The present disclosure relates to systems and method for tracking and authenticating data.
Data comes in many forms and from many different sources. However, tracking data and authenticating data can be complicated and difficult when the data transfers between user, systems and networks.
The investment sector currently does not provide a means of enabling outside investors to invest in private companies who desire no exit strategy and wish to stay sovereign. There is the rare occasion where 1-2 individuals can provide the $1-10 mm startup funding; however, this is an exception. All other current investment models and funds insist upon an exit strategy, which does not serve all inventors who wish to retain control of their IP and their company.
The investment sector currently does not provide a means for venture capital or private equity firms or funds (VCs, PEs) to invest in private, sovereign companies that intend to remain sovereign. Again, these firms consistently insist upon an exit strategy to provide investor return, which is often in conflict with inventor goals and desires to stay sovereign.
The investment sector currently does not provide any way for corporations to invest in private companies, and therefore entirely impedes their ability to access private, oftentimes highly disruptive technologies.
Overall, inventors are generally not prioritized, protected or honored with current investment and VC/PE models. They almost always must eventually sell out or lose their company in order to gain access to initial seed capital or mezzanine level financing. Banks do not fill this void, as their loan parameters often remain untenable for many inventors. The result is an inappropriate and often tragic demand that is inflicted upon inventors, which dishonors us all as it disrespects human creativity at its core.
A new entity or tool is called for in the investment industry. The new entity, the Sovereign Revenue Trust Entity (SRTE), will change the above dynamics. This entity provides an alternative to the venture capital (VC) model for inventors, and is needed to enable synergies and mutually beneficial dynamics to occur within our investment and entrepreneurial communities which are currently implausible based on our current structures.
The value of a company is directly reflected in its share price, which is based on the profitability of that company. However, the investment industry has insisted upon only one avenue for offering an ROI for investors, which necessitates the sale of the IP or the company at some future point. If a company's value is determined based on profitability, why must we tie the initial investment to an indicator that is only a mirror of that value, which also necessitates additional negative collateral effects for the inventor. The SRTE can enable investors to directly benefit from profits without a forced sale of the company. The value doesn't change, but suddenly a new opportunity presents itself, and investors, VC's and corporations are enabled to participate in areas and technologies they never could have prior to the creation of the SRTE.
The SRTE entity represents a “special purpose entity/vehicle” and acts as a limited co-founder of the company with exclusive limited negotiated rights to revenue/profit share to its investors, VC's or PE's. In the case of a Corporation, the SRTE will enable corporate investment and negotiated access to use of the private technology, with no access to the IP or ownership of the private company. The SRTE enables the above four scenarios to be resolved, which could never exist if the SRTE was not created. The SRTE acts as a “Chinese Wall”, which enables a private company to therefore raise funds, while maintaining its independent sovereignty in all cases
The SRTE also dramatically diminishes potential dilution, or current dilution as investors move from ownership of the company to direct participants in profits created by the technology. Outside investors will suddenly have access to the revenues of a private company they would never have access to under any other circumstance.
Investors gain their return thru a direct share in revenues/profits, verses a merger/acquisition or an IPO. As all share value is ultimately derived from the profitability of a company, sharing directly in profits cuts through the other cumbersome demands that are not necessary for shareholder return.
The SRTE prevents the need for a private company to sell to a larger acquirer and therefore prevents the downstream problem of the “too big to fail” scenario which has led to global financial instability, monopoly and corruption by ending the need to incentivize larger firms to continually purchase smaller firms until only a few giant players remain.
VC's often times cannot invest or do not have the opportunity to invest in private companies. This offers a new investment piece of the pie currently unavailable to VC investors. Investors would incur the same risk as any high-risk investment, but may contribute in a higher return potentiality should the SRTE be well negotiated.
Inventors often resist VC's as they often take a great deal of the ownership of the company to raise the needed funds, and oftentimes avoid VC's, as they are often renowned for negotiating too aggressively for control of the company.
There is no broker dealer dynamic applicable as there are no securities being traded or purchased. If investors want to invest in a private company and negotiate a share in revenues as a partner within the SRTE which is a co-founder of the company, that is their prerogative. Regardless, the SRTE opportunity will honor current Regulation D parameters regarding qualified investors.
