SYSTEM AND METHOD FOR GENERATING A NON-FUNGIBLE TOKEN ASSOCIATED TO AN ITEM
20230087841 ยท 2023-03-23
Assignee
Inventors
- Simon Read (London, GB)
- Yasir Adeel Qayam (Borehamwood, GB)
- Owais Hassan Shaikh (Karachi, PK)
- Kirthi Gogulamudi (London, GB)
Cpc classification
International classification
H04L9/32
ELECTRICITY
Abstract
The present invention relates to a method for creating a non-fungible token associated to an item, wherein the method comprises the steps of: providing general information about the item; providing information about the owner of the item; confirming the information about the owner of the item; and generating the non-fungible token based on the general information about the item, wherein the step of generating the non-fungible token comprises storing the confirmed information about the owner of the item in the non-fungible token.
Claims
1. Method for generating a non-fungible token associated to an item, wherein the method comprises the steps of: providing general information about the item; providing information about the owner of the item; confirming the information about the owner of the item; and generating the non-fungible token based on the general information about the item, wherein the step of generating the non-fungible token comprises storing the confirmed information about the owner of the item in the non-fungible token.
2. Method according to claim 1, wherein the method further comprises the step of confirming the general information about the item, and wherein the non-fungible token is generated based on the confirmed general information about the item.
3. Method according to claim 1, wherein the step of confirming the information about the owner of the item comprises verifying the identity of the owner of the item or biometric identifiers of the owner of the item.
4. Method according to claim 1, wherein the method further comprises the steps of, for all parts of the item, providing information about the creation of the corresponding part of the item, for all parts of the item validating the provided information about the creation of the corresponding part of the item, wherein, for all parts of the item, the validated information about the creation of the corresponding part is respectively stored in the non-fungible token together with information about when the corresponding part of the item was created or an IP address used when creating the corresponding part of the item or an electronic signature of the creator of the corresponding part of the item.
5. The method according to claim 4, wherein the method comprises the step of using a cryptographic function to create a digest based on the confirmed information about the owner of the item, or the validated information about the creation of each of the parts of the item, respectively together with the information about when the corresponding part of the item was created, or the IP address used when creating the corresponding part of the item, or the electronic signature of the creator of the corresponding part of the item, and wherein the digest is stored in the non-fungible token.
6. Method according to claim 1, wherein the method further comprises the step of storing the non-fungible token on a decentralized storage system.
7. Method according to claim 1, wherein the method further comprises the step of providing at least one governance parameter for the non-fungible token, and wherein the step of generating the non-fungible token comprises generating the non-fungible token based on the general information about the item and the at least one governance parameter.
8. Method for authenticating an item, wherein the method comprises the steps of: Generating a non-fungible token associated to the item by a method for generating a non-fungible token associated to an item according to claim 1; and Authenticating the item based on the generated non-fungible token associated to the item.
9. System for generating a non-fungible token associated to an item, wherein the system is configured to execute a method for generating a non-fungible token associated to an item according to claim 1.
10. System for authenticating an item, wherein the system comprises a receiver that is configured to receive a non-fungible token associated to an item generated by a system for generating a non-fungible token associated to an item according to claim 9, and wherein the system is configured to authenticate the item based on the received non-fungible token associated to the item.
11. Computer program product comprising instructions which, when executed by a computer, cause the computer to carry out the steps of the method for generating a non-fungible token associated to an item according to claim 1.
Description
DESCRIPTION OF THE DRAWINGS
[0042] Embodiments of the invention will now be described with reference to the drawings.
[0043]
[0044]
DETAILED DESCRIPTION
[0045]
[0046] When a medical device such as a pacemaker or a deep brain stimulation device is accessed or updated, it is important to first verify that it is allowed to correspondingly access or to update the medical device, in order to avoid significant health risks.
[0047] For example, there are implantable devices used to monitor physiological parameters and to deliver stimulation signals or therapy to selected organs. An external programmer is often used by physicians or technicians to communicate data with an implantable device. The data may include measured parameters, electrocardiograms, markers, instructions, identification information and other such data.
[0048] With the advent of far field communications for implantable devices, cloud-based software or parameter updates are possible. Whether the data used by the implantable device is set or updated by an external, near-filed programmer or a far field programmer or cloud system, it is essential to prevent unauthorized or unintended communications with an implantable device. Such communications can result in a minor inconvenience or tragic, life threatening, consequences or any level of risk in between those extremes.
[0049] Further, it is important to incorporate security between communication devices, for example Internet of Things (IOT)-devices, to avoid significant security issues.
[0050] For example, it is important to ensure traceability of the data and operations created and performed, respectively, by IoT-devices.
[0051] Therein, it is known to use utility or non-fungible tokens in applications that require immutable evidence of valid agreement or contracts between different parties, provenance or ownership, what has been proven as extremely reliable.
[0052] A utility token is a simple token that enables future access to items respectively assets or products or services offered by an organization. Thus, a utility token offers a specific utility within a decentralized application. Therein, utility tokens usually are a form of digital assets created for spending within a blockchain ecosystem.
[0053] Further, a non-fungible token is a unique and non-interchangeable unit of data stored in a digital ledger, respectively a digital asset that contains identifying information recorded in one or more smart contracts. In particular, a non-fungible token is a unit of data stored on a digital ledger, respectively a blockchain ledger, that can be sold and traded, wherein the non-fungible token can be associated with a particular digital or physical asset and a license to use the asset for a specific purpose.
[0054] Non-fungible tokens are advantageous regarding proof of ownership of an item, wherein since non-fungible tokens are on a blockchain network, they can help in associating ownership to a single user or account. In particular, non-fungible tokens are indivisible and cannot be distributed among multiple owners. Further, non-fungible tokens are respectively unique, wherefore they can be used to verify authenticity of an item. Furthermore, non-fungible tokens are easily tradeable freely on particular markets with a wide range of options for trading.
