to supply a four (4) cog progression.
  • COG#1 has been allocated 75 teeth so 75 balls will be selected.
  • COG#2 has been allocated 24 teeth so 24 balls will be selected.
  • COG#3 has been allocated 37 teeth so 37 balls will be selected.
  • COG#4 has been allocated 86 teeth so 86 balls will be selected.
  • COG#1 has an ODD number of teeth.
  • a manual instruction is executed for the balls to be mixed in the tumbler.
  • the mixed balls are mechanically released one at a time from the tumbler.
  • Each ball is fed past through over an interface reading device capable of ascertaining their internal two digit alpha-numeric code.
  • the two digit alpha-numeric code of each selected ball is memorized and forms a series of random alpha-numeric units.
  • Read used balls fall into a collection tray located within the WEAPD.
  • the WEAPD has been instructed to choose a total of 75 balls for COG#1 .
  • the 75 tooth alpha-numeric SERIES attributed to COG#1 is complete.
  • the WEAPD has been pre-programmed to either retain the (75) selected balls in the collection tray thereby removing them from future selection or to return them via a mechanical feed-way back into the tumbler for possible re-selection.
  • COG#2 has an EVEN number of teeth. [0081] The previous process is repeated this time with the second pre-determined number of balls being selected read and their alpha-numeric units being memorized. In this case a total of 24 balls is required. Once the predetermined number of balls has been released read and memorized the 24 tooth alpha-numeric series attributed to COG#2 is complete.
  • COG#3 has an ODD number of teeth.
  • COG#4 has an EVEN number of teeth.
  • COG#4 in this example requires 86 balls to be chosen and memorized.
  • the WEAPD memory now contains a four cog progression with each cog represented by its own unique randomly selected alpha numeric units corresponding to the number of teeth on that cog.
  • the first alpha-numeric unit selected for each cog becomes the starting point of the process.
  • the first four alpha-numeric units supplied by each cog form a ROW of units and are memorized by the computer.
  • the length of a row depends on the pre-determined number of cogs used in the process.
  • a processor revolves all four cogs simultaneously by one tooth to the next row of alpha-numeric units and memorizes those.
  • each cog will begin again from the beginning and continues to repeat until all the possible combinations of the four cog alpha-numeric rows have been deciphered memorized and all the cogs have returned to the original four alpha-numeric row starting point.
  • the WEAPD memory now contains a QUEUE of all the possible row combinations attributable to the four cogs.
  • the entire four cog process can then be repeated using a completely new set of balls released from the tumbling chamber. This would result in a completely new queue of rows in the WEAPD memory; or a different group of ball families can replace those in the chamber with the same 4 cog progression being re-used; or the cog/teeth configuration can be replaced with another cog/teeth combination and a new set of ball families.
  • the row queues generated and stored in the WEAPD memory can number in the millions or billions.
  • the WEAPD is paired to a separate device (or devices) located in different countries.
  • the rows can be supplied individually or in batches as required.
  • the system employs a computerised visual recognition process. Using balls smaller in size but similar in a sense to golf balls but without the customary indentations.
  • the balls may also be fabricated to display a repeated barcode or QR code.
  • a barcode is a machine-readable optical label that contains information about the item to which it is attached.
  • the barcode would contain an alpha-numeric unit. The barcode being arranged in such a manner as to enable the ball to be read no matter what way it is presented before the visual reading device.
  • QR code may also be used in a similar style as described for the barcode.
  • the QR code (abbreviated from Quick Response Code) is the trade mark for a type of matrix barcode (or two-dimensional barcode) first designed for the automotive industry in Japan.
  • a QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be used.
  • the QR code would contain an alpha-numeric unit.
  • the ball family groups are stored safely in transparent tubes.
  • the tubes are of a size to fit the diameter of the balls and long enough to hold the complete family series.
  • Each tube is inscribed with a simple name allocated to each family e.g. (TUBE)Groupl , (TUBE)Group2 etc.
  • the WEAPD database memory has been loaded with all the alpha-numeric family units allocated to each tube group and has them stored in its database memory for the express purpose of sorting the balls and directing them out via an exit directly back into their correct storage tubes as they are emptied from the tumbler.
  • the process of loading and emptying the tumbler may employ robotic technology.
  • the cradle is on tracks running parallel to the WEAPD in proximity to an exit used for evicting the balls from the tumbler.
  • the cradle is capable of being mechanically moved to the left or to the right so as to place a selected tube in a position where balls exiting from the WEAPD are deposited directly into it.
  • Tubes containing a small number of family of alpha-numeric balls are in short tubes.
  • the short tubes may be stood on steps so that all tubes placed in the cradle are of an equal height that corresponds to the height of an exit point on the WEAPD.
  • a RIFD in the tube base may supply the group number to the WEAPD via readers located in the cradle base.
  • the WEAPD will then proceed to empty the chamber reading the balls as they exit. Each ball will be identified as belonging to a specific family group and then mechanically moved to an exit point. Just prior to the balls arrival at the exit point the WEAPD is programmed to activate the mechanism that moves the cradle into position i.e. A, B or C etc. thereby placing the balls group tube in direct proximity to the exit point and as a result the ball will be ejected directly into the correct family group tube. [00120] When the emptying process is completed the transparent tubes can be inspected visually. Each family group has its own distinctive colour or colour combination and this can be seen through the transparent tubes. If everything appears in order the tubes are then stored in a safe place.
  • the balls can be checked by a device previously described that identifies balls containing damaged or non-viable computer readable devices.
  • TEST BALLS including non-functioning balls specifically designed for that purpose can be emptied from a tube into the tumbling chamber and fed through the WEAPD mechanics directly back into the test group tube in the cradle. This test is performed to check that all reading devices and mechanical systems are functioning.
  • the encryption tags produced by WEAPD can be put to any application that requires security, but they were primarily developed with the aim of securing safe WorQour currency transfers.
  • the WorQour is a new form of currency conceived to replace fiat currencies in international currency transfer transactions and overcome the problems associated with using them in particular problems with volatile exchange rates and problems caused by using a national currency which also functions in a dual role as a global reserve currency (i.e. the US$).
  • a national currency which also functions in a dual role as a global reserve currency (i.e. the US$).
  • WorQours Working Hours.
  • WorQour currency has broad commercial applications.
  • WorQour Currency also fulfils all the basic aims initially tabled at the Bretton Wood discussions held in July 1944: the WorQour conversion utilises stable long-term fiat monetary exchange rates (i.e. the national mHR); the WorQour allows all nations equal access to trade and raw materials because no overseas funds need to be held or acquired for trade; the WorQour is freely convertible to and from national fiat currencies therefore it removes trade barriers; the stable mHR WorQour exchange rate fosters a system of international payments that will allow trade to be conducted without fear of sudden currency depreciation or wild fluctuations in exchange rates; and the WorQour exchange rates neutralise the subsidization of labor and sweated competition in the export markets - currently this is demonstrated by firms sending jobs overseas to take advantage of cheap labour and good exchange rates between the fiat currencies.
  • One WorQhour equals the rate of pay for the lowest paid worker in every fiat currency the national mHR(s) of exchange makes the transfer of jobs overseas financially non-viable.
  • VVorQour Currency functions as a bridge between national economies.
  • VVorQour Certificates are created specifically for the purpose of storing large fiat currency values outside the domestic economy in a tangible form until their value needs to be re-introduced back into the economy.
  • VVorQour certificates are made of a durable substance. They have WEAPD generated Serial numbers and registered owners.
  • the national fiat currency accepted in exchange for the certificates is banked in a national institution.
  • the certificates can be instantly redeemed but only for/in their inceptive fiat currency.
  • VVorQour certificates are inflation, recession and depression proof. They have distinct advantages over investing in Gold bullion.
  • VVorQour symbol is shown in Figure 1 and is basically the capital letter 'C with 2 clock hour-hands pointing at 9 and 5.
  • the PLUG-IN program enables the WEAPD to interface with other devices located around the globe.
  • the plug-in program includes a BREAKPOINT RUN, a BRANCH IDENTIFIER ROW FREQUENCY SET SERIES, A TAG IDENTIFIER ROW FREQUENCY SET SERIES and a DIRECTORY listing the WEAPD branch numbers that correlate to the nationality names addresses BSB Swift account etc. details of all the global offices authorized to engage in WorQour transactions.
  • branch devices and paired devices will simply be referred to as branches.
  • branches are listed under their Nationality, Business Name, street address etc. and also by the international banking criteria commonly used for Fiat currency institutions; BSB, swift codes etc. Also found with this branch information recorded in the WEAPD database is a CODED REFERENCE NUMBER that is used by the system to identify a branch involved in the WorQour transaction transfer.
  • a program designed for the purpose will automatically update a branch directory with any changes made to the WEAPD database directory.
  • the directory is open for Fiat currency operators to search.
  • a branch requiring the transfer of fiat currency in WorQours must first obtain the WEAPD reference number of the TARGET branch from the directory. [00151] To do this an operator will type in the conventional details of the targeted branch and conduct a search to retrieve the WEAPD database number allocated to the targeted branch or its head office.
  • Fiat currency converted from WorQours may need to be deposited in a head office account and then internally transferred to an account held at one of its regional branches.
  • the WEAPD will need to be paired to devices in institutions located around the globe.
  • the WEAPD's primary objective is to supplies ROWS of alpha-numeric pair units to be used with WorQour Currency for although not restricted to the following examples; TRANSACTION encryptions, BRANCH identifiers, TAG identifiers, device identifiers, CERTIFICATE serial numbers etc.
  • the WEAPD also stores WorQour transaction information use for the purpose of calculating charges. This information available for analysis and reports can be printed out in hard copy.
  • the WEAPD supplies ROWs from its COG ROW QUEUE stored in its database memory at the request of one of the devices paired to the WEAPD. Rows stored in the WEAPD can be supplied individually or in run batches.
  • RUN BATCHES issued with the PLUG-IN program are to be used in a device pairing identification procedure.
  • the tasks performed by the various devices paired to the WEAPD are given a task priority rating. Low volume tasks having a higher priority than large volume tasks to avoid a backlog of low volume tasks.
  • Each row is divulged only once from the WEAPD COG ROW QUEUE when this occurs, that row it is allocated a SYMBOL indicating the TASK function to which the row was utilized.
  • Each TASK will have its own family of symbols. Although not restricted to the following examples they serve to illustrate the concept;
  • the device initiating the request is used to identify the task and the WEAPD selects the correct symbol family.
  • the WEAPD memorizes the symbols in sequence as the requests are fulfilled.
  • the symbols substituted for WEAPD ROWs are used in a random fashion.
  • the symbols are paired with NUMBERS using similar RFID balls and the same method previously described for obtaining the WEAPD COG ROWs (by rotating COGs).
  • Identical balls each programed with a unique unit from a SYMBOL family are loaded into the mixing chamber in a manner similar to that use for the COG ball families. Also, identical balls each one containing one unit of a unique pre-determined NUMBER series family are loaded into the mixing chamber. One set of balls must be even in total number and the other set of balls must be odd. Both sets of balls are mixed together in the WEAPD tumbling chamber.
  • the WEAPD is manually pre-programmed to process a SYMBOL/NUMBER two (2) COG progression.
