The illustrative embodiments relate to data management, valuation and monetization systems. More specifically, but not exclusively, the illustrative embodiments relate to a system, method, apparatus, and platform for the valuation, management, and utilization of objectified data objects associated with religious services and organizations.
In recent years, data security, cyber-attacks and big data breaches have led to the development of technology initiatives to secure data and make it available for users, including blockchain, cryptocurrencies, fire walls, and security and encryption technologies. These technologies have largely fallen short of protecting or properly capturing all the available consumer data. The commercial Internet is still largely dependent on digital advertisement revenue derived from user or personal data that is typically monetized through advertising and resulting consumer or commercial product sales. User data is being captured, searched and used in targeted ad revenue production and delivery by the big data companies. Search engines, web destinations, and physical real-world sources of data are abundant and grossly underserved in the fields of capture, valuation, and monetization. Big data companies collect, analyze, verify and sell consumer data across all known web environments. The data is monetized by collecting and tracking interactions across an array of platforms, sites, devices, questionnaires, surveys and so forth.
Often, the current mechanisms fall short in the ability to price the resulting data and do not provide accurate data capture or network or exchanges for data purchasing, development, and transaction. Consumers' online profile data is commonly generated and monetized from consumer web searches, profile data, social media profiles, and online surveys that generate revenue through advertisement delivery with no compensation to the actual owners of the data, the individual consumers/users, consumer groups, organizations, and data generators themselves.
A set of seemingly unrelated problems to one not having the benefit of this disclosure relates to problems facing religious services and religious organizations. In a technology-driven world, religious services and organizations may struggle to engage with members in meaningful ways. This problem was further exacerbated during the pandemic when in-person religious services may have been cancelled or individuals may have limited attendance. This lack of engagement has limited traditional fundraising for religious organizations and limited charitable contributions.
What is needed are technological solutions for religious organizations which help facilitate engagement with members and enhance fundraising efforts.
Therefore, it is a primary object, feature, or advantage to improve over the state of the art.
It is a further object, feature, or advantage to provide for data management for managing data of religious organizations.
It is a still further object, feature, or advantage to provide for data valuation for religious organizations.
It is another object, feature, or advantage to provide for monetization of data for religious organizations.
A further object, feature, or advantage is to increase or enhance technology-driven engagement of members of religious organizations.
A still further object, feature, or advantage is to enhance fund-raising of religious organizations.
One more of these and/or other objects, features, or advantages will become apparent from the specification and claims that follow. No single embodiment needs to meet or exhibit each and every object, feature, or advantage. Different embodiments may have different objects, features, or advantages.
Embodiments of the present disclosure may include a method for monetizing data for a religious organization, including receiving a selection from a user to monetize data associated with a data object for benefit of a religious organization. Embodiments may also include compiling the data associated with the data object. Embodiments may also include generating a security token including a reference to the data object. Embodiments may also include monetizing the data object utilizing the security token in accordance with the selection. In some embodiments, the data associated with the data object includes data independently obtained from the religious organization associated with the user.
In some embodiments, the security token may be a blockchain-based token utilized by a blockchain platform. In some embodiments, the data object includes one or more profiles associated with the user, a website, an application, or a service. In some embodiments, at least one of the one or more profiles includes the data independently obtained from the religious organization associated with the user.
In some embodiments, the method may include storing the data object in a secure storage associated with the religious organization. Embodiments may also include creating access information to the data object referenced in the security token. In some embodiments, the method may include electronically sending a receipt to the user for contribution of the data associated with the data object.
In some embodiments, the data independently obtained from the religious organization associated with the user may include membership data for the user within the religious organization. In some embodiments, the membership data may include at least one of religious service attendance data and religious organization charitable contribution data for the individual.
In some embodiments, the data independently obtained from the religious organization associated with the user may include engagement data on one or more digital platforms of the religious organization. In some embodiments, the method may include trading the security token on a data exchange in exchange for monetary value.
Embodiments of the present disclosure may also include a method for managing assets of a religious organization, including maintaining a registry of data backed assets of the religious organization. Embodiments may also include providing an interface to access the registry of data backed assets of the religious organization. In some embodiments, entries within the registry of data backed assets includes entries for assets having real estate value, entries corresponding to programmatically defined smart contracts having non-fungible token (NFT) value, and entries having hard asset value.
In some embodiments, the religious organization may be a hierarchical organization including a plurality of subunits. In some embodiments, the interface may be configured to display the data backed assets associated with each of the plurality of subunits. In some embodiments, the entries corresponding to the programmatically defined smart contracts having non-fungible token (NFT) value include security tokens including a reference to a data object including data about a member of the religious organization for which the religious organization has a right to monetize under the smart contracts.
