SYSTEMS AND METHODS FOR A TOKENIZED VIRTUAL PERSONA FOR USE WITH A PLURALITY OF SOFTWARE APPLICATIONS
20230409679 ยท 2023-12-21
Assignee
Inventors
Cpc classification
H04L9/3073
ELECTRICITY
International classification
G06F21/10
PHYSICS
H04L9/30
ELECTRICITY
H04L9/32
ELECTRICITY
Abstract
Systems and methods for securely managing all aspects of virtual personas, i.e., all aspects of digital representations of any human, animal or character used to represent an object in any software application. The systems and methods securely manage the creation of virtual personas, the encryption and tokenization of the virtual personas, recordation of the tokenized virtual personas on a distributed ledger technology, the authorization of software applications to access and use the virtual personas, the modification of the virtual personas, the ownership rights in the virtual personas, the grant of access and usage rights in the virtual personas to other parties, providing authorized access and use of the virtual personas, and the ability of character intellectual property owners to create and license virtual personas based on proprietary characters.
Claims
1. A method for generating and using a tokenized virtual persona, the method comprising: creating a virtual persona for a first user, the virtual persona comprising one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the virtual persona; associating the virtual persona with a unique first user account having an associated unique authorized cryptographic key pair (ACKP); encrypting the virtual persona; storing the encrypted virtual persona at a storage location within a virtual persona files database; generating a master virtual persona token (MVPT) for the virtual persona by associating the virtual persona to the first user account as a non-fungible token (NET); and recording the MVPT on a distributed ledger technology (DLT) configured to track ownership rights to the virtual persona; configuring one or more permissions defining usage rights for the virtual persona, the permissions including one or more application permissions authorizing one or more of a plurality of software applications to access and use the virtual persona; and recording the application permissions as a transaction for the MVPT on the DLT.
2. The method of claim 1, further comprising: receiving a request from a requestor software application to access the virtual persona on behalf of the first user, the request including an authenticator generated using the ACKP; verifying the request to access the virtual persona using the DLT by (a) verifying the requestor software application has permission to access and use the virtual persona in the permissions and (b) authenticating the authenticator using the ACKP; and upon verifying the request to access the virtual persona, allowing the requestor software application to access the virtual persona and to only use the virtual persona as set forth in the permissions.
3. The method of claim 2, wherein access to the virtual persona is provided by one of uploading, downloading or streaming the virtual persona to the requestor software application.
4. The method of claim 2, wherein the virtual persona is uploaded, downloaded or streamed to the requestor in encrypted packets for rendering in real-time by the requestor without providing storage of the virtual persona.
5. The method of claim 2, further comprising: recording a transaction on the DLT for allowing the requestor software application to access the virtual persona.
6. The method of claim 1, wherein a smart contract generates the MVPT by associating the virtual persona to the first user account.
7. The method of claim 1, further comprising: creating the first user account by a process comprising: authenticating an identity of the first user by transmitting an authentication message to a messaging address provided by the first user, and receiving an authenticating response from the first user in response to the authentication message; generating the ACKP in response to receiving the authenticating response; and creating an authorized digital account wallet for the first user and registering the ACKP in the digital account wallet of the first user.
8. The method of claim 7, wherein the messaging address is one of a mobile phone number and an email address, and the authentication message is one of a text message transmitted to the mobile phone number and an email sent to the email address.
9. The method of claim 7, wherein the process for creating the first user account further comprises: verifying that the first user is a real person using a live image detection on a real-time photo capture device to eliminate fake users, including bots, and to prevent plagiarism of another user's identity.
10. The method of claim 9, wherein the live image detection comprises one of a single image, passive facial liveness detection or other suitable method of verifying liveness.
11. The method of claim 1, wherein the DLT is selected from the group consisting of: blockchain technology; and directed acyclic graph (DAG) technology.