This vehicle would provide VC/PE firms and their investors access to invest in heretofore unavailable private companies and technologies.
This would be an additional offering for broker/dealers, VC/PE's to bring their clients to deals they would normally have no access to, if they chose to offer an SRTE to their clients.
This investment structure would contribute to greater global economic stability.
To accomplish the objectives of providing a vehicle for individuals to support the development, deployment, and commercialization of a promising technology, while allowing the innovators continued autonomy in their development, deployment, and commercialization decisions, it is necessary to provide a means to track a level of support to such development, deployment, and commercialization efforts, while isolating such support from control over the entity into which the support is to flow.
Another important factor is ensuring that the value associated with such support and/or the accrual is recognized at a future point in time when the entity into which such support has been provided grows, is revalued, is acquired or raises additional funding.
An important aspect of associating a value to such support is being able to track such value, ensure that such value is recognized and accepted by others, and enabling such value to be fungible, i.e., exchanged, traded, sold, transferred, and passed on to others. To enable such a capability, there must be a method and system for documenting or recognizing such support, or creating an artifact that represents the value of such support. In addition to creating such an artifact, there also must be a method and system for the authentication of such artifact, and a confirmation of value of such artifact.
A method for creating such artifact includes generating a token that represents the support provided. Such support is represented by one or more set of data. For example, the token may be associated with a set of data relating to a point in time when such support was provided and/or with a set of data relating to a level of the support provided. The token may also be associated with a set of data relating to an imputed value of the assets underlying the entity into which the support is being provided. In one or more embodiments, the assets owned by the entity are represented by a first set of data. Other factors or sets of data that may be incorporated into the valuation process include a size of a market associated with the first set of data, a skill set of a management team associated with the first set of data, or a competitive landscape associated with the first set of data.
In one or more embodiments, the SRTE may place certain restrictions on transferring or exchanging the first key or any keys or tokens. For example, one restriction is that the holder of the key or token must return or transfer some of the value received back to the SRTE or the company or parent company. This provides that any accrual in value is recognized as having been accomplished by the hard work of the company or entity and provides additional funding to the company or entity to allow it to continue to grow and succeed.
In one or more embodiments, investment into the SRTE may include corporations or strategic investors. One limitation that may be imposed to ensure that the technology being developed by the company is not improperly used or misappropriated by the corporations or strategic investors is for the agreement to include a penalty for such theft, improper use, or misappropriation, such as, for example, an agreed upon damages multiplier, such as an automatic treble damages or 5× damages award upon a determination of misappropriation.
In one or more embodiments, the investors in the SRTE may trade revenue share or cash flow in the early years of the company's growth for a larger payout in later years. This benefits the company by allowing the company to retain growth capital in its early years when such capital is more expensive, harder to come by and more urgently needed, in exchange for a payout of a larger amount of revenue in later years when the company is less likely to need such capital, or if needed, other sources of capital will be more readily available when the company is in a later stage of operation and growth.
In one or more embodiments, each factor underlying the valuation is automatically assigned a weighting based on an algorithm that automatically factors various objective criteria based on one or more databases or repositories of information. For example, assuming the assets comprise intellectual property rights such as patents, trademarks, and copyrights, the imputed value of those assets may be determined by an algorithm that identifies other patents that cite the patents being valued, or during the prosecution of which the patents being values are cited against such patents.
Depending on the size of the entity against whose patent the patents being valued were cited, the number of patents against which the patents being valued were cited, and/or the basis for the citation of the patents being valued, the algorithm sets a value and a weighting relating to such assets. Other valuation techniques can be applied to automatically assign a value and weighting to such assets. For example, the valuation may be based on a selling price of patents covering a similar technology, or based on a damages award in an infringement lawsuit relating to patents or similar patents addressing a similar market or product. It may also be based on a valuation of a company having a similar size or scope of patent portfolio. Another valuation method may be based on the average royalty rates in a particular industry or market or royalty rates paid for similar patents.
In one or more embodiments, the valuation may be based on the current value, future value, projected value, or net present value of one or more asset owned by or controlled by the company. For example, where the assets are real estate or mineral deposits owned by the company, the valuation may be based on the current value of such assets, a future value of such assets at a predetermined point in time, a projected value of such assets or a net present value of such assets.
