[go: up one dir, main page]

WO2024118437A1 - Systems and methods for generating unique digital identifiers for linking to coral reef devices - Google Patents

Systems and methods for generating unique digital identifiers for linking to coral reef devices Download PDF

Info

Publication number
WO2024118437A1
WO2024118437A1 PCT/US2023/080930 US2023080930W WO2024118437A1 WO 2024118437 A1 WO2024118437 A1 WO 2024118437A1 US 2023080930 W US2023080930 W US 2023080930W WO 2024118437 A1 WO2024118437 A1 WO 2024118437A1
Authority
WO
WIPO (PCT)
Prior art keywords
unique digital
images
sub
processors
identifiers
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Ceased
Application number
PCT/US2023/080930
Other languages
French (fr)
Inventor
Samantha WEST
Kaarthikeyan SUBRAMANIAM
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Mars Inc
Original Assignee
Mars Inc
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Mars Inc filed Critical Mars Inc
Publication of WO2024118437A1 publication Critical patent/WO2024118437A1/en
Anticipated expiration legal-status Critical
Ceased legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/50Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols using hash chains, e.g. blockchains or hash trees
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/73Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information by creating or determining hardware identification, e.g. serial numbers
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/30Payment architectures, schemes or protocols characterised by the use of specific devices or networks
    • G06Q20/36Payment architectures, schemes or protocols characterised by the use of specific devices or networks using electronic wallets or electronic money safes
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q20/00Payment architectures, schemes or protocols
    • G06Q20/38Payment protocols; Details thereof
    • G06Q20/389Keeping log of transactions for guaranteeing non-repudiation of a transaction
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/018Certifying business or products
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q30/00Commerce
    • G06Q30/02Marketing; Price estimation or determination; Fundraising
    • G06Q30/0279Fundraising management
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q40/00Finance; Insurance; Tax strategies; Processing of corporate or income taxes
    • G06Q40/04Trading; Exchange, e.g. stocks, commodities, derivatives or currency exchange
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06QINFORMATION AND COMMUNICATION TECHNOLOGY [ICT] SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL OR SUPERVISORY PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Information and communication technology [ICT] specially adapted for implementation of business processes of specific business sectors, e.g. utilities or tourism
    • G06Q50/02Agriculture; Fishing; Forestry; Mining
    • GPHYSICS
    • G06COMPUTING OR CALCULATING; COUNTING
    • G06NCOMPUTING ARRANGEMENTS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N20/00Machine learning

Definitions

  • the present disclosure relates generally to the field of environmental monitoring and analysis.
  • the present disclosure relates to generating unique digital identifiers and linking generated unique digital identifiers to coral reef devices.
  • Coral reefs are home to numerous aquatic species. They absorb wave energy and reduce coastal erosion, and they are a source of income for many people.
  • coral reefs are dying due to climate change, deteriorating water quality (e.g., pollution, ocean acidification, etc.), global warming, and direct physical damage from intensifying human stresses (e.g., dredging, anchoring, destructive fishing techniques, etc.).
  • intensifying human stresses e.g., dredging, anchoring, destructive fishing techniques, etc.
  • Such destruction of coral reefs is causing a decline in the diversity of aquatic species, an increase in erosion of coastal structures, and a loss of tourism revenues.
  • Conventional methods for monitoring coral or marine environments include studies conducted by research laboratories or survey-type approaches. The methods implemented by research laboratories are complicated and only manageable by trained and skillful technicians, whereas the survey-type approaches are inaccurate. Service providers are technically challenged in developing a method for integrating modern technologies to identify threats to the coral or marine environment and evaluate potential mitigation plans.
  • a system includes one or more processors; and a non-transitory computer readable medium storing instructions that, when executed by the one or more processors, cause the one or more processors to perform a method including: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second subsystem; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first subsystem to the second digital access device associated with the second sub-system.
  • a non-transitory computer readable medium the non-transitory computer readable medium storing instructions which, when executed by one or more processors of a computing system, cause the one or more processors to perform operations, including: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second subsystem.
  • FIG. 1 is a diagram of a system configured for generating unique digital identifiers (e.g., non-fungible tokens (NFTs)) for protecting and restoring coral reefs, according to aspects of the disclosure.
  • unique digital identifiers e.g., non-fungible tokens (NFTs)
  • FIG. 2A is a diagram of the components of NFT generation platform 115, according to aspects of the disclosure.
  • FIG. 2B is a diagram of the components of distributed blockchain 117, according to one example embodiment.
  • FIG. 3 is a flowchart of a process for generating dynamic NFTs, according to aspects of the disclosure.
  • FIG. 4A is a flowchart of a process for transacting dynamic NFTs, according to aspects of the disclosure.
  • FIG. 4B is a diagram that illustrates the growth of the dynamic NFTs upon satisfaction of the pre-determined threshold, according to aspects of the disclosure.
  • FIG. 5 shows an example machine learning training flow chart.
  • FIG. 6 illustrates an implementation of a general computer system configured to execute techniques presented herein.
  • NFTs non-fungible tokens
  • Coral reefs maintain marine biodiversity and fishery resources, reduce the greenhouse effect, protect coastlines, e.g., preventing coastal erosion and flooding, and the like.
  • coral reefs due to climate change and human activities, coral reefs have generally been degraded, which is not only reflected in the reduction of living coral cover, but also in the quality of habitats, such as reef collapse and fragmentation, structural simplification, etc., which may lead to a decrease in species diversity and then weaken the function of coral reef ecosystems.
  • coral reefs are declining at fast rates, scientists are technologically challenged to find effective and innovative ways to save them.
  • the future of coral reefs depends upon technologies that analyze coral reef data, e.g., in real-time or near real-time, and provide recommendations to prevent and restore them.
  • the advancement of such technologies suffers from a lack of visibility and investment.
  • the present disclosure solves the technical challenges typically encountered during the use of a conventional techniques, such as those discussed above.
  • One way of achieving this is by generating NFTs that provide a safe and reliable means of digital transactions and assets, while addressing the threats faced by the coral reefs.
  • NFTs may be leveraged to create a green economy to support environmental causes. For example, a user may purchase NFTs and own a virtual coral reef that is created on a blockchain, and the purchased NFTs may fund research and development to prevent and restore coral reefs.
  • NFTs are becoming popular, and as users are discovering the liberation of peer-to-peer transactions, there has been a visible shift toward decentralization.
  • System 100 leverages modern technology infrastructures and novel data structures and algorithmsto generate NFTs for protecting and restoring coral reefs.
  • system 100 introduces real-time environmental monitoring systems, which incorporate modern real-time sensor networks, machine learning techniques, NFTs, the Internet of Things (loT), predictive analytics, and other technologies to statistically analyze corals or marine environment in real-time.
  • the real-time data is utilized to make predictions and inform time-critical decisions related to environmental conditions.
  • FIG. 1 is a diagram of a system configured for implementing modern communication and data processing capabilities into methods and systems for generating NFTs for protecting and restoring coral reefs, according to one example embodiment.
  • FIG. 1 an example architecture of one or more example embodiments of the present invention, includes system 100 that comprises first sub-system 101 , user equipment (UE) 103 that includes application 105 and sensors 107, file 109, communication network 111 , database 113, NFT generation platform 115, distributed blockchain 117, and second sub-system 119.
  • UE user equipment
  • the first sub-system 101 is a single service-providing entity or a group of service-providing entities that may perform various activities to protect and restore coral reefs or marine environment based, at least in part, on the NFTs associated with second sub-system 119.
  • NFTs of second subsystem 119 may fund various projects undertaken by first sub-system 101 to protect and restore the coral reefs, e.g., collecting scientifically sound, geographically comprehensive biological, climate, and socioeconomic data on coral reefs, developing methodologies for countering damages to the coral reefs, etc.
  • the first sub-system 101 is a system that is managed or hosted by the service-providing entity for providing service(s) related to monitoring, protecting, and restoring coral reefs and/or marine environment.
  • UE 103 may include, but is not restricted to, any type of mobile terminal, wireless terminal, fixed terminal, or portable terminal.
  • Examples of the UE 103 may include, but are not restricted to, a mobile handset, a wireless communication device, a station, a unit, a device, a multimedia computer, a multimedia tablet, an Internet node, a communicator, a desktop computer, a laptop computer, a notebook computer, a netbook computer, a tablet computer, a Personal Communication System (PCS) device, a personal navigation device, a Personal Digital Assistant (PDA), a digital camera/camcorder, an infotainment system, a dashboard computer, a television device, or any combination thereof, including the accessories and peripherals of these devices, or any combination thereof.
  • PCS Personal Communication System
  • PDA Personal Digital Assistant
  • the UE 103 may facilitate various input means for receiving and generating information, including, but not restricted to, a touch screen capability, a keyboard, and keypad data entry, a voice-based input mechanism, and the like.
  • the UE 103 may be configured with different features for generating, sharing, and viewing of visual content.
  • the first sub-system 101 may send a request for generating NFTs via UE 103 and may receive the NFTs via UE 103.
  • the second sub-system 119 may send a request for purchasing the generated NFTs and may receive the purchased NFTs via UE 103. Any known and future implementations of the UE 103 are also applicable
  • UE 103 may include applications 105. Further, applications 105 may include various applications such as, but not restricted to, content provisioning applications, networking applications, multimedia applications, media player applications, camera/imaging applications, software applications, payment application, and the like. In one embodiment, one of the applications 105 at UE 103 may act as a client for NFT generation platform 115 and may perform one or more functions associated with the functions of NFT generation platform 115 by interacting with NFT generation platform 115 over communication network 111.