  • the balls are released one at a time and read by the WEAPD reader interface which is programmed to recognize the SYMBOL balls as being distinct from the NUMBER balls. As each ball is released and read the WEAPD processor allocates the ball types to two (2) separate COGs. One cog will carry the randomly released SYMBOLS and the other cog the randomly released NUMBERS.
  • the first balls chosen for each COG will be the starting point.
  • the processor begins to rotate the COGs one tooth at a time.
  • the various combinations are memorized and form a two-part SYMBOL/NUMBER ROW queue. This queue indicates how many times a specific symbol will be used before it is replaced by the next in the series.
  • MULTIPLE types of transaction tasks each with their own family of randomly issued symbol/number rows will produce an interwoven MIXED TRANSACTION TASK FLOW Record. Illustrated as follows:
  • the transaction task flow record is retained in the WEAPD memory and is used for PAIRING devices to the WEAPD if the WEAPD has already begun the process of distributing ROWs to other devices.
  • branch(s), Branch devices, paired device(s) used in the following description are interchangeable and should be taken to represent the same broad concept illustrating a WEAPD connection to Fiat currency institutions.
  • a BREAKPOINT run is a manually determined specific number of sequential transaction symbols numbering in the hundreds or thousands and is obtained from the task flow record. Simply illustrated as follows: I BREAKPOINT SYMBOL RUN 1
  • the Creation DATE:TIME (that the BREAKPOINT run was CREATED by the WEAPD) the BREAKPOINT SYMBOL run and a PLUG-IN program are transferred separately by some secure means (e.g. computer discs, USB sticks) to the device that requires pairing to the WEAPD.
  • some secure means e.g. computer discs, USB sticks
  • the PLUG-IN program is loaded into the device in preparation for pairing.
  • the BREAKPOINT RUN is loaded into the device as/when instructed by the program.
  • the supplied Initial DATE IME is manually entered as/when instructed.
  • the BREAKPOINT functions as the DEVICE IDENTIFIER and the CREATION DATE:TIME functions like the first PIN. e.g.
  • the WEAPD matches both the BREAKPOINT RUN and the Creation DATE:TIME with that stored in its DEVICE PAIRING database the WEAPD will pair with the device.
  • the secure mediums e.g. computer discs, USB sticks
  • the secure mediums used for transferring the PLUG-IN PROGRAM and Creation DATE:TIME to the pairing device are now obsolete and can be destroyed. They can only be used once. Any problems in establishing the pairing will result in a completely new PLUG-IN program being required.
  • the WEAPD will move the Creation DATE:TIME in front of the BREAKPOINT RUN and add the DATE:TIME of the most recent pairing to be used as the future PIN at the end.
  • the WEAPD will then interact with the PLUG-IN program requesting it substitute the BEAKPOINT RUN with the first BRANCH DEVICE IDENTIFIER ROW from the DEVICE IDENTIFIER FREQUENCY ROW queue AND the first TAG IDENTIFIER ROW from TAG IDENTIFIER FREQUENCY ROW queue both having been included and supplied with the PLUG-IN program.
  • the paired device replaces the BREAKPOINT run with a BRANCH DEVICE IDENTIFIER ROW and a TAG IDENTIFIER ROW contained in the PLUG-IN program and retains the original CreationDATE:TIME I BREAKPOINT SYMBOL RUN in its memory as a future security feature. (Shown here as an eight (8) COG progression); CreationDATE:TIME/aF8fGAU1wAZX7ep1 +rR1vqsDuTT269dpA RecentDATE:TIME
  • the WEAPD will recognize the PLUG-IN BRANCH and TAG IDENTIFIER ROW sequences forwarded by the device as being supplied from its own DEVICE PAIRING DATABANK saved in the WEAPD memory and will respond to the requests.
  • the WEAPD shares the unique Device identifier ROW frequency sets with the paired device and will respond with the second identifier row. Each device taking the following unused row in the series from the ROW FREQUENCY SET SERIES when interacting with each other.
  • the device paired to the WEAPD receiving transaction task ROWs will recognize this last piece of information as being the changeable CurrentDATE:TIME as the PIN to be used when initiating the next ROW request.
  • a technician operating the WEAPD may ask for verification that the paired machine constitutes an authorised pairing.
  • the paired device will supply the Creation DATE IME, BREAKPOINT SYMBOL RUN and the last used
  • the PLUG-IN Program supplied for a device pairing essentially contains two batches of WEAPD COG ROWs that are used as the paired device IDENTIFIERS and the frequency at which each ROW in the batches are to be used before being replaced by the next ROW in the series.
  • the ROWs and the frequency at which they are used constitute a FREQUENCY SET.
  • the two frequency sets are named BRANCH IDENTIFIER FREQUENCY SET and TAG IDENTIFIER FREQUENCY SET.
  • FREQUENCY SET(s) are created by the WEAPD.
  • the process of producing FREQUENCY SETS involves the use of a FAMILY OF NUMBERS applied to a batch of ROWs issued from the WEAPD COG ROW queue.
  • NUMBERS Although not restricted to the examples given a Family of NUMBERS could consist of: (1 ,2,3,4,5), (1 ,2,3,4,5,6,7,8,9), (2,4,6,8), (1 ,3,5,7,9), (1 ,3,6,9) etc.
  • a NUMBER FAMILY may also be REPLICATED and a number of Clones introduce into the Tumbler e.g. (1 ,2,3), (1 ,2,3), (1 ,2,3), (1 ,2,3), (1 ,2,3), (1 ,2,3).
  • the tumbler now contains several different Number Families OR several clones of the same family OR a mixture of both.
  • the tumbler is activated and the balls are mixed.
  • a number of balls are pre-determined for release and that number can be ALL or a fraction of the total number of balls contained in the tumbler.
  • the device releases the balls one by one reads records memorises the numbers contained within the balls up to the pre-determined number. [00216] The final result is called a NUMBER SET of randomly selected numbers. A number set will be used as a COG.
  • the WEAPD can create a queue of unique NUMBER SETs and stores these in its memory for future use.
  • the WEAPD When the WEAPD is required to supply a BATCH of ROWs intended for branch device Tag identifiers.
  • the WEAPD takes a BATCH of ROWs from the COG ROW QUEUE stored in its memory.
  • a batch can consist of hundreds of rows.
  • the WEAPD also retrieves the next NUMBER SET from the queue in its memory.
  • the first ROW from the BATCH is paired with the first NUMBER from the NUMBER SET.
  • the first NUMBER in the NUMBER SET determines how often the first ROW is used before being replaced by the second ROW in the series.
  • the second ROW is also matched with the second NUMBER in the NUMBER SET and that determines how often the second ROW will be used before being replaced by the third ROW. And so on.
  • the number of units in a NUMBER SET is less than the number of units in a ROW BATCH. This will result in the NUMBER SET COG rolling-on to begin again when all of the numbers in the NUMBER SET have been used.
  • the BATCH ROWS will also be required to roll-on when it reaches the end of the ROWs contained in the batch if the NUMBER SET is only partially through the numbers in the NUMBER set.
  • a ROW FREQUENCY SERIES pertaining to the BRANCH and a second ROW FREQUENCY SERIES used to identify TAG transactions are included with the Plug-in program.
  • the result is two batches each changing ROWs according to their individual number frequencies.
  • the DATE:TIME of the transaction is also included with the branch and tag ROWs being used. Both devices are capable of recognizing any irregularity in the use of either Branch or Tag ROW frequencies and/or the DATE:TIME used for a transaction task. Any irregularity will result in a termination of the WorQours transaction transfer task and trigger an alert.
  • a PLUG-IN program function is to ascertain the tasks being performed by the paired device and supply this information to the WEAPD.
  • the WEAPD can then identify the correct family of Symbols to be substituted when the paired device initiates requests for transaction tasks. Examples offered earlier in this explanation were: Symbols to indicate ROWs used for WorQour Currency transactions;
  • WorQours are then transferred, by a suitable method, over a border to another nation.
  • the recipient nation in turn, using their predetermined monetary rate (mHR), converts the WorQours forward into their own fiat currency. The conversion this time requires the process of multiplication.
  • mHR predetermined monetary rate
  • Japan has an mHR of ⁇ 5.00 (5 Yen)
  • the WorQour Encryption code system of the embodiment uses ROW codes to ensure that transactions performed in conjunction with WorQour transfers etc. are exclusively legitimately sourced through the WEAPD database and to enable the calculations of royalties and charges resulting from the use of WorQours in transfers.
  • the same WorQour encryption code in another form is used to identify the addresses of machines making mHR requests.
  • Each branch computer has been given via the PLUG-IN program its own unique BRANCH ROW IDENTIFIER FREQUENCY SET and at the same time its own unique TAG ROW IDENTIFIER FREQUENCY SET SERIES both originating from the WorQour Encryption and Processing Device (WEAPD).
  • WEAPD WorQour Encryption and Processing Device
  • the WEAPD Database memory contains all official national mHR figures used in WorQour calculations.
  • the WEAPD is instructed to supply a hardcopy of a WEAPD COG ROW from its own WEAPD COG ROW QUEUE.
  • the mHR rates stored in the WEAPD database memory are updated by authorised individuals using conventional metal keys to access, over-ride and change existing settings.
  • a paired device sends a request for a WorQour transfer to the WEAPD.
  • the initiating branch wants to transfer $15,000 Australian dollars to the USA Illustrated as follows;
  • BT is the identifier for a Business Transfer.
  • “Initial” is the branch identification number of the branch initiating the transaction and is sourced from the WAPD Directory.
  • the initiating Branch and TAG identifiers ROWs are also supplied.
  • TARGET is the branch identification number sourced from the WEAPD directory of the branch to which the transfer transaction is directed.
  • the WEAPD Upon receipt of a request the WEAPD searches the branch Directory number and confirms the branch by the identifier ROWs it supplies. They were issued from the WEAPD COG ROW QUEUE and sent to the device via a PLUG-IN program. The WEAPD will not respond if the branch identification number the BRANCH or TAG identifier supplied with the request are not recognised as a valid combination.
  • the WEAPD allocates a ROW from a WEAPD COG ROW QUEUE to identify the transaction (the example shown here is from a 7 x COG ROW i.e.; Ds28ee19BG1 1 Rg).
  • the WEAPD is able to access the Target BRANCH identifier series and TAG identifier series it shares with the TARGET branch.
  • the WEAPD is able to access the Target BRANCH identifier series and TAG identifier series it shares with the TARGET branch.
  • the TARGET branch's Directory address number will link to a PLUG-IN program stored in the WEAPD DEVICE PAIRING DATABANK and to transactions already carried out by the branch. This will allow the WEAPD to access the NEXT branch identifier ROW of the BRANCH ROW FREQUENCY SERIES from a program it shares with that branch.
  • the letter 'C in the following example is a stand-in for the WorQour currency symbol illustrated in ( Figurel .WorQour Symbol).
  • the currency symbol is not yet available in any font format.
  • the WEAPD accesses the appropriate mHR figures from its database memory and calculates the transaction transfer task:
  • the WEAPD sends a string of data to the TARGET branch including the source of the transfer in the form of the Initiating branch's WEAPD Directory number. Illustrated as follows;
  • the DATE:TIME used here is the time according to the WorQour database clock.
  • the branch and TAG identifiers belong to the Target branch, the WorQourencryptioncodeROW for future reference.
  • the TARGET bank receives US $5526.31578947368424 fiat currency and deposits this into an allocated bank account. [00291] The TARGET bank then retrieves the NEXT branch identifier ROW from it's own BRANCH ROW FREQUENCY SERIES and the next TAG from the TAG ROW
  • the WEAPD recognises the branch address and TAG ROWS, the WorkQour amount and its own WorQourencryptioncodeROW.
  • the WEAPD now send confirmation of a successful transaction to the branch that initiated the currency transfer.
  • the next Branch and TAG identifiers from their respective ROW FREQUENCY SERIES are used.
  • Branch identification and TAG identification ROWs along with the exchange rate calculations are recorded by the WEPD in the Transaction database for purposes of calculating transaction charges.
  • the branches involve will do the same and also supply information to any relevant government agencies pertaining to the national fiat currency transferred by this method. Also the information contained in the transaction records can be analysed by a program and a report results statistics printed out as a hard copy.
  • the WEAPD having supplied the IDENTIFIER ROWs and the frequency of ruse recognises the ROW patterns and responds positively.
  • the reader will now appreciate the present invention provides a random encryption tag generator that generates billions of un-calculated un-predictable random encryption tags that can be used to safely encrypt foreign currency transactions.
  • the tags are particularly suited for use with a new regime of foreign currency transactions based around the concept of the WorQour.