In other embodiments, the valuation may be based on a value of a product being made, sold, offered for sale, or being developed by the entity, such as, for example, a software application, a pharmaceutical product, a medical device, an electronic device, a telecommunication device, a piece of sports equipment, or some other product. In yet other embodiments, the valuation may be based on a service being provided by the entity or that will be provided by the entity, such as, for example, a SaaS application, a music or video download or streaming service, or a social networking website or community. In still other embodiments, the valuation may be based on advertising sales or revenue, or referral fees, generated by the entity.
In one or more embodiments, the valuation of the entity may be based on a size of a market associated with the first set of data. For example, where the first set of data relates to an anti-lung cancer drug, or drug for treating melanoma developed by the entity, the size of the market may be very large, as compared to an orphan drug, for example, used for treating a rare form of cancer. Another example is where the first set of data corresponds to a telecommunication technology, where the size of the market may be very large. In situations where the market is very large, the valuation would correlate to such market size.
In one or more embodiments, the valuation may be tied to a skill set of a management team associated with the first set of data. For example, where the management team associated with the first set of data or with the entity has been successful with respect to one or more prior entities in which they were involved, or if they successfully sold a prior entity or took an entity public through an IPO, it is likely that the valuation of the new entity would be higher than if the management team was not involved in such activities, or if the entity is the first entrepreneurial project in which the management team is involved.
In one or more embodiments, the valuation may be tied to a competitive landscape associated with the first set of data or with the entity. For example, if there are many competitors in the marketplace for the particular product being offered by the entity, the valuation may be lower as compared to a product for which there are fewer competitors or which the entity can provide at a better quality, lower cost, or with better customer support. Further, to the extent that a risk of defensive litigation arises based on third party intellectual property rights, the valuation may also be reduced
To ensure that the value associated with the token is appropriately determined, an independent determination as to the value of the token is undertaken. This is accomplished by an independent third party determining a value or adjustment of the value of items represented by the various sets of data. When the reassessment of value is completed, the token is regenerated and associated with the adjusted or revised valuation. The reassessment may be based on various criteria determined at the discretion of the independent third party and may be based on objective criteria and/or subjective criteria. The criteria and the adjustment to the valuation is based on one or more algorithms applied by the independent third party.
In one or more embodiments, the token may be generated by applying one or more algorithm to the one or more data set. In one or more other embodiments, the token may be generated by applying one or more algorithm to the type or level of support provided, or to the imputed value of the assets underlying the entity into which the support is being provided. The one or more algorithm may also be applied to the point in time when the support was provided or to the set of data relating to the level of the support provided. In one or more embodiments, the token may be generated by applying one or more algorithms to the first set of data. The one or more algorithm may be an algorithm, such as, for example, a hashing function/algorithm, such as, for example, SHA-2, SHA-3, BLAKE2, ECOH, FSB, GOST, HAS-160, NAVAL, Kupyna, LM hash, MD2, MD4, MD6, MDC-2, N-Hash, RIPEMD, RadioGatún, SWIFFT, Snefru, Streebog, Tiger, VSH, WHIRLPOOL, among others.
After the token is created, the token is uniquely associated with the entity for which support was provided. The token is then isolated from the entity such that the token and the entity or person possessing or associated with the token does not exert any influence over the entity. The goal is to isolate the entity from influence by the person or entity that possesses or that is associated with the token. In one or more embodiments, this isolation includes isolating the person or entity possessing or controlling, or that is associated with the token from the management and direction of the entity. In one or more embodiments, the isolation includes not allowing the token holder to be involved in the development, deployment, and commercialization efforts of the entity.