  • sensor 107 may be any type of sensor.
  • sensors 107 may include, for example, a network detection sensor for detecting wireless signals or receivers for different short-range communications (e.g., Bluetooth, Wi-Fi, Li-Fi, near field communication (NFC), etc.), a camera/imaging sensor for gathering image data (e.g., real-time images or videos of coral reefs, marine environments, etc.), an audio recorder for gathering audio data (e.g., recordings of various research on coral reefs, marine environments, etc.), and the like.
  • a network detection sensor for detecting wireless signals or receivers for different short-range communications
  • a camera/imaging sensor for gathering image data (e.g., real-time images or videos of coral reefs, marine environments, etc.)
  • an audio recorder for gathering audio data (e.g., recordings of various research on coral reefs, marine environments, etc.), and the like.
  • sensors 107 may implement remote sensing technologies for measuring coral reef properties, and may receive: (i) data from Lidar (Light Detection and Ranging) on coral reef properties, (ii) data from biosensors on water quality, (iii) data from radar on near-surface waves and current, and/or (iv) data from thermal sensors on water temperature.
  • sensors 107 may include a ledger sensor, e.g., a software implemented alongside distributed blockchain 117 that may monitor every transaction written to distributed blockchain 117 for information that the ledger sensors are instructed to find. Such ledger sensors may be activated by a request to search through distributed blockchain 117 for data corresponding to the request.
  • file 109 may include images and/or videos of coral reefs and/or marine environment collected via sensors 107, underwater robots, drones, or a satellite (e.g., satellite 441 of FIG. 4B).
  • a diver/researcher may utilize underwater cameras to capture images and/or videos of the coral reefs and marine environment.
  • a satellite may capture, in real-time or near real-time, images and/or videos of the coral reefs and/or marine environment.
  • File 109 may be stored in database 113 for access by NFT generation platform 115.
  • Communication network 111 may support a variety of different communication protocols and communication techniques.
  • communication network 111 allows NFT generation platform 115 to communicate with UE 103, database 113, and distributed blockchain 117.
  • the communication network 111 of system 100 includes one or more networks such as a data network, a wireless network, a telephony network, or any combination thereof.
  • the data network may be any local area network (LAN), metropolitan area network (MAN), wide area network (WAN), a public data network (e.g., the Internet), short range wireless network, or any other suitable packet-switched network, such as a commercially owned, proprietary packet- switched network, e.g., a proprietary cable or fiber-optic network, and the like, or any combination thereof.
  • LAN local area network
  • MAN metropolitan area network
  • WAN wide area network
  • a public data network e.g., the Internet
  • short range wireless network e.g., a commercially owned, proprietary packet- switched network, e.g., a proprietary cable or fiber-optic network, and the like, or any combination thereof.
  • the wireless network may be, for example, a cellular communication network and may employ various technologies including 5G (5th Generation), 4G, 3G, 2G, Long Term Evolution (LTE), wireless fidelity (Wi-Fi), Bluetooth®, Internet Protocol (IP) data casting, satellite, mobile ad-hoc network (MANET), vehicle controller area network (CAN bus), and the like, or any combination thereof.
  • 5G 5th Generation
  • 4G 3G
  • 2G Long Term Evolution
  • Wi-Fi wireless fidelity
  • Bluetooth® Bluetooth®
  • IP Internet Protocol
  • satellite mobile ad-hoc network
  • MANET mobile ad-hoc network
  • CAN bus vehicle controller area network
  • database 113 may be any type of database, such as relational, hierarchical, object-oriented, and/or the like, wherein data are organized in any suitable manner, including data tables or lookup tables.
  • database 113 may access various data sources and store and manage multiple types of information, e.g., file 109, that can provide means for aiding in the content provisioning and sharing process. It is understood that any other suitable data may be included in the database 113.
  • database 113 may include a machine-learning based training database with pre-defined mapping defining a relationship between various input parameters and output parameters based on various statistical methods. Exemplary datasets include geographic data, climate data, coral reef data, marine environment data, and the like.
  • NFT generation platform 115 may be a platform with multiple interconnected components.
  • NFT generation platform 115 may include one or more servers, intelligent networking devices, computing devices, components, and corresponding software for generating unique digital identifiers, i.e., non-fungible tokens (NFTs), to prevent and restore coral reefs.
  • NFTs non-fungible tokens
  • NFT generation platform 115 may be a separate entity of system 100. Further details of NFT generation platform 115 are provided below.
  • distributed blockchain 117 may hold immutable information once data is committed to the chain, and it is therefore a decentralized, distributed, and immutable database in which data is logically structured as a sequence of smaller chunks (blocks).
  • each block 8,>o is immutably connected to a single preceding block B/-1 through a cryptographic hash function /-/(B,-i ). Any changes to B,-i may yield an invalid hash in B, and all following blocks.
  • the very first block Bo, the genesis block is the only block without a predecessor. In one instance, to assure the integrity of a block and the data contained in it, respectively, the block may be digitally signed.
  • each transaction may be recorded as a block of data in distributed blockchain 117.
  • These blocks may form a chain of data as assets move from place to place or ownership changes hands. These blocks may confirm the exact time and sequence of transactions, and may link securely together to prevent any block from being altered or a block being inserted between two existing blocks.
  • each additional block may strengthen the verification of the previous block, thereby forming a protected blockchain.
  • Distributed blockchain 117 may be tamper-evident, delivering the key strength of immutability. This removes the possibility of tampering by a malicious actor and builds a ledger of transactions users, e.g., second subsystem 119, can trust.
  • the first sub-system 101 and second subsystem 119 may have access to distributed blockchain 117, and its immutable record of transactions.
  • transactions may be recorded only once, eliminating the duplication of records that is typical of traditional business networks. For example, participants may not change or tamper with a transaction after it has been recorded to distributed blockchain 117. However, if a transaction record includes an error, a new transaction may be added to reverse the error, and both transactions are then visible.
  • a set of rules e.g., smart contracts, may be stored on the blockchain and executed automatically.
  • NFTs may be created using blockchain technology, e.g., distributed blockchain 117.
  • NFTs may be generated when distributed blockchain 117 string records of cryptographic hash, a set of characters that verifies a set of data to be unique, onto previous records, therefore, creating a chain of identifiable data blocks. This cryptographic transaction process ensures the authentication of each digital file by providing a digital signature that is used to track NFT ownership.
  • NFTs are non-fungible cryptographic assets that may be declared in a standard token format and may have a unique set of attributes.
  • NFTs may be digital assets with unique identifiers that are stored on distributed blockchain 117 and may not be substituted.
  • NFTs may be digital representations of real-world objects, e.g., coral reefs and marine environment, etc., or tradable rights of digital assets, e.g., pictures, virtual creations, audio, and other types of digital files, where the ownerships may be recorded in blockchain smart contracts.
  • NFTs may be tracked on distributed blockchain 117 to provide the owner with proof of ownership.
  • second sub-system 119 may be a person or any entity interacting with a user interface or a web interface of the system associated with first sub-system 101 to purchase the NFTs.
  • the second subsystem 119 may include a registered user, an authorized user, a returning user, a visiting user, a potential user, etc., to access payment-related services provided by the service provider, e.g., purchasing NFTs.
  • UE 103, database 113, NFT generation platform 115, and distributed blockchain 117 may communicate with each other and other components of the communication network 111 using well known, new or still developing protocols.
  • a protocol includes a set of rules defining how the network nodes within the communication network 111 interact with each other based on information sent over the communication links.
  • the protocols are effective at different layers of operation within each node, from generating and receiving physical signals of various types, to selecting a link for transferring those signals, to the format of information indicated by those signals, to identifying which software application executing on a computer system sends or receives the information.
  • the conceptually different layers of protocols for exchanging information over a network are described in the Open Systems Interconnection (OSI) Reference Model.
  • OSI Open Systems Interconnection
  • Each packet typically comprises (1 ) header information associated with a particular protocol, and (2) payload information that follows the header information and contains information that may be processed independently of that particular protocol. In some protocols, the packet includes (3) trailer information following the payload and indicating the end of the payload information.
  • the header includes information such as the source of the packet, its destination, the length of the payload, and other properties used by the protocol.
  • the data in the payload for the particular protocol includes a header and payload for a different protocol associated with a different, higher layer of the OSI Reference Model.
  • the header for a particular protocol typically indicates a type for the next protocol contained in its payload.
  • the higher layer protocol is said to be encapsulated in the lower layer protocol.
  • the headers included in a packet traversing multiple heterogeneous networks, such as the Internet typically include a physical (layer 1) header, a data-link (layer 2) header, an internetwork (layer 3) header and a transport (layer 4) header, and various application (layer 5, layer 6 and layer 7) headers as defined by the OSI Reference Model.
  • FIG. 2A is a diagram of the components of NFT generation platform 115, according to one example embodiment.
  • terms such as “component” or “module” generally encompass hardware and/or software, e.g., that a processor or the like may use to implement associated functionality.
  • NFT generation platform 115 includes one or more components for generating NFTs for protecting and restoring coral reefs. It is contemplated that the functions of these components may be combined in one or more components or performed by other components of equivalent functionality.
