Login| Sign Up| Help| Contact|

Patent Searching and Data


Title:
SYSTEM AND METHOD OF AUTOMATED KNOW-YOUR-TRANSACTION CHECKING IN DIGITAL ASSET TRANSACTIONS
Document Type and Number:
WIPO Patent Application WO/2021/202474
Kind Code:
A1
Abstract:
An automated method of checking tor legitimacy during a digital asset transaction, including by a customer, initiating a digital asset transaction, receiving a wallet address corresponding to a wallet, checking the wallet address against one or more databases, wherein said one or more databases comprise wallet transaction history and risk category information, determining if the wallet address should be flagged as a suspicious transaction based on the transaction history and risk category information stored in the one or more databases, if the wallet address is flagged as suspicious, rejecting the transaction and notifying the customer of the rejection, or moving the digital assets to a holding wallet for further checks, and if the wallet address is not flagged as suspicious, releasing the digital assets and proceeding with the transaction.

Inventors:
BRASSE ANTONIO (US)
BRASSE SAMUEL (US)
HYUN SAMUEL (US)
SHRIKISHUN RANDY (US)
Application Number:
PCT/US2021/024809
Publication Date:
October 07, 2021
Filing Date:
March 30, 2021
Export Citation:
Click for automatic bibliography generation   Help
Assignee:
BLOCKQUAKE IP HOLDINGS LLC (US)
International Classes:
G06Q20/00
Foreign References:
US20190019180A12019-01-17
US20180240107A12018-08-23
Attorney, Agent or Firm:
GRANT, Kristin (US)
Download PDF:
Claims:
CLAIM

What is claimed is:

1. An automated method of checking for legitimacy during a digital asset transaction, the automated method comprising the steps of: by a customer, initiating a digital asset transaction; receiving a wallet address corresponding to a wallet; checking the wallet address against one or more databases, wherein said one or more databases comprise wallet transaction history and risk category information; determining if the wallet address should be flagged as a suspicious transaction based on the transaction history and risk category information stored in the one or more databases; if the wallet address is flagged as suspicious, rejecting the transaction and notifying the customer of the re jection; and if the wallet address is not flagged as suspicious, releasing the digital assets.

2. The method of claim 1 , further comprising the step if the wallet address is not flagged as suspicious whitelisting the wallet, address for future transactions.

3. The method of claim 1 , wherein the digital asset transaction comprises the withdrawal of digital assets and the wallet address corresponds to a receiving wallet for receipt of digital assets,

4. The method of claim 1 , wherein the digital asset transaction comprises the deposit of digital assets and the wallet address corresponds to a sending wal let for withdrawal of digital assets.

5. An automated method of checking for legitimacy during a digital asset transaction, the automated method comprising the steps of: by a customer, initiating a digital asset transaction, wherein the digital asset transaction comprises the deposit of digital assets; receiving a wallet address corresponding to a sending wallet tor the withdrawal of digital assets; moving, temporarily, the digital assets from the sending wallet to a holding wallet; cheeking the wallet address against one or more databases, wherein said one or more databases comprise wallet transaction history and risk category information; determining if the wallet address should be flagged as a suspicious transaction based on the transaction history and risk category· information stored in the one or more databases; if the wallet address is flagged as suspicions, holding the digital assets in the holding wallet for further checks; and

If the wallet address is not flagged as suspicious, releasing the digital assets.

6. The method of claim 5, further comprising the step if the wallet address is not flagged as suspicious whitelisting the wallet address for future transactions.

7. An automated method of checking for legitimacy during a digital asset transaction, the automated method comprising the steps of; by a customer, initiating a digital asset transaction, wherein the digital asset transaction comprises the withdrawal of digital assets; receiving a wallet address corresponding to a receiving wallet, ib.r the receipt of digital assets: moving, temporarily, the digital assets from a sending wallet to a holding wallet; checking the wallet address against one or more databases, wherein said one or more databases comprise wallet transaction history and risk category information; determining If the wallet address should be flagged as a suspicious transaction based on the transaction history and risk category information stored in the one or more databases; if the wallet address is flagged as suspicious, holding the digital assets in the holding wallet for further cheeks; and if the wal let address is not flagged as suspicious,, releasing the digital assets.

8. The method of claim 7, further comprising the step if the wallet address is not flagged as suspicious whitelisting the wallet address for future transactions.

