System and Methods for Asset Management
20240211552 ยท 2024-06-27
Inventors
Cpc classification
H04L9/3242
ELECTRICITY
International classification
H04L9/32
ELECTRICITY
Abstract
In summary, the present invention, in some embodiments thereof, relates to digital and physical assets security and, more specifically, but not exclusively, to systems and methods for registration, validation, and distribution of assets digitally. The invention describes a system and method to establish an asset management system that registers, hosts, and validates submitted digital assets or digital representations of physical assets using cryptographically secured assets, such as digital non-fungible tokens (NFTs).
Claims
1. A cryptographic asset management system comprising one or more hardware processors configured by machine-readable instructions to: receive a digital asset; generate a copy of received digital asset; embed a unique watermark on the generated copy of received digital asset using a watermarking algorithm; obtain a hash value of the generated copy of received digital asset embedded with the unique watermark using a hashing algorithm; encrypt the generated copy of received digital asset embedded with the unique watermark using an encryption algorithm, and; generate a cryptographically secured asset representing the encrypted generated copy of received digital asset embedded with the unique watermark, wherein the cryptographically secured asset comprises the hash value obtained from the generated copy of received digital asset embedded with the unique watermark.
2. The system of claim 1, wherein the cryptographically secured asset comprises the cryptographic hash value obtained from the generated copy of received digital asset embedded with the unique watermark.
3. The system of claim 1, wherein the digital asset is a representation of a physical asset.
4. The system of claim 1, wherein the digital asset is a non-fungible token registered on a blockchain.
5. The system of claim 1, further comprising machine-readable instructions to: receive an encrypted copy of a digital asset embedded with a unique watermark; decrypt the received encrypted copy of a digital asset embedded with a unique watermark using a decryption algorithm; obtain a hash value from the decrypted copy of a digital asset embedded with a unique watermark using the hashing algorithm; compare the obtained hash value with the hash value of the corresponding cryptographically secured asset registered on a blockchain to assert the validity and/or ownership.
6. The system of claim 1, further comprising machine-readable instructions to generate and register a plurality of cryptographically secured assets on a blockchain, each cryptographically secured asset representing an encrypted unique modified copy of the digital asset embedded with a unique watermark.
7. The system of claim 1, further comprising machine-readable instructions to: receive an encrypted copy of a digital asset embedded with a first unique watermark; decrypt the received encrypted copy of a digital asset embedded with the first unique watermark using a decryption algorithm; embed a second unique watermark on the decrypted copy of a digital asset embedded with the first unique watermark using a watermarking algorithm; obtain a hash value from the decrypted copy of a digital asset embedded with the first and second unique watermark using the hashing algorithm; encrypt the decrypted copy of a digital asset embedded with the first and second unique watermarks using an encryption algorithm, and; generate a cryptographically secured asset representing the encrypted decrypted copy of a digital asset embedded with the first and second unique watermarks.
8. The system of claim 7, further comprising machine-readable instructions to: receive an encrypted decrypted copy of a digital asset embedded with the first and second unique watermarks; decrypt the received encrypted decrypted copy of a digital asset embedded with the first and second unique watermarks using a decryption algorithm; obtain a hash value from the decrypted encrypted decrypted copy of a digital asset embedded with the first and second unique watermarks using the hashing algorithm; compare the obtained hash value with the hash value of a corresponding non-fungible token registered on the blockchain to assert validity and/or ownership.
9. A computer implemented method for generating cryptographically secured assets, the method comprising of: receiving a digital asset; generating a copy of received digital asset; embedding a unique watermark on the generated copy of received digital asset using a watermarking algorithm; obtaining a cryptographic hash value of the generated copy of received digital asset embedded with the unique watermark; encrypting the generated copy of received digital asset embedded with a unique watermark using a hashing algorithm; encrypting the copy embedded with the unique watermark using an encryption algorithm, and; generating a cryptographically secured asset representing the encrypted generated copy of received digital asset embedded with the unique watermark, wherein the cryptographically secured asset comprises the hash value obtained from the generated copy of received digital asset embedded with the unique watermark.