  • NFT generation platform 115 comprises data collection module 201 , data processing module 203, NFT content encoder 205, NFT mint program 207, training module 209, machine learning module 211 , and user interface module 213, or any combination thereof.
  • data collection module 201 may automatically collect relevant data associated with coral reefs and/or the marine environment through sensor 107 or various data collection techniques.
  • data collection module 201 may use a web-crawling component to access various information sources, e.g., database 113, distributed blockchain 117, to collect relevant data associated with coral reefs and/or the marine environment.
  • Data collection module 201 may include various software applications, e.g., data mining applications in Extended Meta Language (XML), that automatically search for and return relevant data regarding coral reefs and/or the marine environment. Data collection module 201 may parse and arrange the data into a common format that can be easily processed by other modules and platforms.
  • XML Extended Meta Language
  • data processing module 203 may process data collected by data collection module 201 .
  • data processing module 203 may process, in real-time or near real-time, coral reef data and marine environment data to determine the condition of the coral reefs and marine environment.
  • data processing module 203 may compare the current condition of the coral reef and marine environment with historical data to determine an improvement or a deterioration in the condition of the coral reefs and marine environment.
  • data processing module 203 may process NFT data associated with second sub-system 119 to generate a recommendation to update the metadata of the NFT upon determining an improvement in the condition of the coral reef and marine environment.
  • NFT content encoder 205 may be configured to encode data associated with second sub-system 119, coral reefs, and/or the marine environment to generate an NFT.
  • data associated with second sub-system 119 may include, but is not limited to, personal data, e.g., name, signature, address, phone number, place of birth, etc., biometric data, e.g., height, weight, blood type, eye color, fingerprint, iris patterns, DNA information, etc., and/or additional multimedia data, e.g., audio, still images, animation, videos, etc., and so forth.
  • data associated with coral reefs and/or the marine environment may include, but are not limited to, coral reefs and marine animal population, coral reef health, changes in water quality and temperature, coral diseases, coral bleaching, coastal erosion, human activities, e.g., dredging, anchoring, fishing, coral reefs mining, etc., that impacts the coral reefs and/or the marine environment.
  • These data may provide unique attributes to each NFT, thereby making the NFT irreplaceable.
  • NFT mint program 207 may process by logging the encoded data in distributed blockchain 117 to generate customized NFTs.
  • the customized NFTs may be received over communication network 111 and may be further verified by NFT generation platform 115.
  • the verified NFTs may be logged in distributed blockchain 117 with a set of protocols for marking a permanent chain of custody on the customized NFTs to prevent editing, modifying, or deletion.
  • training module 209 may provide supervised learning to machine learning module 211 by providing training data that contains input and correct output, to allow machine learning module 211 to learn over time. The training may be performed based on the deviation of a processed result from a documented result when the inputs are fed into machine learning module 211 , e.g., an algorithm measures its accuracy through the loss function, adjusting until the error has been sufficiently minimized.
  • training data may include sample image data, sample video data, sample NFT data, etc., for training machine learning module 211 to identify the condition of the coral reefs and/or generate NFTs from images/videos for storage into distributed blockchain 117.
  • Training module 209 may conduct the training in any suitable manner, e.g., in batches, and may include any suitable training methodology. Training may be performed periodically, and/or continuously, e.g., in real-time or near real-time.
  • machine learning module 211 may receive the training data from training module 209.
  • Machine learning module 211 may randomize the ordering of the training data, visualize the training data to identify relevant relationships between different variables, identify any data imbalances, split the training data into two parts where one part is for training a model and the other part is for validating the trained model, de-duplicating, normalizing, correcting errors in the training data, and so on.
  • Machine learning module 211 may implement various machine learning techniques, e.g., decision tree learning, association rule learning, neural network (e.g., recurrent neural networks, convolutional neural networks, deep neural networks), inductive programming logic, support vector machines, Bayesian models, etc.
  • machine learning module 211 may leverage one or more classification models trained to classify the training data and/or one or more prediction models trained to predict an outcome based on the training data.
  • machine learning module 211 may input the training data to classification models and/or prediction models to generate NFTs or update the NFTs.
  • machine learning module 211 may process, in real-time or near real-time, the data from other modules to determine the deterioration or restoration of the coral reefs and marine ecosystems.
  • the machine learning module may automatically upgrade the NFTs upon determining progress in the restoration of the coral reefs and marine ecosystems.
  • the machine learning module may automatically generate recommendations upon determining a deterioration in the condition of the coral reefs and marine ecosystems, e.g., novel methods to attract customers, new approaches to handle the worsening condition of the coral reefs, etc.
  • user interface module 213 may enable a presentation of a graphical user interface (GUI) in UE 103.
  • GUI graphical user interface
  • User interface module 213 may employ various application programming interfaces (APIs) or other function calls corresponding to application 105 on UE 103, thus enabling the display of NFTs, images/videos, and/or graphics primitives such as icons, menus, buttons, data entry fields, etc.
  • APIs application programming interfaces
  • user interface module 213 may generate a display of the virtual reefs, e.g., dynamic and evolving 3D reef stars featuring multiple corals, represented by the NFTs.
  • Second sub-system 119 may view the progress of the virtual reef, wherein the progress of the virtual reefs may represent the progress of the physical coral reefs.
  • FIG. 2B is a diagram of the components of distributed blockchain 117, according to one example embodiment.
  • the distributed blockchain 117 may include encoder/decoder 215, ledger inquiry and update server 217, smart contract 219, or any combination thereof.
  • distributed blockchain 117 may encrypt data stored in distributed blockchain 117, via encoder/decoder 215, to provide security and/or protect sensitive information.
  • the latest data stored in distributed blockchain 117 may be periodically or continually retrieved by NFT generation platform 115 to make it accessible to interested parties, e.g., first subsystem 101 and/or second sub-system 119.
  • distributed blockchain 117 may decode data stored in distributed blockchain 117, via encoder/decoder 215.
  • Embodiments of encoder/decoder 215 are not limited to these examples and may include other suitable functionality in other embodiments.
  • ledger inquiry and update server 217 may be one or more of an application, application program interface, software, hardware, server, or protocol that allows the addition of data, e.g., a new attribute or a detail regarding an attribute of a transaction, to distributed blockchain 117.
  • ledger inquiry and update server 217 may further enable the access or retrieval of data for any attribute of the transaction information from distributed blockchain 117.
  • ledger inquiry and update server 217 may respond to requests to add attributes of a transaction, dispute one or more of the previously posted data for the transaction attribute, or add a proposed modification to an existing transaction attribute.
  • smart contract 219 may be one or more of an application, application program interface, software, hardware, server, or computerized transaction protocol that facilitates, verifies, and/or enforces the negotiation or performance of a contract.
  • the contract is configured to govern the transaction between first sub-system 101 and second sub-system 119.
  • NFT generation platform 115 may be implemented in hardware, firmware, software, or a combination thereof. Though depicted as a separate entity in FIG. 2A, it is contemplated that NFT generation platform 115 may be implemented for direct operation by respective UE 103. As such, NET generation platform 115 may generate direct signal inputs by way of the operating system of the UE 103. In another embodiment, one or more of the modules 201-213 may be implemented for operation by respective UEs, as NFT generation platform 115, or a combination thereof.
  • the various executions presented herein contemplate any and all arrangements and models.
  • FIG. 3 is a flowchart of a process for generating dynamic NFTs, according to one example embodiment.
  • NFT generation platform 115 may perform one or more portions of process 300 and may be implemented in, for instance, a chip set including a processor and a memory as shown in FIG. 6.
  • NFT generation platform 115 and/or any of modules 201-219 may provide means for accomplishing various parts of process 300, as well as means for accomplishing embodiments of other processes described herein in conjunction with other components of system 100.
  • process 300 is illustrated and described as a sequence of steps, it is contemplated that various embodiments of process 300 may be performed in any order or combination and need not include all of the illustrated steps.
  • NFT generation platform 115 via processor 602 (which may include one or more processors), may receive a request (e.g., a first request) for unique digital identifiers (e.g., NFTs) from at least one device, e.g., UE 103, associated with first sub-system 101.
  • the request may include a plurality of images and/or videos of coral reefs and marine ecosystems.
  • the images and/or videos include geographic coordinates of the coral reefs and marine ecosystems.
  • NFT generation platform, 115 via machine learning module 211 may automatically retrieve images and/or videos associated with coral reefs, marine ecosystems, and second sub-system 119 from various information sources to generate dynamic NFTs.
  • Such automated retrieval may be based on historical data, e.g., frequency of NFT requests, of authenticated first subsystem 101 and/or second sub-system 119.
  • the generated NFTs include images, videos, and/or codes associated with a specific coral reef.
  • NFT generation platform 115 via processor 602 and NFT content encoder 205, may encode the plurality of images and/or videos of coral reefs and marine ecosystems, thereby linking the generated dynamic NFT with one or more specific coral reef(s) and/or one or more specific coral reef devices (e.g., reef stars).
  • NFT generation platform 115 may link the NFTs and the plurality of images via geotagging, wherein the NFTs includes geographic coordinates of the coral reefs and the marine ecosystem represented by the plurality of images.
  • NFT generation platform 115 may cryptographically hash the plurality of images and may concatenate the plurality of hashed images in a pre-defined order.
