Data Loading...

Sovnet Whitepaper V1.123 Master LATEST Flipbook PDF

Sovnet Whitepaper V1.123 Master LATEST


108 Views
26 Downloads
FLIP PDF 1.35MB

DOWNLOAD FLIP

REPORT DMCA

SOVNET Project Paper V1.123 Sovran Network Proprietary P2P Protocol

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Abstract SOVNET LLC, registered in Sacro Bisanzio, and the Kingdom of Barotseland, has developed in conjunction with licensed proprietary technologies distributed p2p account and digital currency data services. One of the many areas in which financial inequalities in the world are evident is the so-called “digital divide,” characterizing a large number of communities’ access to the internet, digital and mobile technologies, and technological empowerment. One of the many ways this digital divide manifests itself is a decreased connectivity with banking and financial resources or lack of such leading to what is referred to as the ‘Unbanked’. In addition to availing Sovran Network technologies to enhance the operational abilities of the unbanked, we can distribute and mutualize the economic benefits associated with distributed ledger technology - DLT by offering these communities p2p transactional accounts that expand as more Natural Persons utilize the platform. Introduction This whitepaper for the Sovran Network communicates the general structure along with the various use cases for Sovran technology and is subject to change with or without notice. For the latest up to date information on Sovnet technologies and related partners, please visit www.sovnet.io Sovran Network is comprised of three primary elements, its DLT, Virtual Asset Exchange, and Mobile Payment eWallet Application. Sovran is not exampled specifically by a ledger for distributed transactions, it is the full integration for all essential p2p account services interoperating within a proprietary system environment powered by RBA. Sovran provides unparalleled resources combining member privacy along with the transparency of distributed data. Its platform provides all essential elements in financial service technologies inside one multi-data-centered network, offering advanced interoperability, maintaining the greatest standards in network security, latency, and anonymity. This project paper defines key components enabled to empower people and mitigate the complications that arise from centralized data as well as provide new ways of increasing autonomous liquidity and connectivity with private transactional accounts, liquidity providers and mobile payment technologies. At Sovran, we encourage everyone to participate in decision-making at all levels of their societies to pursue self-determined development priorities. This self-determination through DLT, Exchange Technology and mobile payment technology can help anyone to attain sustainable livelihoods by harnessing the power of DLT and providing solutions previously made impossible by a traditional centralized framework. This proposal incorporates components of the Sovran System powered by its Tech Development and Support Team “RBA” and is part of the establishment of a payment system that will allow the transfer and settlement of virtual currency within Sovran Network - Sovnet using the Sovran Stablecoin “SVC” and other participating “Sovran” countries. Using a range of established technologies, non-bank-based p2p account/value transfer services, and related collateral value for funding, it describes and outlines the proposed establishment of, an initial, ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

“closed-loop” payment/transfer system to be used by SVC members and merchants. In a follow-on phase of development, it provides for an “open-loop” system that connects members to non-members and merchants using, in part, the Sovran Telephone Company “Digitel”. Closed-Loop System In the context of this project, the term “closed-loop” refers to a payment system where account holders can make payments and fund transfers to other account holders or to merchants that also have an account within its closed system. The advantage to the SVC is that this closed system can be implemented in a timely fashion because all transactions are handled within a single payment system rather than across multiple service networks or other financial institutions. Within this system, a user establishes a member account online and funds the account through conventional sources. Merchants may also establish accounts to allow for the purchase of their goods and services. Within this closed system, funds can be transferred between account holders and/or merchants nearly instantaneously for virtually no fees. The initial Phase 1 application will allow the account holder to use their smartphone web browser for access to account-to-account p2p transfer. A dedicated application and other capabilities would be incorporated later in Phase 2.

Sovran Network Technologies Sovran is a proprietary network that has been developed to address significant shortcomings and opportunities that exist throughout a large number of Sovran non-IMF Affiliated communities across the world and will introduce a hybrid non-FinTech p2p barter economy to empower true Freedom and selfdetermination. The network for Sovran has several inherited proven and strong propositions, and the aforementioned opportunities will materialize with the introduction of the following technologies: ◦ ◦



Sovran DLT: Execution of distributed data financial transactions, commodity-backed virtual asset creation, and autonomous service management. Sovran eWallet: Mobile app and payment card, a closed-loop next-generation payment utility for payments in Sovran cash-backed Stablecoin SVC for closed-loop point of sale with future open-loop support from Visa® Network services. Sovran Exchange: Digital/Virtual Asset Exchange for advanced trade of goods and services.

Challenges Legacy financial services are inefficient and create a myriad of challenges with the products they offer. Even today large-scale corporate institutional services face multiple barriers in the economic world and apply unnecessary friction procuring high costs and long procedures for moving value especially in large volumes. Fees

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Despite many advancements in FinTech, core technologies found with legacy corporate institutions are unnecessarily complicated, responsible for high costs due to corporate regulatory requirements and complex communication methods. These fees are made even more cumbersome in developing countries that do not have access to adequate banking services. This creates an egregious lack of options forcing Natural Persons individuals and peoples to use third-party transfer services at rates of up to 10% or more in developed countries, further potential for fees may also apply in the event of additional intermediaries such as agents or brokers. Restrictions This digital divide dominates the financial world and is especially felt in developing nations where access to financial services is limited or altogether nonexistent. The annual revenue for remittances worldwide in 2019 in excess of 500 billion dollars1. In addition, developed economies using bank to bank transfers may also take days, weeks, or potentially be blocked altogether. Transparency Standard programs provided by legacy institutions are limited and offer basic investment options. Most Financial instruments are complex and difficult to understand and information regarding many of these investment programs is limited or withheld from the general public causing an information chasm between institutional investors and the remaining populous. It also leaves most people unprepared and exposed to future market instabilities. Conclusion All these aforementioned challenges stem from issues revolving around trust. Trust is the essential glue that connects all elements and provides solutions to all these problems. This is what trustless financial technologies provide, they create a platform for decentralized distributed financial data without the need for manual control or oversight. Smart contract logic provides opportunities for everyone to interact with their finances creating the highest levels of speed, security, and privacy.

Creating the Closed-loop System (Phase 1) Sovnet would initiate an RBA closed-loop system as the first step in a more comprehensive payment and funds transfer system in liaison with private member banks. The viability of this system has four components. One is the software that comprises the payment process, the other is the marketing of the system within the “Sovran” Participating Countries.

1

https://www.worldbank.org/en/news/press-release/2019/04/08/record-high-remittances-sent-globally-in-2018

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

The marketing to users and merchants will be the responsibility of ‘Sovnet’ with support from its Development Team which will provide the payment system software with the associated administrative and technical support. The proposed closed-loop system is shown in Figure 1.

Figure 1

Project Development Development and implementation of this system will require the following: ◦ Contractually agree on the terms of the system – Emanu-El Michael corp sole of Sacro Bisanzio ◦ Development and implementation of the Technology and ongoing Processes for Tech Support Fund Phase 1 – Sovnet Develop the marketing plan (Phase 1) ◦ ◦ ◦ ◦ ◦ ◦

Establish system private transactional accounts Implement software and administrative staffing (as needed/scaled) Operations manager Software architect Database programmer Interface and use case designer

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦

API, security, and other software adjuncts programmer(s) Administrative manager Tech and customer support lead with support personnel Accounting and audit personnel Establish hardware including server and security agreements Load and test base case payments software Review, test, revise APIs and other support software including user interface Load test accounts and test complete end to end system Enroll test actual users and test, revise, and retest user interface and working test purchases with sample merchants Implement a preliminary marketing program for the first 1000 users Review and revise first 1000 user experience and system performance Roll out full marketing program, staff as needed

Capabilities – Closed-loop The closed-loop system would include the following characteristics and features: ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦

Merchants and consumer/users would have individual accounts Consumer/users would use cell phones Accounts could be used for benefit deposits; bill pay to merchants in the system Payment system CRM would manage the accounts Multiple accounts could be set up with secondary accounts for subordinate use. Accounts could be protected from loss by setting limits on account usage. Primary account holder could control and monitor subordinate / secondary accounts. Subordinate account can be structured for organizations Merchants get instant credit to their account and no interchange fees. Account holder would access the website which would provide the following tools to help account holders manage their accounts: View transaction history View and print online statements. Setup transaction alerts (purchase, deposit, minimum balance, etc.) Set security limits for card use Setup and perform account-to-account transfers (A2A). View personal account information. Monitor secondary accounts and their attached card usage, control alerts and set limits. View Disclosure, Privacy Statement, and Fee Schedule

Platform Technology and Value In terms of platform design and implementation, the Sovnet System includes and provides value to merchants.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

The number one complaint from merchants in traditional systems is the high cost and complexity of the discount (or interchange) fees assessed on them by the payment processing associations. These fees can average 2.5-3% of the purchase amount. Second, is the delay in receiving the payment through the payment association process – which can be 3 to 30 days. Some merchants have to “factor” their receipts at a 2% fee. The third complaint is merchant exposure to customer “chargebacks” and “holdbacks”. This is a financial risk and cost burden to the merchant. The former is a direct reduction in their account and the latter means the merchants do not get their full receipts until a minimum holdback is reached. The Sovnet system would eliminate these complaints because a virtual cash transaction would provide the merchant ‘instant verifiable funds’, reduce discount fees, and avoid customer chargebacks. Out of these savings, merchants could give their customers discounts and loyalty points. Moreover, this technology supports a fundamental change in the issuer business of customer acquisition. As the merchants join the system, they are linked directly to the customers/user database. They make and save money when they invite their customers to join and open an ‘Account’. This system would enable payments and SVC credit transfers to be made and settled instantly with “good funds” between any parties connected to the closed-loop. Interfacing the di-Sceriman Bank in various jurisdictions to provide settlement for the Sovran SVC merchant system. (Phase 2) Phase 2 development would occur sequentially to Phase 1, based upon final design configuration. This will enable smartphones after Phase 1 implementation to access account information through a web browser. Phase 2 will enhance smartphone utility by incorporating both a dedicated application and using the telco as a system fund repository. This approach would also allow the transfer of funds from one account holder to another account holder or merchant using just a phone number. Initially, this system would be a closed-loop system, but that it would become an open-loop as the implementation of the di-Sceriman Private Bank develops and licensing for third-party payment processors is completed. proceeds. Creating the Digitel Telco System (Phase 3) Phase 3 development would be developed in a staggered step to Phase 2. With the final design configuration of Phase 1, smartphone implementation will allow account holders to access account information through an online secure web portal. Phase 2 will enhance smartphone utility by incorporating a dedicated application. This approach would also allow transferring funds from onemember account holder to another or merchant using simply a phone number. Figure 2 shows the basic Sovran Digitel Telco system as proposed.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Figure 2

Development and implementation of the Sovran Digitel Telco system will require the following: ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦

Contractually agree on the terms of the telco system Establish escrow account for the full contract amount Establish contractual relationships with telco re: software development and funds repository Develop telco software design documentation and use cases Review, revise, finalize design documentation Establish project agile development process Begin agile development of phone application(s) Load test accounts as part of the agile process Test complete end to end system for first release Enroll test actual users and test, revise, and retest user interface and working test purchases with sample merchants Review and revise first 1000 users experience and system performance Roll out full Sovran Country Program Capabilities – Sovran interface to the Digitel Telco System Additions

The Sovran Digitel Telco system would incorporate the capabilities described above in the closed-loop section and add the following: ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

◦ ◦ ◦ ◦

Sovran Digitel Telco would act as the funds repository All transactions would be handled on the smartphone Near field communications (NFC) would be operational Creates opportunity for open-loop and remittance capabilities.

One key challenge for a telco is to reduce churn (user switching of providers). If the telco customer has their telco account connected to this system, they will tend to stay a loyal member. If the transactions are performed through the Digitel telco affiliate program, telcos can choose to earn fees on transactions similar to existing telco payment associations. For example, a fee to a merchant for a purchase transaction would depend on the region from 0.90% to 1.25% (rather than 3%), of which the telco could get approximately 0.4% of the gross purchase amount. This acts like an annuity income for the telco. The Sovran Digitel Telco Affiliate becomes part of the merchant processor using the Sovran System. (Fees will be variable and negotiated based on the affordability of each region and country). The system is designed and implemented using multiple virtual databases with business rules for the telco and any other open-loop banks licensed within the system. The database would be centrally located but accessible globally and operated as a Software as a Service (SaaS) to the extent necessary with di-Sceriman Bank interfacing with the propitiatory Digitel system. The system would be operated internally providing Banks or Telcos who wish to offer their customers a way to participate in the system. This includes all aspects of the issuance, payment processing, and account management process, as well as multi-lingual call centers. KYC processing in some instances would be mandatory and stay within those countries. The Sovran Digitel telco affiliates would not have to run a repository database and its associated transactions. Payment and remittance transactions between Digitel or di-Sceriman Bank would be run through the Sovran Network system. The customer/user would use their mobile phone to direct funds from their account to any other account, worldwide when there is a presence. The telco could use the system to connect to ATM switches for money transfers across banks/countries/Sovran countries. The customers/users would not need a bank account in one of the other Digitel or Banks, they would just need to be connected to the system. A Sovran Telco Affiliate would also provide cash withdrawals, loads, and remittance payouts. When a Sovran Telco Affiliate gets its customers to join the Sovran System, they can earn income from payment and money transfer service fees.

Sovran Network Assets Sovran Network Stablecoin (SVC) After building the supportive infrastructure and propositions Sovran has implemented the creation of an exchangeable cryptocurrency with a ‘Fixed Value’ pegged to the Swiss Franc (CHF), the Sovran Network Stablecoin (SVC). SVC is asset-backed, reserved from a basket of fiat currencies, and acts as the exclusive

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

medium of exchange inside the Sovran network environment. SVC transfers are ultra fast, secure with low fees, and instant verification. Sovran Network Token (SVN) The governance token for Sovran, SVC has a fixed token supply of 100,000,000. SVC is the virtual asset anchored to performance metrics for Sovran. As the network for Sovran grows, the value proposition for SVC will follow. The primary token supply is protected inside the Sovran Network and not available on secondary market exchanges. Fundamentals Features and Benefits The purpose of SVC is never to be a speculative tool but rather a utility settlement currency and means of exchange connecting nations to one another. The SVC business model has been established and it advocates a dynamic strategy in virtual transactions and settlements, allowing for flexible resources and goals, as the future financial landscape is difficult to predict. SVC has been designed to help Indigenous financial institutions leverage trends to enhance consumer payment services. Use Cases The most popular applications for current adoption in regards to SVC are as follows: ◦ ◦

◦ ◦ ◦

The cohesion of propositions including digital/virtual currencies. The Sovran platform is built on a proprietary licensed protocol enabling autonomous contracts that handle process control for financial assets/instruments, creating trust, speed, security, and stability. This creates an environment that can scale to almost unlimited levels of currency transactions, virtual asset creation, and virtual contract integration while eliminating market volatility. The true definition of a financial closed-loop system involving a virtual Asset Token and currency Stablecoin. Asset resolution 24/7 when using SVC as currency to settle trades via the Sovran Exchange. Point of sale services merging digital/virtual currencies seamlessly into point of sale (POS) debit card services.

