Home Patent Forecast® Sectors Log In   Contact  
How it works Patent Forecast® Sectors Insights
Menu
Enjoy your FREE PREVIEW which shows only 2022 data and 25 documents. Contact Patent Forecast for full access.        

Cryptocurrency: Platforms

Search All Applications in Cryptocurrency: Platforms


Application US20200265534


Published 2020-08-20

Digital Property Authentication And Management System

Systems and methods for digital property authentication and management are disclosed. A document representing a trade secret may be requested to be registered with a trade secret registry. A document obfuscation value corresponding to the document may be generated and may be registered with a blockchain. A record of the registration may be generated for the trade secret registry. The registry may be searchable and/or offer functionality such as valuation, insurance provision, and/or verification, among other benefits and functionalities.



Much More than Average Length Specification


View the Patent Matrix® Diagram to Explore the Claim Relationships

USPTO Full Text Publication >

3 Independent Claims

  • 1. A system, comprising: one or more processors; and non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising: storing, in association with a trade secret registry, a record indicating: a first document obfuscation value corresponding to a first document representing a trade secret; and a block value generated based at least in part on the first document obfuscation value, the block value representing a block in a blockchain of a distributed-ledger system; receiving, from an electronic device, a second document indicated to have been misappropriated; receiving, from the electronic device, input data requesting verification that the second document corresponds to a registered document registered with respect to the trade secret registry; generating, based at least in part on the second document, a second document obfuscation value corresponding to the second document; determining a degree of similarity between the first document obfuscation value and the second document obfuscation value; determining that the degree of similarity is greater than a threshold degree of similarity; and determining that the second document corresponds to the first document based at least in part on the degree of similarity being greater than the threshold degree of similarity.

  • 5. A method, comprising: storing a record indicating: a first document obfuscation value corresponding to a first document representing a trade secret; and a block value generated based at least in part on the first document obfuscation value, the block value representing a block in a blockchain of a distributed-ledger system; receiving, from an electronic device, a second document indicated to have been misappropriated; generating, based at least in part on the second document, a second document obfuscation value corresponding to the second document; determining a degree of similarity between the first document obfuscation value and the second document obfuscation value; and determining that the second document corresponds to the first document based at least in part on the degree of similarity.

  • 13. A system comprising: one or more processors; and non-transitory computer-readable media storing computer-executable instructions that, when executed by the one or more processors, cause the one or more processors to perform operations comprising: storing a record indicating: a first document obfuscation value corresponding to a first document corresponding to a trade secret; and a block value generated based at least in part on the first document obfuscation value, the block value representing a block in a blockchain of a distributed-ledger system; receiving, from an electronic device, a second document indicated to have been misappropriated; generating, based at least in part on the second document, a second document obfuscation value corresponding to the second document; determining a degree of similarity between the first document obfuscation value and the second document obfuscation value; and determining that the second document corresponds to the first document based at least in part on the degree of similarity.