  • NFT generation platform 115 may generate dynamic NFTs by minting, on the distributed blockchain 117, the dynamic NFTs.
  • NFT generation platform 115 may link the dynamic NFTs and the plurality of images via geotagging.
  • the dynamic NFTs may be virtual reef NFTs, 3D reef stars featuring vibrant 3D coral and marine life, and may include geographic coordinates of the coral reefs and marine ecosystems represented by the plurality of images and/or videos.
  • NFT generation platform 115 may receive a request (e.g., second request) for at least one dynamic NFT from a device, e.g., UE 103, associated with second sub-system 119.
  • the request is a purchase request to buy at least one NFTs from the plurality of NFTs.
  • NFT generation platform 115 may receive, via sensors 107, biometric data that is unique to second sub-system 119 with the purchase request.
  • the biometric data includes eye details, facial details, hand geometry, and/or fingerprints of second sub-system 119.
  • NFT generation platform 115 may process the biometric data to create authentication data for second sub-system 119.
  • NFT generation platform 115 may record the authentication data on distributed blockchain 117 to authenticate second sub-system 119 for any transactions to purchase the dynamic NFTs.
  • NFT generation platform 115 via processor 602, may transmit a value of the requested dynamic NFTs from a second digital access device (e.g., digital wallet) associated with second sub-system 119 to a first digital access device (e.g., digital wallet) associated with first sub-system 101.
  • the digital wallet may facilitate fast, convenient, and secure NFT transactions by utilizing application 105 of UE 103.
  • the digital wallet may be a standalone application program or a companion program to a web browser, e.g., a Hypertext Markup Language (“HTML”) compliant web browser or other types of web browser having messaging and storage capabilities.
  • HTML Hypertext Markup Language
  • second sub-system 119 may navigate to first sub-system 101 ’s website using a web browser and locate the NFTs. After second sub-system 119 indicates a desire to purchase the NFTs, the digital wallet of the second sub-system 119 may interact with the first sub-system 101 ’s website in a secure manner to complete the transaction. Once the transaction is completed, the digital wallet of the first sub-system 101 may receive the value for the NFT, generate a confirmation or receipt for the transaction, and store the confirmation or receipt. The digital wallet may also synchronize the confirmation or receipt with a cloud computing environment, e.g., database 113.
  • a cloud computing environment e.g., database 113.
  • NFT generation platform 115 via processor 602, may transmit the dynamic NFTs from the digital wallet associated with first sub-system 101 to the digital wallet associated with second sub-system 119.
  • the NFTs represent a non-fungible physical asset owned by first sub-system 101 , and the ownership of the non-fungible physical asset is transferred from first sub-system 101 to second sub-system 119 upon completion of the transaction.
  • second sub-system 119 may utilize the NFTs to participate in decision making, e.g., voting, regarding awarding funds to a particular project for protecting and restoring coral reefs, future coral reef restoration regions, and choosing partnering agencies to exponentially grow coral reefs.
  • NFT generation platform 115 via processor 602, may store the dynamic NFTs on transaction blocks of distributed blockchain 117.
  • the distributed blockchain 117 is configured to store the dynamic NFTs received over communication network 111 as a certificate of authenticity for a real object and/or a virtual object.
  • the dynamic NFTs are associated with programmatically defined smart contracts written to distributed blockchain 117.
  • NFT generation platform 115 may receive a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain.
  • NFT generation platform 115 may monitor, in realtime or near real-time, coral reefs and marine ecosystems represented by the plurality of images and/or videos. NFT generation platform 115 may locate the coral reefs and marine ecosystems based on sensor data or the geographic coordinates embedded within the plurality of images and/or videos. NFT generation platform 115 may determine, in real-time or near real-time, whether the condition of the coral reefs and marine ecosystems meets the pre-determined threshold level.
  • NFT generation platform 115 may match the blockchain address of the dynamic NFTs with the geographic coordinates of the coral reefs and marine ecosystems.
  • NFT generation platform 115 may update metadata associated with the dynamic NFTs based on the condition of the coral reefs and marine ecosystems and the pre-determined threshold level (e.g., comparing the condition of the coral reefs and marine ecosystems to the predetermined threshold level).
  • NFT generation platform 115 may generate a new dynamic NFT based, at least in part, on the updated metadata.
  • the new dynamic NFT is concatenated in the pre-defined order, wherein the pre-defined order includes connecting the new dynamic NFT to preceding dynamic NFTs on the transaction block of distributed blockchain 117.
  • FIG. 4A is a flowchart of a process for transacting dynamic NFTs, according to one example embodiment.
  • process 400 is illustrated and described as a sequence of steps, it is contemplated that various embodiments of process 400 may be performed in any order or combination and need not include all of the illustrated steps.
  • second sub-system 119 via UE 103, may navigate to first sub-system 101 ’s website and initiate a purchase transaction of dynamic NFTs.
  • second sub-system 119 may select dynamic NFTs which are then automatically added to the shopping cart, and second sub-system 119 may proceed to checkout.
  • second sub-system 119 is presented with a notification in the user interface of UE 103 requesting billing information, e.g., name information, address information, etc., and contact information, e.g., phone number, email address, etc.
  • the second sub-system 119 may enter the requested information, whereupon the second sub-system 119 is navigated to a payment section of the website.
  • step 405 second sub-system 119 is presented with a notification in the user interface of UE 103 requesting payment details, e.g., credit card information, bank account information, security code, credit card expiration date, routing number, or any other payment-related information.
  • the second sub-system 119 may enter the requested information, whereupon the second sub-system 119 is navigated to the confirmation page of the website.
  • second sub-system 119 may review the purchase transaction for the NFTs and may confirm the purchase to complete the transaction.
  • second sub-system 119 may receive the purchase confirmation, purchase details, and a link to a digital wallet service provider.
  • the second sub-system 119 may receive this information via email or as a textual message in UE 103.
  • Second sub-system 119 may click on the link, whereupon second sub-system 119 is navigated to a website that provides digital wallet service.
  • Second sub-system 119 may be requested for login credentials, e.g., user name and password, biometric verification, etc.
  • the registered second sub-system 119 may enter login credentials, whereas a new second sub-system 119 may register with the digital wallet service by creating login credentials.
  • the digital wallet service provider may display a list of the purchased NFTs for review by authenticated second sub-system 119.
  • authenticated second sub-system 119 may review the NFTs to ensure the purchase transaction was accurately executed, e.g., verifying the NFTs are the ones that were intended to be purchased.
  • second sub-system 119 may be notified to connect the access device (e.g., digital wallet) to their bank accounts, credit cards, debit card accounts, social media accounts or any other type of account.
  • second sub-system 119 may connect the digital wallet to their bank accounts, whereupon the transaction performed utilizing the digital wallet may be debited to the bank account of second sub-system 119.
  • second sub-system 119 may connect the digital wallet to their credit cards.
  • the digital wallet may store multiple credit cards and may allow second sub-system 119 to set a default payment method during any transaction performed utilizing the digital wallet.
  • second sub-system 119 may connect the digital wallet to their social media account, and may share their digital collectibles, e.g., cross-post digital collectibles that they own.
  • second sub-system 119 may be notified to initialize the digital wallet.
  • a wallet encryption key may be created and the digital wallet is then initialized.
  • the digital wallet may send at least one outgoing transaction, and a correct public key is then recorded on the distributed blockchain 117.
  • Initialization of a digital wallet may secure the digital wallet, as the network may detect nonmatching public keys.
  • second sub-system 119 may claim the NFTs.
  • FIG. 4B is a diagram that illustrates the growth of the dynamic NFTs upon satisfaction of the pre-determined threshold, according to one example embodiment.
  • second sub-system 119 has acquired dynamic NFT 427 which is embedded with geographic coordinates of the coral reefs and marine ecosystems it is representing.
  • NFT generation platform 115 may monitor, in realtime or near real-time, the coral reefs and marine ecosystems of dynamic NFT 427 per the methods described herein.
  • NFT generation platform 115 may determine, in real-time or near real-time, whether the condition of the coral reefs and marine ecosystems meets the pre-determined threshold level.
  • NFT 427 may represent coral reef 435
  • NFT generation platform 115 may receive, in real-time or near real-time, coral reef data and marine environment data from sensors 107, satellite 441 , divers/researchers 437, and various underwater sensors 439, e.g., underwater camera, underwater robots, etc.
  • NFT generation platform 115 may update metadata of dynamic NFT 427 upon determining the condition of the coral reefs and marine ecosystems satisfy the pre-determined threshold level.
  • NFT generation platform 115 may determine the growth of coral reefs satisfies the pre-determined coral reef growth threshold, whereupon dynamic NFT 427 may be upgraded to dynamic NFT 429.
  • the second sub-system 119 may donate for various research or activities undertaken by the first sub-system 101 to improve the growth of marine animals around the coral reef 435.
  • the NFT generation platform 115 may determine the growth of marine animals around the coral reefs satisfies the predetermined marine population threshold, as a result, dynamic NFT 429 may be upgraded to dynamic NFT 431 .
  • the second sub-system 119 may contribute to the various research or activities undertaken by the first sub-system 101 to increase marine and coral reef species or improve the water quality around the coral reef 435.
  • NFT generation platform 115 may determine growth in the species of marine animals and coral reefs, and an improvement in water quality around the coral reefs. Such growth and improvements satisfy the pre-determined threshold regarding marine animal species, coral reef species, and water quality.