9. A system for checking for legitimacy during a digital asset transaction, the system comprising; a transaction entity software system configured to host a plurality' of digital wallets each comprising wallet addresses; one or more databases comprising wallet transaction history and risk category information, wherein the transaction entity software system is configured to perform checks of the wallet addresses against the one or more databases; and a means for whitelisting or blacklisting a wallet address, said means comprising predefined standards which the wallet address must meet during the checks.

Description:
SYSTEM AND METHOD OF AUTOMATED KNOW-YOI j R-TRANSACTION CHECKING IN DIGITAL ASSET TRANSACTIONS

CROSS REFERENCE TO RELATED TO APPLICATIONS

[000 i ] This application claims the benefit of U.S. Provisional Patent Application No. 63/001,646 filed March 30, 2020, which is incorporated by reference herein in its entirety.

FIELD OF THE INVENTION

[0002] The present invention is in the field of digital asset transactions. More particularly, the present invention provides a system and method of performing checks and auditing of digital transactions to determine integrity of counterparties and ensure compliance with money laundering and other regulations.

BACKGROUND OF THE INVENTION

[0003] Entities engaging in digital asset transactions currently do not implement preventive automated real-time methods or processes for determining whether certain such transactions are intended to launder money or commit other illegal activities through the use of digital assets. Such entities are not performing Know- Y our-T ransaction (KYT) audits or checks, whether preventive or detective, on deposits, transfers, and/or withdrawals in an automated manner. Know -Your-Transaction is a process employed by virtual asset, service providers, companies that facilitate virtual asset transactions, and companies that custody virtual assets, to monitor an individuaTs or business's transaction activity to identify suspicious or fraudulent transactions. Successful KYI ' analysis would detect high risk activities ranging from Office of Foreign Assets Control (OF AC) sanctioned transactions, scams, and darknei markets. Failure to perform these cheeks or audits may put these individuals or entities at risk with respect to compliance with Financial Action Task Force (FATF) guidance, Bank Secrecy Act (BSA) requirements, or other anti-money laundering related rules applicable to transfers of funds and digital assets. What is needed is a system and method for performing automated preventive KYI checks in real time upon initiation of digital asset transactions, as disclosed by the present invention. The use of the invention may support compliance with anti-money laundering laws.

BRIEF DESCRIPTION OF THE DRAWINGS [0004] The drawings, described below, are for illustrative purposes only and are not necessarily drawn to scale. The drawings are not intended to limit the scope of the disclosure in any way. Wherever possible, the same or like reference numbers are used throughout the drawings to refer to the same or like parts.

[0005] FIG. 1 is a flowchart illustrating an exemplary method for whitelisting one or more wallet addresses according to the embodiments described herein;

[0006] FIG. 2 Is a flow-chart illustrating an exemplar} ' method for the deposit of digital assets according to the embodiments described herein;

[0007] FIG. 3 is a flowchart illustrating an exemplary method for the withdrawal of digital assets according to the embodiments described herein; and

[0008] FIG. 4 is a block diagram showing an exemplary system for the implementation of automated real-time OΎ cheeks daring digital asset transactions according to the embodiments described herein.

DETAILED DESCRIPTION OF THE INVENTION [0009] The present invention discloses a system and method of automated preventive KYI cheeks in real time upon initiation of digital asset transactions. Such digital asset transactions may be recorded on a blockchain (on-chain) or outside of a specific blockchain { off- chain). A blockchain is a digital ledger of transacti ons which are dupl icated and distributed across all computer systems on a peer-to-peer network.

[001 . 0] Digital assets may include cryptocurrencies such as biteoin, Bfhereum, and other blockchain- based assets. These cryptocurrencies may also be referred to as tokens, coins, security tokens, or tokenized securities for the tokenization of real estate or other assets. Such tokenized assets may be referred to herein as tradeable or transferable digital assets,

[0011] The present invention is ideal for entities engaging in such digital asset transactions. Such entities may, for example, be a natural person, a group of persons, a corporation, a trust a partnership, or a limited liability company. These entities can include cryptocurrency exchanges, digital asset exchanges, banks, custodians, trusts, or trading desks, or any other entity that engages in or facilitates digital asset transactions. For the purpose of this disclosure only, these entities will hereinafter be referred to each individually as a transaction entity and collectively as transaction entities.

[0012] Digital asset transactions may include trades, transfers, deposits, and withdrawals between digital asset wallets (also referred to as digital wallets or wallets) and wallet addresses, A wallet address is a hashed version of a blockchain public key to which transactions ean be sent. A public key is publicly known cryptographic code used as a form of identification to allow' users to receive ciyptocurrencies. A single wallet may have multiple wallet addresses. This is for security reasons to ensure that the wallet is secure from third party access. A wallet is a consolidation of private keys that will correspond to a wallet address. A private key is cryptographic code which is kepi secret and used for the authentication, encryption, and access of assets. A private key is used by a wallet owner m order to access and send digital assets from wallet addresses. A passphrase or a seed phrase is a hashed version of a private key. A wallet may either he a cold wallet, a hot wallet, or a warm wallet Hot wallets are wallets directly connected to the internet, while cold wallets are devices that are specifically designated tor phy sical cryptocitrrcncy storage; offline and disconnected from the internet. In between both hot and cold wallets are warm wallets which share similar characteristics to hot wallets, but warm wallets lend to be based on downloadable software or mobile application instead of a web-based services such as a trading platform or exchange, which utilizes hot wallets. In addition, most warm wallets rely on a passcode or personal identification number (PIN) for security and identification, whereas hot wallets normally rely on user created passwords as well as ha ving the user verify personal information. By way of example only, a hot wallet may be an online wallet, a warm wallet may be a desktop or mobile wallet, and a cold wallet may be a hardware or paper wallet

[0013] KYT checks may resemble anti-money laundering (AML) checks that are performed by traditional financial entities. Such AMI, cheeks may be performed against fiat currencies to determine if such funds have been used or may be used in transactions involving illegal activity. KYT checks may serve similar purposes as AML checks hut are performed on digital asset transactions taking place within at least one blockchain.

[0014 ! The present invention includes one or more databases which are repositories containing information about digital wallets or digital wallet addresses, The information contained in the one or more databases may include the wallets’ transaction histories and risk categories. Such information may be used to determine whether a digital wallet or digital wallet address is being used in financial crimes or other activities that may be considered money laundering. These repositories may be maintained in various forms, including paper format, electronic mail, spreadsheets that use CSV format or Microsoft Excel., or databases, for example, Microsoft Access, Microsoft SQL, or Oracle.

[0015] Turning now to the figures, Figure 1 is a flowchart illustrating an exemplary method for white listing one or more wallet addresses according to the embodiments described herein. Whitelisting is the practice of explicitly allowing certain identified entities access to a particular privilege, service, mobility, access, or recognition. When a digital asset wallet address is requested to be whiteilsted 102 to allow for future withdrawal or deposit requests with a transaction entity , the address is checked against one or more databases 104. Such databases may include government databases and databases maintained by reputable and trusted private entities, to determine whether the wallet address is deemed high risk. Such high-risk wallet addresses may include OF AC blacklisted wallet addresses. Checks are performed in real time and are performed via application programming interface (API) calls between a transaction entity’s system and one or more databases. In a preferred embodiment of the present invention, the checks are performed in real time via API calls between a transaction entity’s system and a blockchain analysis platform compiling the information from various government and private databases into one platform.

[00161 Where it is deemed that the wallet address to be whitelisted is high risk 108 as predefined by the transaction entity, the digital asset wallet address whitelistmg request is denied 110. The customer of the transaction entity is notified that whitelisiing was denied with a detailed explanation 112. The customer may then decide to proceed with attempting to whitelist another wallet address. If the wallet address for the whitelisiing request is not flagged as high risk, the whitelisting req uest tor the wallet address is approved 1.14. In some embodiments of the present invention, the system does not whitelisi wallet addresses but instead, conducts checks during each transaction regardless of the result of previous checks,

[00171 Databases may be periodically updated by the providers of those databases. A customer of a transaction entity may only withdraw from or deposit to wallet addresses that have been whitelisted and not flagged against the subject databases. Both the external sending or receiving addresses must be whitelisted and go through the same checks as the requesting withdrawal or deposit wallet addresses.

[0018] A purpose for whitelisting withdrawal or deposit wallet addresses and requiring non-SMS two-factor authentication (2FA) for whitelisting requests, withdrawals, and deposits is to protect a customer ' s digital assets from theft. Such whitelisting is also directed to proactively identifying potential risky transactions and their underlying behavior to detect fraud, corruption, and money laundering.

[0019] The present invention is ideal for transaction entities that may need to Implement processes to ensure compliance with FATF guidance and BSA requirements for the handling of virtual currency or digital asset transactions. Such processes may be desirable for the transaction entity where wallet addresses for deposits or withdrawals are required to be whitelisted and where a collection of other information to meet compliance requirements is desirable, Such other information may include the owner of the wallet address and location of the owner. The information, may also Include notations as to whether the wallet address belongs to an entity labeled as a virtual asset service provider (VASP). Such notations may benefit customers of a transaction entity receiving or sending digital assets.