In some embodiments, the data about the member of the religious organization includes data obtained from the religious organization about the member. In some embodiments, the data obtained from the religious organization about the user may include membership data for the user within the religious organization. In some embodiments, the data obtained from the religious organization associated with the user may include engagement data on one or more digital platforms of the religious organization. In some embodiments, the hard asset value includes works of art.
In some embodiments, the membership data may include at least one of religious service attendance data and religious organization charitable contribution data for the member.
Embodiments of the present disclosure may also include a monetization platform for religious organizations including a user interface for recording audio or video of a content creator. Embodiments may also include a plurality of computer systems connected via a network, where the plurality of computer systems, form at least one immutable ledger. Embodiments may also include provide a non-fungible token (NFT) registry, where entries in the NFT registry correspond to programmatically defined smart contracts written to the at least one immutable ledger.
In some embodiments, at least one of the computer systems may be configured as an NFT registry service, where the NFT registry service may be capable of authenticating a representative of the religious organization based in part on input received from the representative of the religious organization through the user interface. Embodiments may also include minting NFTs to the at least one immutable ledger and recording the minted NFT in the NFT registry, where minted NFTs may be cryptographically co-signed by the NFT registry service and an authenticated representative of the religious organization. In some embodiments, the user interface may be configured to display text of at least one of a prayer, a religious song, and a verse of scripture to the content creator during the recording of the audio or the video.
Embodiments of the present disclosure may also include a user device, including a processor. Embodiments may also include a network interface. Embodiments may also include memory containing a software application including a media wallet component. In some embodiments, the processor may be capable of being configured by the media wallet application to securely store non-fungible tokens (NFTs), where each NFT may be associated with a programmatically defined smart contract written to at least one immutable ledger. Embodiments may also include perform transactions for at least one of buying and selling one or more NFT. Embodiments may also include provide a media viewer for accessing content associated with the NFTs. Embodiments may also include providing a user interface for requesting an NFT from a religious organization.
In some embodiments, the interface for requesting the NFT from the religious organization provides for requesting a specific prayer. In some embodiments, the interface for requesting the NFT from the religious organization further provides for requesting the specific prayer be performed by a specific individual or a specific group. In some embodiments, the software application may include a data monetization component configured to receive a selection from a user to monetize data associated with a data object for benefit of a religious organization, the data object containing data associated with the user and to donate monetization of the data to the religious organization.
Various aspects associated with a religious organization's use of data management, valuation, and monetization systems are shown and described herein. Although different embodiments are shown and described, it is to be understood that various embodiments may be combined.
The illustrative embodiments provide a system, method, and platform for tokenizing content for spiritual organizations, Churches, non-profits, and/or religious groups. Content whether real, virtual, or idea-based may be captured in non-fungible tokens, a dedicated cryptocurrency, and/or blockchain tokens. The organization may utilize the tokenized content for charitable contributions, specific projects (e.g., building, water wells, clothing donations, disaster relief, etc.), or other needs. The tokens may also be exchanged for service hours, prayers, in-kind contributions, scripture reading, good works, attendance at services/events, and so forth. One or more exchanges may also be utilized to create value and a market for the tokens. The illustrative embodiments may combine the best practices and outcomes of religious organizations, blockchain, and virtual and augmented reality (e.g., metaverse, virtual platforms, etc.). The additional methods of reaching parishioners, members, and other individuals and fundraising, receiving, donations, or enhancing experiences are very important to various types of organizations.
At 120, the method may include compiling the data associated with the data object. This may include the various types of data previously discussed. In some embodiments, additional data from the religious organization may be included. This may include membership data, attendance data, charitable giving data (e.g., present, historical, etc.), or other data which is independently collected by the religious organization.
At 130, the method may include generating a security token including a reference to the data object. Thus, the data object is now tokenized. This is advantageous in various ways including for security where the data object is encrypted. The resulting security token is portable and tradeable.
At 140, the method may include monetizing the data object utilizing the security token in accordance with the selection. As previously discussed, the data associated with the data object may include data independently obtained from the religious organization associated with the user as well as from the user. Access to this data may be purchased through an exchange or otherwise and may be used according to any applicable limitations set forth in smart contracts associated with the token, policies of the exchange, or otherwise created.