Abstract

A device and method for random encryption tag generation that generates billions of un-calculated, un-predictable random encryption tags that can be used to safely encrypt foreign currency transactions. The tags are particularly suited for use with a new regime of foreign currency transactions based around the concept of the WorQour which brings equality to the working hours of people in all countries. The device and method are also capable of performing transactions using the tags.

Description

Random Encryption Tag Generator
FIELD OF THE INVENTION
[0001] The present invention relates to a device and method for generating random encryption tags, processing transactions and is particularly useful for securing foreign exchange transactions.
BACKGROUND TO THE INVENTION
[0002] The term "Money makes Money" is misleading. If every human disappeared from this planet what would happen to money? Money would just lie there or it would blow around and eventually decay. Not one more new note or coin would ever be produced.
[0003] Every week people go to work with empty wallets and at the end of their working week their wallets are filled with money. They have turned their time into money. They are paid by the hour, week, fortnight, month or salaried year. Their time can be contracted in years. How much they are paid depends on the educated skills they are applying during that time. Money is a voucher token reward for supplying human effort time.
[0004] Theoretically a builder's labourer or a cleaner can work anywhere in the world and convert their time into any number of fiat currencies. The 'working hour' is a universal currency.
[0005] Once converted into fiat currencies human effort time loses all significance. Contemporary commercial transactions between fiat currencies use currency exchange rates. Exchange rates fluctuate and at times of global unrest can be extremely volatile. Fluctuating and volatile fiat currency exchange rates have a direct bearing on the fiat currency value of human effort time and on what workers can exchange their fiat currencies for in terms of goods and services. Currency speculation or gambling on these exchange rates is rife and the exchange rates themselves can be manipulated. Working hours can be made and working hours can be lost in this speculation. [0006] There is an opening for a method that neutralizes and removes the systems abusing and wasting the working hours of the hard-working man. The solution is quite simple.
[0007] The practice performed by the builder's labourer can be taken one step further and be extended to the actual fiat currencies themselves. The process can be reversed. Fiat currencies can be converted back into working hours by using the same universal common denominator that reflects the exchange rate of the uneducated and unskilled effort of the builder's labourer. That common denominator is the official minimum hourly rate (mHR) paid within fiat currency systems to the lowest paid uneducated unskilled member of the national work force.
[0008] With the globalisation of commercial transactions ever increasing. The exchange of fiat currencies between nations is no longer limited to governments and large corporate entities. This international expansion of the world economy has necessitated a fundamental shift in the manner in which currency is exchanged and the way banking is carried out. In particular, the advent of computerisation has allowed for sophisticated security measures to allow individuals to carry out exchanges of value (monetary transactions) irrespective of geographical location or relative wealth. However, such systems inherently rely on transmitting information between computing systems. While sophisticated encryption systems exist to protect such information, the current trend towards relying on transmitted information is not fool proof. Transmitted information can be captured and criminals are always finding ways to circumvent or disable security measures.
[0009] Not only is security a problem in cross-border transactions, the volatile exchange rates intrinsic in such exchanges can result in a profound increase in cost to the customer. The exchange of fiat currencies is fraught with risk.
[0010] There is a need to create a device, system and method to assist in reducing fraudulent transactions. Even better would be one that incorporates a currency to eliminate the volatile exchange rates inherent in national fiat currency transactions. [001 1] The object of this invention is to provide a method to generate random encryption tags that overcomes the above problems by generating billions of un-calculated unpredictable random encryption tags for use with a currency that circumvents the fluctuating exchange rates inherent in fiat currency transfers, or at least provides the public with a useful alternative.
SUMMARY OF THE INVENTION
[0012] In a first aspect the invention comprises a method of generating a series of pseudo-random encryption tags, said encryption tags comprising a row of N symbols, comprising firstly generating a circular queue of random symbols for each of the N symbols of a row, then for each row in the series of tags: selecting each of the symbols of the row from the front of each symbol queue; and then progressing every symbol queue.
[0013] Preferably the queues of random symbols are generated by associating each symbol with a unique ball, placing the balls in a mixing chamber, sequentially releasing balls from the chamber and entering the symbol associated with each released ball into a queue.
[0014] The balls comprises a RFID (Radio Frequency Interactive Device) used to identify the symbol associated with the ball.
[0015] Preferably each set of symbols is a unique set of two digit alphanumeric symbols and each ball associated with a particular set of symbols is colored a particular color or color combination unique to that particular set of symbols. Each set of symbols may be replicated.
[0016] Each ball may be tested as it enters the mixing chamber to ensure that it can be associated with a unique symbol.
[0017] Preferably each of the queues has its own random set of symbols and each circular queue is of a different length. [0018] The queues associated with adjacent symbols of a row preferably have an odd length for one of the symbols and an even length for the other symbol.
[0019] More than one mixing chamber may be utilized. Preferably the mixing chamber is adjacent to and interfaced with a computerized processing database.
[0020] Preferably placing of balls in the chamber employs robotic technology.
[0021] Each of the balls may comprise a visible mark used to identify the symbol associated with the ball. The visible mark may be a barcode or a QR (quick response) code.
[0022] In a second aspect the invention provides a device for generating a series of pseudo-random encryption tags, said encryption tags comprising a row of N symbols, said device comprising: N circular queues; a means for filling each of the circular queues with random symbols, and a means for reading a symbol from each of the queues to form an encryption tag then progressing every symbol queue.
[0023] Preferably the device further comprises a series of balls, each ball representing a unique symbol, and a mixing chamber for mixing the balls into a random sequence.
[0024] Each of the balls may comprise a RFID (Radio Frequency Interactive Device) used to identify the symbol associated with the ball or a visible mark used to identify the symbol associated with the ball.
[0025] It should be noted that any one of the aspects mentioned above may include any of the features of any of the other aspects mentioned above and may include any of the features of any of the embodiments described below as appropriate.
BRIEF DESCRIPTION OF THE DRAWINGS
[0026] Preferred features, embodiments and variations of the invention may be discerned from the following Detailed Description which provides sufficient information for those skilled in the art to perform the invention. The Detailed Description is not to be regarded as limiting the scope of the preceding Summary of the Invention in any way. The Detailed Description will make reference to a number of drawings as follows. [0027] Figure 1 illustrates the symbol used to denote WorQour currency. DETAILED DESCRIPTION OF THE INVENTION
[0028] The following detailed description of the invention refers to the accompanying drawings. Wherever possible, the same reference numbers will be used throughout the drawings and the following description to refer to the same and like parts. Dimensions of certain parts shown in the drawings may have been modified and/or exaggerated for the purposes of clarity or illustration.
[0029] The present invention draws from two disparate existing concepts to produce a device capable of generating billions of un-calculated un-predictable random encryption tags. It incorporates the principles used in the Mayan Calendar in itself a system for measuring time with a tumbling chamber and balls similar to that used in the well-known game of Lotto where choosing the right numbers results in a win paid in fiat currency.
[0030] The Mayan Calendar can be described as a series of cogs within cogs. In the calendar each cog represents a time-frame found in the solar system. For example one cog has teeth equivalent to the number of days in a year. Another cog has 28 teeth representing each day of the thirteen full moon cycles per year. Other cogs represent various planets and the time-frames they each take to complete an orbit around the sun. Each cog time-frame is different. The end result was a calendar with a starting point that took over 4 billion years to complete a full cycle.
[0031] The Lotto system is comprised of a transparent tumbling chamber and externally numbered balls both required for public scrutiny and confirmation of the validity of the selection. This gambling process is limited to one series of externally numbered balls in the tumbler at a time. In the device being described the externally numbered balls as used in Lotto have been replaced by un-numbered, un-marked balls each containing a computer readable device. [0032] Also public scrutiny of the tumbling chamber is not required; in fact the selection process requires that the selection of balls be completely random and secret so the tumbling chamber is not necessarily transparent.
[0033] Where ball, tooth and alpha-numeric unit are used throughout this description, these terms should be interpreted to cover the same broad concept. In a similar fashion where computer readable device, chip and RFID are used throughout this description, these terms should be interpreted to cover the same broad concept.
[0034] Each computer readable device contained within the ball is programmed with its own unique two digit alpha-numeric combination. A series of alpha-numeric combinations constitutes a family. Each family of combinations is indicated by the external colour of the balls. Either a single colour or a combination of colours is used to differentiate each family.
[0035] Unlike the Lotto system which involves one series of numbered balls in the tumbler at any one time the device being described utilizes multiple unmarked family groups of alpha-numeric balls used simultaneously in the tumbler. The use of multiple families in the mixing chamber at the same time greatly increases the number of possible random combinations when a collection of balls is randomly selected.
[0036] The device incorporates the concept of Mayan cog time-frames without the planetary association. Instead it uses a pre-determined number of cogs each with its own pre-determined number of teeth. There can be any number of cogs and the teeth on each cog can number in the hundreds/thousands. Each tooth on a cog is represented by a randomly chosen ball containing the computer readable device programmed with its own two digit alpha-numeric combination. The alpha-numeric ball series combinations are rotated in sequence like cogs. When several cogs are used in conjunction they are revolved simultaneously one alpha-numeric ball/tooth at a time until they complete an entire cycle of all their possible alpha-numeric combinations before ending at their starting point. As evident in the Mayan Calendar this process has the potential to supply exceptionally huge numbers of multi-alpha-numeric row combinations. [0037] An interface computer program system method capable of reading the computer readable device contained within selected balls memorizing deciphering their possible alpha numeric combinations and then releasing the combinations when as instructed is aided by mechanical systems within the device capable of moving the balls through the various stages of the process.
[0038] The invention is a device, method, system and computer generated set of tasks comprising of although not restricted to one each of the following: a series of spheres each containing a programmable computer readable device chip RFID; a series of two digit alpha-numeric units; a tumbling chamber; a mechanical system capable of moving the spheres around throughout the device as required; an interface capable of accessing reading the information programmed on the computer readable devices contained within the spheres; a processor; a memory; a keyboard; a computer screen; a printer connection; and at least one executable task.
[0039] For convenience the invention is referred to as the WORQOUR ENCRYTION and PROCESSING DEVICE, or WEAPD.
[0040] The balls used throughout the following processes are equal in size and made of although not restricted to the samples provided from a durable substance e.g. plastic or resin. During their fabrication a computer readable device is manufactured into each ball. [0041] In more detail, each ball includes one microcontroller device, which in one embodiment takes the form of an implanted "chip" capable of interfacing with an appropriate reader. In another embodiment, the "chip" forms part of a Radio Frequency Identification Device (RFID). In more detail, the RFID device is a wireless information carrying device which includes a passive (i.e. battery-less) RFID technology and an antenna for transmitting and receiving radio frequency signals.
[0042] RFID devices are powered by harvested energy from radio waves transmitted from RFID readers. The harvested energy operates a micro-controller which can perform a variety of simple tasks, such as receiving and sending data to and from the RFID reader, writing data to a memory or register in the RFID device and optionally, performing calculations (if the RFID device includes a processor module capable of performing arithmetic operations).
[0043] In the embodiment described herein, the RFID device is arranged to securely hold data in a manner that is described in more detail below.
[0044] The computer readable device is programmed either before or after fabrication to contain a series based on a two digit alpha-numeric sequence. In the example being described there are no visible external alpha-numeric indicators.
[0045] However in the system being described each alpha-numeric series or family is visibly represented by its own unique external colour or multi-colour combination. External colour(s) is/are used to identify the family to which a damaged or non-functioning ball belongs.
[0046] An independent separate device capable of reading the balls can be programmed with the alpha numeric family series indicated by the external colour(s) and a faulty ball can be discovered using the process of elimination. This enables any damaged or nonfunctioning ball to be quickly identified and replaced.
[0047] The ball family groups are stored in transparent tubes. The tubes are of a size to fit the diameter of the balls and long enough to hold the complete family series. [0048] Although not restricted to the following examples they serve to illustrate families of alpha-numeric progressions programmable into the balls. Contemporary foreign or ancient alphabets and numerical sequences may also be used.
[0049] Lowercase combinations: aa,ab,ac az. (26 ball progression); ba,bb,bc bz (26 ball progression); etcetera
[0050] Lowercase/Uppercase combinations;
Aa,Ab,Ac Az. (26 ball progression);
Ba,Bb,Bc, ...Bz. (26 ball progression); aA,aB,aC, ...aZ. (26 ball progression); bA,bB,bC....bZ (26 ball progression); etcetera.
[0051] Lowercase/Number combinations:
1 a, 1 b, 1c, 1z (26 ball progression);
2a,2b,2c 2z (26 ball progression);
Etcetera.
[0052] Uppercase/Number combinations 1A,1 B,1 C....1Z (26 ball progression); 2A,2B,2C....2Z (26 ball progression); Etcetera
[0053] Uppercase combinations:
AA, BB,CC....ZZ (26 ball progression);
AB, AC,AD....AZ (25 ball progression); BA,BC,BD....BZ (25 ball progression) [0054] Number combinations:
10, 1 1 , 21 ....19 (10 ball progression); 20, 21 , 22....29 (10 ball progression); etcetera; and
00, 01 , 02....99 (100 ball progression)
[0055] A family of balls may also be replicated so a number of Clones can be used in a WEAPD tumbler at the same time.
[0056] LOADING THE MACHINE
[0057] All the balls in the pre-selected alpha-numeric family(s) are subject to a visual inspection for obvious signs of damage. Each family of balls is then loaded independently by connecting the transparent tube to the WEAPD.
[0058] The tumbler loading and unloading process may be enhanced by the use of robotic technology.
[0059] A reading device checks every ball as it enters the machine. Once checked the ball drops into a holding tray until all the balls in the family group have been confirmed as functioning. If any ball proves to be unviable the whole family series will be retained in the holding tray and subsequently ejected from the machine. If all the balls prove viable the WEAPD will then release the entire family group from the holding tray into the tumbling chamber.
[0060] This process is repeated until the pre-selected ball families have been inspected loaded checked and are subsequently contained within the tumbling chamber. The chamber now contains a collection of ball family groups. Once loading is complete a manual instruction is performed and the tumbler commences mixing the balls. [0061] In an alternative embodiment more than one tumbler may be employed. Each tumbler being loaded with ball FAMILIES and taking turns to supply the alpha-numeric balls.
[0062] In another further embodiment the combined tumbler(s) reader(s) mechanical mechanisms stand adjacent and are connected by cables to a computer.
[0063] THE COG / BALL ALLOCATION
[0064] Where the term cog is utilized in this description, it is used as a proxy for a linear series of units that is applied so as to repeat in a circular fashion. A cog is in effect a circular queue.
[0065] Where ball, tooth, teeth and alpha-numeric unit are used throughout this description, these terms should be interpreted to cover the same broad concept.
[0066] Each cog has its own unique number of teeth. Balls loaded into the machine are mixed mechanically selected at random one ball at a time to represent each of the corresponding number of teeth on a particular cog, i.e. seventy balls are randomly selected for a cog with seventy teeth.
[0067] The selected balls supply a random mixture of two digit alpha-numeric units unique to that cog.
[0068] The machine is pre-programmed to either retain the selected balls in the collection tray thereby eliminating those balls from future selection or to return them via a mechanical method to the tumbler for reuse after each cog series has been drawn.
[0069] Although not restrictive the following description serves to illustrate the concept.
[0070] A predetermined number of cogs are programmed into the WEAPD. Each cog is then allocated its own predetermined number of teeth. There is virtually no limit to the number of cogs chosen or to the teeth allocated to each cog. (However in practice it would be sensible to restrict the cog number to a manageable size). The cogs are addressed one at a time. Each cog has a different number of teeth. Each tooth will be represented by a ball released at random from the mixing chamber. When the ball selection for a cog has been completed balls for the next cog are selected and so on. The cog can be considered as a circular queue, when a ball is added to a cog it is effectively inserted into the front of a queue with a length equivalent to the number of teeth. When read, each cog position, or tooth is read in turn. When the last tooth is reached the first tooth is read next and so on in a never ending circular manner.
[0071] In this example the machine has been programmed to supply a four (4) cog progression.
[0072] COG#1 has been allocated 75 teeth so 75 balls will be selected. [0073] COG#2 has been allocated 24 teeth so 24 balls will be selected. [0074] COG#3 has been allocated 37 teeth so 37 balls will be selected. [0075] COG#4 has been allocated 86 teeth so 86 balls will be selected. [0076] COG#1 has an ODD number of teeth.
[0077] A manual instruction is executed for the balls to be mixed in the tumbler. The mixed balls are mechanically released one at a time from the tumbler.
[0078] Each ball is fed past through over an interface reading device capable of ascertaining their internal two digit alpha-numeric code. The two digit alpha-numeric code of each selected ball is memorized and forms a series of random alpha-numeric units. Read used balls fall into a collection tray located within the WEAPD. In our example the WEAPD has been instructed to choose a total of 75 balls for COG#1 . Once the predetermined number of balls has been released read and memorized by the WEAPD memory the 75 tooth alpha-numeric SERIES attributed to COG#1 is complete.
[0079] The WEAPD has been pre-programmed to either retain the (75) selected balls in the collection tray thereby removing them from future selection or to return them via a mechanical feed-way back into the tumbler for possible re-selection.
[0080] COG#2 has an EVEN number of teeth. [0081] The previous process is repeated this time with the second pre-determined number of balls being selected read and their alpha-numeric units being memorized. In this case a total of 24 balls is required. Once the predetermined number of balls has been released read and memorized the 24 tooth alpha-numeric series attributed to COG#2 is complete.
[0082] COG#3 has an ODD number of teeth.
[0083] The process described for COG#1 and #2 is again repeated this time releasing the 37 balls required to represent the teeth in COG#3.
[0084] COG#4 has an EVEN number of teeth.
[0085] The process is repeated for a fourth time. COG#4 in this example requires 86 balls to be chosen and memorized.
[0086] The WEAPD memory now contains a four cog progression with each cog represented by its own unique randomly selected alpha numeric units corresponding to the number of teeth on that cog.
[0087] The first alpha-numeric unit selected for each cog becomes the starting point of the process.
[0088] The first four alpha-numeric units supplied by each cog form a ROW of units and are memorized by the computer. The length of a row depends on the pre-determined number of cogs used in the process.
[0089] A processor revolves all four cogs simultaneously by one tooth to the next row of alpha-numeric units and memorizes those.
[0090] The process is repeated over and over.
[0091] The different number of teeth allocated to each cog means at certain stages one cog will have completed a cycle before the other cogs have completed theirs. [0092] On reaching the end of its series each cog will begin again from the beginning and continues to repeat until all the possible combinations of the four cog alpha-numeric rows have been deciphered memorized and all the cogs have returned to the original four alpha-numeric row starting point.
[0093] The WEAPD memory now contains a QUEUE of all the possible row combinations attributable to the four cogs.
[0094] If necessary the entire four cog process can then be repeated using a completely new set of balls released from the tumbling chamber. This would result in a completely new queue of rows in the WEAPD memory; or a different group of ball families can replace those in the chamber with the same 4 cog progression being re-used; or the cog/teeth configuration can be replaced with another cog/teeth combination and a new set of ball families.
[0095] By adjusting the cog/teeth alpha-numeric combinations the row queues generated and stored in the WEAPD memory can number in the millions or billions.
[0096] The WEAPD is paired to a separate device (or devices) located in different countries.
[0097] When instructed the WEAPD is programmed to divulge each row IN SEQUENCE from the cog row queue contained in the WEAPD database memory.
[0098] The rows can be supplied individually or in batches as required.
[0099] Alternative Ball Embodiments - Visual Recognition.
[00100] In the example previously described there are no visible external alpha-numeric indicators on the balls. In a further embodiment the system employs a computerised visual recognition process. Using balls smaller in size but similar in a sense to golf balls but without the customary indentations.
[00101] The indentation placement is used but the indentations are replaced with a repeat of the same unique alpha-numeric unit allocated to that particular ball. No matter which way the ball lands a reading device will be capable of reading at least one of the units displayed on the ball by visual recognition techniques.
[00102] The balls may also be fabricated to display a repeated barcode or QR code.
[00103] A barcode is a machine-readable optical label that contains information about the item to which it is attached. In another embodiment the barcode would contain an alpha-numeric unit. The barcode being arranged in such a manner as to enable the ball to be read no matter what way it is presented before the visual reading device.
[00104] A QR code may also be used in a similar style as described for the barcode.
[00105] The QR code (abbreviated from Quick Response Code) is the trade mark for a type of matrix barcode (or two-dimensional barcode) first designed for the automotive industry in Japan. A QR code uses four standardized encoding modes (numeric, alphanumeric, byte/binary, and kanji) to efficiently store data; extensions may also be used. In this embodiment the QR code would contain an alpha-numeric unit.
[00106] STORAGE OF THE BALLS and EMPTYING THE TUMBLER.
[00107] The ball family groups are stored safely in transparent tubes. The tubes are of a size to fit the diameter of the balls and long enough to hold the complete family series. Each tube is inscribed with a simple name allocated to each family e.g. (TUBE)Groupl , (TUBE)Group2 etc.
[00108] The WEAPD database memory has been loaded with all the alpha-numeric family units allocated to each tube group and has them stored in its database memory for the express purpose of sorting the balls and directing them out via an exit directly back into their correct storage tubes as they are emptied from the tumbler.