According to one or more embodiments of a method for authenticating data, a value is assigned to a first set of data at a first point in time, wherein the value is automatically determined based on at least one of an imputed value of a pool of assets associated with the first set of data, a size of a market associated with the first set of data, a skill set of a management team associated with the first set of data, or a competitive landscape associated with the first set of data. The value of the first set of data is adjusted based on an independent third party evaluation at or near the first point in time. A first key is generated using an algorithm that produces a unique identifier from the first set of data, the first point in time, and the adjusted value. A copy of the unique identifier is stored in a first location in a database. The first set of data is stored in a second location in the database. The first point in time is stored in a third location in the database, and the adjusted value is stored in a fourth location in the database. A first pointer that identifies the first location in the database is generated, and the first pointer correlates the first location in the database to the second location in the database. A second pointer that correlates the first location in the database to the third location in the database is also generated, as is a third pointer that correlates the first location in the database to the fourth location in the database. The first key is associated with the first pointer, the second pointer, and the third pointer. The first key is isolated from the first set of data, such that the transfer and/or ownership of the first key does not affect the adjusted value of the first set of data. The first key is transferred to a first user. The first key is authenticated using the first pointer, the second pointer, and the third pointer.
In one or more embodiments, the first pointer is used to locate the unique identifier and the first set of data. In one or more other embodiments, the second pointer is used to locate the unique identifier and the first point in time. In one or more further embodiments, the third pointer is used to locate the unique identifier and the adjusted value.
In one or more embodiments, the adjusted value of the first set of data is further adjusted based on an independent third party evaluation at or near a second point in time. In one or more embodiments, a net present value is transferred to the first user based on the further adjusted value of the first key at or near the second point in time based on an exchange or redemption of the first key by the first user at the second point in time.
In one or more embodiments, a system for authenticating data, comprises a server, including a microprocessor, a memory and a database, wherein a first set of data is stored in the database, and wherein the memory includes instructions that cause the microprocessor to assign a value to the first set of data at a first point in time, wherein the value is automatically determined based on at least one of an imputed value of a pool of assets associated with the first set of data, a size of a market associated with the first set of data, a skill set of a management team associated with the first set of data, or a competitive landscape associated with the first set of data. The microprocessor also adjusts the value of the first set of data based on an independent third party evaluation at or near the first point in time, generates a first key, wherein the first key is generated using an algorithm that produces a unique identifier from the first set of data, the first point in time, and the adjusted value, stores a copy of the unique identifier in a first location in a database, stores the first set of data in a second location in the database, stores the first point in time in a third location in the database, stores the adjusted value in a fourth location in the database. The microprocessor further generates a first pointer that identifies the first location in the database and correlates the first location in the database to the second location in the database, generate a second pointer that correlates the first location in the database to the third location in the database, generate a third pointer that correlates the first location in the database to the fourth location in the database, and associates the first key with the first pointer, the second pointer, and the third pointer. The microprocessor also isolates the first key from the first set of data, such that the transfer and/or ownership of the first key does not affect the adjusted value of the first set of data. The first key is transferred to a first user. The system authenticates the first key using the first pointer, the second pointer, and the third pointer.
The set of accompanying illustrative drawings shows various example embodiments of this disclosure. Such drawings are not to be construed as necessarily limiting this disclosure. Like numbers and/or similar numbering scheme can refer to like and/or similar elements throughout.
This disclosure is now described more fully with reference to the set of accompanying illustrative drawings, in which example embodiments of this disclosure are shown. This disclosure can be embodied in many different forms and should not be construed as necessarily being limited to the example embodiments disclosed herein. Rather, the example embodiments are provided so that this disclosure is thorough and complete, and fully conveys various concepts of this disclosure to those skilled in a relevant art.
Features described with respect to certain example embodiments can be combined and sub-combined in and/or with various other example embodiments. Also, different aspects and/or elements of example embodiments, as disclosed herein, can be combined and sub-combined in a similar manner as well. Further, some example embodiments, whether individually and/or collectively, can be components of a larger system, wherein other procedures can take precedence over and/or otherwise modify their application. Additionally, a number of steps can be required before, after, and/or concurrently with example embodiments, as disclosed herein. Note that any and/or all methods and/or processes, at least as disclosed herein, can be at least partially performed via at least one entity in any manner.
Various terminology used herein can imply direct or indirect, full or partial, temporary or permanent, action or inaction. For example, when an element is referred to as being “on,” “connected” or “coupled” to another element, then the element can be directly on, connected or coupled to the other element and/or intervening elements can be present, including indirect and/or direct variants. In contrast, when an element is referred to as being “directly connected” or “directly coupled” to another element, there are no intervening elements present.
Although the terms first, second, etc. can be used herein to describe various elements, components, regions, layers and/or sections, these elements, components, regions, layers and/or sections should not necessarily be limited by such terms. These terms are used to distinguish one element, component, region, layer or section from another element, component, region, layer or section. Thus, a first element, component, region, layer, or section discussed below could be termed a second element, component, region, layer, or section without departing from various teachings of this disclosure.
Various terminology used herein is for describing particular example embodiments and is not intended to be necessarily limiting of this disclosure. As used herein, various singular forms “a,” “an” and “the” are intended to include various plural forms as well, unless a context clearly indicates otherwise. Various terms “comprises,” “includes” and/or “comprising,” “including” when used in this specification, specify a presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence and/or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.
As used herein, a term “or” is intended to mean an inclusive “or” rather than an exclusive “or.” That is, unless specified otherwise, or clear from context, “X employs A or B” is intended to mean any of a set of natural inclusive permutations. That is, if X employs A; X employs B; or X employs both A and B, then “X employs A or B” is satisfied under any of the foregoing instances.
Example embodiments of this disclosure are described herein with reference to illustrations of idealized embodiments (and intermediate structures) of this disclosure. As such, variations from various illustrated shapes as a result, for example, of manufacturing techniques and/or tolerances, are to be expected. Thus, various example embodiments of this disclosure should not be construed as necessarily limited to various particular configurations of systems illustrated herein, but are to include deviations in configuration that result, for example, from selection of components.
Unless otherwise defined, all terms (including technical and scientific terms) used herein have the same meaning as commonly understood by one of ordinary skill in an art to which this disclosure belongs. Various terms, such as those defined in commonly used dictionaries, should be interpreted as having a meaning that is consistent with a meaning in a context of a relevant art and should not be interpreted in an idealized and/or overly formal sense unless expressly so defined herein.
Furthermore, relative terms such as “below,” “lower,” “above,” “upper,” “first,” “second,” and “third” can be used herein to describe one element's relationship to another element as illustrated in the set of accompanying illustrative drawings. Such relative terms are intended to encompass different orientations of illustrated technologies in addition to an orientation depicted in the set of accompanying illustrative drawings. For example, if a device in the set of accompanying illustrative drawings were turned over, then various elements described as being on a “lower” side of other elements would then be oriented on “upper” sides of other elements. Similarly, if a device in one of illustrative figures were turned over, then various elements described as “below” or “beneath” other elements would then be oriented “above” other elements. Therefore, various example terms “below” and “lower” can encompass both an orientation of above and below.
As used herein, a term “about” and/or “substantially” refers to a +/−10% variation from a nominal value/term. Such variation is always included in any given value/term provided herein, whether or not such variation is specifically referred thereto.
If any disclosures are incorporated herein by reference and such disclosures conflict in part and/or in whole with this disclosure, then to an extent of a conflict, if any, and/or a broader disclosure, and/or broader definition of terms, this disclosure controls. If such disclosures conflict in part and/or in whole with one another, then to an extent of a conflict, if any, a later-dated disclosure controls.
As shown in
As shown in
As shown in
In one or more embodiments, the contractual arrangement between the parent company 200 and the SRTE 100 requires that the SRTE 100 be listed as a beneficiary in some or all of the agreements entered into by the parent company 200. In such a situation, that relationship is depicted in
In one or more embodiments, as shown in
In one or more embodiments, the contractual arrangement between the parent company 200 and the SRTE 100 requires that the SRTE 100 be listed as a beneficiary in some or all of the agreements entered into by the parent company 200. In such a situation, that relationship is depicted in
To remain attractive any investment vehicle must be fungible, including for purposes of exchanging, trading, or selling an investment, it must be traceable, and it must have some recognized and accepted value, or recognized as representing a value. In addition the investment vehicle should be manageable, traceable and authenticatable over time. This is particularly true in situations where the SRTE's goal is to generate interest in investing in the success of the parent company.
To remain attractive, the revenue share offered and distributed by the SRTE must, therefore, correlate to some imputed value that remains traceable over time and that can be authenticated. It also must retain its value assuming the revenues attributable to the assets continue to be generated. To remain viable, the SRTE must generate or issue some representation of value attributable to each investor in the SRTE based on the level of their investments in the SRTE. To retain its value and attain acceptance in the marketplace, the representation of value must also be authenticatable and traceable in order to support a secondary market for the representation of value.
As shown in
When the valuation and evaluation are completed, in step 506, a first key is generated. In one or more embodiment, the first key is generated using an algorithm that produces a unique identifier from the first set of data, the first point in time, and the adjusted value. In step 508, a copy of the unique identifier is stored in a first location in a database. The database is described further below with respect to the system. In step 510, the first set of data is stored in a second location in the database. Alternatively, the first set of data may be stored in a second database that is independent of the first database. In step 512, the first point in time is stored in a third location in the database. Alternatively, the first point in time may be stored in a second or third database. In step 514, the adjusted value is stored in a fourth location in the database. Alternatively, the adjusted value may be stored in a second, third or fourth database.
After these various items are stored in one or more databases, in step 516, a first pointer is generated. The first pointer identifies the first location in the database and correlates the first location in the database to the second location in the database. Alternatively, the first pointer identifies the first location in the first database and correlates the first location in the first database to the second location in the second database. In step 518, a second pointer is generated. The second pointer correlates the first location in the database to the third location in the database. Alternatively, the second pointer correlates the first location in the first database to the third location in the third database or some other database. In step 520, a third pointer is generated. The third pointer correlates the first location in the database to the fourth location in the database. Alternatively, the third pointer correlates the first location in the first database to the fourth location in the fourth database or some other database. After generation of the first pointer, the second pointer and the third pointer, in step 522, the first key is associated with the first pointer, the second pointer, and the third pointer.
In order to maintain the independence of the parent company from the SRTE, the representation of value that is associated with the assets of the parent company should relate to the SRTE but should be isolated from the parent company. This is accomplished in step 524, where the first key is isolated from the first set of data. The isolation is accomplished such that the transfer or ownership of the first key does not affect the adjusted value of the first set of data. In step 526, the first key is transferred to a first user. The first key allows the first user to maintain an interest in the SRTE that is isolated from the parent company.
In step 528, the first key is authenticated. This authentication is accomplished using the first pointer, the second pointer, and the third pointer. The authentication allows the first user to derive a return or value from the retention or ownership of the first key and the initial investment in the SRTE that is associated with the parent company and the revenue stream generated by the assets owned by the parent company.
In one or more embodiments, the first pointer is used to locate the unique identifier and the first set of data. In one or more embodiments, the second pointer is used to locate the unique identifier and the first point in time. In one or more embodiments, the third pointer is used to locate the unique identifier and the adjusted value.
In one or more embodiments, in step 530 the adjusted value of the first set of data is further adjusted based on an independent third party evaluation at or near a second point in time. In one or more embodiments, a net present value of the first key is transferred to the first user in exchange for or redemption of the first key by the first user at the second point in time based on the further adjusted value of the first set of data at or near the second point in time.
In one or more embodiments, the pool of assets that are represented by the first set of data include an intellectual property portfolio.
A system according one or more embodiments is shown in
The server 602a can be hardware-based and/or software-based. The server 602a is and/or is hosted on, whether directly and/or indirectly, a server computer, whether stationary or mobile, such as a workstation, a desktop, a laptop, a tablet, a mainframe, a supercomputer, a server farm, and so forth. The server computer can be touchscreen enabled and/or non-touchscreen enabled. The server computer can include and/or be a part of another computer system and/or a cloud computing network. The server computer can run any type of operating system (OS), such as iOS®, Windows®, Android®, Unix®, Linux® and/or others. The server computer can include and/or be coupled to, whether directly and/or indirectly, an input device, such as a mouse, a keyboard, a camera, whether forward-facing and/or back-facing, a touchscreen, a biometric reader, a clicker, and/or a microphone. The server computer can include and/or be coupled to, whether directly and/or indirectly, an output device, such as a display, a speaker, a headphone, and/or a printer. In some embodiments, the input device and the output device can be embodied in one unit. The server computer can include circuitry for global positioning determination, such as via a global positioning system (GPS), a signal triangulation system, and so forth. The server computer can be equipped with near-field-communication (NFC) circuitry. The server computer can host, run, and/or be coupled to, whether directly and/or indirectly, database 605 or database 606a, such as a relational database or a non-relational database, which can feed data to the server 602a, whether directly and/or indirectly.
Network 608 may be any size network and may include a plurality of nodes, such as a collection of computers and/or other hardware interconnected via a plurality of communication channels, which allow for sharing of resources and/or information. Such interconnection can be direct and/or indirect. Network 608 can be wired and/or wireless. The network 608 can allow for communication over short and/or long distances, whether encrypted and/or unencrypted. The network 608 can operate via at least one network protocol, such as Ethernet, a Transmission Control Protocol (TCP)/Internet Protocol (IP), and so forth. The network 608 can have any scale, such as a personal area network, a local area network, a home area network, a storage area network, a campus area network, a backbone network, a metropolitan area network, a wide area network, an enterprise private network, a virtual private network, a virtual network, a satellite network, a computer cloud network, an internetwork, a cellular network, and so forth. The network 608 can be and/or include an intranet and/or an extranet. The network 608 can be and/or include Internet. The network 608 can include other networks and/or allow for communication with other networks, whether sub-networks and/or distinct networks, whether identical and/or different from the network 608. The network 608 can include hardware, such as a computer, a network interface card, a repeater, a hub, a bridge, a switch, an extender, and/or a firewall, whether hardware based and/or software based. The network 608 can be operated, directly and/or indirectly, by and/or on behalf of one and/or more entities, irrespective of any relation to contents of the present disclosure.
In one or more embodiments, server 602a and the client on server 602a, via the microprocessor 603, a transmitter, transceiver, and/or communication port, may be in communication with network 608, such as directly and/or indirectly, selectively and/or unselectively, encrypted and/or unencrypted, wired and/or wireless, via contact and/or contactless. Such communication can be via a software application, a software module, a mobile app, a browser, a browser extension, an OS, and/or any combination thereof. For example, such communication can be via a common framework/API, such as HTTPS.
The database 605 or 606a stores a first set of data. The memory 604 includes instructions that cause the microprocessor 603 to take certain actions. The microprocessor 603 assigns a value to the first set of data at a first point in time, wherein the value is automatically determined based on at least one of an imputed value of a pool of assets associated with the first set of data, a size of a market associated with the first set of data, a skill set of a management team associated with the first set of data, or a competitive landscape associated with the first set of data. The value of the first set of data is adjusted based on an independent third party evaluation at or near the first point in time.
Looking now at
Upon generation of the first key, the microprocessor 603, at step 702, stores a copy of the unique identifier in a first location in the database 605 or database 606a. At step 704, the microprocessor 603 also stores the first set of data in a second location in the database 605 or database 606a, the first point in time in a third location in the database 605 or database 606a, and the adjusted value in a fourth location in the database 605 or database 606a. To ensure that the first set of data, the first point in time, and the adjusted value will be locatable and correlated one to the other, in step 706, the microprocessor 603 generates a first pointer that identifies the first location in the database 605 or database 606a, and correlates the first location in the database 605 or database 606a to the second location in the database 605 or database 606a. In step 708, the microprocessor 603 also generates a second pointer that correlates the first location in the database 605 or database 606a to the third location in the database 605 or database 606a, and generates a third pointer that correlates the first location in the database 605 or database 606a to the fourth location in the database 605 or database 606a. The microprocessor 603 further associates the first key with the first pointer, the second pointer, and the third pointer, in step 710, and isolates the first key from the first set of data, such that the transfer and/or ownership of the first key does not affect the adjusted value of the first set of data.
Looking now at
According to one or more embodiments, the first key is authenticated using the first pointer, the second pointer, and the third pointer. Each of the first pointer, the second pointer, and the third pointer that were generated by the microprocessor 603 and retained by the system are recalled and used to locate the unique identifier and the first set of data associated with the unique identifier, the first point in time associated with the first set of data, and the adjusted value associated with the first point in time.
Once the authentication is complete, the transaction involving the first key will be a trusted transaction as other users will be able to associate the first set of data, which represents certain assets of the company, with the adjusted value at the first point in time. Based on that adjusted value and the first set of data, at step 806, a new value will be able to be generated such that a new value will be associated with the first key at the second point in time, i.e., at the time of the transaction involving the first key.
For example, the first set of data may represent a particular revenue stream or percentage of revenue generated by the parent company or by certain assets of the parent company. The first set of data may also represent a particular adjusted value associated therewith at a first point in time, such as, for example, at the time that the agreement providing for the particular revenue stream or percentage of revenue generated by the parent company is concluded by the parent company and the SRTE. At the second point in time, for example, when the first key is being transferred, the first set of data may represent a new value greater than the adjusted value associated with the first set of data at the first point in time. This may be the case where, for example, the revenues generated by the parent company are in excess of the amounts contemplated or projected at the first point in time. In such a situation, the first key may have a greater value at the second point in time.
In one or more embodiments, the system includes a plurality of servers, including, for example, servers 602a, 602b, and 602c. Each of the servers generates keys associated with sets of data relating to a parent company, such as, for example, parent company 1, parent company 2, and parent company 3. In this embodiment, SRTE 1 is associated with parent company 1 and server 602a; SRTE 2 is associated with parent company 2 and server 602b; and SRTE 3 is associated with parent company 3 and server 602c, as depicted in
Each of the first key, the second key and the third key are transmitted to a server 610, which is controlled and managed by one or more exchanges. The server 610 provides for the trading or exchange of keys, including the first key, the second key, and the third key. Keys may be exchanged and the differences in values between the keys may be maintained in a ledger system or covered by a transfer of value in some other form, such as financial products, commodities, assets, real estate, cash, futures, services, or some other form of value. The value associated with each key is accepted by the server 610 based on the authentication of the key as described above. The authentication of a key may be accomplished by the server 610, through certain access privileges to the server associated with the key. For example, to authenticate the first key, server 602a allows server 620 to access the database 605 or database 606a and the first pointer, second pointer and third pointer, such that the server 610 may identify the first set of data, the adjusted value, and the first point in time. Server 610 will use this information to authenticate the first key and to determine the value associated with the first key at the first point in time. Server 610 will perform a similar process with respect to the second key and server 602b, and with respect to the third key and server 602c. Once server 610 authenticates each of the keys, it will allow transactions relating to exchanges between key holders.
The creation of the exchange will provide for the fungibility of the keys and allow them to be considered valuable and freely transferrable assets. In this example, a value associated with each key can be used to assist in determining what would be acceptable to exchange for that key. If the first key has a value of 10 and the second key has a value of 5, the first key may be converted to two first sub keys, each having a value of 5 and then one of the first keys may be exchanged for the second key. The first user who controls the first sub keys would transfer one of the first sub keys to the second user. The second user would transfer the second key to the first user. The system would then create a new association for the first sub key that was transferred to the second user and second key that was transferred to the first user. The databases would be updated, as would be the pointers and this would complete the transaction.
In some embodiments, various functions or acts can take place at a given location and/or in connection with the operation of one or more apparatuses or systems. In some embodiments, a portion of a given function or act can be performed at a first device or location, and a remainder of the function or act can be performed at one or more additional devices or locations.
The corresponding structures, materials, acts, and equivalents of all means or step plus function elements in the claims below are intended to include any structure, material, or act for performing the function in combination with other claimed elements as specifically claimed. The embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.
The diagrams depicted herein are illustrative. There can be many variations to the diagram or the steps (or operations) described therein without departing from the spirit of the disclosure. For instance, the steps can be performed in a differing order or steps can be added, deleted or modified. All of these variations are considered a part of the disclosure. It will be understood that those skilled in the art, both now and in the future, can make various improvements and enhancements which fall within the scope of the claims which follow.
The present application is a Continuation of U.S. Nonprovisional application Ser. No. 15/977,781 filed 11 May 2018; which claims the benefit of U.S. Provisional Application Ser. No. 62/506,367 filed 15 May 2017; each of which is incorporated herein by reference in its entirety.
Number | Date | Country | |
---|---|---|---|
62506367 | May 2017 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 15977781 | May 2018 | US |
Child | 17891397 | US |