Skip to main content

Leveraging Bitcoin Blockchain Technology to Modernize Security Perfection Under the Uniform Commercial Code

  • Conference paper
  • First Online:
Book cover Software Business (ICSOB 2016)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 240))

Included in the following conference series:

Abstract

The states of the United States operate parallel registration systems under the rules of the Uniform Commercial Code to provide notice of existing security interests in collateral to lenders. The current system is primarily a paper-based system more suited to the 19th than the 21st century. While the states have implemented varying degrees of computerization and modernization, dealing with fifty separate registration databases has made it difficult for banks and their attorneys to automate their processes, leading to errors and loss. The system could be modernized by storing the records for all 50 states in a single shared database with external electronic access. In this paper, we propose an implementation of a distributed, replicated database utilizing a variation on the Bitcoin blockchain for data storage and validation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 34.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 44.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    To simplify this explanation, we omit the cases where only a fraction of a Bitcoin or only part of a grant of Bitcoin is spent. We briefly discuss coin creation below.

References

  1. Federal Deposit Insurance Corporation (USA): Quarterly banking profile: Third quarter 2015 (2015). https://www.fdic.gov/bank/analytical/quarterly/2015_vol9_4/FDIC_3Q2015_v9n4_QBP.pdf

  2. United States Court of Appeals for the 2nd Circuit: In re motors liquidation co. 2015 U.S. App. Lexis 859

    Google Scholar 

  3. Schroeder, J.L.: Bitcoin and the uniform commercial code. Available at SSRN 2649441 (2015)

    Google Scholar 

  4. Wilkinson, S., Boshevski, T., Brandoff, J., Buterin, V.: Storj: A peer-to-peer cloud storage network (2014). http://storj.io/storj.pdf

  5. Kirk, J.: Could the bitcoin network be used as an ultrasecure notary service?, May 2013. http://www.computerworld.com/article/2498077/desktop-apps/could-the-bitcoin-network-be-used-as-an-ultrasecure-notary-service-.html

  6. Wight, R., Cooke, W., Gray, R.: The LSTA’s Complete Credit Agreement Guide. McGraw Hill Professional, New York (2009)

    Google Scholar 

  7. Duncan, R.F., Lyons, W.H., Wilson, C.L.: The Law and Practice of Secured Transactions: Working with Article 9. Law Journal Press, New York (2015)

    Google Scholar 

  8. International Association of Commercial Administrators: UCC Forms. https://www.iaca.org/secured-transactions/forms/

  9. Nakamoto, S.: Bitcoin: A peer-to-peer electronic cash system (2008). https://bitcoin.org/bitcoin.pdf

  10. Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Trans. Inf. Theory 22(6), 644–654 (1976)

    Article  MATH  MathSciNet  Google Scholar 

  11. Merkle, R.C.: Protocols for public key cryptosystems. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 122–133. IEEE (1980)

    Google Scholar 

  12. Rogaway, P., Shrimpton, T.: Cryptographic hash-function basics: definitions, implications, and separations for preimage resistance, second-preimage resistance, and collision resistance. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol. 3017, pp. 371–388. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  13. US Bankruptcy Court, E.D. Virginia: In re tyringham holdings inc. (2006)

    Google Scholar 

  14. Minnesota Supreme Court: Borg Warner Accept. v. ITT Diversified Credit (1984)

    Google Scholar 

  15. Permanent Editorial Board for the Uniform Commercial Code: PEB Commentary No. 15 ((electronic filing under Article 9) (1996)

    Google Scholar 

  16. Ose, T.M.: XML Technical Specifications For Uniform Commercial Code Revised Article 9. Technical report, International Association of Commercial Administrators, May 2013

    Google Scholar 

  17. National Corporate Research: North dakota to require electronic UCC filing: Review of requirements for all e-filing only states, February 2016. http://info.nationalcorp.com/blog

  18. State of Delaware, Division of CorporationsD: Delaware Division of Corporations 2014 Annual Report (2015). https://corp.delaware.gov/Corporations_2014AnnualReport.pdf

  19. State of Delaware: UCC Authorized Filers. http://corp.delaware.gov/uccauthfilers.shtml

  20. Lenstra, A., Hughes, J.P., Augier, M., Bos, J.W., Kleinjung, T., Wachter, C.: Ron was wrong, whit is right. Technical report, IACR (2012). https://eprint.iacr.org/2012/064.pdf

  21. Tank, M., Emley, S., Whitakey, R.D.: A brief guide to using electronic signatures in security transactions. Practical Compliance and Risk Management for the Securities Industry, pp. 23–34, July-August 2013

    Google Scholar 

  22. Buterin, V.: Bitcoin network shaken by blockchain fork (2013). https://bitcoinmagazine.com/articles/ bitcoin-network-shaken-by-blockchain-fork-1363144448

  23. National Corporate Research: UCC article 9 filing and searching info. http://www.nationalcorp.com/ncr/resources/UCC-Resources/UCC-Article-9-Filing-and-Searching-Info

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to David S. Gerstl .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2016 Springer International Publishing Switzerland

About this paper

Cite this paper

Gerstl, D.S. (2016). Leveraging Bitcoin Blockchain Technology to Modernize Security Perfection Under the Uniform Commercial Code. In: Maglyas, A., Lamprecht, AL. (eds) Software Business. ICSOB 2016. Lecture Notes in Business Information Processing, vol 240. Springer, Cham. https://doi.org/10.1007/978-3-319-40515-5_8

Download citation

Publish with us

Policies and ethics