[00109] When loading the WEAPD tubes are connected to the device one at a time and the balls emptied past the first reading device into the holding tray then into the tumbling chamber. The empty tubes are stood side by side in a cradle adjacent to the WEAPD.
[001 10] The process of loading and emptying the tumbler may employ robotic technology. [001 1 1] The cradle is on tracks running parallel to the WEAPD in proximity to an exit used for evicting the balls from the tumbler. The cradle is capable of being mechanically moved to the left or to the right so as to place a selected tube in a position where balls exiting from the WEAPD are deposited directly into it.
[001 12] Tubes containing a small number of family of alpha-numeric balls are in short tubes. The short tubes may be stood on steps so that all tubes placed in the cradle are of an equal height that corresponds to the height of an exit point on the WEAPD.
[001 13] Larger groups that could be contained in very long tubes are split into two or three group tubes so that the tube heights will correspond with the heights of the other tubes presenting at the exit. Split families in multi-tubes are named Groupl a, Groupl b, etc.
[001 14] The Group numbers and the position of the tubes on the cradle are noted e.g. Groupl 2 position TV, Group6 position 'B', Groupl 5 position 'C, etc.
[001 15] The operator enters this information into the WEAPD emptying program.
[001 16] Alternatively a RIFD in the tube base may supply the group number to the WEAPD via readers located in the cradle base.
[001 17] The WEAPD now has been programmed with the group number, the position of the group storage tube on the mobile cradle and the alpha-numeric units in that group are sourced supplied from the WEAPD database memory.
[001 18] When the WEAPD has finished supplying balls for a cog row queue calculation an operator can instruct the WEAPD to empty the tumbling chamber.
[001 19] The WEAPD will then proceed to empty the chamber reading the balls as they exit. Each ball will be identified as belonging to a specific family group and then mechanically moved to an exit point. Just prior to the balls arrival at the exit point the WEAPD is programmed to activate the mechanism that moves the cradle into position i.e. A, B or C etc. thereby placing the balls group tube in direct proximity to the exit point and as a result the ball will be ejected directly into the correct family group tube. [00120] When the emptying process is completed the transparent tubes can be inspected visually. Each family group has its own distinctive colour or colour combination and this can be seen through the transparent tubes. If everything appears in order the tubes are then stored in a safe place.
[00121] Any confusion in the balls contained within the tubes indicates a problem. The possible problem, a reading malfunction in the WEAPD, can be sourced repaired or replaced. In this event the tubes themselves can be emptied and the balls hand-sorted into their correct group tubes.
[00122] The balls can be checked by a device previously described that identifies balls containing damaged or non-viable computer readable devices.
[00123] TEST BALLS including non-functioning balls specifically designed for that purpose can be emptied from a tube into the tumbling chamber and fed through the WEAPD mechanics directly back into the test group tube in the cradle. This test is performed to check that all reading devices and mechanical systems are functioning.
[00124] The encryption tags produced by WEAPD can be put to any application that requires security, but they were primarily developed with the aim of securing safe WorQour currency transfers.
[00125] The WorQour is a new form of currency conceived to replace fiat currencies in international currency transfer transactions and overcome the problems associated with using them in particular problems with volatile exchange rates and problems caused by using a national currency which also functions in a dual role as a global reserve currency (i.e. the US$). Using a basic rate for paid employment fiat currencies are converted into WorQours (Working Hours). In this form WorQour currency has broad commercial applications.
[00126] THE TRIFFIN DILEMMA
[00127] WorQours circumvents the Triffin Dilemma. The Triffin Dilemma pointed to possible conflicts of interest when using a single national currency also as the global reserve currency. This was reflected in fundamental disparities in a nation's ability to meet its balance of payments. There are advantages to the nation whose currency is used and this creates a possible tension between national monetary policy and global monetary policy. This is not an issue when WorQours are used as the global reserve currency:
WorQours required for international transactions are created instantly as needed; no stocks of a global reserve fiat currency are required; no single nation benefits more than the others; and there are no conflicts of interest resulting from its use.
[00128] THE BRETTON WOODS AGREEMENT
[00129] WorQour Currency also fulfils all the basic aims initially tabled at the Bretton Wood discussions held in July 1944: the WorQour conversion utilises stable long-term fiat monetary exchange rates (i.e. the national mHR); the WorQour allows all nations equal access to trade and raw materials because no overseas funds need to be held or acquired for trade; the WorQour is freely convertible to and from national fiat currencies therefore it removes trade barriers; the stable mHR WorQour exchange rate fosters a system of international payments that will allow trade to be conducted without fear of sudden currency depreciation or wild fluctuations in exchange rates; and the WorQour exchange rates neutralise the subsidization of labor and sweated competition in the export markets - currently this is demonstrated by firms sending jobs overseas to take advantage of cheap labour and good exchange rates between the fiat currencies. [00130] One WorQhour equals the rate of pay for the lowest paid worker in every fiat currency the national mHR(s) of exchange makes the transfer of jobs overseas financially non-viable.
[00131] VVorQour CERTIFICATES
[00132] VVorQour Currency functions as a bridge between national economies.
[00133] Fiat money exchanged into WorQours has effectively been moved outside the domestic economy and once outside the economy it can be stored indefinitely in limbo.
[00134] VVorQour Certificates are created specifically for the purpose of storing large fiat currency values outside the domestic economy in a tangible form until their value needs to be re-introduced back into the economy.
[00135] VVorQour certificates are made of a durable substance. They have WEAPD generated Serial numbers and registered owners.
[00136] The national fiat currency accepted in exchange for the certificates is banked in a national institution. The certificates can be instantly redeemed but only for/in their inceptive fiat currency.
[00137] VVorQour certificates are inflation, recession and depression proof. They have distinct advantages over investing in Gold bullion.
[00138] VVorQour SYMBOL
[00139] As with other currencies a convenient symbol is needed to represent the VVorQour. The VVorQour symbol is shown in Figure 1 and is basically the capital letter 'C with 2 clock hour-hands pointing at 9 and 5.
[00140] The preceding description has described the concept of the VVorQour the operation of the WEAPD in generating billions of un-calculated, un-predictable random encryption tags. The following describes a PLUG-IN PROGRAM that utilises the encryption tags to secure transactions, with a focus on transferring funds between bodies using WorQours as a currency. [00141] THE PLUG-IN PROGRAM
[00142] The PLUG-IN program enables the WEAPD to interface with other devices located around the globe.
[00143] The plug-in program includes a BREAKPOINT RUN, a BRANCH IDENTIFIER ROW FREQUENCY SET SERIES, A TAG IDENTIFIER ROW FREQUENCY SET SERIES and a DIRECTORY listing the WEAPD branch numbers that correlate to the nationality names addresses BSB Swift account etc. details of all the global offices authorized to engage in WorQour transactions.
[00144] For the purposes of this explanation global regional/head offices, branch devices and paired devices will simply be referred to as branches.
[00145] WorQour WEAPD DIRECTORY
[00146] The branches are listed under their Nationality, Business Name, street address etc. and also by the international banking criteria commonly used for Fiat currency institutions; BSB, swift codes etc. Also found with this branch information recorded in the WEAPD database is a CODED REFERENCE NUMBER that is used by the system to identify a branch involved in the WorQour transaction transfer.
[00147] These reference numbers are used to facilitate transactions between the WEAPD and the branches. Both the WEAPD database and the branches have access to this directory.
[00148] A program designed for the purpose will automatically update a branch directory with any changes made to the WEAPD database directory.
[00149] The directory is open for Fiat currency operators to search.
[00150] A branch requiring the transfer of fiat currency in WorQours must first obtain the WEAPD reference number of the TARGET branch from the directory. [00151] To do this an operator will type in the conventional details of the targeted branch and conduct a search to retrieve the WEAPD database number allocated to the targeted branch or its head office.
[00152] Fiat currency converted from WorQours may need to be deposited in a head office account and then internally transferred to an account held at one of its regional branches.
[00153] BREAKPOINT
[00154] The WEAPD will need to be paired to devices in institutions located around the globe.
[00155] The WEAPD's primary objective is to supplies ROWS of alpha-numeric pair units to be used with WorQour Currency for although not restricted to the following examples; TRANSACTION encryptions, BRANCH identifiers, TAG identifiers, device identifiers, CERTIFICATE serial numbers etc.
[00156] The WEAPD also stores WorQour transaction information use for the purpose of calculating charges. This information available for analysis and reports can be printed out in hard copy.
[00157] Devices paired to the WEAPD cannot access the WEAPD database or it's transaction records.
[00158] Devices paired to the WEAPD can only print out information from their own database transaction records.
[00159] The WEAPD supplies ROWs from its COG ROW QUEUE stored in its database memory at the request of one of the devices paired to the WEAPD. Rows stored in the WEAPD can be supplied individually or in run batches.
[00160] RUN BATCHES issued with the PLUG-IN program are to be used in a device pairing identification procedure. [00161] The tasks performed by the various devices paired to the WEAPD are given a task priority rating. Low volume tasks having a higher priority than large volume tasks to avoid a backlog of low volume tasks.
[00162] The end use of a row depends on the task(s) being performed by the device paired to the WEAPD making the request.
[00163] Each row is divulged only once from the WEAPD COG ROW QUEUE when this occurs, that row it is allocated a SYMBOL indicating the TASK function to which the row was utilized.
[00164] Each TASK will have its own family of symbols. Although not restricted to the following examples they serve to illustrate the concept;
[00165] Symbols indicating ROWs used for WorQour Currency transactions TASKs: C^i SOGa^^^^® CD ©
[00166] Symbols indicating ROWs used as WorQour certificate serial number tasks:
© © ® ® n m 0
[00167] The device initiating the request is used to identify the task and the WEAPD selects the correct symbol family.
[00168] Once a ROW has been issued and allocated a symbol representing that task the symbol is saved in the WEAPD's USED ROW database MEMORY.
[00169] (Devices paired to the WEAPD will also retain the WorQourencryptionROW(s) in their own computer memories for the purposes of; recording serial numbers issued or to correlate transactions tasks etc. that have been performed by the paired device.)
[00170] The WEAPD memorizes the symbols in sequence as the requests are fulfilled. The symbols substituted for WEAPD ROWs are used in a random fashion. To obtain this random feature the symbols are paired with NUMBERS using similar RFID balls and the same method previously described for obtaining the WEAPD COG ROWs (by rotating COGs).
[00171] Identical balls each programed with a unique unit from a SYMBOL family are loaded into the mixing chamber in a manner similar to that use for the COG ball families. Also, identical balls each one containing one unit of a unique pre-determined NUMBER series family are loaded into the mixing chamber. One set of balls must be even in total number and the other set of balls must be odd. Both sets of balls are mixed together in the WEAPD tumbling chamber.
[00172] The WEAPD is manually pre-programmed to process a SYMBOL/NUMBER two (2) COG progression.
[00173] The balls are released one at a time and read by the WEAPD reader interface which is programmed to recognize the SYMBOL balls as being distinct from the NUMBER balls. As each ball is released and read the WEAPD processor allocates the ball types to two (2) separate COGs. One cog will carry the randomly released SYMBOLS and the other cog the randomly released NUMBERS.
[00174] The first balls chosen for each COG will be the starting point. The processor begins to rotate the COGs one tooth at a time. The various combinations are memorized and form a two-part SYMBOL/NUMBER ROW queue. This queue indicates how many times a specific symbol will be used before it is replaced by the next in the series.
[00175] In this sample the first symbol ^ is used 3 times before being replace by the second symbol which is used 5 times and so on
»3,BO5,® 1 ,«o2,(Q)4, ¾6,
[00176] Even though the requests made to the WEAPD for ROWs may result in the performing of a high volume of un-interrupted similar transaction task types the symbols replacing the used ROWs in the WEAPD memory will be CONSTANTLY changing according to the SYMBOL/NUMBER queue. Illustrated as follows using the example above:
^^^BOBOBOBOBO® soso© © © © csaesesesc^
[00177] MULTIPLE types of transaction tasks each with their own family of randomly issued symbol/number rows will produce an interwoven MIXED TRANSACTION TASK FLOW Record. Illustrated as follows:
. .. " " BOBOBO QSOBT}© © © © © ® C3C3]'* , OS
[00178] In the example above the function of the ROWs divulged from the WEAPD can be identified. In this case they were used for WorQour Currency transactions and as WorQour Certificate serial numbers.
[00179] THE TRANSACTION TASK FLOW RECORD
[00180] The transaction task flow record is retained in the WEAPD memory and is used for PAIRING devices to the WEAPD if the WEAPD has already begun the process of distributing ROWs to other devices.
[00181] The terms branch(s), Branch devices, paired device(s) used in the following description are interchangeable and should be taken to represent the same broad concept illustrating a WEAPD connection to Fiat currency institutions.
[00182] When it is required to pair a device to the WEAPD a manual task is performed asking the WEAPD to supply a BREAKPOINT SYMBOL run.
[00183] A BREAKPOINT run is a manually determined specific number of sequential transaction symbols numbering in the hundreds or thousands and is obtained from the task flow record. Simply illustrated as follows: I BREAKPOINT SYMBOL RUN 1
[00184] The Creation DATE:TIME (that the BREAKPOINT run was CREATED by the WEAPD) the BREAKPOINT SYMBOL run and a PLUG-IN program are transferred separately by some secure means (e.g. computer discs, USB sticks) to the device that requires pairing to the WEAPD.
[00185] In all cases the Creation DATErTIME, BREAKPOINT SYMBOL run and PLUG- IN program supplied by the WEAPD for the device pairing will contain unique information that is ONLY USED ONCE. This information is RETAINED in the WEAPD DEVICE PAIRING database memory.
[00186] Certain aspects of the PLUG-IN program are shared between the WEAPD and the paired device. Both devices are drawing sequential IDENTIFICATION ROWs from the same single COG FREQUENCY SET. For added security there are two frequency sets; the BRANCH FREQUENCY SET and the TAG FREQUENCY SET.
[00187] The PLUG-IN program is loaded into the device in preparation for pairing. The BREAKPOINT RUN is loaded into the device as/when instructed by the program. The supplied Initial DATE IME is manually entered as/when instructed.
[00188] The BREAKPOINT functions as the DEVICE IDENTIFIER and the CREATION DATE:TIME functions like the first PIN. e.g.
L "wwwwOwio©©©©© / CREATIONDATE IME
[00189] If either the BREAKPOINT run or the Creation DATE:TIME submitted are not recognized as having been supplied by the WEAPD a request to pair the devices will be denied.
[00190] When the WEAPD matches both the BREAKPOINT RUN and the Creation DATE:TIME with that stored in its DEVICE PAIRING database the WEAPD will pair with the device. [00191] At this point the secure mediums (e.g. computer discs, USB sticks) used for transferring the PLUG-IN PROGRAM and Creation DATE:TIME to the pairing device are now obsolete and can be destroyed. They can only be used once. Any problems in establishing the pairing will result in a completely new PLUG-IN program being required.
[00192] The WEAPD will move the Creation DATE:TIME in front of the BREAKPOINT RUN and add the DATE:TIME of the most recent pairing to be used as the future PIN at the end.
Creation DATE :ΤΙΜΕ≡/-¾»ΐθΠ Π ΠϊΟΒΟΒΟϊθΦίΟίΟ® © © © (Q)/RecentDATE:TIME/ PIN
[00193] The WEAPD will then interact with the PLUG-IN program requesting it substitute the BEAKPOINT RUN with the first BRANCH DEVICE IDENTIFIER ROW from the DEVICE IDENTIFIER FREQUENCY ROW queue AND the first TAG IDENTIFIER ROW from TAG IDENTIFIER FREQUENCY ROW queue both having been included and supplied with the PLUG-IN program.
[00194] The paired device replaces the BREAKPOINT run with a BRANCH DEVICE IDENTIFIER ROW and a TAG IDENTIFIER ROW contained in the PLUG-IN program and retains the original CreationDATE:TIME I BREAKPOINT SYMBOL RUN in its memory as a future security feature. (Shown here as an eight (8) COG progression); CreationDATE:TIME/aF8fGAU1wAZX7ep1 +rR1vqsDuTT269dpA RecentDATE:TIME
[00195] Each time a device paired to the WEAPD initiates a transaction task it will use the next of a number of DEVICE IDENTIFIER ROWs queued in the PLUG-IN program in a sequence frequency that is also supplied by the PLUG-IN program.
[00196] The WEAPD will recognize the PLUG-IN BRANCH and TAG IDENTIFIER ROW sequences forwarded by the device as being supplied from its own DEVICE PAIRING DATABANK saved in the WEAPD memory and will respond to the requests.
[00197] The WEAPD shares the unique Device identifier ROW frequency sets with the paired device and will respond with the second identifier row. Each device taking the following unused row in the series from the ROW FREQUENCY SET SERIES when interacting with each other.
[00198] Every time the WEAPD supplies transaction task ROW(s) from its COG ROW QUEUE memory to a PAIRED device the WEAPD will change the PIN to the DATE:TIME of the request and send that DATE:TI E at the end of the supplied ROW sequence to seal the transaction.
[00199] The DATE:TIME of the previous request is moved to the front of the DEVICE IDENTIFIER ROW e.g.
LastDATE:TIME / aF8fGAU1wAZX7ep1 +rR1 vqsDuTT269dpA/CurrentDATE:TIME
[00200] The device paired to the WEAPD receiving transaction task ROWs will recognize this last piece of information as being the changeable CurrentDATE:TIME as the PIN to be used when initiating the next ROW request.
[00201] At any time a technician operating the WEAPD may ask for verification that the paired machine constitutes an authorised pairing. In that event the paired device will supply the Creation DATE IME, BREAKPOINT SYMBOL RUN and the last used
DATE IME PIN e.g.
CreationDATE TIME/^so »¾oi»w©.»£o©©©©©/LastDATE:TIME
[00202] The CreationDATE:TIME and BREAKPOINT SYMBOL run has been retained in the WEAPD DEVICE PAIRING memory for this purpose and remains until instructions are manually entered for their deletion.
[00203] The deletion of the CreationDATE:TIME I BREAKPOINT SYMBOL run and LastDATE:TIMEPIN terminates the connection between the two machines.
[00204] FREQUENCY SETs
[00205] The PLUG-IN Program supplied for a device pairing essentially contains two batches of WEAPD COG ROWs that are used as the paired device IDENTIFIERS and the frequency at which each ROW in the batches are to be used before being replaced by the next ROW in the series. The ROWs and the frequency at which they are used constitute a FREQUENCY SET. The two frequency sets are named BRANCH IDENTIFIER FREQUENCY SET and TAG IDENTIFIER FREQUENCY SET.
[00206] FREQUENCY SET(s) are created by the WEAPD.
[00207] Their purpose is to reduce the number of ROWs being sent from the WEAPD COG ROW QUE to the paired device. By sending FREQUENCY SET(s) the paired device has a reservoir of ROWs that both the WEAPD and the paired device can jointly access. The WEAP will recognize from its own records when a reservoir is close to exhaustion and send another unique replacement Frequency Set series.
[00208] The process of producing FREQUENCY SETS involves the use of a FAMILY OF NUMBERS applied to a batch of ROWs issued from the WEAPD COG ROW queue.
[00209] Although not restricted to the examples given a Family of NUMBERS could consist of: (1 ,2,3,4,5), (1 ,2,3,4,5,6,7,8,9), (2,4,6,8), (1 ,3,5,7,9), (1 ,3,6,9) etc.
[00210] A NUMBER FAMILY may also be REPLICATED and a number of Clones introduce into the Tumbler e.g. (1 ,2,3), (1 ,2,3), (1 ,2,3), (1 ,2,3), (1 ,2,3), (1 ,2,3).
[0021 1] A pre-determined selection of NUMBER Families are introduced into the WEAPD tumbler using the standard loading checking procedure previously described for creating WEAPD COG ROWs.
[00212] The tumbler now contains several different Number Families OR several clones of the same family OR a mixture of both.
[00213] The tumbler is activated and the balls are mixed.
[00214] A number of balls are pre-determined for release and that number can be ALL or a fraction of the total number of balls contained in the tumbler.
[00215] The device releases the balls one by one reads records memorises the numbers contained within the balls up to the pre-determined number. [00216] The final result is called a NUMBER SET of randomly selected numbers. A number set will be used as a COG.
[00217] By repeating the process the WEAPD can create a queue of unique NUMBER SETs and stores these in its memory for future use.
[00218] When the WEAPD is required to supply a BATCH of ROWs intended for branch device Tag identifiers. The WEAPD takes a BATCH of ROWs from the COG ROW QUEUE stored in its memory. A batch can consist of hundreds of rows.
[00219] The WEAPD also retrieves the next NUMBER SET from the queue in its memory.
[00220] The NUMBER set is applied to the BATCH.
[00221] The process requires that a BATCH of ROWs and a NUMBER SET both be treated as if they were COGs.
[00222] The first ROW from the BATCH is paired with the first NUMBER from the NUMBER SET.
[00223] The first NUMBER in the NUMBER SET determines how often the first ROW is used before being replaced by the second ROW in the series. The second ROW is also matched with the second NUMBER in the NUMBER SET and that determines how often the second ROW will be used before being replaced by the third ROW. And so on.
[00224] The number of units in a NUMBER SET is less than the number of units in a ROW BATCH. This will result in the NUMBER SET COG rolling-on to begin again when all of the numbers in the NUMBER SET have been used.
[00225] The BATCH ROWS will also be required to roll-on when it reaches the end of the ROWs contained in the batch if the NUMBER SET is only partially through the numbers in the NUMBER set.
[00226] The roll-on is repeated and continues to repeat until the NUMBER SET and ROW BATCH have both returned to the original units first used in starting the process. [00227] The ROW FREQUENCY SERIES has now been deciphered and the whole RANGE OF ROW POSSIBILITIES is memorized in the WEAPD database.
[00228] These ROW FREQUENCY SERIES' are included within the Plug-in program and SHARED between the WEAPD and the paired device.
[00229] A ROW FREQUENCY SERIES pertaining to the BRANCH and a second ROW FREQUENCY SERIES used to identify TAG transactions are included with the Plug-in program.
[00230] The WEAPD and the paired device SHARE the use of both the ROW FREQUENCY SERIES' (Branch and TAG) each using the next ROW in the series when initiating contact between the two devices. The result is two batches each changing ROWs according to their individual number frequencies.
[00231 ] The DATE:TIME of the transaction is also included with the branch and tag ROWs being used. Both devices are capable of recognizing any irregularity in the use of either Branch or Tag ROW frequencies and/or the DATE:TIME used for a transaction task. Any irregularity will result in a termination of the WorQours transaction transfer task and trigger an alert.
[00232] Operators will examine the cause of the irregularity.
[00233] Other BRANCHes are not affected by this alert. They continue to interact with the WEAPD and function as normal.
[00234] Also a PLUG-IN program function is to ascertain the tasks being performed by the paired device and supply this information to the WEAPD. The WEAPD can then identify the correct family of Symbols to be substituted when the paired device initiates requests for transaction tasks. Examples offered earlier in this explanation were: Symbols to indicate ROWs used for WorQour Currency transactions;
OS OSSXiAfi ^^^© ® © and
Symbols for ROWs used as WorQour certificate serial numbers; © © ® © 0 gp
[00235] A method example described previously in this document used to create the SYMBOL/NUMBER frequency set has been used again. This time to formulate the BRANCH IDENTIFIER ROW FREQUENCY SETS and the TAG IDENTIFIER ROW FREQUENCY SETS.
[00236] The symbols shown here represent an alpha-numeric IDENTIFIER ROW supplied from a WEAPD COG ROW QUEUE and the numbers are indicating how often each IDENTIFIER ROW is repeatedly used before being replaced by the next in line. The cycle constantly repeats:
Figure imgf000032_0001
[00238] The WEAPD having supplied both the IDENTIFIER ROWs and the repeat sequence for their use recognizes the pattern and in conjunction with the correct DATE:TI E/PIN responds positively and divulges transaction task ROWs to that device.