In some embodiments, the security token may be a blockchain-based token utilized by a blockchain platform. In some embodiments, the data object may include one or more profiles associated with the user, a website, an application, or a service. At least one of the one or more profiles may include the data independently obtained from the religious organization associated with the user. In some embodiments, the data independently obtained from the religious organization associated with the user includes engagement data on one or more digital platforms of the religious organization. In some embodiments, the method may include trading the security token on a data exchange in exchange for monetary value.
In some embodiments, the religious organization may be a hierarchical organization comprising a plurality of subunits. The interface may be configured to display the data backed assets associated with each of the plurality of subunits. In some embodiments, the entries corresponding to the programmatically defined smart contracts having non-fungible token (NFT) value may include security tokens including a reference to a data object comprising data about a member of the religious organization for which the religious organization may have a right to monetize under the smart contracts.
In some embodiments, the data about the member of the religious organization may include data obtained from the religious organization about the member. The data obtained from the religious organization about the user may comprise membership data for the user within the religious organization. In some embodiments, the data obtained from the religious organization associated with the user comprises engagement data on one or more digital platforms of the religious organization. In some embodiments, the hard asset value may include works of art.
In some embodiments, the membership data comprises at least one of religious service attendance data and religious organization charitable contribution data for the member.
In some embodiments, at least one of the computer systems 520 may be configured as an NFT registry service, where the NFT registry service may be capable of authenticating a representative of the religious organization based in part on input received from the representative of the religious organization through the user interface 510. At least one of the computer systems may be configured for minting NFTs to the at least one immutable ledger and recording the minted NFT in the NFT registry, where minted NFTs may be cryptographically co-signed by the NFT registry service and an authenticated representative of the religious organization. In some embodiments, the user interface 510 may be configured to display text of at least one of a prayer, a religious song, and a verse of scripture to the content creator during the recording of the audio or the video which is data associated with the NFT.
The inclusion of the cues is an advantage in that they facilitate the performance of the audio or video recording to be associated with an NFT in a timely and efficient manner to eliminate or reduce the need for multiple attempts at audio or video recording, help facilitate personalization, and to assist in providing genuine and authentic performances. In step 904, the performance is recorded. It should be understood that cues may be communicated before and/or during the performance. The resulting video, audio, or images which are recorded may be included in a data object for which a token is created in step 906. This step may be performed using a NFT registry service. In step 908, the data object or a reference to the data object may be stored in a secure and encrypted hash on a block chain.
The data refinery 1202 is utilized to create data objects and capture applicable data to include the data objects as described herein. In one embodiment, the data refinery 1202 may be positioned within the user's existing system to capture data that is already received, entered, gleaned, or otherwise determined by the existing system (e.g., software or systems utilized by a Church or religious organization). The data object may be created to store all, portions, or types of data associated with the user (e.g., Church, charity, religious group, individual, couple, family, company, organization, entity, etc.).
The data vault 1204 is utilized to securely store the data objects and add, modify, and improve the associated data. In one embodiment, the data vault may be utilized to collect, characterize, and value the data. The data vault 1204 may also determine the pace at which new data objects are added or updated as well as the types of data. For example, the data vault 1204 may determine that information relevant to two of the user's clients including company preferences for wireless services and legal services are added to the data vault 1204 each day. The data vault 1204 may be a physical or virtual storage and vault that securely stores information. In one embodiment, the data objects may be deidentified to remove identifying information to prevent hacking, identity theft, and other unwanted or prohibited utilization of data. The data vault 1204 may also assign an initial value for the data object. The value may be associated with similar data, going rates, completeness of the data, the type of data, the user supplying the data, historical information, and so forth. The value may change at any time based on a determination of the platform 1204 (i.e., the data vault or data exchange).
The data exchange 1206 is utilized to price and perform transactions for the data objects. In one embodiment, the data exchange 1206 creates a ticker associated with the data object. The ticker may be associated with the data object(s) for a user. The data exchange 1206 allows the data objects to be priced and purchased. In one embodiment, the exchange may utilize secure tokens to access the data. For example, transactions involving the data may represent a key for accessing the purchased or leased data. For example, the tokens may include an encryption key, password, biometric, or other secure identifier for accessing the data object from the data vault or other stored location.
In some embodiments, the religious organization may have its own cryptocurrency. Where the religious organization has its own cryptocurrency, it may require NFTs to be purchased using its cryptocurrency.
