SQL Database Design For Developers at php[tek] 2024
Secure Ownership and Control of Digital Tokens, Hasq Chains, Applications and Crypto-Currencies
1. Hasq Technology
Secure Ownership and Control of
Digital Tokens, Hasq Chains,
Applications and Crypto-Currencies
Oleg Mazonka
CSE Research Rounds
27 Jan 2015
Hasq Technology
6. Hasq TechnologyHasq Technology
Ownership Types
Ownership
property
Real
objects,
money
(cash)
Money
(bank
account)
Copyright Authorship ?
Can be lost
against will
Yes Yes Yes No No
Can be
transferred
at will
Yes Yes Yes No Yes
6/26
12. Hasq TechnologyHasq Technology
Hasq Chain
• N is a sequence number for a particular S;
• S is a hash function representation of digital data of
arbitrary nature, S can be expressed as a string of
hexadecimal characters – token;
• K G O are hash strings: Key, Generator and Owner;
• D is an optional textual Data field
{ } [ ]DOGGKSN ...21
[ ]DOGKSN
12/26
13. Hasq TechnologyHasq Technology
Hasq Chain
• Ns are consecutive numbers for the chosen S
...
...
4444
3333
2222
1111
0000
OGKSN
OGKSN
OGKSN
OGKSN
OGKSN
[ ]DOGKSN
13/26
15. Hasq TechnologyHasq Technology
Servers and Distributed DBs
• To own a token is equivalent to own an object or a
promise
• Tokens can be produced
• Tokens can be assigned positive (obligation) or
negative (debt) value
• Tokens can be transferred
15/26
16. Hasq TechnologyHasq Technology
Transaction
• Sender and recipient
exchange with hashes
calculated from records
1) sender gives the "token
key" to recipient
2) recipient gives the "token
acceptor" to sender
3) mixed when token may be
locked in an intermediate state
...
...
4444
3333
2222
1111
0000
OGKSN
OGKSN
OGKSN
OGKSN
OGKSN
16/26
17. Hasq TechnologyHasq Technology
Some Properties
•Issuer has full control over issue of tokens
•Full spectrum of anonymity: complete, partial or none
•Ultimately no client software required
•Lost references to owned tokens can be restored
•High transaction processing speed
•No sensible motive to hack Hasq servers
•No Public Key Cryptography
•Locked state (following slides)
•Devices or software can own and control tokens
17/26
26. Hasq TechnologyHasq Technology
Summary
•The token can:
• be passed electronically over the Internet or
telephone
• be passed fully anonymously for either the
sender or the recipient
• serve as a currency note
• serve as an obligation
• serve as a verifiable title for ownership
• serve as modifiable association with a particular
piece of electronic data
•Simple chain scheme
•Small distribution
• Portable C++ source code
• OS + Hasq = 10 Mb bootable CD ISO image 26/26