10. The method of claim 9, wherein the digital asset is a representation of a physical asset.
11. The method as in claim 9, wherein the digital asset is a non-fungible token registered on a blockchain.
12. The method as in claim 9, further comprising: receiving an encrypted copy of a digital asset embedded with a unique watermark; decrypting the received encrypted copy of a digital asset embedded with a unique watermark using a decryption algorithm; obtaining a hash value from the decrypted copy of a digital asset embedded with a unique watermark using the hashing algorithm; comparing the obtained hash value with the hash value of a corresponding cryptographically secure asset registered on a blockchain to assert the validity and/or ownership.
13. The method of claim 9, further comprising generating and registering a plurality of cryptographically secured assets on a blockchain, each representing an encrypted unique modified copy of the digital asset embedded with a unique watermark.
14. The method of claim 9, further comprising: receiving an encrypted copy of a digital asset embedded with a first unique watermark; decrypting the received encrypted copy of a digital asset embedded with a first unique watermark using a decryption algorithm; embedding a second unique watermark on the decrypted copy of a digital asset embedded with a first unique watermark using a watermarking algorithm; obtaining a cryptographic hash value from the decrypted copy of a digital asset embedded with the first and second unique watermarks using the hashing algorithm; encrypting the decrypted copy of a digital asset embedded with the first and second unique watermarks using an encryption algorithm, and; generating a cryptographically secured asset representing the encrypted decrypted copy of a digital asset embedded with the first and second unique watermarks.
15. The method of claim 14, further comprising: receiving an encrypted decrypted copy of a digital asset embedded with the first and second unique watermarks; decrypting the received encrypted decrypted copy of a digital asset embedded with the first and second unique watermarks using a decryption algorithm; obtaining a hash value from the decrypted encrypted decrypted copy of a digital asset embedded with the first and second unique watermark using the hashing algorithm; comparing the obtained hash value with the hash value of a corresponding cryptographically secure asset registered on the blockchain to assert validity and/or ownership.
Description
BRIEF DESCRIPTION OF FIGURES
[0014] The novel features believed to be characteristic of the illustrative embodiments are set forth in the appended claims. The illustrative embodiments, however, as well as a preferred mode of use, further objectives and descriptions thereof, will best be understood by reference to the following detailed description of one or more illustrative embodiments of the present disclosure when read in conjunction with the accompanying drawings, wherein:
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
DETAILED DESCRIPTION
[0024] Hereinafter, the preferred embodiment of the present invention will be described in detail with reference to the accompanying drawings. The terminologies or words used in the description and the claims of the present invention should not be interpreted as being limited merely to their common and dictionary meanings. On the contrary, they should be interpreted based on the meanings and concepts of the invention in keeping with the scope of the invention based on the principle that the inventor(s) can appropriately define the terms in order to describe the invention in the best way.
[0025] It is to be understood that the form of the invention shown and described herein is to be taken as a preferred embodiment of the present invention, so it does not express the technical spirit and scope of this invention. Accordingly, it should be understood that various changes and modifications may be made to the invention without departing from the spirit and scope thereof.
[0026] In the first exemplary embodiment according to
[0027] The digital asset 1 could be a digital representation of a physical asset, a digital asset, a non-fungible token or any such assets that can be represented in a digital format.
[0028] In a second exemplary embodiment according to
[0029] It should be understood that the hash value 10 obtained from an asset modified with a unique watermark may form part of a cryptographically secure asset 4, or may be obtained from it.
[0030] In a further embodiment according to the
[0031] In another example, a second copy 1b of the digital asset 1 is made, whereby said copy 1b of digital asset is embedded with a unique watermark 11b, to generate a unique second copy 2b of the digital asset 1. A hash value, for instance, 10b may be obtained from the unique second copy 2b of the digital asset 1. Further, the unique second copy 2b of the digital asset 1 may be subsequently encrypted, to form an encrypted asset 3b of the unique second copy 2b of the digital asset 1. Thereafter, a cryptographically secure asset 4b representing the uniquely watermarked and encrypted copy of the digital asset 1 with obtained hash value is generated, whereby it may be possible to decipher the hash value 10b from said cryptographically secure asset 4b.