  • NFT generation platform 115 may upgrade dynamic NFT 431 to dynamic NFT 433.
  • dynamic NFTs 427, 429, 431 , and 433 may be concatenated in a pre-defined order, e.g., connecting the new dynamic NFT to a preceding dynamic NFTs on the transaction block of distributed blockchain 117.
  • divers/researchers 437 may plant a geotagged reef star on the floor of the coral reef (e.g., the coral reef 435).
  • the second sub-system 119 may exchange fully developed NFTs, e.g., NFT 433 has reached its top growth level, for the physical geotagged reef star located on the floor of the coral reef. Accordingly, second sub-system 119 may have ownership over the physical geotagged reef star that is positioned in a tangible spot on Earth. In such a manner, real-world coral reefs are prevented and restored with virtual coral NFTs by gamification of donations or NFTs growth.
  • One or more implementations disclosed herein include and/or may be implemented using machine learning model, e.g., machine learning module 211 , and/or may be used to train the machine learning model.
  • a given machine learning model may be trained using the data flow 500 of FIG. 5.
  • Training data 512 may include one or more of stage inputs 514 and known outcomes 518 related to the machine learning model to be trained.
  • the stage inputs 514 may be from any applicable source including text, visual representations, data, values, comparisons, stage outputs (e.g., one or more outputs from a step from FIG. 3).
  • the known outcomes 518 may be included for the machine learning models generated based on supervised or semi-supervised training.
  • An unsupervised machine learning model may not be trained using known outcomes 518.
  • Known outcomes 518 may include known or desired outputs for future inputs similar to or in the same category as stage inputs 514 that do not have corresponding known outputs.
  • the training data 512 and a training algorithm 520 may be provided to a training component 530 that may apply the training data 512 to the training algorithm 520 to generate the machine learning model.
  • the training component 530 may be provided comparison results 516 that compare a previous output of the corresponding machine learning model to apply the previous result to re-train the machine learning model.
  • the comparison results 516 may be used by the training component 530 to update the corresponding machine learning model.
  • the training algorithm 520 may utilize machine learning networks and/or models including, but not limited to a deep learning network such as Deep Neural Networks (DNN), Convolutional Neural Networks (CNN), Fully Convolutional Networks (FCN) and Recurrent Neural Networks (RCN), probabilistic models such as Bayesian Networks and Graphical Models, and/or discriminative models such as Decision Forests and maximum margin methods, or the like.
  • a deep learning network such as Deep Neural Networks (DNN), Convolutional Neural Networks (CNN), Fully Convolutional Networks (FCN) and Recurrent Neural Networks (RCN), probabilistic models such as Bayesian Networks and Graphical Models, and/or discriminative models such as Decision Forests and maximum margin methods, or the like.
  • the machine learning model used herein may be trained and/or used by adjusting one or more weights and/or one or more layers of the machine learning model. For example, during training, a given weight may be adjusted (e g., increased, decreased, removed) based on training data or input data. Similarly, a layer may be updated, added, or removed based on training data/and or input data. The resulting outputs may be adjusted based on the adjusted weights and/or layers. [0075] In general, any process or operation discussed in this disclosure that is understood to be computer-implementable, such as the process illustrated in FIG. 3 may be performed by one or more processors of a computer system as described herein.
  • a process or process step performed by one or more processors may also be referred to as an operation.
  • the one or more processors may be configured to perform such processes by having access to instructions (e.g., software or computer-readable code) that, when executed by the one or more processors, cause the one or more processors to perform the processes.
  • the instructions may be stored in a memory of the computer system.
  • a processor may be a central processing unit (CPU), a graphics processing unit (GPU), or any suitable types of processing unit.
  • a computer system such as a system or device implementing a process or operation in the examples above, may include one or more computing devices.
  • One or more processors of a computer system may be included in a single computing device or distributed among a plurality of computing devices.
  • One or more processors of a computer system may be connected to a data storage device.
  • a memory of the computer system may include the respective memory of each computing device of the plurality of computing devices.
  • FIG. 6 illustrates an implementation of a general computer system that may execute techniques presented herein.
  • the computer system 600 can include a set of instructions that can be executed to cause the computer system 600 to perform any one or more of the methods or computer based functions disclosed herein.
  • the computer system 600 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices.
  • processor may refer to any device or portion of a device that processes electronic data, e.g., from registers and/or memory to transform that electronic data into other electronic data that, e.g., may be stored in registers and/or memory.
  • a “computer,” a “computing machine,” a “computing platform,” a “computing device,” or a “server” may include one or more processors.
  • the computer system 600 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment.
  • the computer system 600 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine.
  • PC personal computer
  • PDA personal digital assistant
  • the computer system 600 can be implemented using electronic devices that provide voice, video, or data communication. Further, while a computer system 600 is illustrated as a single system, the term “system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
  • the computer system 600 may include a processor 602, e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both.
  • the processor 602 may be a component in a variety of systems.
  • the processor 602 may be part of a standard personal computer or a workstation.
  • the processor 602 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analyzing and processing data.
  • the processor 602 may implement a software program, such as code generated manually (i.e., programmed).
  • the computer system 600 may include a memory 604 that can communicate via a bus 608.
  • the memory 604 may be a main memory, a static memory, or a dynamic memory.
  • the memory 604 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like.
  • the memory 604 includes a cache or random-access memory for the processor 602.
  • the memory 604 is separate from the processor 602, such as a cache memory of a processor, the system memory, or other memory.
  • the memory 604 may be an external storage device or database for storing data. Examples include a hard drive, compact disc (“CD”), digital video disc (“DVD”), memory card, memory stick, floppy disc, universal serial bus (“USB”) memory device, or any other device operative to store data.
  • the memory 604 is operable to store instructions executable by the processor 602.
  • the functions, acts or tasks illustrated in the figures or described herein may be performed by the processor 602 executing the instructions stored in the memory 604.
  • the functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination.
  • processing strategies may include multiprocessing, multitasking, parallel processing and the like.
  • the computer system 600 may further include a display 610, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid-state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information.
  • a display 610 such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid-state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information.
  • the display 610 may act as an interface for the user to see the functioning of the processor 602, or specifically as an interface with the software stored in the memory 604 or in the drive unit 606.
  • the computer system 600 may include an input/output device 612 configured to allow a user to interact with any of the components of computer system 600.
  • the input/output device 612 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control, or any other device operative to interact with the computer system 600.
  • the computer system 600 may also or alternatively include drive unit 606 implemented as a disk or optical drive.
  • the drive unit 606 may include a computer- readable medium 622 in which one or more sets of instructions 624, e.g. software, can be embedded. Further, instructions 624 may embody one or more of the methods or logic as described herein. The instructions 624 may reside completely or partially within the memory 604 and/or within the processor 602 during execution by the computer system 600.
  • the memory 604 and the processor 602 also may include computer-readable media as discussed above.
  • a computer-readable medium 622 includes instructions 624 or receives and executes instructions 624 responsive to a propagated signal so that a device connected to a network 630 can communicate voice, video, audio, images, or any other data over the network 630. Further, the instructions 624 may be transmitted or received over the network 630 via a communication port or interface 620, and/or using a bus 608.
  • the communication port or interface 620 may be a part of the processor 602 or may be a separate component.
  • the communication port or interface 620 may be created in software or may be a physical connection in hardware.
  • the communication port or interface 620 may be configured to connect with a network 630, external media, the display 610, or any other components in computer system 600, or combinations thereof.
  • connection with the network 630 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed below.
  • additional connections with other components of the computer system 600 may be physical connections or may be established wirelessly.
  • the network 630 may alternatively be directly connected to a bus 608.
  • computer-readable medium 622 is shown to be a single medium, the term “computer-readable medium” may include a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions.
  • the term “computer- readable medium” may also include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein.
  • the computer-readable medium 622 may be non-transitory, and may be tangible.
  • the computer-readable medium 622 can include a solid-state memory such as a memory card or other package that houses one or more non-volatile readonly memories.
  • the computer-readable medium 622 can be a random-access memory or other volatile re-writable memory. Additionally or alternatively, the computer-readable medium 622 can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to capture carrier wave signals such as a signal communicated over a transmission medium.
  • a digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
  • dedicated hardware implementations such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein.
  • Applications that may include the apparatus and systems of various implementations can broadly include a variety of electronic and computer systems.
  • One or more implementations described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations.
  • the computer system 600 may be connected to a network 630.
  • the network 630 may define one or more networks including wired or wireless networks.
  • the wireless network may be a cellular telephone network, an 802.11 , 802.16, 802.20, or WiMAX network. Further, such networks may include a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols.
  • the network 630 may include wide area networks (WAN), such as the Internet, local area networks (LAN), campus area networks, metropolitan area networks, a direct connection such as through a Universal Serial Bus (USB) port, or any other networks that may allow for data communication.
  • the network 630 may be configured to couple one computing device to another computing device to enable communication of data between the devices.
  • the network 630 may generally be enabled to employ any form of machine-readable media for communicating information from one device to another.
  • the network 630 may include communication methods by which information may travel between computing devices.
  • the network 630 may be divided into sub-networks.
  • the sub-networks may allow access to all of the other components connected thereto or the sub-networks may restrict access between the components.