[00239] Any change in the pattern of IDENTIFIER ROWs being submitted or an incorrect DATE:TI E/PIN terminates the divulgence of ROWs being supplied to the paired device and triggers an alert.
[00240] WEAPD operators search for the cause of the alert.
[00241] The CreationDATE:TIME. BREAKPOINT SYMBOL RUN and a manually entered LastDATE:TIME PIN will wipe the records of the unused IDENTIFIER ROW/number frequencies for that WEAPD /device pairing from the WEAPD database memory and terminate the connection between the WEAPD and the other device.
[00242] An entirely new and unique CreationDATE:TIME, BREAKPOINT SYMBOL RUN and PLUG-IN program will be required to re-start the WEAPD /device pairing.
[00243] EXAMPLE USAGE [00244] The use of the WorQour to transfer fiat currency can be appreciated with the following example. Although in no way restrictive the mHR is used in the following example and throughout this document to explain the process involved;
[00245] The Transfer process involves three basic steps:
[00246] STEP 1 : Departure-Conversion
[00247] The concept requires one nation to convert a sum of money, in their own fiat currency, using their own predetermined monetary rate (mHR), into WorQours. This involves the process of division.
[00248] STEP 2: Transit
[00249] The WorQours are then transferred, by a suitable method, over a border to another nation.
[00250] STEP 3: Arrival-Conversion
[00251] The recipient nation, in turn, using their predetermined monetary rate (mHR), converts the WorQours forward into their own fiat currency. The conversion this time requires the process of multiplication.
[00252] An Example (using an individual)
[00253] The following fictitious example shows how an individual could use WorQours for an international transfer of funds. In no way restricted to the minimum hourly rate (mHR) of pay for the working man this example is used to illustrate when both countries use the same predetermined monetary rate in a transaction.
[00254] A man in Japan wants to settle an account for $10 million he owes to an Australian firm. (The $10 million owed is in Australian dollars).
[00255] In this example: Japan has an mHR of ¥5.00 (5 Yen)
Australia has an mHR of AUD$17.00
[00256] To find equivalent in WorQours the man needs to send to the Australian firm, he divides AUD$10 million by the mHR fixed by the Australian government.
[00257] $10,000,000 divided by $17.00 (Australia's mHR) = 588235.29 WorQours.
[00258] He then multiplies the 588235.29 WorQours X ¥5.00 (Japan's mHR) = ¥2,941 , 176.47
[00259] To meet his $10 million obligation the man needs to send the Australian firm 588235.29 WorQours the equivalent to ¥2,941 , 176.47 in Japanese currency.
[00260] As the mHRs used in WorQour calculations are stable over a long time frame the man can be reasonably sure the WorQour transfer amount, will be the same for months to come. The use of a mHR in exchange calculations enables long term financial planning and budgeting.
[00261] WorQour Function Method
[00262] The WorQour Encryption code system of the embodiment uses ROW codes to ensure that transactions performed in conjunction with WorQour transfers etc. are exclusively legitimately sourced through the WEAPD database and to enable the calculations of royalties and charges resulting from the use of WorQours in transfers. The same WorQour encryption code in another form is used to identify the addresses of machines making mHR requests.
[00263] TRANSACTIONS
[00264] Each branch computer has been given via the PLUG-IN program its own unique BRANCH ROW IDENTIFIER FREQUENCY SET and at the same time its own unique TAG ROW IDENTIFIER FREQUENCY SET SERIES both originating from the WorQour Encryption and Processing Device (WEAPD). [00265] The dual BRANCH / TAG system is used to increase security.
[00266] The ROWs are always divulged in sequence from WEAPD ROW QUEUEs, a substitute ROW presented out of sequence would trigger a WEAPD alert.
[00267] Anyone who manages to work out the sequence would still have to introduce the substitute clone ROW(s) at exactly the correct time. This would result in a double divulgence of the same ROW and this would also trigger a WEAPD alert. By doubling the ROW queues used (Branch and TAG) the security is reinforced.
[00268] STORAGE OF mHR FIGURES
[00269] The WEAPD Database memory contains all official national mHR figures used in WorQour calculations.
[00270] Although commonly known these figures MUST be obtained from the WEAPD Database when required for WorQour transactions.
[00271] The mHR figures cannot be entered manually at any stage during a WorQour transaction.
[00272] Changes to the official WEAPD mHR figures (supplied by national governments) are performed by trained approved WEAPD operators.
[00273] When changes are required the WEAPD is instructed to supply a hardcopy of a WEAPD COG ROW from its own WEAPD COG ROW QUEUE.
[00274] Changes to mHR rates must be accompanied by the entry of the WEAPD COG ROW:DATE:TIME. an employee identification number (which is also a ROW from the WEAPD) and the operator's PIN. Illustrated as follows:
(New Australian)mHR /WEAPD COG ROW/DATE:TIME/operator ID/operatorPIN.
[00275] In an alternative embodiment the mHR rates stored in the WEAPD database memory are updated by authorised individuals using conventional metal keys to access, over-ride and change existing settings. [00276] THE METHOD
[00277] A paired device sends a request for a WorQour transfer to the WEAPD. The initiating branch wants to transfer $15,000 Australian dollars to the USA Illustrated as follows;
[00278] BTinitial/initiabranchldentifierseriesROW01 +initiabranchTAGIdentifierseriesROW0 1/AU15000>US$/TARGET/CurrentDATE:TIME
[00279] BT is the identifier for a Business Transfer.
"Initial" is the branch identification number of the branch initiating the transaction and is sourced from the WAPD Directory. The initiating Branch and TAG identifiers ROWs are also supplied.
TARGET is the branch identification number sourced from the WEAPD directory of the branch to which the transfer transaction is directed.
[00280] Upon receipt of a request the WEAPD searches the branch Directory number and confirms the branch by the identifier ROWs it supplies. They were issued from the WEAPD COG ROW QUEUE and sent to the device via a PLUG-IN program. The WEAPD will not respond if the branch identification number the BRANCH or TAG identifier supplied with the request are not recognised as a valid combination.
[00281] If the information matches the WEAPD records the WEAPD begins to process the request.
[00282] The WEAPD allocates a ROW from a WEAPD COG ROW QUEUE to identify the transaction (the example shown here is from a 7 x COG ROW i.e.; Ds28ee19BG1 1 Rg).
[00283] Using the TARGET branch directory number code supplied by the initiating branch the WEAPD is able to access the Target BRANCH identifier series and TAG identifier series it shares with the TARGET branch. [00284] (If a regional branch of a commercial bank is not listed in the directory that indicates all transactions are processed through the Head Office.)
[00285] The TARGET branch's Directory address number will link to a PLUG-IN program stored in the WEAPD DEVICE PAIRING DATABANK and to transactions already carried out by the branch. This will allow the WEAPD to access the NEXT branch identifier ROW of the BRANCH ROW FREQUENCY SERIES from a program it shares with that branch.
[00286] It will also access the NEXT TAG ROW from the branch TAG ROW FREQUENCY SERIES in the same way.
[00287] The letter 'C in the following example is a stand-in for the WorQour currency symbol illustrated in (Figurel .WorQour Symbol). The currency symbol is not yet available in any font format.
[00288] The WEAPD accesses the appropriate mHR figures from its database memory and calculates the transaction transfer task:
AU$15,000/(AUmHR=19)=C789.47368421052632x(USmHR=7)=US$5526.31578947368 424
[00289] The WEAPD sends a string of data to the TARGET branch including the source of the transfer in the form of the Initiating branch's WEAPD Directory number. Illustrated as follows;
BT/TARGET/TargetbranchldentifierseriesROW#01 +TargetbranchTAGIdentifierseriesRO
W#01/C789.47368421052632/USmHR/7.00/5526.31578947368424/WorQourencrypti oncodeROW/lnitial/WEAPDDATE:TIME.
The DATE:TIME used here is the time according to the WorQour database clock. The branch and TAG identifiers belong to the Target branch, the WorQourencryptioncodeROW for future reference.
[00290] The TARGET bank receives US $5526.31578947368424 fiat currency and deposits this into an allocated bank account. [00291] The TARGET bank then retrieves the NEXT branch identifier ROW from it's own BRANCH ROW FREQUENCY SERIES and the next TAG from the TAG ROW
FREQUENCY SERIES that it shares with the WEAPD and sends an acknowledgement comprising of the WorQour amount, the WorQourencryptioncodeROW sent with the transaction, the branch adds the DATE:TIME in local time followed by the letters TC indicating the transfer is completed;
BT/TARGET/TargetbranchldentifierseriesROW#02+TargetbranchTAG IdentifierseriesR OW#02/C789.47368421052632/WorQourencryptioncodeROW/ lnitial/DATE:TIME/TC DATE:TIME (used here is the time at the target branch).
[00292] The WEAPD recognises the branch address and TAG ROWS, the WorkQour amount and its own WorQourencryptioncodeROW.
[00293] The WEAPD now send confirmation of a successful transaction to the branch that initiated the currency transfer. The next Branch and TAG identifiers from their respective ROW FREQUENCY SERIES are used.
BTInitial/lnitialBranchldentifierseriesROW#02+1 nitialBranchTAGIdentifierseriesROW#0
[00294] The amounts in AUdollars/WorQours/USdollars are included,
BTInitial/lnitialBranchldentifierseriesROW#02+1 nitialBranchTAGIdentifierseriesROW#0
/AU15000.00/C789.47368421052632/US5526.31578947368424
[00295] The WEAPD DATE:TIME of the transaction is added,
BTInitial/lnitialBranchldentifierseriesROW#02+1 nitialBranchTAGIdentifierseriesROW#0 /AU15000.00/C789.47368421052632/US5526.31578947368424/ WEAPD DATE:TIME
[00296] The WorQourencryption ROW added to identify the transaction followed by the Letters TC (Transfer Complete) indicating that the transfer was successful,
BTInitial/lnitialBranchldentifierseriesROW#02+1 nitialBranchTAGIdentifierseriesROW#0 /AU15000.00/C789.47368421052632/US5526.31578947368424/ WEAPD
DATE:TIME/WorQourencryptioncodeROW/TC.
[00297] Branch operators involved in the transfer will only see the WorQourencryption TAG ROW the Directory Code numbers of the respective branches involved in the transaction the mHR calculation rates the currency amounts involved and the dates and times. WORQOUR and BRANCH ROW information is withheld;
BT / INITIAL BRANCH DIRECTORY NUMBER / AU$15,000 / (AUmHR=19) / C789.47368421052632 / (USmHR=7) / US$5526.31578947368424 / TARGET BRANCH DIRECTORY NUMBER / WorQourencryptionROW / WEAPD DATE:TIME.
[00298] This is sufficient information for Fiat currency institutions to track the flow of fiat currency and to reference resulting WorQour charges by means of the WorQourencryptionROW. E.g. it may show on WEAPD / Branch statements.
[00299] All three devices involved in the transfer transaction task have sufficient information to track a payment.
[00300] The Branch identification and TAG identification ROWs along with the exchange rate calculations are recorded by the WEPD in the Transaction database for purposes of calculating transaction charges.
[00301] The branches involve will do the same and also supply information to any relevant government agencies pertaining to the national fiat currency transferred by this method. Also the information contained in the transaction records can be analysed by a program and a report results statistics printed out as a hard copy.
[00302] The WEAPD having supplied the IDENTIFIER ROWs and the frequency of ruse recognises the ROW patterns and responds positively.
[00303] Any break in the pattern of IDENTIFIER ROWs being submitted or an incorrect DATE:TIME triggers an alert and terminates the transaction task.
[00304] Because both devices share the IDENTIFIER FEQUENCY SET(s) either can terminate a suspect transaction. WEAPD operators examine the cause of the alert.
[00305] The reader will now appreciate the present invention provides a random encryption tag generator that generates billions of un-calculated un-predictable random encryption tags that can be used to safely encrypt foreign currency transactions. The tags are particularly suited for use with a new regime of foreign currency transactions based around the concept of the WorQour.
[00306] Further advantages and improvements may very well be made to the present invention without deviating from its scope. Although the invention has been shown and described in what is conceived to be the most practical and preferred embodiment, it is recognized that departures may be made therefrom within the scope and spirit of the invention, which is not to be limited to the details disclosed herein but is to be accorded the full scope of the claims so as to embrace any and all equivalent devices and apparatus. Any discussion of the prior art throughout the specification should in no way be considered as an admission that such prior art is widely known or forms part of the common general knowledge in this field.
[00307] In the present specification and claims (if any), the word "comprising" and its derivatives including "comprises" and "comprise" include each of the stated integers but does not exclude the inclusion of one or more further integers.

Claims

1 . A device for generating a series of pseudo-random encryption tags, said encryption tags comprising a row of N symbols, said device producing: N circular queues; a means for filling each of the circular queues with random symbols, and a means for reading a symbol from each of the queues to form an encryption tag then progressing every symbol queue.
2. A device as in claim 1 further comprising a series of balls, each ball representing a unique symbol, a mixing chamber for mixing the balls into a random sequence with a computer interface for calculating the queues to form an encryption tag then progressing every symbol queue.
3. A device as in claim 2 wherein each of the balls comprises a RFID (Radio Frequency Interactive Device) used to identify the unique symbol associated with the ball.
4. A device as in claims 1 , 2 or 3 wherein the encryption tags generated are further employed.
5. A device as in claim 4 wherein a secure conversion transfer of value task is performed.
6. A device as in claim 5 wherein a transfer task is recorded.
7. A device as in claim 6 wherein a charge for the task is calculated.
8. A method of generating a series of pseudo-random encryption tags, said encryption tags comprising a row of N symbols, comprising firstly generating a circular queue of random symbols for each of the N symbols of a row, then for each row in the series of tags: selecting each of the symbols of the row from the front of each symbol queue; and then progressing every symbol queue.
9. A method as in claim 8 wherein the queues of random symbols are generated by associating each symbol with a unique ball, placing the balls in a mixing chamber, sequentially releasing balls from the chamber and entering the symbol associated with each released ball into a queue.
10. A method as in claim 9 wherein each of the balls comprises a RFID (Radio Frequency Interactive Device) used to identify the symbol associated with the ball.
1 1 . A method as in claim 9 wherein each queue uses a unique set of symbols comprising two digit alphanumeric symbols.
12. A method as in claim 1 1 wherein each ball associated with a particular set of symbols is colored a particular color or color combination unique to that particular set of symbols.
13. A method as in claim 9 or claim 1 1 wherein each set of symbols may be replicated.
14. A method as in claim 9 wherein each of the queues has its own random set of symbols.
15. A method as in claim 8 wherein each circular queue is of a different length.
16. A method as in claim 9 wherein more than one mixing chamber is utilized.
17. A method as in claim 9 or claim 16 wherein the mixing chamber is adjacent to and interfaced with a computerized processing database.
18. A method as in any one of claims 9, 16 or 17 where the placing of balls in the chamber employs robotic technology.
19. A method as in claim 9 wherein each of the balls comprises a visible mark used to identify the symbol associated with the ball.
20. A method for securing transaction communication between a first device and second device, wherein: the first device generates a series of encryption tags in accordance to the method of any one of claims 8 to 19;
the encryption tags are stored on the first device;
the encryption tags are copied to a physical medium from the first device;
the encryption tags are copied from the physical medium to the second device; the encryption tags are applied sequentially to tasks from the second device to the first device; and
the first device verifies tasks by comparing the encryption tag sequence of the tasks with the sequence of encryption tags stored on the first device.
21 . A method as in claim 20 wherein each encryption tag in the series of encryption tags has an associated frequency defining how many times it will be used for tasks before progressing to the next encryption tag in the series.
22. A method in accordance to claim 20 or claim 21 for securing tasks from a sending device to a receiving device via an intermediary device, wherein tasks between the sending device and the intermediary device, and tasks between the intermediary device and the receiving device are carried out.
23. A method as in any one of claims 20, 21 or 22 wherein the tasks performed secure a transfer of value.
24. A method as in claim 23 wherein the transfer of value is from a first fiat currency to a second fiat currency, and wherein: an executed task indicating the target of the first fiat currency is sent from the sending device to the intermediary device; the intermediary device performs tasks that convert the amount of the first fiat currency to an intermediary value by a first exchange rate and then by a second exchange rate the intermediary value to the second fiat currency; and a formulation describing the source of the second fiat currency is sent from the intermediary device to the receiving device.
25. A method as in claim 24 wherein the intermediary device records the transfer tasks and calculates charges based on the number of tasks performed or on a percentage of the value transferred.
26. A method as in claim 24 wherein the intermediary transfer value is the working hour WorQour.
27. A method comprising a task wherein the minimum hourly rate (mHR) for paid work in any national currency is the intermediary conversion rate.
PCT/AU2015/000768 2014-12-25 2015-12-24 Random encryption tag generator WO2016101016A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
AU2014280970 2014-12-25
AU2014280970A AU2014280970B1 (en) 2014-12-25 2014-12-25 Random Encryption Tag Generator

Publications (1)

Publication Number Publication Date
WO2016101016A1 true WO2016101016A1 (en) 2016-06-30

Family

ID=53171782

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/AU2015/000768 WO2016101016A1 (en) 2014-12-25 2015-12-24 Random encryption tag generator

Country Status (2)

Country Link
AU (1) AU2014280970B1 (en)
WO (1) WO2016101016A1 (en)

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963646A (en) * 1997-03-10 1999-10-05 The Pacid Group Secure deterministic encryption key generator system and method
US7170997B2 (en) * 2000-12-07 2007-01-30 Cryptico A/S Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
US8001054B1 (en) * 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US5963646A (en) * 1997-03-10 1999-10-05 The Pacid Group Secure deterministic encryption key generator system and method
US7170997B2 (en) * 2000-12-07 2007-01-30 Cryptico A/S Method of generating pseudo-random numbers in an electronic device, and a method of encrypting and decrypting electronic data
US8001054B1 (en) * 2001-07-10 2011-08-16 American Express Travel Related Services Company, Inc. System and method for generating an unpredictable number using a seeded algorithm

Also Published As

Publication number Publication date
AU2014280970B1 (en) 2015-05-21

Similar Documents

Publication Publication Date Title
CN107392608A (en) Digital asset method of commerce and block catenary system based on block catenary system
WO2003065276B1 (en) Method and apparatus for processing electronic dispute data
US20060213974A1 (en) Bank card with lottery feature
RU2010144407A (en) METHODS AND SYSTEM FOR MANAGING FORMATION, COLLECTION AND DISTRIBUTION OF CONTRIBUTIONS AS A RESULT OF USING PAYMENT CARDS
O’Toole Does financial liberalisation improve access to investment finance in developing countries?
JP2017509459A (en) Lottery equipment
Helle et al. Grabbing an election: Abuse of state resources in the 2011 elections in Uganda
Dam et al. The determinants of customer’s intention to use international payment services by applying blockchain
US20060213977A1 (en) Bank card with sweepstakes feature
WO2018145717A1 (en) Interactive gaming system and method for playing a remotely accessible interactive game
WO2016101016A1 (en) Random encryption tag generator
US20230186280A1 (en) Systems and methods for debit card issuance
CN107818475A (en) Reward voucher distribution method
TWM587787U (en) Blockchain-based electronic ticketing random-selection selling system
CN108256891A (en) The method and apparatus that a kind of advertising display template to web advertisement is tested
US20150356558A1 (en) Customer authentication based on action the user has done within a transit system
TW202042149A (en) Electronic ticketing lottery ticket selling method and system based on block chain which can be applied to a block chain network that can execute smart contracts
WO2020045192A1 (en) Precious-stone-standard virtual currency distribution system
CN106132493A (en) The method carrying out lottery activity
Hasan Wage Digitization in Readymade Garment (RMG) Sector in Bangladesh is Crucial for Women Empowerment, Social Compliance and Competitiveness
US11681500B2 (en) ASCII-seeded random number generator
Ariyasena et al. E-banking and financial performance of the domestic commercial banks in Sri Lanka
KR102584578B1 (en) Artificial intelligence (AI) type electronic taekwondo training system with smart payment function applied with IC chip
Bartoletti et al. An empirical analysis of smart contracts
RU2005120918A (en) IDENTIFICATION SYSTEM FOR CERTIFICATION OF AUTHENTICITY OF ELECTRONIC TRANSACTIONS AND ELECTRONIC TRANSMISSIONS WITHOUT USING IDENTIFICATION CARDS

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 15871339

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 15871339

Country of ref document: EP

Kind code of ref document: A1