12. The method of claim 1, wherein creating the virtual persona comprises: receiving a digital image of the user from the first user, the digital image being one of a digital photo, a digital video and a digital scan; and converting the digital image into three-dimensional avatar data thereby forming a virtual persona base (VPB), wherein the VPB includes base digital files for constructing the virtual persona, including one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the virtual persona.
13. The method of claim 12, wherein creating the virtual persona further comprises: adding a virtual persona attribute (VPA) to the virtual persona, wherein the VPA is one or more of a digital object and data to change one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the virtual person; and wherein the VPA is directly controllable only by an owner of the MVPT, user(s) authorized by the owner of the MVPT, and software applications authorized by the permissions.
14. The method of claim 13, further comprising: generating a virtual persona attribute token by associating the VPA to the first user account as an NFT which documents ownership of the virtual persona attribute token by the first user; and registering the virtual persona attribute token on the DLT.
15. The method of claim 12, wherein creating the virtual persona further comprises: adding a virtual persona modification (VPM) to the virtual persona; wherein the VPM is one or more of a digital object and data to change one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the virtual persona; and wherein the VPM can be used only as authorized by the first user.
16. The method of claim 15, further comprising: generating a virtual persona modification token by associating the VPM to the first user account as an NFT, the virtual persona modification token having no mathematical relationship to the VPA; and registering the virtual persona modification token on the DLT.
17. The method of claim 1, wherein creating the virtual persona comprises: capturing a digital image of a two-dimension or three-dimension source selected from the group consisting of a photo, a video, a real-world animate object and a real-world inanimate object; converting the digital image into three-dimensional avatar data thereby forming a virtual persona base (VPB).
18. The method of claim 17, wherein the digital image is captured by digital scanning, computer vision or other suitable image capturing process which converts the source into a digital image file.
19. The method of claim 1, wherein creating the virtual persona comprises: using a computer design software application to produce a set of digital files representing one or more of the appearance attributes, physical attributes, sound traits, capability traits and personality traits for the virtual persona.
20. The method of claim 19, wherein the computer design software application is one of manually operated by a user, semi-automated by user input and automated generation, and fully automated without user input.
21. The method of claim 1, further comprising: creating a sub virtual persona (SVP) for the first user separate from the virtual persona, the SVP comprising one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the SVP; associating the SVP with the first user account; encrypting the SVP; storing the encrypted SVP in the virtual persona media files database; configuring one or more permissions defining usage rights for the SVP, the permissions including one or more application permissions authorizing one or more of a plurality of software applications to access and use the SVP; and registering the SVP and its application permissions within the MVPT on the DLT.
22. The method of claim 21, further comprising: creating a virtual persona attribute (VPA) comprising a digital object or data which can be added to the virtual persona or the SVP to change one or more of the appearance, sound, actions, and intelligence of the virtual persona or SVP via direct control of the first user and any software application authorized by the permissions, wherein the VPA is owned by the first user; and registering the VPA within the MVPT on the DLT.
23. The method of claim 21, further comprising: creating a virtual persona modification (VPM) comprising a digital object or data which can be added to the virtual persona or the SVP to change one or more of their appearance, sound, actions, and intelligence via any means authorized by the permissions, wherein the VPM is not owned by the first user; and registering the VPM within the MVPT on the DLT.
24. The method of claim 1, further comprising: configuring a first permission of the one or more permissions to authorize a second user to use the virtual persona, the second user having a unique second user account having an associated unique second ACKP; recording the first permission as a transaction on the DLT; receiving a request from a requestor software application to access the virtual persona on behalf of the second user, the request including an authenticator generated using the second ACKP; and verifying the request to access the virtual persona using the DLT by verifying the requestor software application has permission to access the virtual persona in the permissions, and authenticating the authenticator using the second ACKP.
25. The method of claim 1, wherein the first user is a character intellectual property owner (CIPO) that owns intellectual property rights in a character and the first user account is a CIPO account of the CIPO, and wherein creating the virtual persona comprises: receiving a request from the CIPO account to create the virtual persona; authenticating the request from the CIPO account using the ACKP; receiving character data for the character comprising one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the character; and creating the virtual persona using the character data.
26. The method of claim 25, further comprising: creating the CIPO account by a process comprising: authenticating an identity of the CIPO by transmitting an authentication message to a messaging address provided by the CIPO, and receiving an authenticating response from the CIPO in response to the message; generating the ACKP in response to receiving the authenticating response; and creating an authorized digital account wallet for the CIPO and registering the ACKP in the digital account wallet of the CIPO.
27. The method of claim 26, wherein the messaging address is one of a mobile phone number and an email address, and the authentication message is one of a text message transmitted to the mobile phone number and an email sent to the email address.
28. The method of claim 26, further comprising: configuring a permission to grant access rights to the virtual persona to a second user, wherein the second user has a unique second user account having an associated unique second ACKP; receiving a request from a requestor software application to access the virtual persona on behalf of the second user, the request including an authenticator generated using the second ACKP; verifying the request to access the virtual persona using the DLT by (a) verifying the requestor has permission to access and use the virtual persona in the permissions and (b) authenticating the authenticator using the second ACKP; and upon verifying the request to access the virtual persona, allowing the requestor software application to access the virtual persona and to only use the virtual persona as set forth in the permissions.
29. The method of claim 28, wherein the virtual persona is a sub virtual persona (SVP) created by the CIPO.
30. The method of claim 29, wherein the SVP is created by using at least one of the following processes: (1) creating a virtual persona attribute (VPA) comprising a digital object or data which can be added to the virtual persona or the SVP to change one or more of the appearance, sound, actions, and intelligence of the virtual persona or SVP via direct control of the first user or any software application authorized by the permissions, wherein the VPA is owned by the first user, and using the VPA to create the SVP; and (2) creating a virtual persona modification (VPM) comprising a digital object or data which can be added to the virtual persona or the SVP to change one or more of their appearance, sound, actions, and intelligence via any means authorized by the permissions, wherein the VPM is not owned by the first user, and using the VPM to create the SVP.
31. The method of claim 1, further comprising: creating a sub virtual persona (SVP) entity account and generating an SVP ACKP associated with the SVP entity account; creating an authorized SVP entity account wallet and registering the SVP ACKP in the SVP entity account wallet; granting the SVP entity account access and use rights to the virtual persona for the first user; generating a SVP token (SVPT) by associating the access rights to the virtual persona as a non-fungible token; and recording the SVPT as a transaction on the DLT.
32. The method of claim 31, wherein granting the SVP entity account access rights to the virtual persona for the first user comprises: configuring a permission granting access rights to the virtual persona to the SVP entity account.
33. The method of claim 32, wherein the SVPT is generated by a smart contract which combines the SVPT ACKP with the storage location.
34. The method of claim 1, wherein configuring the one or more permissions further includes one or more of: authorizing one or more other users to access and use the virtual persona and configuring access rights, usage rights and restrictions on use for the one or more other users; and authorizing the one or more other users to view the virtual persona and configuring the viewing rights and restrictions for the one or more other users.
35. The method of claim 34, further comprising: configuring license terms for the access rights, usage rights and viewing rights granted to the one or more other users, including one or more of: amount of payment; and term of the license.
36. A method for generating and using a tokenized virtual persona, the method comprising: creating a virtual persona utilizing character data for a character owned by a character intellectual property owner (CIPO), the virtual persona comprising one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the virtual persona; associating the virtual person with a unique CIPO account having an associated unique authorized cryptographic key pair (ACKP); encrypting the virtual persona; storing the encrypted virtual persona at a storage location within a virtual persona media database; generating a master virtual persona token (MVPT) of the virtual persona by associating the virtual persona to the CIPO account as a non-fungible token (NFT); recording the MVPT as a transaction on a distributed ledger technology (DLT) configured to track ownership rights to the virtual persona; configuring a license to a first user to access and use the virtual persona; recording the license for the first user as a transaction for the MVPT on the DLT; receiving a request from a requestor software application to access the virtual persona on behalf of the first user, including an authenticator generated using the ACKP; verifying the request to access the virtual persona on the DLT by verifying the first user has permission to access the virtual persona in the license, and authenticating the authenticator using the ACKP; and upon verifying the request to access the virtual persona, allowing the requestor access to the virtual persona.
37. The method of claim 36, wherein access to the virtual persona is provided by one of uploading or streaming the virtual persona to the requestor.
38. The method of claim 37, wherein the virtual persona is uploaded or streamed to the requestor in encrypted packets for rendering in real-time by the requestor without providing storage of the virtual persona.
39. The method of claim 36, further comprising: recording a transaction on the DLT for allowing the requestor software application to access the virtual persona.
40. The method of claim 36, wherein a smart contract generates the MVPT by associating the virtual persona to the CIPO account.
41. The method of claim 36, wherein the character data comprises one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the character, the method further comprising: receiving a request from the CIPO account to create the virtual persona; authenticating the request from the CIPO account using the ACKP; and receiving the character data.
42. The method of claim 41, further comprising: creating the CIPO account by a process comprising: authenticating an identity of the CIPO by transmitting an authentication message to a messaging address provided by the CIPO, and receiving an authenticating response from the CIPO in response to the message; generating the ACKP in response to receiving the authenticating response; and creating an authorized digital account wallet for the CIPO and registering the ACKP in the digital account wallet of the CIPO.
43. The method of claim 42, wherein the messaging address is one of a mobile phone number and an email address, and the authentication message is one of a text message transmitted to the mobile phone number and an email sent to the email address.
44. The method of claim 36, wherein the virtual persona is a sub virtual persona (SVP) created by the CIPO.
45. The method of claim 44, wherein the SVP is created by using at least one of the following processes: (1) creating a virtual persona attribute (VPA) comprising a digital object or data which can be added to the virtual persona or to the SVP to change one or more of the appearance, sound, actions, and intelligence of the virtual persona or SVP via direct control of the first user and any software application authorized by the permissions, wherein the VPA is owned by the first user, and using the VPA to create the SVP; and (2) creating a virtual persona modification (VPM) comprising a digital object or data which can be added to the virtual persona or to the SVP to change one or more of their appearance, sound, actions, and intelligence via any means authorized by the permissions, wherein the VPM is not owned by the first user, and using the VPM to create the SVP.
46. The method of claim 36, further comprising: creating a sub virtual persona (SVP) entity account and generating an SVP ACKP associated with the SVP entity account; creating an authorized SVP entity account wallet and registering the SVP ACKP in the SVP entity account wallet; granting the SVP entity account a license to access the virtual persona for SVP entity; generating a SVP token (SVPT) by associating the license to the virtual persona as a non-fungible token (NFT); and recording the SVPT as a transaction on the DLT.
47. The method of claim 46, wherein the SVPT is generated by a smart contract which combines the SVPT ACKP with the storage location.
48. A system for generating and using a tokenized virtual persona, the system comprising: a tokenized virtual persona system comprising: a virtual persona user control panel configured to: create a virtual persona for a first user, the virtual persona comprising one or more of appearance attributes, physical attributes, sound traits, capability traits and personality traits for the virtual persona; associate the virtual persona with a unique first user account having an associated unique authorized cryptographic key pair (ACKP); and encrypt the virtual persona; configure permissions defining usage rights for the virtual persona, the permissions including authorizing one or more of a plurality of software applications to access the virtual persona; a virtual persona tokenization system configured to: generate a master virtual persona token (MVPT) of the virtual persona by associating the virtual persona and permissions to the first user account as a non-fungible token (NET); record the MVPT on a distributed ledger technology (DLT) configured to track ownership rights to the virtual persona; and record the permissions as a transaction for the virtual persona MVPT on the DLT; a virtual persona container system configured to store the encrypted virtual persona at a storage location within a virtual persona files database; and a virtual persona access system configured to: receive a request from a requestor software application to access the virtual persona on behalf of the first user, including an authenticator generated using the ACKP; verify the request to access the virtual persona on the DLT by (a) verifying the requestor has permission to access the virtual persona in the permissions and (b) authenticating the authenticator using the ACKP; and upon verifying the request to access the virtual persona, allow the requestor software application to access the virtual persona. receive a request from a requestor software application to access the virtual persona on behalf of the first user, including an authenticator generated using the ACKP; verify the request to access the virtual persona on the DLT by (a) verifying the requestor has permission to access the virtual persona in the permissions and (b) authenticating the authenticator using the ACKP; and upon verifying the request to access the virtual persona, allow the requestor software application to access the virtual persona.
49. The system of claim 48, wherein the virtual persona access system further comprises: a virtual persona smart contract software program configured to record and control the permissions for the virtual persona.
50. The system of claim 49, further comprising: a real-time virtual persona presence system configured to track real-time use of the virtual persona, including maintaining a database of software applications actively using the virtual persona and their actions and behaviors with the software applications.
51. The system of claim 49, wherein the real-time virtual persona presence system is further configured to coordinate with the virtual persona access system to cross-reference access rights to a plurality of virtual personas that the first user is authorized to use and allows searching of connections across an authorized software application.
52. The system of claim 48, wherein the virtual persona access system is further configured to allow the first user to define all aspects of the virtual persona via a user interface configured to access the virtual persona and all virtual persona data for the virtual persona, including defining, modifying and adjusting one or more of visual, audio, controls, interactivity, artificial intelligence, permissions, and economic exchanges for the virtual persona.
Description
BRIEF DESCRIPTION OF THE DRAWINGS
[0064] The foregoing and other aspects of embodiments are described in further detail with reference to the accompanying drawings, wherein like reference numerals refer to like elements (e.g., elements having the same number are considered like elements such as 50a and 50b) and the description for like elements shall be applicable for all described embodiments wherever relevant:
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
DETAILED DESCRIPTION
[0074] Referring to
[0075] As shown in
[0076] The DLT 132 may be any suitable blockchain technology 134 or directed acyclic graph (DAG) technology 136. The DLT 132 may comprise a series of computer 1-X node(s) 135 that provide a distributed system of authorizing, recording and maintaining all transactions for the virtual persona system 100. The DLT 132 may rely on other databases or ledgers that are separate from the DLT 132. In such cases, mechanisms are implemented to assure the DLT 132 remains the master ledger of record for the virtual persona system 100.
[0077] The virtual tokenization system 110 includes a smart contract software application 111 configured to tokenize a virtual persona 124 by associating the virtual persona to a respective user account 122 as an NFT, thereby generating a VPT 133.
[0078] The digital file storage system 104, also referred to as a permissioned digital file storage system (PDFSS) is configured to securely store the virtual personas 124 using a virtual persona container system 138 and to provide authorized access to the virtual personas 124 stored therein in response to requests from the third-party software applications 112. The virtual persona container system 138 may utilize a VP media files database 139 and/or VP behaviors database 242, which may be any suitable relational database system.
[0079] The third-party software applications 112 may be any suitable application which utilizes a virtual persona 124, such as gaming platforms/applications 140, social media applications 142, and VR/AR applications 144. Each of the software applications 112 includes API 146 configured to interface with the virtual persona system 100 to allow an authorized user to access and use the virtual personas 124 created and managed on the virtual persona system 100 within the software application 112.
[0080] The virtual persona access system 106 is configured to receive and verify requests from the software applications 112 to access and use the virtual personas 124, and upon verifying a request, provide access to the virtual personas 124, as described in more detail herein. The virtual persona access system 106 may also include a real-time virtual persona presence system 107. The virtual persona presence system 107 is configured to track real-time use of the virtual personas 124 in the virtual persona system 100 and maintains a database of software applications 112 actively using each of the virtual personas 124. The virtual persona presence system 107 may also be configured to coordinate with the virtual persona access system 106 to cross-reference access rights to a plurality of virtual personas 124 that each user 128 is authorized to use and allows searching of connections across an authorized software application 112.
[0081] The virtual persona system 100 also includes user digital software wallets 146 which each store a respective unique ACKP 148 for each user 128. The digital software wallets 146 are password-secured by each user 128, which may also include multi-factor authentication.
[0082] The systems and components of the virtual persona system 100 can communicate with each other via one or more communication networks 105. The one or more communication networks 105 may include one or more of the internet, a local area network (LAN), a wide area network (WAN), a cellular communication network, and/or other communication network.
[0083] Referring now to
[0084] As shown in
[0085] At step 164, the 3D digital avatar data is tokenized by the smart contract 111 of the virtual persona tokenization system 110 by generating a MVPT 137 which combines the first ACKP 148 for the first user account 122 with the storage location of the 3D digital avatar data as an NFT. The MVPT 137 may also be non-tradeable, as well as non-fungible. The virtual persona tokenization system 110 records the MVPT 137 on the DLT 132. The ownership data for MVPT 137 is also recorded in the first user's digital wallet 146 by a transaction verified using the first ACKP 148, such as by an ACKP exchange or digital signature generated using the ACKP 148.
[0086] Turning to
[0087] The CIPO 128a provides a user authentication, which may use the CIPO ACKP 148, to allow the virtual persona system 100 to access the character 166 in the CIPO database 170. The character 166 (i.e., the character data 166 stored in the CIPO database 170) is then accessed by the virtual persona system 100. The character data 166 may be 3D character data useable as a virtual persona 124. If not, a software application on the virtual persona system 100 converts the character 166 into a format useable as a virtual persona 124 on the virtual persona system 100, such as by converting the character 166 into 3D digital avatar data and/or performing any other needed formatting or conversion. The virtual persona 124 is encrypted and stored at a storage location (which may be indicated by URI location metadata) in the VP media files database 139. At step 172, the virtual persona 124 (comprising the character 166) is tokenized by the smart contract 111 of the virtual persona tokenization system 110 by generating a MVPT 137 which combines the CIPO ACKP 148 for the CIPO account 122 with the storage location of the virtual persona 124 as an NFT. The MVPT 137 may also be non-tradeable, as well as non-fungible. The virtual persona tokenization system 110 records the MVPT 137 on the DLT 132. At step 176, the ownership data for MVPT 137 is also recorded in the digital wallet 146 of the CIPO 128a by a transaction verified using the first ACKP 148, such as by an ACKP exchange or digital signature generated using the ACKP 148 of the CIPO 128a.
[0088] As shown in
[0089] Also shown in
[0090] Turning now to
[0091] At step 192, the virtual personas 124 are minted as VPTs by the smart contract 111 and recorded on the DLT 132.
[0092] In addition, the CIPO 128a can utilize the virtual persona user control panel 108 to configure the permissions 118 for the virtual personas 124 using the VP configuration software 190. As step 194, the CIPO 128a can use the virtual persona user control panel 108 to configure a permission for access and usage rights for individuals (e.g., other users 128), groups, and software applications 112. At step 196, the CIPO 128a can also configure viewing rights for individuals (e.g., other users 128), groups, and software applications. As some examples, the CIPO can define one or more SVPs 127 using the virtual persona control panel 108, and then assign relationships to other users and/or software applications 112 to control who can view the different SVPs 127. The viewing rights can also set a default virtual persona 124 that all users 128 will see for each software application that is granted permission to access and display a virtual persona 124. This can be any of the CIPO's virtual personas 124 that are assigned to the CIPO MVPT 137. The viewing rights can also include an invisible mode where the CIPO 128a can participate in a software application 112 without a visible representation of a virtual persona 124. The viewing right can also include a specific virtual persona 124 that will be displayed to a specific user, such as when both users are in a common software application 112. The viewing rights can also assign different virtual personas 124 to each of different users 128. The display of the different virtual personas can be simultaneous such that any and all actions performed by any one of the virtual personas 128a is represented to all participants on a software application 112 without perceived delay.
[0093] At step 198, the CIPO 128a can also use the virtual persona user control panel 108 to configure license terms between the CIPO and other users (licensees) for granting the usage rights to the virtual personas 124 of the CIPO 128a. The license terms may include fees to be paid by the licensee, the term of the license, and any other desired terms.
[0094] Turning to
[0095] Referring now to
[0096] At step 224, the virtual persona access system 106 verifies the request using the DLT by verifying the requestor software application 112 has permission to access the virtual personas 124 in the permissions and authenticating the authenticator using the first user's ACKP 148. Upon verification, the virtual persona access system 106 sends an authorization to the digital file storage system 104 to allow the software application 112 to access the virtual personas 124. At step 226, the virtual persona 124 (i.e., the virtual persona data files) is uploaded or streamed to the software application 112.
[0097] The virtual persona access system 106 also verifies the permissions 118 authorizing other users 128b-128x to access and use the virtual personas 124 on the software application 112 and/or granting viewing rights to the other users 128b-128x to view the virtual personas 124 on the software application 112, and authorizes the software application 112 to allow the other user 128b-128x to access, use and/or view the virtual personas 124 according to the verified permissions 118. At step 228, one or more of the other users 128b-128x log into the software application 112, and are allowed to access, use and/or view the virtual personas 124 (and/or SVP 127) according to the verified permissions 118.
[0098] At step 230, the virtual persona access system 106 sends one or more transactions for the access, use and viewing of the virtual personas 124 allowed on the software application 112 for recording on the DLT 132.
[0099]
[0100] At step 232, User 1 128a logs into the software application 112, and the software application 112 requests to access and use the virtual personas 124a-124e, as described in method 208. The virtual persona system 100 verifies the request, and provides access to the virtual personas 124a-124e, as also described in method 208. At steps 234a-234e, the software application 112 simultaneously displays the respective virtual persona 124a-124e assigned to each respective other user 128b-128x. Accordingly, User 2 128b sees User 1 128a as the photo-realistic avatar of User 1 128a, while User 3 128c sees User 1 128a as the superhero, while User 4 128d see User 1 128a as the monster, while User 5 128e sees User 1 128a as the cartoonish avatar of User 1 128a, and User 6 128fUser X 128x see User 1 128a as the default licensed CIPO character avatar of User 1 128a.
[0101] The method 210 may also include any one or more of the processes utilized in the method 208.
[0102]
[0103]
[0104] A second option is a mint reservation option. In the mint reservation option, at step 262, the original digital media file 260 is encrypted and transferred to the permissioned digital file storage system 104. At step 264, the local copy of the digital media file 260 is marked with a watermark that notates it as a copy of the original digital media file which may be a lower quality version than the original. At step 266, the smart contract 111 mints the NFT (e.g., a DCCT 270) as a reservation without the ability to transfer ownership of the NFT (e.g., a DCCT 270) and records the information on the DLT 132. The local original quality version of the digital media files is permanently deleted from the user device 129. If the user chooses at a later time to mint the NFT (e.g., a DCCT 270) as a tradeable NFT (e.g., a DCCT 270), it is converted to a direct mint NFT (e.g., a DCCT 270). If the user chooses at a later time to cancel the reservation, the original quality digital media file is transferred from the digital file storage system 104 to be used as an openly available digital media file.
[0105] Although particular embodiments have been shown and described, it is to be understood that the above description is not intended to limit the scope of these embodiments. While embodiments and variations of the many aspects of the invention have been disclosed and described herein, such disclosure is provided for purposes of explanation and illustration only. Thus, various changes and modifications may be made without departing from the scope of the claims. For example, not all of the components and/or method steps described in the embodiments are necessary, and the invention may include any suitable combinations of the described components and method steps. Accordingly, embodiments are intended to exemplify alternatives, modifications, and equivalents that may fall within the scope of the claims. The invention, therefore, should not be limited, except to the following claims, and their equivalents.