  • the network 630 may be regarded as a public or private network connection and may include, for example, a virtual private network or an encryption or other security mechanism employed over the public Internet, or the like.
  • the methods described herein may be implemented by software programs executable by a computer system. Further, in an exemplary, non-limited implementation, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein. [0092] Although the present specification describes components and functions that may be implemented in particular implementations with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. For example, standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed herein are considered equivalents thereof.
  • TCP/IP Transmission Control Protocol
  • UDP/IP User Datagram Protocol
  • HTML HyperText Transfer Protocol
  • some of the embodiments are described herein as a method or combination of elements of a method that can be implemented by a processor of a computer system or by other means of carrying out the function.
  • a processor with the necessary instructions for carrying out such a method or element of a method forms a means for carrying out the method or element of a method.
  • an element described herein of an apparatus embodiment is an example of a means for carrying out the function performed by the element for the purpose of carrying out the invention.
  • the present disclosure furthermore relates to the following aspects.
  • Example 1 A computer-implemented method comprising: receiving, by one or more processors, a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating, by the one or more processors, the unique digital identifiers by encoding the plurality of images; receiving, by the one or more processors, a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting, by the one or more processors, a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting, by the one or more processors, the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second sub-system.
  • Example 2 The computer-implemented method of example 1 , wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing, by the one or more processors, the plurality of images; and concatenating, by the one or more processors, the plurality of hashed images in a pre-defined order
  • Example 3 The computer-implemented method of example 2, wherein the plurality of images are images of coral reefs and marine ecosystems.
  • Example 4 The computer-implemented method of example 3, wherein generating the unique digital identifiers further comprises: linking, by the one or more processors via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.
  • Example 5 The computer-implemented method of example 4, wherein generating the unique digital identifiers further comprises: storing, by the one or more processors, the unique digital identifiers on transaction blocks of a distributed blockchain, wherein the unique digital identifiers are associated with programmatically defined smart contracts written to the distributed blockchain; and receiving, by the one or more processors, a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain.
  • Example 6 The computer-implemented method of example 5, further comprising: monitoring, by the one or more processors, the coral reefs and marine ecosystems represented by the plurality of images based, at least in part, on the geographic coordinates and sensor data; and determining, by the one or more processors, whether condition of the coral reefs and the marine ecosystems satisfy a pre-determined threshold.
  • Example 7 The computer-implemented method of example 6, further comprising: matching, by the one or more processors, the blockchain address of the at least one unique digital identifier with the geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images; updating, by the one or more processors, metadata associated with the at least one unique digital identifier based, at least in part, on the determined condition of the coral reefs and the marine ecosystems; generating, by the one or more processors, a new unique digital identifier based, at least in part, on the updated metadata; and concatenating, by the one or more processors, the new unique digital identifier in the pre-defined order, wherein the pre-defined order includes connecting the new unique digital identifier to a preceding unique digital identifier on the transaction block of the distributed blockchain.
  • Example 8 The computer-implemented method of example 5, further comprising: minting, by the one or more processors, on the distributed blockchain, the unique digital identifier.
  • Example 9 The computer-implemented method of example 5, wherein receiving the second request from the at least one device associated with the second sub-system comprises: receiving, by the one or more processors via one or more sensors, biometric data that is unique to the second sub-system; processing, by the one or more processors, the biometric data to create authentication data for the second sub-system; and recording, by the one or more processors, the authentication data on the distributed blockchain to authenticate the second subsystem during a transaction of the unique digital identifier.
  • Example 10 The computer-implemented method of example 5, wherein the distributed blockchain is configured to store the unique digital identifier received over a communication network as a certificate of authenticity for a real object, a virtual object, or a combination thereof.
  • Example 11 A system comprising: one or more processors; a non- transitory computer readable medium storing instructions that, when executed by the one or more processors, cause the one or more processors to perform a method comprising: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second sub-system.
  • Example 12 The system of example 11 , wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing the plurality of images; and concatenating the plurality of hashed images in a pre-defined order.
  • Example 13 The system of example 12, wherein the plurality of images are images of coral reefs and marine ecosystems.
  • Example 14 The system of example 13, wherein generating the unique digital identifiers further comprises: linking, via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.
  • Example 15 The system of example 14, wherein generating the unique digital identifiers further comprises: storing the unique digital identifiers on transaction blocks of a distributed blockchain, wherein the unique digital identifiers are associated with programmatically defined smart contracts written to the distributed blockchain; and receiving a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain.
  • Example 16 The system of example 15, further comprising: monitoring the coral reefs and the marine ecosystems represented by the plurality of images based, at least in part, on the geographic coordinates and sensor data; and determining whether condition of the coral reefs and the marine ecosystems satisfy a pre-determined threshold.
  • Example 17 The system of example 16, further comprising: matching the blockchain address of the at least one unique digital identifier with the geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images; updating metadata associated with the at least one unique digital identifier based, at least in part, on the determined condition of the coral reefs and the marine ecosystems; generating a new unique digital identifier based, at least in part, on the updated metadata; and concatenating the new unique digital identifier in the pre-defined order, wherein the pre-defined order includes connecting the new unique digital identifier to a preceding unique digital identifier on the transaction block of the distributed blockchain.
  • Example 18 A non-transitory computer readable medium, the non- transitory computer readable medium storing instructions which, when executed by one or more processors of a computing system, cause the one or more processors to perform operations, comprising: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second subsystem; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first subsystem to the second digital access device associated with the second sub-system.
  • Example 19 The non-transitory computer readable medium of example 18, wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing the plurality of images, wherein the plurality of images are images of coral reefs and marine ecosystems; and concatenating the plurality of hashed images in a predefined order.
  • Example 20 The non-transitory computer readable medium of example 19, wherein generating the unique digital identifiers further comprises: linking, via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.

Landscapes

  • Engineering & Computer Science (AREA)
  • Business, Economics & Management (AREA)
  • Accounting & Taxation (AREA)
  • Theoretical Computer Science (AREA)
  • Physics & Mathematics (AREA)
  • Finance (AREA)
  • General Physics & Mathematics (AREA)
  • Strategic Management (AREA)
  • General Business, Economics & Management (AREA)
  • Economics (AREA)
  • Marketing (AREA)
  • Development Economics (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Entrepreneurship & Innovation (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • General Engineering & Computer Science (AREA)
  • Health & Medical Sciences (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Life Sciences & Earth Sciences (AREA)
  • Technology Law (AREA)
  • Mining & Mineral Resources (AREA)
  • Agronomy & Crop Science (AREA)
  • Tourism & Hospitality (AREA)
  • Animal Husbandry (AREA)
  • Game Theory and Decision Science (AREA)
  • Signal Processing (AREA)
  • Bioethics (AREA)
  • Primary Health Care (AREA)
  • Human Resources & Organizations (AREA)
  • Marine Sciences & Fisheries (AREA)
  • Mathematical Physics (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

Systems and methods are disclosed for generating unique digital identifiers. The method includes receiving a first request for unique digital identifiers from a device of a first sub-system, wherein the first request includes a plurality of images. Generating the unique digital identifiers by encoding the plurality of images. Receiving a second request for at least one of the unique digital identifiers from a device of a second sub-system. Transmitting a value of at least one unique digital identifier from a second digital access device of the second sub-system to a first digital access device of the first sub-system. Transmitting at least one unique digital identifier from the first digital access device to the second digital access device.

Description

SYSTEMS AND METHODS FOR GENERATING UNIQUE DIGITAL IDENTIFIERS FOR LINKING TO CORAL REEF DEVICES
CROSS-REFERENCE TO RELATED APPLICATION(S)
[0001] This application claims the benefit of priority to U.S. Provisional Application No. 63/385,118, filed on November 28, 2022, the entirety of which is incorporated herein by reference.
FIELD OF DISCLOSURE
[0002] The present disclosure relates generally to the field of environmental monitoring and analysis. In particular, the present disclosure relates to generating unique digital identifiers and linking generated unique digital identifiers to coral reef devices.
BACKGROUND
[0003] Coral reefs are home to numerous aquatic species. They absorb wave energy and reduce coastal erosion, and they are a source of income for many people. However, coral reefs are dying due to climate change, deteriorating water quality (e.g., pollution, ocean acidification, etc.), global warming, and direct physical damage from intensifying human stresses (e.g., dredging, anchoring, destructive fishing techniques, etc.). Such destruction of coral reefs is causing a decline in the diversity of aquatic species, an increase in erosion of coastal structures, and a loss of tourism revenues. Conventional methods for monitoring coral or marine environments include studies conducted by research laboratories or survey-type approaches. The methods implemented by research laboratories are complicated and only manageable by trained and skillful technicians, whereas the survey-type approaches are inaccurate. Service providers are technically challenged in developing a method for integrating modern technologies to identify threats to the coral or marine environment and evaluate potential mitigation plans. SUMMARY
[0004] According to certain aspects of the present disclosure, systems and methods are disclosed for generating unique digital identifiers, and linking generated unique digital identifiers to coral reef devices for monitoring, protecting, and restoring coral reefs and/or marine environment.
[0005] In one embodiment, a computer-implemented method includes: receiving, by one or more processors, a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request include a plurality of images; generating, by the one or more processors, the unique digital identifiers by encoding the plurality of images; receiving, by the one or more processors, a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting, by the one or more processors, a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting, by the one or more processors, the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second sub-system.
[0006] In accordance with another embodiment, a system includes one or more processors; and a non-transitory computer readable medium storing instructions that, when executed by the one or more processors, cause the one or more processors to perform a method including: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second subsystem; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first subsystem to the second digital access device associated with the second sub-system. [0007] In accordance with a further embodiment, a non-transitory computer readable medium , the non-transitory computer readable medium storing instructions which, when executed by one or more processors of a computing system, cause the one or more processors to perform operations, including: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second subsystem.
[0008] It is to be understood that both the foregoing general description and the following detailed description are exemplary and explanatory only and are not restrictive of the detailed embodiments, as claimed.
BRIEF DESCRIPTION OF THE DRAWINGS
[0009] The accompanying drawings, which are incorporated in and constitute a part of this specification, illustrate various exemplary embodiments and together with the description, serve to explain the principles of the disclosed embodiments.
[0010] FIG. 1 is a diagram of a system configured for generating unique digital identifiers (e.g., non-fungible tokens (NFTs)) for protecting and restoring coral reefs, according to aspects of the disclosure.
[0011] FIG. 2A is a diagram of the components of NFT generation platform 115, according to aspects of the disclosure.
[0012] FIG. 2B is a diagram of the components of distributed blockchain 117, according to one example embodiment.
[0013] FIG. 3 is a flowchart of a process for generating dynamic NFTs, according to aspects of the disclosure.
[0014] FIG. 4A is a flowchart of a process for transacting dynamic NFTs, according to aspects of the disclosure.
[0015] FIG. 4B is a diagram that illustrates the growth of the dynamic NFTs upon satisfaction of the pre-determined threshold, according to aspects of the disclosure. [0016] FIG. 5 shows an example machine learning training flow chart.
[0017] FIG. 6 illustrates an implementation of a general computer system configured to execute techniques presented herein.
DETAILED DESCRIPTION
[0018] While principles of the present disclosure are described herein with reference to illustrative embodiments for particular applications, it should be understood that the disclosure is not limited thereto. Those having ordinary skill in the art and access to the teachings provided herein will recognize additional modifications, applications, embodiments, and substitution of equivalents all fall within the scope of the embodiments described herein. Accordingly, the invention is not to be considered as limited by the foregoing description.
[0019] Various non-limiting embodiments of the present disclosure will now be described to provide an overall understanding of the principles of the structure, function, and use of systems and methods disclosed herein for generating unique digital identifiers (i.e. , non-fungible tokens (NFTs)) for protecting and restoring coral reefs.
[0020] Coral reefs maintain marine biodiversity and fishery resources, reduce the greenhouse effect, protect coastlines, e.g., preventing coastal erosion and flooding, and the like. However, due to climate change and human activities, coral reefs have generally been degraded, which is not only reflected in the reduction of living coral cover, but also in the quality of habitats, such as reef collapse and fragmentation, structural simplification, etc., which may lead to a decrease in species diversity and then weaken the function of coral reef ecosystems. As coral reefs are declining at fast rates, scientists are technologically challenged to find effective and innovative ways to save them. The future of coral reefs depends upon technologies that analyze coral reef data, e.g., in real-time or near real-time, and provide recommendations to prevent and restore them. However, the advancement of such technologies suffers from a lack of visibility and investment.
[0021] Conventional methods are technically challenged in incorporating advanced sensors, remote sensing, and tracking systems for providing real-time and accurate information regarding the conditions of corals or marine environments. These methods are also technically challenged in automating image capture and processing, and developing algorithms to segment, classify, and analyze the captured images or data sets for making an informed decision regarding protecting and/or restoring coral reefs or marine environment.
[0022] The present disclosure solves the technical challenges typically encountered during the use of a conventional techniques, such as those discussed above. One way of achieving this is by generating NFTs that provide a safe and reliable means of digital transactions and assets, while addressing the threats faced by the coral reefs. NFTs may be leveraged to create a green economy to support environmental causes. For example, a user may purchase NFTs and own a virtual coral reef that is created on a blockchain, and the purchased NFTs may fund research and development to prevent and restore coral reefs. NFTs are becoming popular, and as users are discovering the liberation of peer-to-peer transactions, there has been a visible shift toward decentralization. As part of this march toward decentralization, innovations may be made, and sophisticated systems and methods may be developed to integrate such decentralized finance with the goal of protecting and restoring coral reefs. System 100 leverages modern technology infrastructures and novel data structures and algorithmsto generate NFTs for protecting and restoring coral reefs.
[0023] In one embodiment, system 100 introduces real-time environmental monitoring systems, which incorporate modern real-time sensor networks, machine learning techniques, NFTs, the Internet of Things (loT), predictive analytics, and other technologies to statistically analyze corals or marine environment in real-time. The real-time data is utilized to make predictions and inform time-critical decisions related to environmental conditions.
[0024] FIG. 1 is a diagram of a system configured for implementing modern communication and data processing capabilities into methods and systems for generating NFTs for protecting and restoring coral reefs, according to one example embodiment. FIG. 1 , an example architecture of one or more example embodiments of the present invention, includes system 100 that comprises first sub-system 101 , user equipment (UE) 103 that includes application 105 and sensors 107, file 109, communication network 111 , database 113, NFT generation platform 115, distributed blockchain 117, and second sub-system 119. [0025] In one embodiment, the first sub-system 101 is a single service-providing entity or a group of service-providing entities that may perform various activities to protect and restore coral reefs or marine environment based, at least in part, on the NFTs associated with second sub-system 119. For example, NFTs of second subsystem 119 may fund various projects undertaken by first sub-system 101 to protect and restore the coral reefs, e.g., collecting scientifically sound, geographically comprehensive biological, climate, and socioeconomic data on coral reefs, developing methodologies for countering damages to the coral reefs, etc. In another embodiment, the first sub-system 101 is a system that is managed or hosted by the service-providing entity for providing service(s) related to monitoring, protecting, and restoring coral reefs and/or marine environment.
[0026] In one embodiment, UE 103 may include, but is not restricted to, any type of mobile terminal, wireless terminal, fixed terminal, or portable terminal. Examples of the UE 103, may include, but are not restricted to, a mobile handset, a wireless communication device, a station, a unit, a device, a multimedia computer, a multimedia tablet, an Internet node, a communicator, a desktop computer, a laptop computer, a notebook computer, a netbook computer, a tablet computer, a Personal Communication System (PCS) device, a personal navigation device, a Personal Digital Assistant (PDA), a digital camera/camcorder, an infotainment system, a dashboard computer, a television device, or any combination thereof, including the accessories and peripherals of these devices, or any combination thereof. In addition, the UE 103 may facilitate various input means for receiving and generating information, including, but not restricted to, a touch screen capability, a keyboard, and keypad data entry, a voice-based input mechanism, and the like. The UE 103 may be configured with different features for generating, sharing, and viewing of visual content. For example, the first sub-system 101 may send a request for generating NFTs via UE 103 and may receive the NFTs via UE 103. For example, the second sub-system 119 may send a request for purchasing the generated NFTs and may receive the purchased NFTs via UE 103. Any known and future implementations of the UE 103 are also applicable
[0027] In one embodiment, UE 103 may include applications 105. Further, applications 105 may include various applications such as, but not restricted to, content provisioning applications, networking applications, multimedia applications, media player applications, camera/imaging applications, software applications, payment application, and the like. In one embodiment, one of the applications 105 at UE 103 may act as a client for NFT generation platform 115 and may perform one or more functions associated with the functions of NFT generation platform 115 by interacting with NFT generation platform 115 over communication network 111. [0028] By way of example, sensor 107 may be any type of sensor. In one embodiment, sensors 107 may include, for example, a network detection sensor for detecting wireless signals or receivers for different short-range communications (e.g., Bluetooth, Wi-Fi, Li-Fi, near field communication (NFC), etc.), a camera/imaging sensor for gathering image data (e.g., real-time images or videos of coral reefs, marine environments, etc.), an audio recorder for gathering audio data (e.g., recordings of various research on coral reefs, marine environments, etc.), and the like. In another embodiment, sensors 107 may implement remote sensing technologies for measuring coral reef properties, and may receive: (i) data from Lidar (Light Detection and Ranging) on coral reef properties, (ii) data from biosensors on water quality, (iii) data from radar on near-surface waves and current, and/or (iv) data from thermal sensors on water temperature. In one embodiment, sensors 107 may include a ledger sensor, e.g., a software implemented alongside distributed blockchain 117 that may monitor every transaction written to distributed blockchain 117 for information that the ledger sensors are instructed to find. Such ledger sensors may be activated by a request to search through distributed blockchain 117 for data corresponding to the request.
[0029] In one embodiment, file 109 may include images and/or videos of coral reefs and/or marine environment collected via sensors 107, underwater robots, drones, or a satellite (e.g., satellite 441 of FIG. 4B). In one example, a diver/researcher may utilize underwater cameras to capture images and/or videos of the coral reefs and marine environment. In another example, a satellite may capture, in real-time or near real-time, images and/or videos of the coral reefs and/or marine environment. File 109 may be stored in database 113 for access by NFT generation platform 115.