Open-loop and Remittances Transfer funds from closed-loop account to open-loop card/account pegged to the SVC Stable Virtual Currency which value, in turn, is pegged to the CHF. PIN and signature purchases at merchants that support the worldwide processor rails such as Visa® card services. Can make “card not present” purchases over the Internet and telephone. Can use any ATM that supports the local or “Plus” global ATM networks.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Offshore and di-Sceriman Banks would act as Swift clearing for international transfers Figure 3 shows the remittance system.

Figure 3

Project Phases As discussed above the overall system development and implementation are comprised of four phases. Phase 1 Complete This is the design and preliminary development stage. It includes, but is not limited to: Design and model of key system components Design and preliminary test interconnected components/elements Establish and maintain jurisdictional lawful (legal and other administrative/legal) issues to the full development of the Sovran System including Telco Affiliates and Banking Development of appropriate licenses and other administrative (legal) documentation

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Obtain agreements from key stakeholders including Sovran countries, di-Sceriman Bank and other Public Sector and Business Interests Phase 2 In process Platform development phase. Built database and other elements Interconnect systems Test systems Test user interface and supporting components Design and implement final connections to telco administrative and operational elements Continued research into remittance-like transfers Phase 3 In process Telco integration phase Bring up fully functional telco Interconnect telco systems to the processing platform Test system Go live.

Phase 4 In process Country Sovran Payment System and Digitel Telco integration Promote to Countries the implementation of a Country Wide Sovran Digital Currency and Payment Programme, including the Investment Bank providing the Funding Loans and Liquidity and the Sovran Digital Telecommunication System. Countries and Governments become participants in the Sovran Ecosystem. Establish and Bring up fully functional Sovran Digitel Telco Systems and Affiliates. Interconnect Country Wide Sovran Digital Telco systems to provide cell phone coverage to remote areas using a combination of WiMax, VSat technologies, and the Sovran Ether Telecommunication and processing platform. Develop the Sovran Ether Cell Phone Network, WiMax, VSat for each Sovran Country in the remote areas a propitiatory cell network capable of providing a full cell phone and internet / Ethernet communication thus enhancing and implementing Country Wide or Area Specific Network ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Communication and Sovran Network Payment System to remote areas not served by banks or telco services. In Country Wide or Regional Implementation, the main goal is to assist and provide transnational lowcost payment accounts for the ‘Unbanked’. Typically, many countries and regions while not having an overall strategy are looking for solutions, the Sovran Network Solution is capable of support the ‘In-Country or Regional’ Development, these are the: ◦ ◦ ◦ ◦

Country or Regional Government Liquidity Provider Investment Bank di-Sceriman Group RBA Backbone Technology and Service Provisioning Provider Telecom and Telecom Affiliates

The Sovran Network Payment System and Stable Digital Currency does not operate as or in the Corporate Banking World, it is not governed by Corporate Banking AML rules, this caveat is essential to comprehend the complete functionality and integrated Telecom network payment as a low-cost approach to providing account and payment transaction alternatives for what is generally thought of as the ‘Unbanked’, in this sense and to the full meaning of the vision, the creators and development teams have the express interest of assisting those peoples who are ‘Undeserved’ by conventional banking. As Conventional Banking is incapable of providing ultra-low-cost transnational bank accounts, billions of people never obtain any affordable alternative to cash transactions, and this is where the Sovran Network and SVC Ecosystem will fill the gap.

Implementation ABSTRACT A method implemented in a computer system may include reading a first set of data byte values, providing a reproducible first array that includes at least one of each data byte value, identifying in the first array a first contiguous pathway that defines a set of data byte values matching the first set, and creating a second set of command byte values representing the first contiguous pathway. The method may further include providing a reproducible second array that includes at least one of each command byte value in the second set, identifying in the second array a second contiguous pathway that defines a set of command byte values matching the second set, and creating a third set of command byte values representing the second contiguous pathway.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

COMMAND ENCODED DATA COMPRESSION BACKGROUND The present disclosure relates generally to data compression and encryption. More specifically, the present disclosure relates to methods for compressing data using command encoding. Computer files may be several megabytes or gigabytes in size, resulting in a need for compression in order to maximize storage on a given storage medium. While the cost of storage media has dropped significantly over time, the ability to compress the files for transfer or transmission remains desirable to reduce transmission time and bandwidth usage. As a secondary benefit, this process may serve to encrypt the data to Some degree, providing enhanced security. Data compression methods generally fall into two categories, known as “lossless” and “lossy.” Lossless methods of compression generally take advantage of repeated patterns within a file’s data. Lossless methods faithfully reproduce every aspect of the data but reduce the overall size by replacing repetitive portions with smaller representative codes. Lossy methods, on the other hand, generally change the data slightly, for example by homogenizing portions that have only slight variations. This, in turn, makes the data more amenable to compression by creating repeated patterns where before there were none. For example, a digital photograph of an outdoor scene may have hundreds of shades of blue in the sky portion of the photo. A lossy method may convert all of the blues into a single shade and therefore be able to encode the entire sky portion with a single data point. As the name lossy implies, some data is inevitably lost in translation (as in the photo, which when later decompressed will only have a single shade of blue in the sky where before there were many). SUMMARY One or more embodiments of the present invention may include methods, systems, and computer program products for command encoded data compression. According to an embodiment of the present disclosure, a method implemented in a computer system may include reading a first set of data ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

byte values, providing a reproducible first array that includes at least one of each data byte value in the first set, identifying in the first array a first contiguous pathway that defines a set of data byte values matching the first set, and creating a second set of command byte values representing the first contiguous pathway. The method may further include providing a reproducible second array that includes at least one of each command byte value in the second set, identifying in the second array a second contiguous pathway that defines a set of command byte values matching the second set, and creating a third set of command byte values representing the second contiguous pathway. According to an embodiment of the present disclosure, a computer system for manipulating data may include a processor, a memory, and a data manipulation program. The program may include a plurality of instructions stored in the memory that are executed by the processor to read a first set of input byte values and to match a chosen first portion of the first set of input byte values to a chosen first pattern found in a first reproducible array of byte values. The program may also include instructions to represent the first pattern using corresponding first command byte values indicating one or more commands to recreate the first pattern. The program may also include instructions to create a second set of byte values including the command byte values that represent the first pattern. The first portion and first pattern may be chosen from respective multiple candidate portions and patterns based on preselected criteria biased toward candidate portions having a greater size and candidate patterns having a Smaller corresponding set of command byte values. According to an embodiment of the present disclosure, a computer program product for manipulating data may include a computer-readable storage medium having computer-readable program code embodied therewith. The computer-readable program code may be configured to losslessly translate between a first set of bytes and a plurality of pathways in a reproducible array of byte values, and losslessly translate between the plurality of pathways in the reproducible array of byte values and a second set of bytes. Each byte in the first set may have a first number of possible values, each byte in the second set may have a second number of possible values, and the first number may be less than or equal to the second number.

BRIEF DESCRIPTION OF THE DRAWINGS So that the present disclosure will be readily understood, a more particular description will be rendered by reference to specific embodiments that are illustrated in the appended drawings. Understanding that these drawings depict only typical embodiments of the invention and are not, therefore, to be considered to be limiting of its scope, methods and systems will be described and explained with additional specificity and detail through the use of the accompanying drawings, in which: FIG. 1 is a pictorial representation of a distributed data processing system in which illustrative embodiments may be implemented.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

FIG. 2 is a block diagram of a data processing system in which illustrative embodiments may be implemented.

Page left intentionally blank

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

FIG. 3 is a diagram depicting an illustrative method of command encoded lossless data compression. FIG. 4 is a flow chart depicting an illustrative method of command encoded lossless data compression.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

FIG.5 is a diagram depicting another illustrative method of command encoded lossless data compression.

FIG. 6 depicts an example of a set of input bytes. FIG. 7 depicts an example of a first array. FIG. 8 depicts examples of pathways in the array of FIG. 7. FIG.9 depicts examples of selected pathways from those shown in FIG. 8.

Page left intentionally blank

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Page left intentionally blank

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

FIG. 10 depicts illustrative command representations of the examples in FIG. 9.

Page left intentionally blank

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

FIG. 11 depicts an example of a chosen command representation. FIG. 12 depicts an example of a second array. FIG. 13 depicts examples of pathways in the array of FIG. 12. FIG. 14 depicts examples of selected pathways from those shown in FIG. 13.

Page left intentionally blank

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

FIG. 15 depicts illustrative command representations of the examples in FIG. 14.

Page left intentionally blank

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

FIG. 16 depicts an illustrative method according to the present disclosure.

DETAILED DESCRIPTION Lossless data compression and encryption may be accomplished by matching portions of the data to patterns found within reproducible arrays containing byte values. Identified patterns may be encoded as commands for recreating the patterns. Strings of these commands may be encoded in a similar fashion using other reproducible arrays containing only command values. The resulting information may be used to recreate the original data but may be significantly reduced in size from the original data set. As will be appreciated by one skilled in the art, the present disclosure may be embodied as a system, method, or computer program product. Accordingly, the disclosure may take the form of an entirely hardware embodiment, an entirely software embodiment (including firmware, resident software, microcode, etc.), or an embodiment combining software and hardware aspects that may all generally be referred to herein as a “circuit,” “module' or “system.” Furthermore, the disclosure may take the form

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

of a computer program product embodied in any tangible medium of expression having computerusable program code embodied in the medium. Any combination of one or more computer-usable or computer-readable medium(s) may be utilized. The computer-usable or computer-readable medium may be, for example, but not limited to, an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system, apparatus, device, or propagation medium. More specific examples of a computer-readable medium may include the following: an electrical connection having one or more wires, a portable computer diskette, a hard disk, a random access memory (RAM), a read-only memory (ROM), an erasable programmable read-only memory (EPROM or Flash memory), an optical fiber, a portable compact disc read-only memory (CDROM), an optical storage device, a transmission media Such as those Supporting the Internet or an intranet, or a magnetic storage device. Note that the computer-usable or computer-readable medium could even be paper or another suitable medium upon which the program is printed, as the program can be electronically captured, via, for instance, optical scanning of the paper or other medium, then compiled, interpreted, or otherwise processed in a Suitable manner, if necessary, and then stored in a computer's memory. In the context of the present disclosure, a computer-usable or computer-readable medium may be any medium that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The computer-usable medium may include a propagated data signal with the computer-usable program code embodied therewith, either in baseband or as part of a carrier wave. The computer-usable program code may be transmitted using any appropriate medium, including but not limited to wireless, wireline, optical fiber cable, or RF. Computer program code for carrying out operations of the embodiments of the disclosure may be written in any combination of one or more programming languages, including an object-oriented programming language Such as Java, Small talk, C++ or the like and conventional procedural programming languages, such as the C programming language or similar programming languages. The program code may execute entirely on the user's computer, partly on the user's computer, as a standalone software package, partly on the user's computer and partly on a remote computer or entirely on the remote computer or server. In the latter scenario, the remote computer may be connected to the user's computer through any type of network, including a local area network (LAN) or a wide area network (WAN), or the connection may be made to an external computer (for example, through the Internet using an Internet Service Provider). The aspects of the disclosure are described below with reference to flowchart illustrations and/or block diagrams of methods, apparatus (systems), and computer program products according to embodiments of the disclosure. It will be understood that each block of the flowchart illustrations and/ or block diagrams, and combinations of blocks in the flow chart illustrations and/or block diagrams, can be implemented by computer program instructions. These computer program instructions may be provided to a processor of a general-purpose computer, special purpose computer, or other programmable data processing apparatus to produce a machine, such that the instructions, which execute via the processor of the computer or other programmable data processing apparatus, create means for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

These computer program instructions may also be stored in a computer-readable medium that can direct a computer or other programmable data processing apparatus to function in a particular manner, such that the instructions stored in the computer-readable medium produce an article of manufacture including instruction means which implement the function/act specified in the flowchart and/or block diagram block or blocks. The computer program instructions may also be loaded onto a computer or other programmable data processing apparatus to cause a series of operational steps to be performed on the computer or other programmable apparatus to produce a computer-implemented process such that the instructions which execute on the computer or other programmable apparatus provide processes for implementing the functions/acts specified in the flowchart and/or block diagram block or blocks. With reference now to the figures and in particular with reference to FIG. 1, an illustrative diagram of a data processing environment is provided in which illustrative embodiments may be implemented. It should be appreciated that FIG. 1 is only provided as an illustration of one implementation and is not intended to imply any limitation with regard to the environments in which different embodiments may be implemented. Many modifications to the depicted environments may be made. FIG. 1 depicts a pictorial representation of a distributed data processing systems in which illustrative embodiments may be implemented. Network data processing system 100 is a network of computers in which the illustrative embodiments may be implemented. Network data processing system 100 contains network 102, which is the medium used to provide communications links between various devices and computers connected within network data processing system 100. Network 102 may include connections, such as wire, wireless communication links, or fiber optic cables. In the depicted example, server computer 104 and server computer 106 connect to network 102 along with storage unit 108. In addition, client computers 110, 112, and 114 connect to network 102. Client computers 110, 112, and 114 may be, for example, personal computers, network computers, or mobile computing devices such as personal digital assistants (PDAs), cellphones, handheld gaming devices, or tablet computers, and the like. In the depicted example, server computer 104 provides information, such as boot files, operating system images, and applications to client computers 110, 112, and 114. Client computers 110, 112, and 114 are clients to server computer 104 in this example. Network data processing system 100 may include additional server computers, client computers, and other devices not shown. Program code located in network data processing system 100 may be stored on a computer recordable storage medium and downloaded to a data processing system or another device for use. For example, program code may be stored on a computer recordable storage medium on server computer 104 and downloaded to client computer 110 over network 102 for use on client computer 110. In the depicted example, network data processing system 100 is the Internet with network 102 representing a worldwide collection of networks and gateways that use the Transmission Control Protocol/Internet Protocol (TCP/IP) suite of protocols to communicate with one another. At the heart of the Internet is a backbone of high-speed data communication lines between major nodes or host computers, consisting of thousands of commercial, governmental, educational and other computer

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

systems that route data and messages. Network data processing system 100 also may be implemented as several different types of networks, such as an intranet, a local area network (LAN), or a wide area network (WAN). FIG. 1 is intended as an example, and not as an architectural limitation for the different illustrative embodiments. Turning now to FIG. 2, a block diagram of a data processing system is depicted in accordance with the present disclosure. In this illustrative example, data processing system 200 includes communications fabric 202, which provides communications between processor unit 204, memory 206, persistent storage 208, communications unit 210, input/output (I/O) unit 212, and display 214. Processor unit 204 serves to execute instructions for software that may be loaded into memory 206. Processor unit 204 may be a number of processors, a multi-processor core, or Some other type of processor, depending on the particular implementation. A number, as used herein with reference to an item, means one or more items. Further, processor unit 204 may be implemented using a number of heterogeneous processor systems in which the main processor is present with secondary processors on a single chip. As another illustrative example, processor unit 204 may be a symmetric multi-processor system containing multiple processors of the same type. Memory 206 and persistent storage 208 are examples of storage devices 216. A storage device is any piece of hardware that is capable of storing information, Such as, for example, without limitation, data, program code in functional form, and/or other suitable information on either a temporary basis and/or a permanent basis. Memory 206, in these examples, maybe, for example, random-access memory or any other suitable volatile or non-volatile storage device. Persistent storage 208 may take various forms, depending on the particular implementation. For example, persistent storage 208 may contain one or more components or devices such as a hard drive, a flash memory, a rewritable optical disk, a rewritable magnetic tape, or some combination of the above. The media used by persistent storage 208 also may be removable. For example, a removable hard drive may be used for persistent storage 208. Communications unit 210, in these examples, provides for communications with other data processing systems or devices. In these examples, communications unit 210 may be a network interface card. Communications unit 210 may provide communications through the use of either or both physical and wireless communications links. Input/output unit 212 allows for input and output of data with other devices that may be connected to data processing system 200. For example, input/output unit 212 may provide a connection for user input through a keyboard, a mouse, and/or some other suitable input device. Further, input/output unit 212 may send output to a printer. Display 214 provides a mechanism to display information to a user. Instructions for the operating system, applications, and/or programs may be located in storage devices 216, which are in communication with processor unit 204 through communications fabric 202. In these illustrative examples, the instructions are in a functional form on persistent storage 208. These instructions may be loaded into memory 206 for execution by processor unit 204. The processes of the

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

different embodiments may be performed by processor unit 204 using computer implemented instructions, which may be located in a memory, Such as memory 206. These instructions are referred to as program code, computer usable program code, or computerreadable program code that may be read and executed by a processor in processor unit 204. The program code in the different embodiments may be embodied on different physical or computerreadable storage media, Such as memory 206 or persistent storage 208. Program code 218 is located in a functional form on computer-readable media 220 that is selectively removable and may be loaded onto or transferred to data processing system 200 for execution by processor unit 204. Program code 218 and computer-readable media 220 form computer program product 222 in these examples. In one example, computer-readable media 220 may be computerreadable storage media 224 or computer-readable signal media 226. The computer-readable storage media 224 may include, for example, an optical or magnetic disk that is inserted or placed into a drive or other device that is part of persistent storage 208 for transfer onto a storage device. Such as a hard drive, that is part of persistent storage 208. Computer-readable storage media 224 also may take the form of persistent storage. Such as a hard drive, a thumb drive, or a flash memory, that is connected to the data processing system 200. In some instances, computer-readable storage media 224 may not be removable from data processing system 200. In these illustrative examples, computer readable storage media 224 is a non-transitory computer-readable storage medium. Alternatively, program code 218 may be transferred to data processing system 200 using computer readable signal media 226, Computer-readable signal media 226 may be, for example, a propagated data signal containing program code 218. For example, computer-readable signal media 226 may be an electromagnetic signal, an optical signal, and/or any other suitable type of signal. These signals may be transmitted over communications links, such as wireless communications links, optical fiber cable, coaxial cable, a wire, and/or any other suitable type of communications link. In other words, the communications link and/or the connection may be physical and/or wireless in the illustrative examples. In some embodiments, program code 218 may be downloaded over a network to persistent storage 208 from another device or data processing system through computer readable signal media 226 for use within data processing system 200. For instance, program code stored in a computer-readable storage medium in a server data processing system may be downloaded over a network from the server to data processing system 200. The data processing system providing program code 218 may be a server computer, a client computer, or Some other device capable of storing and transmitting program code 218. The different components illustrated for data processing system 200 are not meant to provide architectural limitations to the manner in which different embodiments may be implemented. The different advantageous embodiments may be implemented in a data processing system including components in addition to or in place of those illustrated for data processing system 200. Other components shown in FIG. 2 can be varied from the illustrative examples shown. The different embodiments may be implemented using any hardware device or system capable of running program code. As one example, the data processing system may include organic components integrated with

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

inorganic components and/or maybe comprised entirely of organic components excluding a human being. For example, a storage device may be comprised of an organic semiconductor. As another example, a storage device in data processing system 200 may be any hardware apparatus that may store data. Memory 206, persistent storage 208, and computer-readable media 220 are examples of storage devices in a tangible form. In another example, a bus system may be used to implement communications fabric 202 and may be comprised of one or more buses, such as a system bus or an input/output bus. Of course, the bus system may be implemented using any suitable type of architecture that provides for a transfer of data between different components or devices attached to the bus system. Additionally, a communications unit may include one or more devices used to transmit and receive data, Such as a modem or a network adapter. Further, a memory may be, for example, memory 206, or a cache Such as found in an interface and memory controller hub that may be present in communications fabric 202. It is understood that all or part of the system(s) and/or method(s) of the present disclosure may be implemented and/or utilized in a cloud computing environment. A command-encoded data compression method is shown generally at 300 in FIG. 3-5. Unless otherwise specified, command-encoded data compression method 300 may, but is not required to, contain at least one of the structures, components, functionality, steps, and/or variations described, illustrated, and/or incorporated herein. As shown in FIG. 3, compression method 300 may include translation between the first set of bytes 302, one or more patterns or pathways 308 within an array 306, and a second set of bytes 304. Translation between the first set of bytes 302 and the second set of bytes 304 via pathways 308 may be performed for various purposes, including data encryption or decryption and/or data compression or decompression. In some embodiments, the first set of bytes 302 may be any set of bytes provided as an input to method 300. For example, the first set of bytes 302 may include a series of bytes encoding a digital word processing document or digital image. The second set of bytes 304 may be any series of bytes representing instructions for creating pathways 308 in array 306. In some embodiments, the roles of the first set of bytes 302 and second set of bytes 304 may be reversed, with the second set of bytes 304 acting as an input. Each of the first and second sets of bytes 302 and 304 may include bytes having a plurality of possible byte values. Bytes may be any group of binary digits that is operated on as a unit by a device such as a processor. For example, a byte may be a group consisting of eight binary digits, or bits. Byte values may be any of the numerical values associated with a byte. For example, by definition, an unconstrained eight-bit byte would have 256 possible values ranging in decimal notation from 0 to 255. In some embodiments, the universe of possible byte values for a given byte size may be artificially limited. For example, in some steps, method 300 may utilize eight-bit bytes but allow only a predetermined number of byte values smaller than the overall 256 possible. In other steps, eight-bit bytes may not be constrained at all. In any given step, this description will refer to the maximum allowable range of byte values as the “possible' values, intending the term possible to mean permissible in that step of the

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

method. Accordingly, each byte in the first set of bytes 302 may have a different number of possible values than each byte in the second set of bytes 304. Array 306 may be any suitable array of nodes configured to hold byte values, where a node is a location within the array that is addressable using coordinates. Array 306 may have one or more dimensions. For example, array 306 may be a cube having three dimensions, which will be referred to as X, Y, and Z dimensions. In a three-dimensional array 306, therefore, the location of any given point or node in the array can be described using its X, Y, and Z coordinates. Array 306 may have more or fewer dimensions. In some embodiments, array 306 is four-dimensional. Array 306 may also be described as having a size. In this context, the size of an array may be delineated by the magnitude of each dimension. For example, array 306 may be a three-dimensional cube of size 36 by 36 by 36. Because the nodes of array 306 may be populated with the same range of values as are possible in the first set of bytes 302, a given subset of the first set of bytes 302 may be matched by finding patterns of corresponding byte values within array 306. For example, a certain series of byte values from the first set of bytes 302 may have an equivalent series of values located along a pattern consisting of a contiguous pathway 308 of nodes within array 306. In this example, in other words, sequentially traversing a certain pathway 308 may result in encountering the same byte values as are in the original series from the first set of bytes 302. In this context, a contiguous pathway may be meant as a series of nodes wherein any given sequential pair of nodes is contiguous. The term contiguous is used in the sense that within array 306, each of the two nodes may touch the other. More specifically, for a threedimensional array, two nodes may be considered contiguous if each of the respective X, Y, and Z coordinates of one node differs by no more than one unit from the X, Y, and Z coordinates of a second node. Using the method described above, translating is possible from the first set of bytes 302 to pathways 308, by finding matching pathways. Translating is also possible from pathways 308 to the first set of bytes 302 by determining the series of byte values encountered as the pathways are retraced. The second set of bytes 304 may hold byte values that represent instructions or commands that describe how to create pathways 308. Accordingly, translating is possible from second set of bytes 304 to pathways 308, by implementing the commands. Translating is also possible from pathways 308 to second set of bytes 304, by selecting predefined commands that correspond to the pathways. Combining this methodology with the previous methodology may facilitate encryption, because the byte values in first set of bytes 302 may thus be transformed into representative, but different byte values in second set of bytes 304. It may also facilitate compression, because second set of bytes 304 may be smaller than first set of bytes 302, as explained in more detail below. FIG. 4 illustrates an embodiment of method 300. In step 10. input byte values may be read by a processor. Input byte values may be part of an input file or digital data stream. Reading may be done by any suitable method. In step 12, a chosen portion of the input byte values may be matched to a chosen pattern in an array. A pattern may include contiguous pathways, as described above. A pattern may also include other pattern-like arrangements such as a geometrical pattern or a non-contiguous pathway. A portion of the input byte values may be any Subset of input. For example, a portion may be the first byte

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

value of the set or maybe a series of bytes or a Subset of bytes chosen based on certain properties. In some embodiments, a portion of the input byte values and a pattern in the array may be chosen in concert based on certain pre determined criteria. In step 14 the pattern or patterns matched in step 12 may be represented by command byte values that themselves represent instructions for recreating the patterns. In some embodiments, criteria for choosing a portion and pattern in step 12 may include the relative sizes of command byte value representations of various candidate patterns. In step 16, a set of bytes may be created by the processor to include the command byte values determined in step 14. The set of bytes may also include byte values representing other information such as an identifier for the set of input values. For example, header information for a digital data file may be included. FIG. 5-15 illustrate an embodiment of a two-phase process implementing command-encoded data compression method 300. In some embodiments, Phase One may include steps 20-26 and Phase Two may include steps 30-34. Referring to FIG. 5, step 20 may include reading a set of data bytes. The data bytes may be any set of digital information arranged in byte form. For example, the data bytes may be a series of eight-bit bytes representing a digital data file or input stream such as a digital photograph or video. Accordingly, byte values associated with the data bytes may be unrestricted, and the number of possible values will be whatever is mathematically possible. For example, with an eight-bit byte architecture, the data bytes may have 256 possible byte values. FIG. 6 depicts an illustrative example of a set of data bytes 310, shown as a string of bytes, each byte having a value from 0 to 255. Again, referring to FIG. 5, in step 22, a first reproducible array may be provided. The first reproducible array is an example of array 306, and may be a digital array having one or more dimensions, with nodes populated by byte values. The first reproducible array may be reproducible based on predetermined criteria. For example, the first reproducible array may be a three-dimensional array having X, Y, and Z coordinates that may be used to identify nodes of the array. Each node may be configured as a storage location for a byte value, or as a pointer to a storage location for a byte value. Each node of the first reproducible array may be populated with a value from 0 to 255. The first reproducible array may be sized sufficiently to include each possible byte value in at least one node. The first reproducible array may be sized to allow more than one occurrence of any given byte value. FIG. 7 shows an example of a first reproducible array 312, which is depicted as a three-dimensional cube of data, having nodes 314, with X, Y, and Z dimensions illustrated. Array 312 may be configured to be reproducible by providing a predetermined method of construction that will always result in the same values in the same node 314 locations in the same sized array 312. For example, array 312 may be provided by constructing a three-dimensional array of a certain size, populating the array by sequentially loading each node 314 with sequential values from 0 to 255, repeating the order as needed to fill the array. Values in nodes 314 of array 312 may then be shuffled or rearranged in a predetermined manner to allow for a more random distribution of the values.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

In some embodiments, the first reproducible array may be loaded using a pseudorandom number generating algorithm to produce a set of values from 0 to 255. Any suitable pseudorandom number generating algorithm known in the art would be adequate for this purpose. Generally, the algorithm of a pseudorandom number generator may use a seed value or values to produce an approximation of a random set of numbers. These algorithms do not produce truly random numbers because the values are entirely determined by the algorithm and the seed value(s). Accordingly, the first reproducible array may be made reproducible by generating a pseudorandom set each time using an identical seed value. The frequency distribution of byte values in the first reproducible array may be tailored to substantially correspond to a frequency distribution of byte values in the set of data bytes (such as data bytes 310). For example, if certain values occur more or less frequently in the Source data, those values may be made to occur more or less frequently in the array. This would be done to increase the probability of finding sequences or patterns of byte values in the first reproducible array that match portions of the set of data bytes. Frequency distribution tailoring may be done either before or after the first reproducible array is populated with values. For example, a loading then-shuffling method may be conducive to a predetermined frequency distribution of the values being loaded. However, a pseudorandom number generation method may be less conducive to predetermining the distribution, and a post hoc adjustment may be more useful. In some embodiments, this frequency distribution may not be known or may not be Sufficiently beneficial to the process to warrant changing the distribution in the first reproducible array. Again, referring to FIG. 5, step 24 may include identifying a first pattern or pathway in the first reproducible array (such as array 312). The first pathway may be an example of pathway 308 and may be any suitable pattern of locations within the first reproducible array that, if traversed in a predetermined order, will produce a series of values equivalent to the series of values in a subset of data bytes (such as data bytes 310). For example, the first pathway may be an example of a contiguous pathway as described above, in which each subsequent node of the first reproducible array in the first pathway has coordinates that differ by no more than one unit for any given dimension relative to the preceding node. In some embodiments, the first pathway may be a geometric pattern or may be based on a predetermined mathematical formula. The first pathway may be identified by any suitable method. For example, several candidate pathways may be found within the first reproducible array, and a single best or adequate pathway may be chosen from among the candidates. In some embodiments, candidate pathways may continue to be found until one meets certain fitness criteria. Each candidate pathway may be found by first finding a node of the first reproducible array that contains the first value in the set of data bytes. Continuing with the example of FIG. 6-9, the first value in bytes 310 is 0. Accordingly, some or all of nodes 314 containing the value 0 may be located. Each node 314 containing O may then be examined to determine if any contiguous neighbors contain the second value in the set of data bytes 310. Here, that value is 1. Any nodes 314 thus found containing the value 1 may then be examined for neighbors with the third value, 2, and so on. The process may be repeated until no contiguous neighbor can be found containing the next value in the set of data bytes 310. The result of this candidate-pathway identification process may be to identify several candidate pathways of varying lengths and locations. FIG. 8 depicts an example in which six candidate pathways are found, labeled as 402, 404, 406, 408, 410, and 412. ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

With multiple candidate pathways, a single first pathway 316 may be identified by comparing the candidates based on predetermined criteria. Multiple criteria may be used. In Some embodiments, one criterion may be the overall length or size of each candidate pathway, where size is defined by the number of contiguous nodes in each pathway. In the example of FIG. 8, candidate pathways 402, 408, and 412 would have length 5, while candidate pathway 404 would have length 2, candidate pathway 406 would have length 1, and candidate pathway 410 would have length 4. Typically, candidate path ways having a greater size would be preferred, because greater sizes of pathways are more likely to produce better data compression in Subsequent steps. However, this is not always the case. Returning to FIG. 5, in step 26, a command representation of the first pathway may be created. In some embodiments, this step may be at least partly in parallel with step 24, in that a command representation may be created for one or more candidate pathways found in step 24 before a single candidate is chosen as the first pathway. Characteristics of the resulting command representations may be used as criteria in selecting a single first pathway from among the candidates. The command representation may be any suitable arrangement of byte values corresponding to predetermined instructions or commands for recreating a pattern or pathway in an array 306 such as the first reproducible array (such as array 312). For example, a command representation 318 may correspond to a string of predetermined instructions or commands 320. Commands 320 may include “move' and “grab commands. So-called move commands may include instructions regarding a direction in which the next node or nodes 314 in the pathway or pattern may be found. So-called grab commands may include instructions regarding how many nodes 314 in that direction should be traversed. In some embodiments, there may be 26 move commands corresponding to the 26 possible directions when starting from a given node 314 in array 312. More specifically, for any given node 314 in array 312, the 26 possible directions for reaching a contiguous neighbor may be described as follows:

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

In Some embodiments, 26 possible directions may be defined even for nodes on an "edge' of the array. This may be done by causing a direction to be interpreted as wrapping around to the opposite edge of the array. In other words, if a maximum limit is reached for any given dimension, the dimension will wrap around to the minimum value, and vice Versa. For a dimension of size 36, this means that contiguous neighbors of the node at 35 may be defined as including the nodes at 34 and 0, while contiguous neighbors of the node at O may be defined as including the nodes at 35 and 1. The quantity and/or values of grab commands may be limited based on expected patterns. For example, there may be ten grab commands abbreviated here as G1-G10, corresponding to instructions for traversing from 1 to 10 nodes in a given direction. More or fewer grab commands may be chosen based on a typical range of grab-like operations experienced for a given type of input data. Grab commands may include a non-continuous range of values. For example, there may be five grab commands such as G1, G2. G3, G5, and G10. Based on the previous example with G1-G10, however, 26 move commands and 10 grab commands correspond to a total of 36 possible commands. Accordingly, regardless of the byte size used, only 36 total values may be required and/or allowed to represent these 36 possible commands. In some embodiments, more or fewer commands may be used, corresponding to the type of pattern being recreated. Continuing with the example of FIG. 6-9, FIG. 9 illustrates how the number of candidate pathways identified in FIG. 8 may be narrowed based on overall size. In this example, three of the candidate pathways had a length of 5. As the greatest length among the candidates, these may be the only candidates further analyzed to choose a single best pathway 316. Analysis may include creating a command representation 318 for each of the candidate pathways 402, 408, and 412. FIG. 10 shows possible command representations, respectively labeled 502, 508, and 512. In addition, to move and grab commands, a command representation 318 may also include a starting location for each pathway. A starting location may be identified by any suitable means. For example, a starting location may be identified as X, Y, and Z coordinates of the first node of a pathway. In some embodiments, a starting location of a pathway may be identified as a relative direction and distance from the final node of a preceding pathway. Using absolute coordinates may be preferable, because it creates data of a fixed size, whereas other methods such as using relative coordinates may create data that vary in size based on the direction or distance to the next starting node. If an absolute method of identifying a starting location is used, it may be disregarded for purposes of choosing from among candidate pathways and is therefore not illustrated in the drawings. As depicted in FIG. 10, each candidate pathway may be represented using move and grab commands. For example, candidate pathway 402 may be represented as follows. First, the node containing O may be identified by its X, Y, and Z coordinates, which are the starting location for this pathway. Next, the node containing 1 may be reached from the first node by going right. Accordingly, the first command code may be R. In this example, the node containing 2 is found by then moving down. Because no further nodes are found in the R direction, the G1 command to grab one node (the one containing 1) may be used, and the next command would be D to go down. However, nodes containing both 2 and 3 are found in the down direction, so this time the G2 command to grab two nodes may be used. The final node in this path is then found to the right of the one containing 3. Accordingly, the commands R for ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

“right,” and G1 for "grab one' may be added to the command representation string, resulting in a final representation as shown at 502. The other candidate pathways are shown in FIG. 10, as well as candidate pathways in other drawings, are encoded in similar fashion. As shown in FIG. 10, candidate pathway 408 may be represented by the shortest command representation, here command representation 508, which has a size of four. As the candidate pathway with the longest size and the shortest corresponding command representation, candidate pathway 408 may be chosen as first pathway 316. Command representation 508 representing pathway 316 is illustrated in FIG. 11. One skilled in the art will appreciate that analysis of slightly shorter candidate pathways may in some cases result in significantly shorter command representations. Accordingly, candidates other than those having the absolute largest size may be analyzed to determine the optimum combination of pathway length and command representation size, with an overall goal of data compression. One skilled in the art will also recognize that the commands and representations described here are merely examples. Moreover, the commands are described colloquially while actual command codes may consist of numerical values that may be interpreted appropriately by a processor to accomplish the desired result. Any suitable commands describing how to recreate a pattern or pathway may be used, as long as those commands can be digitally represented and interpreted. Different words or abbreviations may be used to represent directions or distances. In some embodiments, directions and distances may be combined. In some embodiments, coordinates may be used for more than starting locations. Many combinations and alternatives are possible while still remaining within the scope of the present disclosure. Referring again to FIG. 5, step 30 may include providing a second reproducible array and may represent entering Phase Two of method 300. In this phase, steps similar to previous steps may be repeated to facilitate encryption and further data compression. In step 30, another example of array 306 is created, i.e., the second reproducible array. As before in step 22, the second reproducible array may be a digital array having one or more dimensions, with nodes populated by byte values. The second reproducible array may again be reproducible based on predetermined criteria. For example, the second reproducible array may be a three-dimensional array comprised of nodes, with X, Y, and Z coordinates identifying any given node of the second reproducible array. Each node of the second reproducible array may be configured as a storage location for a byte value. However, unlike the first reproducible array of step 22, each node of the second reproducible array may be populated only with the possible values used to represent commands. Continuing with the previous example, each node of the second reproducible array may accordingly be populated with a value from 0 to 36. The second reproducible array may be sized sufficiently to allow more than one occurrence of any given byte value. For example, the second reproducible array may be approximately the same size as the first reproducible array. FIG. 12 shows an example of a second reproducible array 322, which is depicted as a cube of data having nodes 324 populated with byte values representing commands. Methods described in step 22 for populating the array, such as load-and-shuffle or pseudorandom generation, may also be used in step

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

30. However, in step 30 only command byte values may be used. The frequency distribution of byte values in the second reproducible array (Such as array 322) may also be tailored to Substantially correspond to a frequency distribution of byte values expected from command representations. For example, grab commands corresponding to longer traversals may be less commonly encountered and therefore may be represented less often in the second reproducible array. Returning to FIG. 5, step 32 may include identifying a second pattern or pathway in the second reproducible array. Similar to step 24, the second pathway may be an example of a pathway 308 and may be any suitable pattern of locations within the second reproducible array that, if traversed in a 10 15 25 30 35 40 45 50 55 60 65 14 predetermined order, may produce a series of values equivalent to those of a given set of bytes. In step 24, that given set of bytes was a subset of data bytes 310. In step 32, the input set of bytes to be matched may be the command representation formed in step 26. Command representation 508 is shown in FIG. 10, but the set of bytes used in step 32 may include an entire string or series of such command representations. For example, Phase One steps 20-26 may be repeated for a predetermined amount of data or for all of the data bytes 310 in a given input file or stream. This may result in several command representations 318, each representing a different portion of the data bytes 310. The plurality of command representations 318 thus created may be concatenated or combined to be used as the input bytes for step 32. In order to simplify discussion, the example of command representation 508 will be used, keeping in mind that the actual amount of data employed as an input to step 32 may be significantly larger and include a plurality of command representations. As before, second pathway 326 may be an example of a contiguous pathway in which each Subsequent node 324 in pathway 326 has coordinates that differ by no more than one unit for any given dimension relative to the preceding node. In Some embodiments, second pathway 326 may be a geometric pattern or may be based on a predetermined mathematical formula. The second pathway 326 may be identified by any suitable method, as explained in step 24, including finding several candidate pathways within array 322, and choosing a single best (or adequate) pathway 326 from among the candidates. However, in Phase Two, array 322 may be configured to have a much greater probability of containing pattern matches for sequences of values from the series of command representations 318. As explained above, there may only be 36 possible byte values corresponding to commands, and in any case, the number of possible values will be less than or equal to the number of possible values for data bytes 310. This reduction in possible values, combined with a sufficiently large array size for array 322 results in a greater duplication of values in nodes 324 and a correspondingly greater probability that any given pattern of values will exist in the array as compared to array 312. In some embodiments, array 322 may be approximately the same size as array 312. However, the same effect may be accomplished using other sizes. In some embodiments, the number of possible command byte values and the number of possible data byte values may be sufficiently similar that the greater duplication of values may be Substantially accomplished using a larger array size alone. In any event, with more potential candidates to find and choose from, a greater amount of data compression may be expected from Phase Two than from Phase One.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Again, referring back to FIG. 5, step 34 may correspond to step 26 of Phase One, and as before it may overlap with the previous step. In step 34, a command representation may be created for each of the candidates vying to become a second pathway. Although the pathways themselves contain byte values corresponding to commands, commands nonetheless may still be used to encode patterns or pathways in an array 306. Thus, methods and commands identical or similar to those in step 26 may be used to encode and choose a second pathway. FIG. 13 depicts various candidate pathways that may be found continuing with the example of FIG. 11 and 12. In this example, five candidates are shown, with candidate pathways 602, 604, 606, and 610 having a size of 4 and candidate pathway 608 having a size of 2. More or fewer candidates may be found. In this example, the largest candidate pathways 602, 604, 606, and 610 may be selected for further analysis. FIG. 14 shows these candidates separated into individual pathways. As shown in FIG. 15, respective command representations 702, 704, 706, and 710 may be created for the candidate pathways using the same rubric as in step 26. In this example, command representation 702 has the smallest size and indicates that candidate pathway 602 may be chosen as second pathway 326. As with Phase One, the steps of Phase Two may be repeated until all or a predetermined amount of the set of Phase One command representations 318 are again encoded. In some embodiments, Phase Two may then be begun yet again, attempting to further reduce the overall size of the set of command representations 318. Phase Two may continue to be repeated until further reduction is no longer possible or practicable. Phase Two may be repeated for only a subset of the command representations 318. For example, certain sections of the data may be more conducive to size reduction using the steps of Phase Two, while other sections have reached maximum practical or desired compression. Once a desired level of data compression is reached, Phase Two may be completed and a set of output bytes may be created. In some embodiments, the set of final command representations 318 may be further compressed in a post processing step using a refactoring method. The refactoring method may take advantage of the fact that the command representations 318 consist of a smaller number of possible values than are able to be stored in an eight-bit byte. For example, there may be 36 possible byte values corresponding to commands, whereas an eight-bit byte may store up to 256 possible values. Continuing with this example, a string of command representations 318 ("command string) in which each byte contains a value from 0 to 35 may be reversibly converted to a shorter (i.e., compressed) string of refactored representations (“refactored string”) in which each byte contains a value from 0 to 255. With these parameters, conversion of a command string of nine bytes may be converted to a refactored string of six bytes, resulting in a compression ratio of approximately 66.7%. The refactoring compression may be accomplished by initially multiplying each value in the command string by a predetermined corresponding factor of 36 and then Summing the products. For example, if the nine values in the command string are represented by the letters A, B, C, D, E, F, G, H, and I, then the initial step may be configured to produce a result R=(Ax368)+(Bx367)+(Cx366)+(Dx365)+(Ex364)+ (Fx363)+(Gx362)+(Hx361)+(Ix360).

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

The result R may then be factored in a second step using factors of 256 to produce six values. For example, the result R may first be divided by 2565 to determine a first integer value J. The remainder, which is the modulus of R and 2565, may then be divided by 2564 to determine a second integer value K. The remainder of that operation, in turn, may be divided by 2563 to determine a third integer value L, and so on through 256 2, 2561, and 2560 to determine values M, N, and O. At that point, the nine 0-35 values A, B, C, D, E, F, G, H, and I may be converted to six 0-255 values J, K, L, M, N, and O. Because every value in this example is represented by eight-bit bytes, this conversion results in data compression and smaller output size. The six values of the refactored string may be converted back to the nine values of the command string by simply reversing the mathematical steps. In other words, the result R may be determined and then refactored as before, but reversing the order of the factors used. First, R may be re-obtained 10 15 25 30 35 40 45 50 55 60 65 16 by multiplying the six refactored values by factors of 256 and Summing. Continuing with the previous example, R (JX 2565)+(Kx2564)+(Lx2563)+(Mx2562)+(Nx2561)+(Ox2560). Because this value of R is the same as the previous value of R obtained in the initial step, it can be factored by factors of 36 to obtain the original nine command values. In other words, dividing R by 368 gives the integer value of A, dividing the remainder of that operation by 367 gives the integer value of B, and so on, until all nine values may again be determined. In some embodiments, the set of final command representations 318 may be refactored as described above in sequential nine-byte chunks, converting each chunk to six-bytes and creating a shorter overall sequence of values. In other embodiments, more or fewer bytes may be operated on at one time. It will also be appreciated by a person of ordinary skill that using command strings of different lengths or containing more or fewer than 36 possible values will result in a need to use correspondingly different factoring parameters. In any case, the refactoring method and parameters may be predetermined and coded into a set of compression and/or decompression computer instructions. It should also be appreciated that this refactoring compression method may be incorporated at any point in the process where a set of bytes is certain to contain only a reduced number of possible values, such as 0-35, but where those values are stored in bytes having a capacity for more possible values, such as eight-bit bytes with possible values from 0-255. Output bytes may be an example of second set of bytes 304, and may be a combination of final command representations 318, including pathway starting location information and the commands for recreating the pathways 308 (which may have been further compressed using the previously described refactoring method), and other bytes representing information Such as frequency distribution tailoring settings and number of Phase Two repetitions completed. Output bytes may be described as an encoded, compressed version of data bytes 310, and may contain all the information required to recreate data bytes 310 using the reproducible commands and arrays of method 300. A digital file or stream containing the output bytes may be transferred to another location using typical methods such as portable storage media or via a network, as shown in FIG. 1. The arrays and command structures of method 300 do not need to be transferred along with the output bytes, resulting in a smaller file transfer size.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

In addition to or instead of encryption and compression, the methods and systems of the present disclosure may be used to decrypt and decompress the output bytes. For example, a processor may follow instructions to read output bytes and translate the byte values into starting locations and commands for recreating patterns or pathways 308 in array 322. Essentially performing the steps of Phase Two out of order, array 322 may be produced, using a standard frequency distribution or following other embedded instructions to create a custom distribution. If a post-processing step was used to refactor the data, that step may be reversed as described above. Each pathway 308 may then be retraced or sequentially traversed by following the listed commands. Byte values encountered at each node 324 may be read to determine the set of command representations 318 that were encoded. For example, the commands of command representation 702 may be followed to retrace second pathway 326 in array 322. Phase Two steps may be repeated for the prescribed number of repetitions listed in the output bytes, resulting in the original set of command representations 318 created by Phase One. At that point, Phase One steps may be carried out. First array 312 would be reproduced and tailored if necessary. Each pathway 308 may then be retraced in first array 312, and the original data bytes 310 may be recreated by reading the byte values encountered at each node 314 on the pathways. For example, the commands of command representation 508 may be followed in order to retrace first pathway 316 in array 312. One skilled in the art will appreciate that each step of this process may have tailored and customized settings, which would be either predetermined or dynamically established during the encryption and compression process. As may be seen from the description above, no information is eliminated or lost in either the compression or the decompression of data bytes 310. The sequence and value of every byte in data bytes 310 is maintained. As such, method 300 may be considered a lossless compression method. In some embodiments, the steps of providing a reproducible array, such as steps 22 and 30, may include providing multiple alternate versions of a reproducible array. Multiple alternate versions of a reproducible array may be reproducible and may contain a different set of values in the alternate nodes in order to be useful to the process. In these embodiments, candidate pathways may be located in one or more arrays. For example, a pathway may start in one array and finish in an alternate version of that array. In another example, one pathway may be in one array and the following pathway may be in an alternate version of that array, with the next pathway after that back in the first array. This may be encoded by either the starting location of each path, by directional commands, or both. Alternate versions of arrays may also be implemented using four-dimensional arrays, with the first three dimensions identifying X, Y, and Z coordinates of a cube and the fourth dimension identifying to which cube the coordinates apply. In Some embodiments, more than one-byte value may be loaded in a given node of an array. Commands may then be implemented to prescribe which value is to be read for any given step. In some embodiments, instead of multiple alternate values being stored in a given node, Strings of two or more values may be stored. This may be useful, for example, if common strings are expected. Rather than requiring two nodes, with corresponding move and grab commands, these strings

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

could be accessed by reaching a single node. These string-storing nodes may be used in conjunction with byte value storing nodes within a single array. In some embodiments, a set of input bytes may be a discrete digital file. For example, a digital file may include image files, office document files, html document files, executable files, and the like. In some embodiments, a set of input bytes may be a stream of data, or a subset of a file or of a stream of data. Any set of input bytes may be analyzed before compression, in order to determine optimal processing. For example, in some embodiments, a set of input bytes may be analyzed to determine a frequency distribution as explained above. In other embodiments, a set of input bytes may be analyzed to determine whether and how to deconstruct the set into smaller blocks of data or subsets of data to be individually compressed in a certain order. In these embodiments, for example, certain parts of the input data may share certain characteristics. These characteristics may lend themselves to being compressed using a first array that is loaded with a certain distribution of values. Other parts of the input data may have different characteristics indicating the use of an array or arrays having a different distribution of values loaded into the nodes of the array. Accordingly, a set of input bytes may be deconstructed into Smaller Subsets, and each Subset may be compressed using a tailored first array and/or second array. In these embodiments, a key or set of instructions describing how to reconstruct the individual subsets or blocks may be generated and provided along with the compressed output file. FIG. 16 depicts an overall view of an embodiment implemented according to the present disclosure. In this illustrative embodiment, a digital image file 802 is compressed and then decompressed. Here, digital image file 802 may first be analyzed as indicated at 804. A result of this analysis may be to create a histogram or frequency distribution of the various byte values in the file. Another result may be to determine various blocks of data in the file that may share certain characteristics. For example, analysis may show that certain areas of the image file have a greater probability of being a certain shade of blue, while others are more likely to be white. Accordingly, each identified area or block of data may have its own histogram. Input image file 802 may be deconstructed at 806 based on results of the previous analysis, such that each area may be separated for customized processing or for processing in a certain order. In the example shown, the input file 802 may be divided into four quadrants, labeled A, B, C, and D. Digital data from each quadrant may then be fed into process 808. Process 808 corresponds to the steps previously described for Phase One and Phase Two, as well as the refactoring compression process. Generally speaking, in Phase One the data for a given quadrant may first be translated into contiguous pathways found in a reproducible first array. The first array may contain values that are distributed similarly to the distribution in the quadrant. The resulting pathways may then be translated into commands and encoded as another set of data. This set of data may then be passed into Phase Two and further translated into contiguous pathways in a reproducible second array. The second array may contain only values corresponding to commands. As indicated in FIG. 16, all or portions of the first phase and/or the second phase may be repeated a predetermined number of times, until the desired compression is achieved, or until no further compression is possible. Further compression may be accomplished using the refactoring process described above and indicated at 811 in FIG. 16. ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

One or more settings 810 used in Phase One and Phase Two may include whether and which frequency distributions were used, deconstruction instructions, and/or number of iterations completed. These settings, along with file identification information and the final output of Phase Two may be included in a compressed output file 812. At this point, file 812 may be smaller in size than input file 802, and may be transferred to another location. Transfer of file 812 may be physical, such as on transportable media. For example, compressed file 812 may be stored on a portable flash drive or CD-ROM, or any other similar media. In some embodiments, compressed file 812 may instead be transported through a network 814. Such as an intranet or the Internet, to a second location. Compressed file 812 or a copy of compressed file 812 may then be decompressed to restore the original file 802 in its original state. As shown in FIG.16, decompression may be accomplished by separating the command representations from the settings and providing those to process 816. This process again corresponds to steps previously described. If the refactoring compression process 811 was performed, a corresponding refactoring decompression process 817 may be completed to recreate the set of command representations. The second array may be reproduced and used to translate the command representations into other command representations. This may be repeated as prescribed in the settings. Once a final set of Phase Two command representations are obtained, the reproduced first array may be used to retrace the pathways and translate the commands into the original data. The settings may again be consulted to determine how the original data should be reconstructed, as indicated at 818. After reconstructing the translated and decompressed data, a lossless copy 820 of the original image file 802 may be produced. As should be appreciated, the preceding embodiment(s) is/are for illustrative purposes only. In embodiments, steps may be added or removed, and many steps may be performed at least partly in parallel. Different portions of a digital file or different related digital files may be processed at the same time or prioritized for speed or transfer purposes. Processes Such as searching for multiple patterns within arrays may be performed effectively or simultaneously. For example, some or all processes may be threaded, using a single processor or multiple processors. The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an and “the are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising, when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/ or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof. The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The description of the disclosure has been presented for purposes of illustration and description but is not intended to be exhaustive or limited to the embodiments in the form disclosed. Many modifications and variations will ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

be apparent to those of ordinary skill in the art without departing from the scope and spirit of the embodiments of the disclosure. The embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated. The disclosure can take the form of an entirely hardware embodiment, an entirely software embodiment, or an embodiment containing both hardware and software elements. In an embodiment, the disclosure may be implemented in software, which includes but is not limited to firmware, resident software, microcode, etc. Furthermore, the disclosure can take the form of a computer program product accessible from a computer-usable or computer-readable medium providing program code for use by or in connection with a computer or any instruction execution system. For the purposes of this description, a computer-usable or computer-readable medium can be any tangible apparatus that can contain, store, communicate, propagate, or transport the program for use by or in connection with the instruction execution system, apparatus, or device. The medium can be an electronic, magnetic, optical, electromagnetic, infrared, or semiconductor system (or apparatus or device) or a propagation medium. Examples of a computer-readable medium include a semiconductor or Solid-State memory, magnetic tape, a removable computer diskette, a random-access memory (RAM), a read-only memory (ROM), a rigid magnetic disk and an optical disk. Current examples of optical disks include compact disk-read only memory (CD ROM), compact disk-read/write (CD-R/W) and DVD. A data processing system suitable for storing and/or executing program code will include at least one processor coupled directly or indirectly to memory elements through a system bus. The memory elements can include local memory employed during actual execution of the program code, bulk storage, and cache memories which provide temporary storage of at least some program code to reduce the number of times code must be retrieved from bulk storage during execution. Input/output or I/O devices (including but not limited to keyboards, displays, and pointing devices) can be coupled to the system either directly or through intervening I/O controllers. Network adapters may also be coupled to the system to enable the data processing system to become coupled to other data processing systems or remote printers or storage devices through intervening private or public networks. Modems, cable modem and Ethernet cards are just a few of the currently available types of network adapters.

Sovnet claims that: 1. A method, implemented in a computer system, the method comprising: reading a first set of data byte values; providing a reproducible first array that includes at least one of each data byte value in the first set; identifying in the first array a first contiguous pathway that defines a set of data byte values matching the first set; creating a second set of command byte values representing the first contiguous pathway; providing a reproducible second array that includes ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

2.

3.

4.

5.

6. 7. 8.

9. 10.

11. 12. 13.

at least one of each command byte value in the second set; identifying in the second array a second contiguous pathway that defines a set of command byte values matching the second set; creating a third set of command byte values representing the second contiguous pathway. The method of claim 1, wherein reading a first set of data byte values includes reading a first set of data bytes each having a first number of possible values; providing a reproducible first array and providing a reproducible second array includes providing a first array and second array having approximately the same size; creating a second set of command byte values includes creating a second set of command bytes each having a second number of possible values less than the first number of possible values. The method of claim 2, wherein reading a first set of data byte values includes reading a first set of data bytes each having 256 possible values; and creating a second set of command byte values includes creating a second set of command bytes each having 36 possible values. The method of claim 1, wherein identifying at least one of the first and second contiguous pathways includes comparing command byte value representations of multiple candidate pathways and selecting a pathway based on criteria including size of representation. The method of claim 1, wherein identifying at least one of the first and second contiguous pathways includes comparing multiple candidate pathways and selecting a pathway based on criteria including size of pathway. The method of claim 1, wherein providing at least one of the first and second reproducible arrays includes providing multiple reproducible alternate versions of the array. The method of claim 1, wherein representing at least one of the first and second contiguous pathways includes providing array coordinates indicating a starting location of the pathway. The method of claim 1, further comprising reading the third set of command byte values: recreating the second set of command byte values by interpreting the command byte values in the third set to retrace the pathway through the reproducible second array; recreating the first set of data byte values by interpreting the command byte values in the second set to retrace the pathway through the reproducible first array. The method of claim 1, wherein providing a reproducible first array includes providing a first array having at least one of every possible data byte value. The method of claim 1, wherein providing a reproducible first array includes providing a first array having a distribution of data byte values substantially corresponding to a distribution of data byte values in the first set of data byte values. The method of claim 1, wherein at least one reproducible array includes a plurality of nodes, and at least one node is associated with more than one-byte value. The method of claim 1, further comprising causing the third set of command byte values to be transferred from a first location to a second location. A computer system for manipulating data, comprising: a processor, a memory; and a data manipulation program including a plurality of instructions stored in the memory that are executed by the processor to read a first set of input byte values: match a chosen first portion of the first set of input byte values to a chosen first pattern found in a first reproducible array of byte values: represent the first pattern using corresponding first command byte values indicating one or more commands to recreate the first pattern; create a second set of byte

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

14.

15.

16. 17. 18.

19.

20.

21.

values including the command byte values that represent the first pattern; wherein the first portion and first pattern are chosen from respective multiple candidate portions and patterns based on preselected criteria biased toward candidate portions having a greater size and candidate patterns having a smaller corresponding set of command byte values. The system of claim 13, wherein the plurality of instructions stored in the memory are further executed by the processor to read the second set of byte values: match a chosen second portion of the second set of byte Values to a chosen second pattern found in a second reproducible array of byte values: represent the second pattern using corresponding second command byte values indicating one or more commands to recreate the second pattern; create a third set of output byte values including the command byte values that represent the second pattern; wherein the second portion and second pattern are chosen from respective multiple candidate portions and patterns based on preselected criteria biased toward candidate portions having a greater size and candidate patterns having a smaller corresponding set of command byte values. The system of claim 14, wherein each input byte has a predetermined first number of possible values, each command byte has a predetermined second number of values, and the first number is greater than the second number; and wherein the first reproducible array and the second reproducible array are approximately the same size. The method of claim 14, further comprising causing the second set of command byte values to be transferred from a first location to a second location. The method of claim 14, wherein at least one reproducible array includes a plurality of nodes, and at least one node is associated with more than one-byte value. A computer program product for manipulating data, the computer program product comprising a computer-readable storage medium having computer-readable program code embodied therewith, the computer-readable program code configured to losslessly translate between a first set of bytes and a plurality of pathways in a reproducible array of byte values: and losslessly translate between the plurality of pathways in the reproducible array of byte values and a second set of bytes; wherein each byte in the first set has a first number of possible values, each byte in the second set has a second number of possible values, and the first number is less than or equal to the second number. The computer program product of claim 18, wherein translating between the plurality of pathways and the second set of bytes includes: dividing the second set of bytes into portions; for each portion, finding a plurality of matching pathways in the reproducible array of byte values, assigning a corresponding sequence of commands to recreate each matching pathway, and choosing one of the matching pathways based on preselected criteria including a length of the corresponding sequence of commands. The computer program product of claim 18, wherein translating between the first set of bytes and the plurality of pathways includes: providing the reproducible array; reading values of the first set of bytes; translating the values into commands; carrying out the commands to recreate the plurality of pathways in the reproducible array. The computer program product of claim 20, wherein translating between the plurality of pathways and the second set of bytes includes: sequentially traversing the plurality of pathways in the reproducible array, and reading byte values encountered on each pathway.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Sovran Economic Community Monetary Policies A major problem facing the economic community at large is the inefficient coordination of monetary policies. At Sovran, we recognize the evolutionary nature of the association and certain aspects of integration left for later definition. Members value transacting in the Sovran ecosystem because they have been affected by difficult payment services from their member countries. Monetary policies are closely linked with national budgets and budgetary discipline that are notoriously hard to achieve. Finance Ministers are usually more understanding and might occasionally welcome external pressure, however, it is typically more difficult to convince the national parliamentary systems. In the long term, the problem can be successfully solved with an appropriate institutional mechanism. With this in mind, we welcome discussions regarding such institutional mechanisms as part of the overall strategy and solution. Participants in the Sovran Ecosystem can preserve and enhance free trade over a large area in critical periods. By establishing our Sovran mechanisms through the di-Sceriman Institution that would move to provide the liquidity and stability negotiated in the Sovran Ecosystem. By participating in a common digital currency, a solution for the common market could develop the successful operation of the Sovran, thus, most difficulties could be overcome and co-ordination of parallel policies could be gradually achieved. The roles of private and public foreign capital in underdeveloped regions are potentially complementary to one another, and Sovran members are considered in the provision of each. Sovran provides sound business principles that pertain to private capital by maintaining close affiliation with liquidity providers, and participation with sufficient guarantees essential for capital exports. This creates an opportunity for interest rates in the Sovran Network to be considerably lower than in a strictly open-loop fiat currency system. By bringing in better institutional policies and programs typically not utilized by developing countries but routinely employed by countries such as Luxembourg, Switzerland among others, the countries participating in the Sovran SVC Stablecoin will have access to more advanced institutional programs not necessarily considered by developing economies. A greater effort could be made with the association of foreign and local capital using advanced financial instrument money supply and creation mechanisms, provided in the Sovran Virtual Currency Network, a solution for creating conditions of security and foreign investment. This has the possibility of implementing it in the immediate future, lending policies for participating institutions and agreements when necessary. By utilizing sophisticated institutional programs as recommended by the di-Sceriman Group, participating Sovran Network and Digital/Virtual Currency countries will be able to mitigate the risk of predatory lending that typically stand together to protect themselves and further infringe on the developing countries ability to receive help elsewhere. In this way, so-called lending countries and institutions have had developing economies over a barrel so to speak. The problem of foreign investment has been rife with tenacious prejudice and the lack of adequate market mechanisms, typically beyond the realm of possibilities for Emerging and Developing countries, ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

yet employed consistently by so-called First World Countries. This includes the recognition that the market mechanism is no longer beyond the realm of possibilities for these Emerging and Developing Countries including so-called Third World Countries. The Sovran Network System will assist the growth of the local and regional economies, improve standards of living for peoples in the countries and help good governments increase their political strength. By deploying a virtual currency, market conditions could improve as the majority of the transactions (easily 70%) within a country, and stability could be maintained in the closed-loop of the SVC and localized currencies. Far from having a war on fiat currencies, the reserves of foreign currencies could be optimized for the 30% in the open-loop system with ease. As a potential “Barter Mechanism” between Sovran participants, a more overall strategy could be planned among Sovnet participants and affiliates. We see a higher degree of co-ordination that could be achieved in such a co-operative system. The problem of expanding institutional/technical education is fundamental to economies, the framework of economic progress is our objective for the underdeveloped regions. Sovran Network agrees on a general strategy for mutual economic development with the co-ordination of participants to employ a vision of common strategy and attitude among its participants. This is no longer about Western World Policies, but rather the internal policies of a Country to participate in a Sovran Virtual Currency Network moving beyond lip service attached to economic policies respective to countries that are all struggling under Western World Economic Controls and Rules. The importance of internal economic policies and free trade zones that utilise a closed-loop system cannot be overemphasized. With that said, regional and other trading partners in a Sovran Society can co-ordinate their respective policies and aims, including but not limited to: ◦ ◦ ◦

The increase of economic potential in poor regions of the participating countries. Stability and development of countries. Progress in terms of free trade and trade of goods and services

Too often a western world focused system has had implications that cause liquidity problems, by employing a more favorable non-banking approach a grand strategy can result in co-operative relations between participants, fewer disagreements and differences of opinions, thus avoiding occasional differences while striving for a better economic climate and the means to facilitate a solution. For too long the principal players of the Western World Economic System have had an advantage, these advantages may not be always immediately apparent. It may be observed that the big six to ten Western World Economies benefit at the expense of underdeveloped areas. Many nations agree the Western world policies achieve strategic economic advantages over emerging markets that do not employ the full scale of advantages available to the Western World players enabling them to secure better conditions for themselves. Purchasers of raw materials from the Western world provided answers to the basic problem of development planning for these regions. All the world has been focused on the agreements/disagreements by large trading blocks and nations, the UK disagreement with the EEC becomes part of the distraction which results in additional disadvantages of currency price manipulation ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

through Foreign Currency manipulation. By employing free trade digital settlement in the working of Sovran Virtual Communities, we can eliminate the prejudice of the western world financial markets. The advantage of the Western world in this respect is more apparent than real-time metrics, based on older agreements using little more than words used to maneuver themselves as lending countries. We can make considerable headway in our partnerships for the industrial development of impoverished countries by adopting a suitable approach that would take into account new independent and emerging economies. By being less prone to the western world and industries bringing capital from abroad, there would be overtime, a lowering of the dependence on these lending countries which ultimately result in such things as quantitative easing and unfair burdens on developing countries and nations. Right political attitudes are of major importance, through discussion, addressing solutions to solve the problem of poverty can be achieved. Our position is that underdeveloped countries can best increase their overall economic strength made possible by conditions that help the poor, thus making it more likely to prove attractive and of good example. By promoting economies of underdeveloped regions, and co-operation between Sovran co-operative societies, new institutional formulas of greater significance can be provided for new and developing countries looking for their place in the world. Larger economic areas and countries could take on more of an aspiration of a modern civilization based on true free market economies, thus reconciling country Sovranty with economic necessity and social progress aimed at helping the poor. Common institutions would need to be committed to evolve and meet administrative needs, and new countries will benefit from good examples to follow the same economic path obliged to help the poor to do more than just survive. Western world forces have found it beneficial to promote internal violence and destabilization policies of economic aggression and pressure, including but not limited to economic threats and economic subversion. The concept of manipulation toward indigent countries by economic hardship cannot be overemphasized. Private corporations that are Ultra Vires have become the means of deploying western world prejudice and economic controls. We stand on the brink of what is deemed to be greater currency controls and restrictions with western world Central Bank Digital Currency (CBDC) systems. We stand on the threshold of a changing world, what direction each country and peoples take is up to their Sovran Society. Developing countries are not interested in the continued exploitation by western world colonialism, albeit masquerading as a beneficial redefined and rebranded system of controls. It might easily be argued that the objective is to avoid getting into greater economic difficulties than are present currently. While there are and will be forces intent on maintaining the current status quo, we feel it is unfortunate that the western world continues to employ such short-sighted positions. With no intent on war against the US dollar, the Sovnet system would back it’s SVC stable currency with fiat currencies in trade and commerce, this will have a beneficial impact by the ability for the creation of Bank Debenture programs and Financial Instruments backed by cash, thus providing Pension Funds in the local economies with important sources of interest. Overall, the strategy of deployment of a Sovran Digital Currency with good economic and institutional programs will provide slightly higher inflation which will not have to be slowed or geared back by higher ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

interest rates which have the adverse effect of slowing economies. We need to reconsider the impact of poorer countries being forced into higher interest burdens by loan providing countries. For a fuller discussion on the realm of possibilities towards a just society, we invite discussion and participation in the objectives, and possibilities for implementation of a Sovran Network Closed-loop and Stable Virtual Currency (backed by cash) trade mechanism that is sound and viable. We are happy to explore and invite participants to discussions as to how this system can help your region and Country. As we witness a new world, may all that has stood against the poor of this Earth for hundreds of years be swept away by the rising tide of Change, to this objective we join together to move into the river of life, enjoying prosperity on Earth the way it is meant to be.

Sovran Network Virtual Token Sale Purchase of SVN Tokens SVN tokens will be issued only to the members and users of the Sovran Network or partners with an interest in participating inside the Sovran Network ecosystem. There will be no public sale or public token offering. The methods to acquire SVC tokens are as follows: Organizations that are interested in the use of Sovran Network technologies may contact Sovran directly at [email protected] Accredited investors who verify with KYC may join the token presale at [email protected] The Sovran Network may enable grants to developers who are developing functionality for the Sovran DLT or applications that run on its network. Depending on the success of the Sovran Mobile Wallet and Payment Card programme, the Sovran Network may be in a position to help develop a payment utility and related capabilities through referrals to third-party technology companies and digital enablement specialists. This could help advance the quantity and quality of technology innovation in the blockchain and cryptocurrency industry, leading to increasing amounts of payment utility, and broaden the acceptance of cryptocurrency as a medium of exchange. Token Allocation Out of the total supply of 100,000,000 SVC tokens, 5% will be issued by the Sovran Network foundation to accredited investors, large funds and institutions, collectively known as external partners, for licensing of proprietary technologies. 10% is allocated to the founder and co-founder, and 85% are owned and held by Emanu-El Michael corp sole within Sacro Bisanzio Treasury which holds the powered by RBA Technology License and for use inside of its network. Jurisdiction Sovran Network operates under the authority of Emanu-El Michael corp sole within the primary jurisdiction of Sacro Bisanzio under a Sacro Bisanzio Charter issued by H.M.R.I Michael X of Sacro ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Bisanzio. As the first and primary of Jurisdictional Authorities, Sacro Bisanzio will ensure Stablecoin arrangements meet all applicable Sacro Bisanzio regulatory, supervisory and oversight requirements within Bisanzio, and external to Sacro Bisanzio pertaining to Corporations and Ultra Vires Corporations before commencing any operations in that jurisdiction, and adaptation to new regulatory requirements as necessary. Sovran Network within Sacro Bisanzio recognises that the Supreme Sovran Jurisdiction of Earth is shēkī`nə to establish power and control inside Sacro Bisanzio and in ‘jurisdictions offshore to Sacro Bisanzio’ in all discussions and agreements it is recognized that Sovranty comes first from shēkī`nə and then to man, with lower and lower jurisdictions established within Maritime Law, Common Law and Corporate Law or legal or legalese being the lowest levels of jurisdiction. Corporate Bodies are essentially “Corpses” attempting to Speak and as such cannot speak of their own volution in regards to the corporate province or state of individual Ultra Vires jurisdictions. Governing legislatures and any change would require legislative support, or acts of parliament, by definition being only an ‘Act’, as was spoken off by a learned man who wrote under the pen name William Shakespeare stating “All the World (read Corporate Governments) is a Stage” …. and as such are corporations within the realm of Ultra Vires Corporate Governing Bodies and Entities acting beyond the scope of their ability to act … he continues “Life (corporate governments, entities and syndicates) is but a walking shadow, a poor player who acts and struts his hour upon the stage, it (ultra vires corporate governments and syndicates) is a tale told by an idiot full of sound and fury signifying nothing”. That said, the Supreme Governing Body of the Sovran Network is Sacro Bisanzio and Emanu-El Michael corp sole. Any corporate rules and regulations of Corporations outside Sacro Bisanzio as defined do not exist and are Ultra Vires. It recognizes that Sovranty can only be established by shēkī`nə which is Life, and the truth of life of shēkī`nə reigns supreme through eternity and in all jurisdictions as per H.S.H Michael X of Sacro Bisanzio. The Sovran Network and SVC/SVC recognize the eternal laws of Sacro Bisanzio reign supreme and any entities seeking to assert jurisdiction will be challenged to present such documents and proof before the Courts of His Serine Highness Michael X of Sacro Bisanzio for presentation before the Supreme authority of shēkī`nə. If any man has documented or proof of any higher authority or jurisdiction let him speak now or forever hold his peace. Sovran Network aims is to identify and distinguish between what is the establishment of effective regulatory, supervisory, and oversight approaches for GSC arrangements which will support the implementation of a key building block of the roadmap to enhance cross-border payments commissioned by the G20. Sovran Network aims to keep pace with the evolution of GSC arrangements and market developments, the FSB will, in close cooperation with relevant SSBs, review its recommendations on a regular basis in order to identify any potential gaps, and update them if needed to ensure that they remain relevant and continue to promote effective regulation, supervision and oversight of GSC arrangements across jurisdictions.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Sovran Network takes into consideration FSB High-Level recommendations to address the regulatory, supervisory and oversight challenges raised by GSCs arrangements. Sovran Network recognizes that authorities within specific jurisdictions should have and utilise the necessary powers and tools, and adequate resources, to comprehensively regulate, supervise and oversee a GSC arrangement and its associated functions and activities, and enforce relevant laws and regulations effectively. Sovran Network agrees that Corporate Jurisdictions and Authorities should apply comprehensive regulatory, supervisory and oversight requirements and relevant international standards to GSC arrangements on a functional basis and proportionately to their risks within their Corporate Entity and Affiliated Syndicates. Sovran Network agrees that Corporate and Body Corporate Entities as Authorities within their syndicate should cooperate and coordinate with each member of their Corporate Club and Syndicated Entities, both domestically and internationally, to foster efficient and effective communication and consultation to support each their particular Corporate Syndicate be it Vires or Ultra Vires, in fulfilling their respective corporate club/syndicate mandates and to ensure comprehensive corporate ultra vires regulation, supervision, and oversight of a GSC arrangement across their corporate borders and sectors. Sovran Network agrees that Corporate Ultra Vires Authorities should ensure that within their IMF corporate affiliated nations concerns regarding GSC arrangements, that Body Corporates have in place a comprehensive corporate governance framework with a clear allocation of accountability for the functions and activities within the GSC arrangement within their corporate ultra vires syndicates. Sovran Network agrees Corporate Government Body Authorities should ensure that GSC arrangements have effective risk management frameworks in place especially concerning reserve management, operational resilience, cybersecurity safeguards and AML/CFT measures as pertaining to Banks and Banking and Financial Institutions within their Corporate Ultra Vires Government mechanism, to comply with the codification of such as well as ‘fit and proper’ requirements within UCC and other underlying international codification. Where potential exists for Corporate Governing Bodies, Corporate Legislation could be established by Corporate Authorities within the individual Syndicate’s to ensure that GSC arrangements have in place robust systems for collecting, storing and safeguarding data inside their Corporate Entities and Corporate Syndicate’s. Sovran Network working with Sovran Authorities ensures that SVC maintains a distinction between the intent and function of the Sovran Network with a line of demarcation differentiating it from GSC arrangements. Sovran Network will work with Corporate Authorities when requested to provide Sovran Network and Sovran Stablecoins to ensure that other defined GSC arrangements provide users and relevant stakeholders with comprehensive and transparent information necessary to understand the functioning of the particular GSC arrangement, including with respect to its stabilisation mechanism.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Sovran Network discusses and is open to discussions with Corporation Entities and Sovran Authorities to ensure that GSC arrangements provide lawful and legal clarity to users on the nature and enforceability of any redemption rights and the process for redemption, where applicable. In accordance with Sacro Bisanzio Jurisprudence and Laws, the following Glossary are presented for any and all commerce inside and offshore to Sacro Bisanzio, The Sovran Network and Sovran Stablecoin Network and Payment Systems are owned and under control of Emanu-El Michael corp sole an Ecclesiastical Entity of Sacro Bisanzio:

Glossary Algorithm-based Stablecoins A stablecoin that purports to maintain a stable value via protocols that provide for the increase or decrease of the supply of the stablecoins in response to changes in demand. Asset-linked Stablecoin A stablecoin that purports to maintain a stable value by referencing physical or financial assets or other crypto-assets. Crypto-asset A type of private digital asset that depends primarily on cryptography and distributed ledger or similar technology. Digital asset A digital representation of value which can be used for payment or investment purposes. This does not include digital representations of fiat currencies. Global Stablecoin (GSC) A stablecoin with a potential reach and adoption across multiple jurisdictions and the potential to achieve substantial volume. Stablecoin A crypto-asset that aims to maintain a stable value relative to a specified asset, or a pool or basket of assets. Stablecoin arrangement An arrangement that combines a range of functions (and the related specific activities) to provide an instrument that purports to be used a means of payment and/or store of value. When discussing a stablecoin arrangement, reference is made to: Activity Typical activities in a stablecoin arrangement are: ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦

establishing rules governing the stablecoin arrangement; issuing, creating and destroying stablecoins; managing reserve assets; providing custody/trust services for reserve assets; operating the infrastructure; validating transactions; storing the private keys providing access to stablecoins e.g., using an eWallet; and exchanging, trading, reselling, and market-making of stablecoins.

Function the glossary is for this document and does not replace other existing taxonomies. Functions in a stablecoin arrangement are: ◦

governing the arrangement;

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

◦ ◦ ◦

issuance, redemption and stabilisation of the value of coins; transfer of coins; and interaction with users for storing and exchanging coins.

Governance body A body responsible for establishing and monitoring the rules governing the stablecoin arrangement which would cover, among other issues, the types of entities that could be involved in the arrangement, the protocol for validating transactions, and the manner in which the value of the stablecoin is “stabilised”. Provider of function/activity An entity that provides a particular function or activity associated with that function in a stablecoin arrangement. User A person or entity that uses a stablecoin as a means of payment or store of value. Validator node An entity on a network that validates transactions. In the context of distributed ledger technology, a node will commit transaction blocks to the ledger once they are validated. Wallet An application or device for storing the private keys providing access to stablecoins. Hosted wallets Typically held by a third-party provider, unhosted wallets by the user. Introduction of “stablecoins” are a type of crypto-asset or, more broadly, digital asset. Stablecoins may be used for different purposes. Some stablecoin projects have the stated ambition to facilitate payments, especially cross-border retail payments, which have remained relatively slow and expensive. A stablecoin, particularly if linked to a fiat currency or a basket of currencies, may become a widely used store of value. The use of stablecoins can evolve, particularly so that a stablecoin initially intended to be used as means of payment could also be increasingly used as a store of value. While “global stablecoins” have the potential to contribute to developing new global payment arrangements, they could present a host of challenges to the regulatory, supervisory, oversight and enforcement authorities. This is because such instruments may have the potential to pose systemic risks to the financial system and significant risks to the real economy, including through the substitution of domestic currencies. Risks may relate to: ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦

challenges for financial stability; consumer and investor protection; data privacy and protection; financial integrity, including compliance with rules governing anti-money laundering and countering the financing of terrorism and proliferation (AML/CFT); tax evasion; fair competition and anti-trust policy; market integrity; sound and efficient governance; cybersecurity and other operational risks;

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

◦ ◦

the safety, efficiency and integrity of financial market infrastructures (FMIs) (e.g. payment systems); and resolution and recovery considerations.

No existing, operational stablecoins or other crypto-assets currently appear to have reached a scale that could pose financial stability risks. However, existing stablecoins or those at the development or testing stage could potentially scale quickly if such stablecoins were offered to and used by a large, existing customer base, though the factors and conditions that could drive such potential mass adoption may require further analysis. Against this backdrop, the G20 mandated the FSB to examine regulatory issues raised by “global stablecoin” arrangements GSCs and to advise on multilateral responses as appropriate, taking into account the perspective of EMDEs. In February 2020, the G20 reiterated the importance of evaluating and appropriately addressing the risks of GSC arrangements before they commence operation and supported the FSB’s efforts to develop regulatory recommendations concerning these arrangements. In April 2020, the Financial Stability Board (FSB) corporation issued a report with a proposed set of highlevel recommendations for public consultation. The report drew on analysis undertaken within the FSB of potential financial stability risks and on a comprehensive survey of regulatory, supervisory and oversight approaches to stablecoins amongst FSB members and non-FSB members represented on FSB Regional Consultative Groups – RCGs corporation. In the following months, the FSB corporation also carried out a series of virtual outreach meetings with representatives from regulated financial institutions, financial technology firms, and legal experts. The FSB corporation documents refer to stablecoins as a category of crypto-assets rather than using the broader reference to digital assets. The reference to crypto-assets was chosen for consistency with the FSB’s corporate publications, including elements that could be used to determine whether a stablecoin qualifies as a “global” stablecoin. The G7 corporation report, investigating the impact of global stablecoins. FSB corporation, addressing the regulatory, supervisory and oversight challenges raised by “global stablecoin” arrangements. SVC is not a Global Stablecoin and cannot be defined as a GSC. In line with the G20 corporate mandate, describes GSCs and how they may differ from other crypto-assets and other stablecoins. G20 corporation, G8 corporation, G7 corporation, IMF corporation documentation identify the potential risks raised by GSCs. Such regulatory environments pertain to the use within the IMF Corporation Affiliated Countries, these corporate regulations pertain to existing corporate regulatory, corporate supervisory, and corporate oversight approaches to GSCs and identify issues that IMF Corporation Affiliated Countries regulators, supervisors, and overseers’ address. This whitepaper for Sovran Network considers the specific challenges arising between the primary jurisdiction of Emanu-El Michael corp sole within Sacro Bisanzio, and the IMF corporation as pertaining to the corporate cross-border context, including the perceived value and jurisdiction of ultra vires corporate cross-border cooperation and coordination. ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Sovran Network is primarily for the adoption of and use of non-corporate and non-IMF corporations within the realm of Sacro Bisanzio for the so called ‘Unbanked Indigenous Nations’, where required Sovran Network may work with so called IMF Corporate Affiliated Countries that choose to adopt the Network Payment System internally within their Country. IMF Corporations and other corporate regulatory supervisory and oversight are primarily concerned by GSCs, within their ultra vires jurisdictions including beneficial corporate legal multilateral actions. Their focus is on corporate regulatory, corporate supervisory and corporate oversight issues relating to privately-issued corporate or non corporate GSCs primarily used for retail purposes, it may be relevant for other types of stablecoin, including stablecoins used for wholesale market purposes and those that may pose risks to financial stability only in some countries or regions. This may also be relevant for other crypto-assets that could pose risks similar to some of those posed by GSCs because of comparable international corporate reach, scale and use. In line with the mandate of the FSB corporation, the FSB corporation reports do not address the consumer and investor protection, cybersecurity, data privacy, competition, market integrity taxation as well as Anti-Money Laundering/Combating the Financing of Terrorism (AML/CFT) issues related to GSCs outside the ultra vires corporate limits and abilities to Act. Sovran Network recognizes that the FSB corporation is working on a comprehensive supervisory and regulatory framework for corporations and that their definition of GSC arrangements needs to effectively address corporate ultra vires rules such as AML/CFT, data privacy, consumer and investor protection, competition and market integrity in addition to financial stability risks all within their ultra vires corporations and syndicates. Sovran does not operate within Corporate or other Vires or Ultra Vires Government Jurisdictions without agreements, and all such documentation pertaining to rules of law must be submitted in writing to the Supreme Court of Sacro Bisanzio. As the FSB is a ‘corporate institution’ acting on behalf of its member and syndicate, it is obligated to remain within its ultra vires corporation confines, thus the wider issues pertaining to Sovran monetary policy, monetary sovereignty and currency substitution questions, the issue of public versus private provision of digital money and payment services and issues related to central bank digital currencies are also outside the scope of the FSB corporation report or jurisdiction. Additionally such ‘corporate entity clubs and syndicates’ as the G7 corporation, the G8 corporation, the G20 corporation, the IMF corporation, etc. are obligated to consider the macroeconomic implications of the creation of money, and what money is, including monetary sovereignty issues in IMF corporate member countries (the club), taking into account country characteristics, and the Financial Action Task Force FATF corporation to consider AML/CFT ultra vires corporation issues. Within the context of Law as opposed to Legal structures of corporations, any entity listed below that is not a corporate entity needs to provide proof of jurisdiction to Sacro Bisanzio, these entities challenged for presentment of their jurisdiction and authority must present certified true copies under the law of proof of jurisdiction and proof of structure including but not limited to the following entities: ◦

the G20 corporate entity,

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦ ◦

the G8 corporate entity and the G7 corporation all corporate syndicated entities the FSB corporate entity has been working closely with the IMF corporate entity, the World Bank corporate entity, the FATF corporate entity, the Basel Committee on Banking Supervision – BCBS corporate entity, the Committee on Payments and Market Infrastructures -CPMI corporate entity, and the International Organization of Securities Commissions – IOSCO corporate entity as well as the other SSBs corporate entities and any and all international corporate entity organizations and corporations attempting to coordinated and be mutually supportive.

Effective corporate entity regulatory, corporate entity supervisory and corporate entity oversight approaches for GSC arrangements are meant to define and support ongoing work to enhance crossborder payments across affiliated corporate entities within their ‘corporate entity club and syndicates’. The FSB corporate entity has, in coordination with its affiliated relevant international corporate entity organisations and SSBs corporate entities, have developed a roadmap for their club and syndicated affiliated corporate government affiliates called for by the G20, G8, and G7 corporation syndicated to enhance their corporation to corporation syndicated cross-border payments. Corporate Entity Authorities are exploring the potential role of new payment infrastructures and, as part of this, concur that appropriate risk management within their Ultra Vires Corporate Entity to address specific GSCs operators within their Corporate Jurisdictions, such Ultra Vires Jurisdictions are based on corporation legal underpinnings, and can assert within the scope of their ability to dictate or act on a basis for the use of stablecoins in their multiple corporate ultra vires jurisdictions, constitute one important building block for the corporate syndicates to maintain the appearance of jurisdiction within their ability to act and / or not act. SVC is not a Global Stablecoins and cannot be defined or referred to as a GSC. SVC establishes first the line of demarcation between it’s Sovran Countries and other Corporate Entities and Syndicates acting Ultra Vires. SVC and SVC accounts may be opened by Natural Persons or Persons, although it is comprehended that no Person or Corporation may act of its own volition without the intermediate being a Natural Person. The very definition of Corp – ‘a dead entity’ attempting to Orate ‘speak’ is technically impossible as corporations are dead and incapable of technically speaking without a living Natural Person. The SVC term stablecoin does not refer to a crypto-asset that aims to maintain a stable value relative to a specified asset, or a pool or basket of assets. SVC is not pooling the value of assets and is not affected by the typical market value of a blockchain asset. ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

SVC does not employ algorithmic or other means to stabilise or impact its market value by, for example, automatically adjusting its supply in response to changes in demand. While there is no universally agreed definition of stablecoin, thus in reference to the term stablecoin SVC does not denote a distinct legal or regulatory classification. The use of the term “stablecoin” in this report is not intended to affirm or imply that its value is necessarily stable, fiat currencies fluctuate with conventional foreign exchange rates, these rates are updated to the value of fiat currencies based on the floating rate of fiat currency rates. SVC is not a Global Stablecoin and cannot be defined as a GSC. The Sovran Network automatically refreshes the value of the fiat currencies on a minute to minute basis with worldwide fiat currency exchange rates and conventional data of fiat currency exchange rates. The SVC stablecoin is used here because it is commonly employed by authorized Jurisdictions and Countries that choose to utilize the Sovran Network for internal Country market participants as authorized by the Indigenous or Non-Indigenous Governments or Authorities. While SVC refers to a stablecoin with a potential reach and adoption across multiple jurisdictions, it is based on an agreement with Countries and Indigenous Countries for adoption, as a result, it may or may not be adopted as a digital, legal or regulatory classification except by Governments and Administrations that agree to use the Sovran Network within their agreements and authorization. The SVC is not aiming for “Global Adoption” or indiscriminate transfer from one country to another, it is rather a mechanism which may be adopted by Indigenous Governments and Countries through contractual agreements as their ‘Central Bank Digital Currency Platform’ within their self-determined ability and/or Central Bank Guidelines and Government Legislature. SVC is a P2P Client to Client or Client to Merchant Transfer of Value system. The SVC is based on Country by Country adoption by Government Administrations and Cabinets as a Free Trade Mechanism that does not fall under Banking or Bank regulations, it may be adopted by Governments within Country as an alternative P2P Payment system to Credit or Debit Card or Transactions more in keeping with what could be defined as a Sacro Bisanzio Barter Mechanism between Natural Persons. SVC does not deploy on large scale or to achieve substantial volume within any Corporate Country or Region that does not want the Sacro Bisanzio digital trade technology. Thus, posing no financial stability risk to such Corporate Countries, or transgressing specific legal or regulatory concepts within Corporate and IMF Corporate Affiliated Nations. SVC assessed three characteristics that may distinguish itself from typical GSC from other crypto-assets and other stablecoins, and defines as best as avail the potential importance of such distinctions. The first being the existence of a stabilisation mechanism, and the second acting as a specific combination of multiple functions and activities to distinguish stablecoins from other crypto-assets. The

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

third, is the potential reach and adoption across multiple jurisdictions, differentiates GSCs from other stablecoins. In regards to Stabilisation mechanism, a stablecoin arrangement seeks to stabilise the value of the stablecoin through the use of some kind of stabilisation mechanism. Stablecoins can be categorised according to several different types of stabilisation mechanisms. SVC Stablecoin designs currently reflect fiat currency asset backed digital coins SVC does not include algorithmic linked cryptocurrencies or blockchain currencies SVC fiat currency asset-backed stablecoins link the stablecoins at issue to fiat currency. SVC may issue commodity-backed assets, where transactors may purchase, transfer, or redeem their commodity-backed coins for the physical commodity itself. SVC does not include crypto-assets, crypto, or fiat arbitrage, to maintain a stable value relative to it. SVC stablecoins can be bought by fiat or some approved blockchain funds ‘virtual funds’, the SVC stablecoin that are backed by fiat currency assets ‘collateralised stablecoins’ traditional fiat currency asset classes, are more akin to a Barter Currency and does not require a bank custodian for their safekeeping. SVC can be purchased by crypto-assets, however, cannot be redeemed back into the particular cryptoassets they were bought with, and do not engender the custody of any underlying blockchain asset” The SVC can be defined as Sacro Bisanzio framework for Sovran Indigenous Government approved hybrid fiat currency-based, fiat financial instrument-based, insurance underwritten backed and commodity-based Indigenous Government stablecoin strictly meant for adoption by Indigenous and/or Governments which seek a potential CBDC solution partner, in keeping with the 2007 UN Agreement on the Right of Indigenous Governments to ‘Self Determination’ as voted on affirmatively by 450 UN Nations. Please note while the four corporate nations those being Canada corporation, Australia corporation, New Zealand corporation and the USA corporation including but not limited to the District of Columbia Act, initially voted against the resolution, over the ensuing years these corporate countries have changed their ‘Nay’ vote to affirm their support of the Right of Self Determination by Indigenous Nations, thus affirming that they will not restrict or attempt to restrict in any fashion the Rights of Indigenous Countries and Peoples. To assess potential Corporate Ultra Vires Jurisdiction issues and to comply with underlying uniform commercial code rules and codification on those seeking solutions to deploy CBDC solutions internally to the Country or discuss the adoption of the SVC, the Country must disclose the following: ◦ ◦ ◦ ◦

if the Country and Cabinet are Corporate Governments as defined by legislation if they are Sovran Countries if they are Indigenous Countries that fall under the 2007 UN Resolution of Indigenous Nations Rights of Self Determination if they are IMF Affiliated Nations or Corporate Nations

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

◦ ◦

if they are registered as Corporate Governments in their Jurisdiction and or precisely what Jurisdiction they are registered within. disclosure of their being authorized as a Nation or Country, and present certified true copies of any and all documents pertaining to the establishment of their corporate jurisdiction and their corporate regulatory bodies.

For example with the ‘CANADA CORPORATION’ and other corporate Nations which are defined as ‘Corporate Registered Nations’ through “Acts of Parliament etc.”, such Corporation Nation and Entities are by Law and Uniform Commercial Codification required to provide a “Certified True Copy of the British North American Act of 1867 – BNA ACT 1867 from the House of Lords in the UK”, or specifically certified true copies of such specific to their nation-state from the House of Lords in the UK as proof of Jurisdiction. While Sovran Countries can and do exercise their capacity to be Sovereign, Corporate Nations and Corporate Entities are incapable of asserting Sovereignty as they are in lawful terms “Ultra Vires” and are essentially “Acting Beyond the scope of their ability as Corporation to Act.”. The underlying objective is to establish proof of a superior Jurisdiction, as in Law and Commercial Law and Codification, when the challenge of jurisdiction is brought up, the question of jurisdiction must be answered first by a court higher than the court or governments asserting or attempting to assert jurisdiction. ‘SVC mechanism’ is one by which the SVC stablecoin value is maintained in relation to the referenced asset. SVC does not include the capability of use in arbitrage. SVC does include the payment transfer rights to redeem the underlying reserve assets. Depending on the structure, stablecoin holders may or may not have redemption right against the issuer or direct claim on the reserve assets. Reserve assets may or may not be available to be used in case of a redemption request and may or may not benefit from consumer and investor protection arrangements or other guaranty schemes. Additionally, without institutional agreements, etc., there may not be any assets in reserve if the stablecoin merely references another asset as a peg. Algorithm-based stablecoins attempt to maintain a stable value via protocols that provide for the increase or decrease of the supply of the stablecoins in response to changes in demand. While the amount to be increased or decreased may be based on an algorithm, the actual issuance or destruction may not be automatic. Combination of multiple functions and activities to be use-able as a means of payment and/or store of value, a stablecoin arrangement typically provides three core functions: ◦ ◦ ◦

issuance, redemption and stabilisation of the value of the coins; transfer of coins; interaction with coin users for storing and exchanging coins.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Considering these functions, SVC stablecoins share functional similarities with payment systems. SVC does not provide financial services or products, such as deposit liabilities or securities (including collective investment schemes), and therefore is not subject to the same risks. The issuance, redemption and stabilisation of the value of the coins typically involve creating and destroying coins, as well as managing the corresponding assets and providing through non-banking arrangements for those assets. The transfer SVC coins entail the operation of suitable infrastructure and a mechanism for validating transactions. The interaction with users occurs through cell devices and applications that operate as eWallets, which verify the private keys providing access to stablecoins, as well as applications that enable the exchange of coins against fiat currencies or other crypto-assets. Maintenance of the stablecoin’s value involves the use of reserve assets in addition to referencing another asset as a peg; the stablecoin reference another asset as a peg with reserve assets. Generally, the value of a stablecoin could be more stable if it is pegged to a widely accepted stable reference asset and when the underlying reserve asset is highly correlated with the referenced asset e.g. when the reserve asset is held in cash in the same currency as the reference asset. The Sovran Network core system does not involve a book of records that registers ownership of coins and changes therein. It is built as a distributed ledger that operates in a combination of permissioned/permissionless data, for example by using distributed ledger technology - DLT and that allows for transactions to be processed with or without a trusted third party. One or more entities performs the activities, with interactive design protocols to perform them. Developments in DLT, enables the use of decentralized processes. The core functions of a stablecoin arrangement relate to activities and operational design elements. ◦ ◦ ◦ ◦

Functions and activities in a stablecoin arrangement Functions Activities Operational design elements Governance of the arrangement Establishing rules governing the stablecoin arrangement

The rules covering, among other issues, the types of entities that could be involved in the arrangement, the protocol for validating transactions, the mechanism for stabilising the value of the stablecoin, and the arrangements for the management and ownership of the reserve assets. A governance body is essential to a stablecoin arrangement and also has a role in promoting adherence to common rules across the stablecoin arrangement.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

Issuance, redemption and stabilisation of value of coins Issuing, creating and destroying stablecoins The mechanism through which stablecoins may be issued or created, and subsequently destroyed by one or more entities or software protocols designed by these entities. Managing reserve assets, the activity of managing the assets that are “backing” the value of a stablecoin, where a stablecoin fully or partially maintains its value or confidence in its value based on real or financial assets or other crypto-assets. This may involve buying and selling assets based on an investment policy, the activity may also be undertaken by using software protocols that adjust the composition of the reserve through smart contracts and algorithmic decision-making. Providing custody / trust services for reserve assets the activity of holding the assets that are “backing” the value of a stablecoin. The entity or entities issuing the stablecoin or other entities may hold the reserve assets. Transfer of coins operating the infrastructure a DLT protocol determining roles in and access to the system. Access may be permissioned - access, including the ability to hold and transfer stablecoins, is controlled with defined access conditions, or permission-less - anyone can access and transfer the stablecoins peerto-peer, directly to other via eWallets. Validating transactions Mechanism by which a transaction is authorized and validated by validator nodes. Interaction with users Storing the private keys providing access to stablecoins eWallet Cryptographic eWallets storing private and public keys which are used to digitally sign transaction instructions performed by the stablecoin arrangement. eWallets can be custodial - hosted, where a third party operates the wallet and holds the private keys on behalf of the users, or non-custodial unhosted, where the users hold the private keys directly. Multiple different parties can develop wallets, based on a set of specifications provided by the stablecoin arrangement. Exchanging, trading, reselling, and market-making of stablecoins, the activity of purchasing/exchanging a stablecoin with fiat currencies, or a stablecoin with other stablecoins or crypto-assets. Potential reach and adoption across multiple jurisdictions as with many financial services that utilise the internet, the technological infrastructure underlying stablecoin arrangements is not limited in its geographic scope. If a stablecoin arrangement combines such infrastructure with features that may be attractive to a broad range of users across multiple jurisdictions, its user base may rapidly grow, i.e. it may become a GSC.

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

The potential reach and adoption of stablecoins across multiple corporate and non-corporate jurisdictions and the potential to achieve substantial volume differentiates a GSC from other stablecoins. A framework to identify a GSC arrangement could seek to measure the global systemic importance of the arrangement. SVC does not operate in the so-called “Global” arena, the corporate criteria to be considered in determining whether a stablecoin is a GSC needs to take into account the extent of the stablecoin’s potential use as a means of payment or store of value in multiple jurisdictions. The likelihood that a stablecoin becomes a GSC also depends on a range of factors, including competition dynamics, which in turn would reflect network effects, access to data, the openness of the GSC arrangement, or its integration with other digital services or platforms. Sovran Network sets out elements that could be used by corporate authorities to determine whether an SVC stablecoin has the potential to expand reach or be adopted across multiple jurisdictions and has the potential to achieve substantial volume. Individual corporate and non-corporate jurisdictions may or may not be able to monitor stablecoin adoption and materiality of risks in a comprehensive manner. For example, a stablecoin that may not pose systemic risk in any one jurisdiction may nonetheless pose such risk corporate risk globally if it has a presence across multiple corporate jurisdictions and therefore has no linkages or function within the corporate global financial system. It is therefore important for relevant authorities in both corporate and non-corporate jurisdictions, where stablecoin arrangement functions and activities occur, to coordinate and cooperate closely when monitoring stablecoin use across corporate ultra vires borders. The Sovran Network addresses risks and vulnerabilities raised by corporate global stablecoins, corporate financial stability risks from existing stablecoins are presently limited. This is largely due to the relatively small scale of these arrangements and their current limited use cases, mainly around facilitating trading in other crypto assets, however, the use of stablecoins as a means of payment or a store of value might significantly increase in the future, possibly on a large scale and across corporate and non corporate Sovran Jurisdictions. Summary It is the intent within the proper system of codification and the Rule of International Law as presented by Sacro Bisanzio, that all issues pertaining to improper use of local corporate acts of parliament be addressed by international overarching codification systems established by The Law. It is clear that no one leg of the Elephant can stand to provide the support and service for the unreserved peoples of Earth, and will take the four strong legs of the Elephant brought together by willing Governments and Beneficial Administrations to stand together and implement jointly this much needed solution. As such, this exercise has been and is primarily not about high profits but reasonable profit expectations whereby the stakeholders are the people who are poor not by choice but by situational limitations of Banking. The Sovran Network and Affiliates join now in providing a Great Work solution to the problem of the Elephant in the room called the Unbanked, this Great work has meant years of struggle and dedicated ©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.

per-preparation on the part of each stakeholder coming together, this has lead to the opportunity to Solve and Coagulate the various steps in the Great Work, with the final objective of the Philosophical Stone and the Multiplication of such, the core of our mutual desire is to achieve the Great Work in the ‘Priestly Way’ of caring for our fellow man. It is with great Joy in our hearts that we see Life has conspired to bring together a highly-skilled diverse yet integrated group of people who themselves have persevered to find a solution for the Elephant in the Room, we have been brought together by our heartfelt desire to help the unbanked move as they choose into a world that is open to the gold that is in each one to be revealed, in a pragmatic rubber hitting the road approach. The hard road has been the desire on each ones talent and perseverance in their unique objective culminating in joining together in the ecosystem we call the Sovran Network and Stablecoin Account and Payment Solution, underlying all of our collective endeavors to be in this athenor of life on Earth, is the secret fire that burns in our hearts, we thus welcome Countries and Administrations that also find themselves inside the athenor of Earth to let all the ingredients we individually and collectively bring together for this Great Work to be achieved, and for each one that finds their way to want to participate together we say welcome and thank you for your participation and desire to explore together the Great Work, all in all, our job is for the poor, and to this objective, we are wholeheartedly committed and thankful to find you also committed to this objective. Emanu-El Michael corp sole comprehends together we are stronger in our objective to address the Elephant in the room, together we can achieve the point of multiplying our collective, the philosophers stone so to speak needs to be multiplied by the shēkī`nə fire, we stand dedicated to this Great Work and trust that life will continue to expand in the hearts of willing Countries to participate together in a mutually beneficial Sovran Merchant Payment and Digital Stable Currency Ecosystem to help peoples, the Elephant in the room “Poverty” can no longer be ignored. The Sovran Network welcomes all who seek the New World.

End

©406 (2021) Sovran Network and related technologies are under the Sacro Bisanzio jurisdiction, Sovran, Sovnet, SVN and SVC are owned by Emanu-El Michael corp sole and operated by Sovnet LLC registered in Sacro Bisanzio and Royal Barotseland.