Enjoy your
FREE PREVIEW which shows only 2022 data and 25 documents. Contact
Patent Forecast for full access.
Cryptocurrency: Industrial Applications
Search All Applications in Cryptocurrency: Industrial Applications
Application US20200265532
Published 2020-08-20
Digital Property Authentication And Management System
Systems and methods for digital property authentication and management are disclosed. A document representing a trade secret may be requested to be registered with a trade secret registry. A document obfuscation value corresponding to the document may be generated and may be registered with a blockchain. A record of the registration may be generated for the trade secret registry. The registry may be searchable and/or offer functionality such as valuation, insurance provision, and/or verification, among other benefits and functionalities.
Much More than Average Length Specification
View the Patent Matrix® Diagram to Explore the Claim Relationships
USPTO Full Text Publication >
- 1. A system comprising:
one or more processors; and non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
storing, in association with a trade secret registry, a first record indicating:
a first document obfuscation value corresponding to a first document representing a trade secret; and
a block value generated based at least in part on the first document obfuscation value, the block value representing a block in a blockchain of a distributed-ledger system;
receiving an indication that the first document represents a first version of the first document;
receiving, from an electronic device, input data requesting to register a second document in association with the trade secret registry;
receiving, from the electronic device, a second document obfuscation value corresponding to the second document;
determining, based at least in part on a comparison of the first document obfuscation value with the second document obfuscation value, that the second document corresponds to a second version of the first document; and
generating a second record:
indicating that an identifier of the second document has been registered in association with the trade secret registry;
indicating that the second document is the second version of the first document; and
including a selectable link that, when selected, causes display of the first record.
- 9. A method, comprising:
storing, in association with a trade secret registry, a record indicating:
a first document obfuscation value corresponding to a document representing a trade secret; and
a first block value generated based at least in part on the first document obfuscation value, the first block value representing a first block in a blockchain of a distributed-ledger system;
receiving, from an electronic device, valuation data indicated to be relevant to a value of the trade secret; receiving, from the electronic device, a second document obfuscation value corresponding to the valuation data; receiving, from at least one of the electronic device or the distributed-ledger system, a second block value generated based at least in part on the second document obfuscation value, the second block value representing a second block in the blockchain; and wherein the record includes the second document obfuscation value and the second block value.
- 13. A system comprising:
one or more processors; and non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising:
storing first access-control data indicating:
a first identifier of a first person permitted to access a record associated with a trade secret registry, the record indicating a trade secret registered in association with the trade secret registry; and
a functionality of the trade secret registry authorized for use by the first person;
storing second access-control data indicating:
a second identifier of a second person permitted to access the record; and
that the second person is unauthorized to use the functionality;
receiving first input data requesting access to the record, the first input data indicating that the second person is requesting access to the record;
causing display, based at least in part on the first input data, of the record;
receiving second input data requesting use of the functionality; and
refraining from causing the functionality to be performed based at least in part on the second access-control data indicating the second person is unauthorized to use the functionality.