Introduction

This is a technical introduction article for security token smart contracts I have been working on.

No alt text provided for this image

Securities vs. cryptocurrencies

Securities (real world assets) differ from cryptocurrencies (virtual assets)

  • Securities have an issuer and there exists an implicit trust between the investors and the issuer
  • Securities often need to have real world identities associated with the ownership - a shareholder registry
  • Securities pay dividends or interest

By their nature, security tokens needs less hardcode decentralisation, as there always exist corresponding assets in the real world. Or opposite, losing of private keys cannot result losing the ownership of your assets.

Issuer control mechanism

No alt text provided for this image

TokenMarket security token can run both on public and private blockchains. It is immune to negative effects typically assumed with cryptocurrencies, like hacks and lost private keys. The issuer maintains the master shareholder registry access which ultimately allows to fix human errors shareholders cause for themselves.

The company board nonimates a technical advisor who will execute board decisions like paying dividends or issuing new shares. Other technical advisor activities include managing shareholders registry, recovering shares from lost private keys and fixing human errors in invalid transfers.

TokenMarket security token smart contract has role based mechanism to delegate authority or partial authority to different set of keys. The technical advisor manages these keys. For the security reasons, the technical advisor is using a multisignature wallet where multiple people need to confirm critical activities that affect the shareholder balances.

More about different roles in the SecurityToken source code.

Restricting share transfers

TokenMarket security token supports restricting share transfers. This helps to

  • Enable collection of real world identities of shareholders
  • Ensure all investors receiving shares are qualified to be in the cap table
  • Make shares restricted shares and ensure Board can approve any new shareholders
  • Ensure there is an online communication method for all investors

There can be multiple parties that maintain real world identity registries and whitelists.

See AdvancedTransfeAgent for source code.

Fixing human errors

The issuer, with the help of the technical advisor, can fix errors caused by the shareholder mistakes.

Recovering lost shares

No alt text provided for this image


Unlike decentralised cryptocurrencies, issuer controlled financial instruments allow more relaxed private key management. Because real world identifies are known and the issuer can replace damaged tokenised shares, it is possible to establish a process where a bad key management errors are recovered. This is not totally different for replacing a lost credit cards.

In the case a shareholder reports that they have lost access to their private key, they can go through a recovery process where the lost shares are invalidated and the corresponding amount of new shares are issued to the shareholder.

For more information see forceTransfer() function in the source code.

Unauthorised trades

The shareholder might become a victim of fraud and have their shares stolen. This is not different of mismanaging one’s online bank account or credit cards and have an unauthorised transfers there.

  • The shareholder does not properly manage their private keys and unauthorised party gains access
  • The shareholder organisation is a victim of insider traud

If the unauthorised party manages to liquidate the shares, how cases of rights on stolen title are resolved depend on a jurisdiction. The issuer and its technical advisor can always follow the court decisions if unsure. For more insights read this Twitter discussion.

Custodianship

No alt text provided for this image


In custodial assets

  • Assets owner multiple entities are pooled into the same wallet
  • Sometimes this is for security (cold wallet), sometimes this is necessary for business activity (exchange hot wallets)
  • We need to be able clear ultimate beneficial owners for the assets in this custodian wallet

Custodians need to ensure take care that their benefactors receive payouts and voting rights correctly.

There are two typical case of custodianship for security tokens: custodian companies and exchanges.

Custodial companies

For institutional investors, it is often required to use a custodian company for the concern of separation of duties.

With TokenMarket security tokens, the custodian can safely hold investors’ assets in a pooled cold wallet and then report the the ultimate beneficial ownership structure behind those assets.

Exchange wallets

Exchange that are based on hot wallets do not offer blockchain transparency for ownership over trades.

Exchanges trading security tokens must report both

  • New ownership
  • Trades made (as consolidated tape)

Good information about reporting requirements can be found in European Union MIFID II RTS (Regulatory Technical Standards).