The illustrative embodiments, allow for individuals, groups, or congregations to collectively give as a way to support churches and religious organizations through immediate or passive revenue. For example, a specific prayer token may be generated and minted for an individual, family, purpose, and/or cause that is accompanied by a smart contract for associating donations with the token individual, family, and/or cause. Tokens may be minted for individual contributions or based on groups of contributions with a specified purpose or cause. Money may be sent directly and exclusively to the individual/group/church/cause or portions of the contributions may be shared with the church or other associated parties. The unique data tokenization process may be employed across various different types of congregations, groups, parishioners, participants, or members. The various individuals may elect to share tokenized components of their data profile(s) with advertisers as a passive contribution to the church. Individuals that elect to participate in the data sharing process may be connected with likeminded advertisers, companies, brands, and charities that support causes that are representative of the values of the church or that are approved and authorized partners.
Therefore, various, methods, apparatuses, and systems have been shown and described. Although specific examples have been shown and described, numerous options, variations, and alternatives are contemplated. For example, where specific user interfaces are shown, it is to be understood that these user interfaces may be modified to display or collect additional information through any number of additional user interface components. In addition, user interfaces need not be visual in nature, but may be based on audio input or other types of input, or multi-modal input.
The methods described herein or aspects thereof may be incorporated into software in the form of instructions stored on a non-transitory computer or machine readable medium.
Throughout this specification, plural instances may implement components, operations, or structures described as a single instance. Although individual operations of one or more methods are illustrated and described as separate operations, one or more of the individual operations may be performed concurrently, and nothing requires that the operations be performed in the order illustrated. Structures and functionality presented as separate components in example configurations may be implemented as a combined structure or component. Similarly, structures and functionality presented as a single component may be implemented as separate components. These and other variations, modifications, additions, and improvements fall within the scope of the subject matter herein.
Certain embodiments may be described herein as implementing mathematical methodologies including logic or a number of components, modules, or mechanisms. Modules may constitute either software modules (e.g., code embodied on a machine-readable medium or in a transmission signal) or hardware modules. A hardware module is tangible unit capable of performing certain operations and may be configured or arranged in a certain manner. In example embodiments, one or more computer systems (e.g., a standalone, client or server computer system) or one or more hardware modules of a computer system (e.g., a processor or a group of processors) may be configured by software (e.g., an application or application portion) as a hardware module that operates to perform certain operations as described herein.
In various embodiments, a hardware module may be implemented mechanically or electronically. For example, a hardware module may comprise dedicated circuitry or logic that is permanently configured (e.g., as a special-purpose processor, such as a field programmable gate array (FPGA) or an application-specific integrated circuit (ASIC)) to perform certain operations. A hardware module may also comprise programmable logic or circuitry (e.g., as encompassed within a general-purpose processor or other programmable processor) that is temporarily configured by software to perform certain operations. It will be appreciated that the decision to implement a hardware module mechanically, in dedicated and permanently configured circuitry, or in temporarily configured circuitry (e.g., configured by software) may be driven by cost and time considerations.
Accordingly, the term “hardware module” should be understood to encompass a tangible entity, be that an entity that is physically constructed, permanently configured (e.g., hardwired), or temporarily configured (e.g., programmed) to operate in a certain manner or to perform certain operations described herein. As used herein, “hardware-implemented module” refers to a hardware module. Considering embodiments in which hardware modules are temporarily configured (e.g., programmed), each of the hardware modules need not be configured or instantiated at any one instance in time. For example, where the hardware modules comprise a general-purpose processor configured using software, the general-purpose processor may be configured as respective different hardware modules at different times. Software may accordingly configure a processor, for example, to constitute a particular hardware module at one instance of time and to constitute a different hardware module at a different instance of time.
Hardware modules can provide information to, and receive information from, other hardware modules. Accordingly, the described hardware modules may be regarded as being communicatively coupled. Where multiple of such hardware modules exist contemporaneously, communications may be achieved through signal transmission (e.g., over appropriate circuits and buses) that connect the hardware modules. In embodiments in which multiple hardware modules are configured or instantiated at different times, communications between such hardware modules may be achieved, for example, through the storage and retrieval of information in memory structures to which the multiple hardware modules have access. For example, one hardware module may perform an operation and store the output of that operation in a memory device to which it is communicatively coupled. A further hardware module may then, at a later time, access the memory device to retrieve and process the stored output. Hardware modules may also initiate communications with input or output devices, and can operate on a resource (e.g., a collection of information).
The various operations of example methods described herein may be performed, at least partially, by one or more processors that are temporarily configured (e.g., by software) or permanently configured to perform the relevant operations. Whether temporarily or permanently configured, such processors may constitute processor-implemented modules that operate to perform one or more operations or functions. The modules referred to herein may, in some example embodiments, comprise processor-implemented modules. Where the term “processor” is used, it is to be understood that it encompasses one or more processors whether located together or remote from one other.