[0032] As a further example, a third copy 1c of the digital asset 1 is made, whereby said copy 1c of digital asset is embedded with a unique watermark 11c, to generate a unique third copy 2c of the digital asset 1. A hash value, for instance, 10c may be obtained from the unique third copy 2c of the digital asset 1. Further, the unique third copy 2c of the digital asset 1 may be subsequently encrypted, to form an encrypted asset 3c of the unique third copy 2c of the digital asset 1. Thereafter, a cryptographically secure asset 4c representing the uniquely watermarked and encrypted copy of the digital asset 1 with obtained hash value is generated, whereby it may be possible to decipher the hash value 10c from said cryptographically secure asset 4c.
[0033] Further still, as an example, a fourth copy 1d of the digital asset 1 is made, whereby said copy 1d of digital asset is embedded with a unique watermark 11d, to generate a unique fourth copy 2d of the digital asset 1. A hash value, for instance, 10d may be obtained from the unique fourth copy 2d of the digital asset 1. Further, the unique fourth copy 2d of the digital asset 1 may be subsequently encrypted, to form an encrypted asset 3d of the unique fourth copy 2d of the digital asset 1. Thereafter, a cryptographically secure asset 4d representing the uniquely watermarked and encrypted copy of the digital asset 1 with obtained hash value is generated, whereby it may be possible to decipher the hash value 10d from said cryptographically secure asset 4d.
[0034] It should be understood that the exemplary illustration provides for the establishing of a digital representation of copyright or ownership right for digital or physical assets using a cryptographically secured asset, embedding a cryptographically secured asset in representation of digital asset or digital representation of physical asset, establishing a digital representation of distribution right for digital or physical assets using the cryptographically secured asset, embedding the cryptographically secured asset representing distribution right in representation of digital asset or digital representation of physical asset, establishing a digital representation of tokenized ownership of digital or physical asset, and embedding cryptographically secured asset representing tokenized ownership in representation of digital asset or digital representation of physical asset.
[0035] Preferably, the exemplary illustration of
[0036] In some embodiments, the uploaded digital asset may be transformed into an updated digital asset with the cryptographically secured asset or a representation of the cryptographically secured asset. The transformation may be driven by a computer algorithm. The transformation may not be detectable by the naked eyes. The presence of the cryptographically secured asset embedded in the updated digital asset may be detected and validated by computer algorithm. The updated digital asset may serve as a proof of ownership of one or more rights. The cryptographically secured assets representing the uploaded digital asset may be structured. In one embodiment, one cryptographically secured asset may contain information of another cryptographically secured asset. The structure may be detected and validated by a computer algorithm.
[0037] In a non-limiting embodiment, the digital asset for which a cryptographically secured asset is generated may embody a digital representation of a physical asset, a digital asset, a non-fungible token or any such assets that can be represented in a digital format.
[0038] In a subsequent embodiment illustrated by
[0039] In a preferred embodiment, the storage device comprises of a blockchain.
[0040] In the embodiment exemplified by the
[0041] A subsequent embodiment according to
[0042] According to an exemplary embodiment as in
[0043] According to an exemplary embodiment as in
[0044] In a last shown exemplary embodiment according to the
[0045] In some preferred aspects, the digital watermarking techniques described in the present invention may specify the use of imperceptible watermarks embedded in the digital assets. As used herein, an imperceptible watermark may refer to a watermark that is cryptographically embedded within the digital data in such a manner that it is not perceptible to the human eyes, or other senses and cannot be detected or deciphered without specialized algorithms and keys.
[0046] Although a preferred embodiment of the present invention has been described for illustrative purposes, those skilled in the art will appreciate that various modifications, additions and substitutions are possible, without departing from the scope and spirit of the invention as disclosed in the accompanying claims.
INDUSTRIAL APPLICATION
[0047] The current invention technology is applicable in the cryptography industry.