[0055] However, once a non-fungible token is lost or stolen, it is generally irretrievable. Further, there is a risk of false or corrupted data inherent in the file validation processes and non-fungible tokens are usually stored on centralized servers which are vulnerable to attacks. Therefore, there is a need for a method for creating generating an improved non-fungible token.
[0056] According to the method shown in
[0057] That the confirmed information about the owner of the item is stored in the non-fungible token has the advantage that the lawful owner of the item can always be identified, whereby immutable trust can be created. The method can also be used to reissue a stolen or lost non-fungible token in a simple manner to its lawful owner, wherein the non-fungible token can be reissued based on the owner's validated identity and a proof of creation of the item, wherein retrieving the non-fungible token can be further subject to legal due diligence, and wherein the lost or stolen original non-fungible token is burnt.
[0058] Further, the non-fungible token can be generated in an effective and cost-efficient manner, as the provided information can easily be provided via known input means, wherefore no expensive and time-consuming modifications of the corresponding data processing system are required.
[0059] Therefore,
[0060] As shown in
[0061] According to the embodiments of
[0062] As shown in
[0063] Therein, the information when the corresponding file or part of the item was created can include a time stamp including information about a particular date and a particular time when the corresponding file or part of the item was created.
[0064] According to the embodiments of
[0065] Therein, the computed digest can be included in smart contract instructions for minting the non-fungible token.
[0066] Further, the computed digest and standard attributes, for example a validity period of the non-fungible token and a type of the non-fungible token, are used to create the non-fungible token and to map a smart contract respectively agreement to the non-fungible token, wherein the corresponding smart contract can be executed on the blockchain of choice. In particular, the computed digest and the standard attributes are processed to be included into corresponding smart contract instructions for minting the non-fungible token, wherein the non-fungible token is created in such a way, that the provided information characterizing the item is stored in the metadata of the non-fungible token unique resource identifier.
[0067] According to the embodiments of
[0068] A blockchain is a distributed ledger, similar to a database, wherein the ledger is dispersed across multiple computers that can be connected by a network. In particular, a blockchain is a ledger through which data is added and updated in real-time, wherein, once the data is added to the ledger, it cannot be removed or simply edited anymore.
[0069] The blockchain ledger can be configured to maintain a verified blockchain public ledger version of the created non-fungible token, whereby a non-fungible token and for example ownership of the corresponding item can easily and reliably be validated.
[0070] The created non-fungible token can then be hold in custody or be transferred to a wallet of the user or owner that has provided the item.
[0071] With uploading the item or the general information about the item in step 2, the owner of the item can also define whether the item should remain in the public or the private domain, wherein the choice of the user determines accessibility to the item and external user privileges.
[0072] The non-fungible token may be issued in several different scenarios for both, online and offline usage. For example, the non-fungible token may be issued to authenticate a medical device or an IoT-device. However, the created non-fungible token may for example also be used as collateral for financing regarding trade finance or as deed of ownership. Further, the created non-fungible token may for example also allow for broader application in insurance risk transfer contracts, or to protect and verify information such as intellectual property, media rights, news, scholarly articles, scientific research, art, or computer code.
[0073] Based on the created non-fungible token, further a legally binding, time stamped and reliable mechanism for authenticating items or contracts is provided.
[0074] Therein, as shown in
[0075] Based on the authentication of the item, further steps, for example security relevant steps may then be initiated. For example, in step 9 a medical device can be authenticated based on the created non-fungible token associated to the medical device, wherein, based on the authentication, it can be validated if it is allowed to correspondingly access or to update the medical device, and wherein the corresponding medical device can only be accessed or updated if it has been validated that it is allowed to access or update the medical device. Further, for example an IoT-device may only be used if it the IoT-device has been authenticated, so that traceability of the data and operations created and performed by the corresponding IoT-device can be ensured.
[0076] According to the embodiments of
[0077] Further, if the authentication was not successful, security relevant actions, for example issuing a notice to the owner of the system, a producer or a seller, or shutting down the item can be initiated.
[0078] Further, the method can be implemented in such a way, that a user that wants to authenticate the item can hold native utility tokens, in order to be able to request for authentication of the item to be linked to the created non-fungible token, whereby the security can be further improved. On the other hand, authentication of an item linked or associated with the created non-fungible token in the private domain may be limited to nominated users or authenticated approved users.
[0079]
[0080] As shown in
[0081] According to the embodiments of
[0082] The generating device can for example be realized based on code that is stored in a memory and executable by a processor.
[0083] According to the embodiments of
[0084] The confirming device can for example also be realized based on code that is stored in a memory and executable by a processor or corresponding sensing means for example biometric sensing devices. In particular, according to the embodiments of
[0085] As shown in
[0086] Therein, also the providing device and the validating device can for example both be realized based on code that is stored in a memory and executable by a processor.
[0087] According to the embodiments of
[0088] The shown system for generating a non-fungible token associated to an item 11 further comprises a storing device 19 that is configured to store the generated non-fungible token on a decentralized storage system.
[0089] The storing device can for example be realized based on code that is stored in a memory and executable by a processor.
[0090] There is further shown a receiver 20 for receiving at least one governance parameter for the non-fungible token, wherein the generating device 16 is configured to generate the non-fungible token based on the computed digest and the at least one governance parameter.
[0091] As further shown in
[0092] Therein, the authentication device can for example be realized based on code that is stored in a memory and executable by a processor.
[0093] The shown system is further configured to execute a method for authenticating an item as described above.