paint-brush
Security Tokens 2.0: Four Protocols that can Power the Next Wave of Tokenized Securitiesby@jrodthoughts
1,881 reads
1,881 reads

Security Tokens 2.0: Four Protocols that can Power the Next Wave of Tokenized Securities

by Jesus Rodriguez5mAugust 7th, 2018
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

The current phase of security token platforms has been mostly focused on enabling the tokenization of assets. More specifically, this first iteration of security token solutions is centered in two main areas: the generation of smart contracts that correlate to an underlying set of documents and enforcing compliance in the form of know-your-customer(KYC) and anti-money-laundering(AML) regulations. A simple way to look at those protocols is as a way to create a smart contract representation of a share, whether that share represents a unit of a real estate lease or common stock in a company, the ultimate process is relatively consistent.

Companies Mentioned

Mention Thumbnail
Mention Thumbnail

Coin Mentioned

Mention Thumbnail
featured image - Security Tokens 2.0: Four Protocols that can Power the Next Wave of Tokenized Securities
Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez

Jesus Rodriguez

@jrodthoughts

Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa

Learn More
LEARN MORE ABOUT @JRODTHOUGHTS'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Jesus Rodriguez HackerNoon profile picture
Jesus Rodriguez@jrodthoughts
Chief Scientist, Managing Partner at Invector Labs. CTO at IntoTheBlock. Angel Investor, Writer, Boa

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite