Fluency Aureum is the world's first, permissioned, CBDC enterprise platform

Which made for the purpose of building and interconnecting national CBDC networks. With the smart use of advancements in DLT (Distributed Ledger Technology) our platform is designed to provide all tools necessary for easy deployment, configuration and management of custom CBDC networks and external financial systems.

Our platform is designed to achieve maximising scalability


Using a lightweight consensus mechanism and sharding approach, our platform is designed to achieve commercialisation viability by maximising scalability and flexibility of the underlying network, while providing regulatory compliance by creation of separated, yet interconnected, compliance zones for each CBDC network.

Fluency Aureum is a technology specially-tailored toward banks and financial institutions


It’s a system designed with the idea of bringing technological and economical innovations of digital currencies to existing financial systems, and making them easy to utilise, manage and understand by both enterprises and retail customers.

It’s more than just a blockchain

It’s a network of interconnected, well-defined and uniquely customised subnets in which each one represents a separate compliance zone with custom-made transactional rules, network participants and owners. Each one fully equipped with tools and applications allowing creating further innovations with high-level abstraction.

Platform concept

System Characteristics

Instant transactions, events and smart-contract calls with high throughput
Extensible smart contract platform designed for the financial systems
Distributed, permissioned and sharded network achieving the separation of concerns
Regulatory compliant, highly configurable and upgradeable consensus rules
Byzantinte-fault tolerant and cryptographically secure
Uniquely-crafted architecture allowing creation of compliance zones with custom regulations
Innovatory solutions: shielded transactions, offline signing, ID management and more!

How It Works

Fluency Aureum is a network of interconnected distributed ledgers, which have been specially customized towards the use and development of highly available and feature rich financial systems. It is a platform that can be used as the foundation for emerging CBDC networks, the intermediary for the existing ones and to bridge the gap between DeFi and CeFi.

From the highest point of view, Aureum is a sharded network of permissioned blockchains. Each one represents a single compliance zone with a separate set of network administrators and managers. The responsibility of the first group is to configure the network, manage protocol execution rules and supervise assets creation, while the second group is responsible for maintenance, dispute-resolution and innovation with the use of tooling provided alongside the network.

Additionally, administrators fill the most important role of managing internal and external monetary policy around the assets created and owned inside the network. They directly engage in setting up internal transfer rules and external trust channels.

Parallel Blockchain Network

Each blockchain in the network runs in parallel and is provided with the tools allowing creation and management of custom assets that can be either transferred internally, programmed with built-in or custom triggers and constraints and/or programmed around complicated use-cases with the help of smart contracts.

In comparison to public blockchains, all contracts and assets are fully manageable only by the network administrators, while leaving the innovation layer around smart contracts to the network managers.

Ecosystem Security

This layered structure adds the required security around the idea of programmable money and allows the rest of the users to freely make payments, along with signing contracts between themselves without the fears of losing access to their funds or falling victim to 3rd party malicious applications, which is a frequent problem in public blockchain.

Client Onboarding

Each end user inside the network can be associated with a specific retail customer or a merchant and be onboarded to the network with the help of a certified manager, which is equivalent to financial institutions and/or private banks.

After a user has been onboarded, the identity data about them is created and stored by either the identity verifier that performed AML/KYC checks or the identity owner. None of this information is stored in the ledger itself for security reasons, but can be passed inside privately established 1-to-1 trust channels for the purpose of proving one’s identity to each other.

Identity Validation

Each user can have their identity proven by one or more managers, for strengthening their identity validation level, but at the same time, none of the other users are forced to accept one or any particular identity.

This allows creation of multi-layer identity systems, which depending on the purpose of identity proving, may rely on any AML/KYC check, or require strong validation with a set of trusted providers - for example Government issued identities.

Having their identity checked and proven by at least one certified manager, users can receive or generate, by themselves, cryptographic keys that can be then used for receiving and transferring assets on the network - i.e. making payments.

Each user can manage their account either by themselves or allow a higher-level network user to manage their account on their behalf, simulating how one can have his account be managed by the bank.

Approval

Each asset available on the network needs to be pre-approved by the administrator, and rules about that asset can be set only by it. That includes setting up monetary structure, tiering of remuneration, balance limits and more. This makes payments on the network safe and regulatory compliant.

Features

Instant Transfers

Instant payments
Near-instant settlements
Near-instant contract calls
Fast cross-asset payments
Fast cross-asset settlements
High throughput of transactions per shard
Low finalization time of transactions per shard

Smart Contracts

Smart contracts are supported
They can be managed and constrained by network rules
They can be easily built with pre-built native interfaces and Fluency SC framework
They can be upgraded alongside protocol rules
They can be managed by network administrators
They can be deployed by network managers

Cross-asset Transfers

Cross-asset and cross-boundary payments are supported
They are managed by associated external monetary policies
They can be executed inside trust channels managed by participating networks administrators

Programmable Protocol

Programmable protocol allowing custom rules between consensus and transactional layers
Programmable protocol enables creation of new, modifying of existing rules
Rules can constraint both payments and smart contracts
Rules can be upgraded alongside protocol upgrades

Programmable Money

Transactions can have contextual data attached to it
Transactions can be programmed with set of different triggers and constraints
Transactions can be put together to participate in complex behaviours with use of smart contracts

Offline Signing

Transactions can be signed offline
Transactions can be signed during managers’ internal systems outage
They can be executed without without the need of live internet connection
They are protected from malicious signers
Disallowed in some cases by protocol rules

Permissioned Network

Permission-based Network
Permission system managed by administrators
Only verified and trusted entities can write transactions
Everyone can read and verify public data about transactions
Write access for end users exposed by managers
Managers can extend or monetize provided API

Shielded Transfers

All transactional data is encrypted and secured
Shielded transactions encryption protocol can be changed and/or upgraded in the future
Shielded transactions can be decrypted only by transaction participants and/or linked authorities

Identity Management

Identity management based on KYC/AML checks
Identity management compliant with GDPR
Identity data secured by cryptography and verifiable proofs
Identity data verified by certified managers
Identity data provable by end users to each other
Identity data held by either managers and/or end users themselves
Identity data usable in smart contracts
Identity data usable in trust channels

Sharded State

Platform is divided into many blockchain-based subnets
Each subnet has its own sharded state
Each subnet has its own administrators, managers and permission groups
Each subnet is managed independently by at least one administrator
Cross-shard communication possible through protocol exposed for administrators
Cross-shard communication secured by administrators

Applications

FluencyFull-node

A full-node application allowing connecting and interacting with Fluency platform, internal tooling and one or many existing networks. It is the most crucial piece of software that can be treated as a crucial element of infrastructure to build on top of the Fluency platform.

FluencyAgent

While full-node can be used as a piece of software directly connecting to the Fluency platform and working low-level with it, Agent is a high-level backend server that can be configured or extended to the user's own needs. It contains multiple pluggable API-based modules including explorer, signing, accounting, identity, financial services and more.

FluencyWallet

Fluency Wallet is a piece of software designed to store cryptographic keys and/or provide functionalities to sign any type of transaction or smart contract call valid for the use on the network, and then broadcast that information if needed with help of a proxy gateway. It also allows storage of personal data in the form of ID-compliant encrypted data.

FluencyExplorer

Fluency Explorer is a piece of software that uses API and full-node to draw various data from an underlying blockchain network and then uses a database to arrange the searched data and to present the data to the user in a searchable format.

FluencyGateway

Fluency Gateway is an application that proxies received transactions and smart contract calls to configured, predefined full-node, to allow it to be executed in the network. It is a crucial part of infrastructure that works on the system boundary and allows wallets to directly execute transactions without need of having their own nodes.