[0020] Figure 2 is a flowchart illustrating an exemplary' method for the deposit of digital assets from one wallet to another. When the deposit of a digital asset is Initiated by a customer 202, the wallet address of the sending wallet is determined 204 and that transaction or the sending wallet address is checked against one or more databases 206, winch may include government-related databases and databases maintained by reputable and trusted private entities. Such checking may determine whether the sending wallet address is deemed high risk. Such high-risk wallet addresses may include OF AC blacklisted wallet addresses. Checks are performed in real time and are performed via API calls. In an embodiment of the present invention, the digital assets are held temporarily in a holding wallet maintained by the transaction entity and separate from the sending wallet, while the wallet address of the sending wallet is checked against the one or more databases.

[00211 Where it is determined that the sending wallet address is high risk as pre-def meet by the transaction entity 208, digital asset deposits are automatically rejected and returned to the sending wallet address 210. The customer of the transaction entity is notified that there was a deposit that was rejected as a result of it being flagged as high risk 212. In some embodiments of the present invention, if it is determined that the sending wallet address is high risk, the digital assets remain in the holding wallet while further checks are being conducted. If the sending wallet address is not flagged as high risk, the deposit proceeds and is credited to the customer’s account 214.

[0022 ] Figure 3 is a flowchart illustrating an exemplary method for the withdrawal of digital assets. When the withdrawal of a digital asset from a transaction entity is initiated by a customer 302, the address of the receiving wallet is determined 304 and that transaction or the receiving wallet address designated for the withdrawal request is cheeked against one or more databases 306, which may include government and private databases. The checks may determine that the receiving wallet address is deemed high risk. Such high-risk wallet addresses may include OFAC blacklisted wallet addresses. Checks are performed in real time and are performed via API calls. In an embodiment of the present invention, the digital assets are either held temporarily in a holding wallet or remain in the transaction entity’s ecosystem separate from the receiving wallet while the wallet address of the receiving wallet is checked against one or more databases.

[0023] Where it is determined that the receiving wallet address is high risk as pre-defined by the transaction entity 308, the digital asset withdrawal request is denied 310, The customer of the transaction entity is notified that that the withdrawal request was denied with a detailed explanation 312. The customer is then able to decide whether they want to proceed with a withdrawal request to another wallet address. If the receiving wallet address for the new withdrawal request is not flagged as high risk, the withdrawal proceeds 314.

[0024] FIG. 4 is a block diagram of a system 400 for the implementation of preventive KYI checks upon initiation of digital asset transactions according to the embodiments disclosed herein. The system 400 may include a customer device 402 through which the customer initiates a digital asset transaction. The customer device may be a laptop, desktop, mobile or other computing device known in the art. The system 400 also includes a transaction entity’s software system 404, one or more databases 406, and a plurality of third-party vendor platforms 408.

10025] The transaction entity’s software system 404 may be configured as any processing platform known to one of ordinary skill In the art. The transaction entity’s software system 404 is configured for the implementation of the digital asset transactions di sclosed herein. As pari of this implementation, the transaction entity’s software system 404 supports a plurality of wallets 412 with corresponding addresses, these wallet addresses serving as a source or destination for the digital asset transactions. The transaction entity's software system 404 also includes a plurality of holding wallets 410 with corresponding holding wallet addresses, these holding wallet addresses serving as a temporary source or destination for the digital asset transactions.

[0026] The present invention described herein may be implemented through the use of and communication between a plurality of third-party vendor systems 408 that handle independent processes that are customized and combined to create the present system and method. This may include vendors that provide hot, warm, or cold wallet solutions, wallet address whitelisting capabili ties for withdrawal requests, or those that, may have some of these aforementioned processes combined. Presently in the art there are existing vendors or entities, government or private, that provide data tracking of wallet addresses for various biockchains for compliance needs, to fight against money laundering and other criminal activity. Currently, this is performed mostly through a manual review process to determine whether any wallet addresses need to be blacklisted. In the present invention, these individual and manual processes are being automated, improved for reliability and efficiency, and combined in such a way to create a new process that al lows for automated preventive checks of wal let addresses in real-time to prevent transactions to and from wallet addresses that are deemed high risk.