Similarly, the methods described herein may be at least partially processor implemented. For example, at least some of the operations of a method may be performed by one or more processors or processor-implemented hardware modules. The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the processor or processors may be located in a single location, while in other embodiments the processors may be distributed across a number of locations.
The one or more processors may also operate to support performance of the relevant operations in a “cloud computing” environment or as a “software as a service” (SaaS). For example, at least some of the operations may be performed by a group of computers (as examples of machines including processors), these operations being accessible via a network (e.g., the Internet) and via one or more appropriate interfaces (e.g., application program interfaces (APIs).)
The performance of certain of the operations may be distributed among the one or more processors, not only residing within a single machine, but deployed across a number of machines. In some example embodiments, the one or more processors or processor-implemented modules may be located in a single geographic location. In other example embodiments, the one or more processors or processor-implemented modules may be distributed across a number of geographic locations.
Some portions of this specification are presented in terms of algorithms or symbolic representations of operations on data stored as bits or binary digital signals within a machine memory (e.g., a computer memory). These algorithms or symbolic representations are examples of techniques used by those of ordinary skill in the data processing arts to convey the substance of their work to others skilled in the art. As used herein, an “algorithm” is a self-consistent sequence of operations or similar processing leading to a desired result. In this context, algorithms and operations involve physical manipulation of physical quantities. Typically, but not necessarily, such quantities may take the form of electrical, magnetic, or optical signals capable of being stored, accessed, transferred, combined, compared, or otherwise manipulated by a machine. It is convenient at times, principally for reasons of common usage, to refer to such signals using words such as “data,” “content,” “bits,” “values,” “elements,” “symbols,” “characters,” “terms,” “numbers,” “numerals,” or the like. These words, however, are merely convenient labels and are to be associated with appropriate physical quantities.
Unless specifically stated otherwise, discussions herein using words such as “processing,” “computing,” “calculating,” “determining,” “presenting,” “displaying,” or the like may refer to actions or processes of a machine (e.g., a computer) that manipulates or transforms data represented as physical (e.g., electronic, magnetic, or optical) quantities within one or more memories (e.g., volatile memory, non-volatile memory, or a combination thereof), registers, or other machine components that receive, store, transmit, or display information.
As used herein any reference to “one embodiment” or “an embodiment” means that a particular element, feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment. The appearances of the phrase “in one embodiment” in various places in the specification are not necessarily all referring to the same embodiment.
As used herein, the terms “comprises,” “comprising,” “includes,” “including,” “has,” “having” or any other variation thereof, are intended to cover a non-exclusive inclusion. For example, a process, method, article, or apparatus that comprises a list of elements is not necessarily limited to only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Further, unless expressly stated to the contrary, “or” refers to an inclusive or and not to an exclusive or. For example, a condition A or B is satisfied by any one of the following: A is true (or present), and B is false (or not present), A is false (or not present), and B is true (or present), and both A and B are true (or present).
In addition, use of the “a” or “an” are employed to describe elements and components of the embodiments herein. This is done merely for convenience and to give a general sense of the disclosure. This description should be read to include one or at least one and the singular also includes the plural unless it is obvious that it is meant otherwise.
The terms “first,” “second,” “third,” “fourth,” and the like in the description and in the claims, if any, are used for distinguishing between similar elements and not necessarily for describing a particular sequential or chronological order. It is to be understood that the terms so used are interchangeable under appropriate circumstances such that the embodiments described herein are, for example, capable of operation in sequences other than those illustrated or otherwise described herein. Similarly, if a method is described herein as comprising a series of steps, the order of such steps as presented herein is not necessarily the only order in which such steps may be performed, and certain of the stated steps may possibly be omitted and/or certain other steps not described herein may possibly be added to the method.
As used herein, a plurality of items, structural elements, compositional elements, and/or materials may be presented in a common list for convenience. However, these lists should be construed as though each member of the list is individually identified as a separate and unique member. Thus, no individual member of such list should be construed as a de facto equivalent of any other member of the same list solely based on their presentation in a common group without indications to the contrary.
Reference throughout this specification to “an example” means that a particular feature, structure, or characteristic described in connection with the example is included in at least one embodiment. Thus, appearances of the phrases “in an example” in various places throughout this specification are not necessarily all referring to the same embodiment.
This application claims priority to U.S. Provisional Patent Application No. 63/380,348, filed on Oct. 20, 2022 and entitled “METHOD FOR MONETIZING DATA FOR A RELIGIOUS ORGANIZATION”, hereby incorporated by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
63380348 | Oct 2022 | US |