[0030] In one embodiment, various elements of system 100 may communicate with each other through communication network 111. Communication network 111 may support a variety of different communication protocols and communication techniques. In one embodiment, communication network 111 allows NFT generation platform 115 to communicate with UE 103, database 113, and distributed blockchain 117. The communication network 111 of system 100 includes one or more networks such as a data network, a wireless network, a telephony network, or any combination thereof. It is contemplated that the data network may be any local area network (LAN), metropolitan area network (MAN), wide area network (WAN), a public data network (e.g., the Internet), short range wireless network, or any other suitable packet-switched network, such as a commercially owned, proprietary packet- switched network, e.g., a proprietary cable or fiber-optic network, and the like, or any combination thereof. In addition, the wireless network may be, for example, a cellular communication network and may employ various technologies including 5G (5th Generation), 4G, 3G, 2G, Long Term Evolution (LTE), wireless fidelity (Wi-Fi), Bluetooth®, Internet Protocol (IP) data casting, satellite, mobile ad-hoc network (MANET), vehicle controller area network (CAN bus), and the like, or any combination thereof.
[0031] In one embodiment, database 113 may be any type of database, such as relational, hierarchical, object-oriented, and/or the like, wherein data are organized in any suitable manner, including data tables or lookup tables. In one embodiment, database 113 may access various data sources and store and manage multiple types of information, e.g., file 109, that can provide means for aiding in the content provisioning and sharing process. It is understood that any other suitable data may be included in the database 113. In an embodiment, database 113 may include a machine-learning based training database with pre-defined mapping defining a relationship between various input parameters and output parameters based on various statistical methods. Exemplary datasets include geographic data, climate data, coral reef data, marine environment data, and the like. The training database may be routinely updated and/or supplemented based on machine learning methods. [0032] In one embodiment, NFT generation platform 115 may be a platform with multiple interconnected components. NFT generation platform 115 may include one or more servers, intelligent networking devices, computing devices, components, and corresponding software for generating unique digital identifiers, i.e., non-fungible tokens (NFTs), to prevent and restore coral reefs. In addition, it is noted that NFT generation platform 115 may be a separate entity of system 100. Further details of NFT generation platform 115 are provided below.
[0033] In one embodiment, distributed blockchain 117 may hold immutable information once data is committed to the chain, and it is therefore a decentralized, distributed, and immutable database in which data is logically structured as a sequence of smaller chunks (blocks). In one example embodiment, in distributed blockchain 117, each block 8,>o is immutably connected to a single preceding block B/-1 through a cryptographic hash function /-/(B,-i ). Any changes to B,-i may yield an invalid hash in B, and all following blocks. The very first block Bo, the genesis block, is the only block without a predecessor. In one instance, to assure the integrity of a block and the data contained in it, respectively, the block may be digitally signed. In one example embodiment, as each transaction occurs, these transactions may be recorded as a block of data in distributed blockchain 117. These blocks may form a chain of data as assets move from place to place or ownership changes hands. These blocks may confirm the exact time and sequence of transactions, and may link securely together to prevent any block from being altered or a block being inserted between two existing blocks. In one embodiment, each additional block may strengthen the verification of the previous block, thereby forming a protected blockchain. Distributed blockchain 117 may be tamper-evident, delivering the key strength of immutability. This removes the possibility of tampering by a malicious actor and builds a ledger of transactions users, e.g., second subsystem 119, can trust.
[0034] In one example embodiment, the first sub-system 101 and second subsystem 119 may have access to distributed blockchain 117, and its immutable record of transactions. In such a shared ledger, transactions may be recorded only once, eliminating the duplication of records that is typical of traditional business networks. For example, participants may not change or tamper with a transaction after it has been recorded to distributed blockchain 117. However, if a transaction record includes an error, a new transaction may be added to reverse the error, and both transactions are then visible. In one instance, to expedite transactions, a set of rules, e.g., smart contracts, may be stored on the blockchain and executed automatically. Due to transparency, proof of ownership, and traceable transactions in a blockchain network, NFTs may be created using blockchain technology, e.g., distributed blockchain 117. In one embodiment, NFTs may be generated when distributed blockchain 117 string records of cryptographic hash, a set of characters that verifies a set of data to be unique, onto previous records, therefore, creating a chain of identifiable data blocks. This cryptographic transaction process ensures the authentication of each digital file by providing a digital signature that is used to track NFT ownership.
[0035] In one embodiment, NFTs are non-fungible cryptographic assets that may be declared in a standard token format and may have a unique set of attributes. In one example embodiment, NFTs may be digital assets with unique identifiers that are stored on distributed blockchain 117 and may not be substituted. In another example embodiment, NFTs may be digital representations of real-world objects, e.g., coral reefs and marine environment, etc., or tradable rights of digital assets, e.g., pictures, virtual creations, audio, and other types of digital files, where the ownerships may be recorded in blockchain smart contracts. In one embodiment, NFTs may be tracked on distributed blockchain 117 to provide the owner with proof of ownership.
[0036] In one embodiment, second sub-system 119 may be a person or any entity interacting with a user interface or a web interface of the system associated with first sub-system 101 to purchase the NFTs. For example, the second subsystem 119 may include a registered user, an authorized user, a returning user, a visiting user, a potential user, etc., to access payment-related services provided by the service provider, e.g., purchasing NFTs.
[0037] By way of example, UE 103, database 113, NFT generation platform 115, and distributed blockchain 117 may communicate with each other and other components of the communication network 111 using well known, new or still developing protocols. In this context, a protocol includes a set of rules defining how the network nodes within the communication network 111 interact with each other based on information sent over the communication links. The protocols are effective at different layers of operation within each node, from generating and receiving physical signals of various types, to selecting a link for transferring those signals, to the format of information indicated by those signals, to identifying which software application executing on a computer system sends or receives the information. The conceptually different layers of protocols for exchanging information over a network are described in the Open Systems Interconnection (OSI) Reference Model.
[0038] Communications between the network nodes are typically effected by exchanging discrete packets of data. Each packet typically comprises (1 ) header information associated with a particular protocol, and (2) payload information that follows the header information and contains information that may be processed independently of that particular protocol. In some protocols, the packet includes (3) trailer information following the payload and indicating the end of the payload information. The header includes information such as the source of the packet, its destination, the length of the payload, and other properties used by the protocol. Often, the data in the payload for the particular protocol includes a header and payload for a different protocol associated with a different, higher layer of the OSI Reference Model. The header for a particular protocol typically indicates a type for the next protocol contained in its payload. The higher layer protocol is said to be encapsulated in the lower layer protocol. The headers included in a packet traversing multiple heterogeneous networks, such as the Internet, typically include a physical (layer 1) header, a data-link (layer 2) header, an internetwork (layer 3) header and a transport (layer 4) header, and various application (layer 5, layer 6 and layer 7) headers as defined by the OSI Reference Model.
[0039] FIG. 2A is a diagram of the components of NFT generation platform 115, according to one example embodiment. As used herein, terms such as “component” or “module” generally encompass hardware and/or software, e.g., that a processor or the like may use to implement associated functionality. By way of example, NFT generation platform 115 includes one or more components for generating NFTs for protecting and restoring coral reefs. It is contemplated that the functions of these components may be combined in one or more components or performed by other components of equivalent functionality. In one embodiment, NFT generation platform 115 comprises data collection module 201 , data processing module 203, NFT content encoder 205, NFT mint program 207, training module 209, machine learning module 211 , and user interface module 213, or any combination thereof. [0040] In one embodiment, data collection module 201 may automatically collect relevant data associated with coral reefs and/or the marine environment through sensor 107 or various data collection techniques. In one example embodiment, data collection module 201 may use a web-crawling component to access various information sources, e.g., database 113, distributed blockchain 117, to collect relevant data associated with coral reefs and/or the marine environment. Data collection module 201 may include various software applications, e.g., data mining applications in Extended Meta Language (XML), that automatically search for and return relevant data regarding coral reefs and/or the marine environment. Data collection module 201 may parse and arrange the data into a common format that can be easily processed by other modules and platforms.
[0041] In one embodiment, data processing module 203 may process data collected by data collection module 201 . In one example embodiment, data processing module 203 may process, in real-time or near real-time, coral reef data and marine environment data to determine the condition of the coral reefs and marine environment. In another example embodiment, data processing module 203 may compare the current condition of the coral reef and marine environment with historical data to determine an improvement or a deterioration in the condition of the coral reefs and marine environment. In another example embodiment, data processing module 203 may process NFT data associated with second sub-system 119 to generate a recommendation to update the metadata of the NFT upon determining an improvement in the condition of the coral reef and marine environment.
[0042] In one embodiment, NFT content encoder 205 may be configured to encode data associated with second sub-system 119, coral reefs, and/or the marine environment to generate an NFT. In one example embodiment, data associated with second sub-system 119 may include, but is not limited to, personal data, e.g., name, signature, address, phone number, place of birth, etc., biometric data, e.g., height, weight, blood type, eye color, fingerprint, iris patterns, DNA information, etc., and/or additional multimedia data, e.g., audio, still images, animation, videos, etc., and so forth. In one example embodiment, data associated with coral reefs and/or the marine environment may include, but are not limited to, coral reefs and marine animal population, coral reef health, changes in water quality and temperature, coral diseases, coral bleaching, coastal erosion, human activities, e.g., dredging, anchoring, fishing, coral reefs mining, etc., that impacts the coral reefs and/or the marine environment. These data may provide unique attributes to each NFT, thereby making the NFT irreplaceable.
[0043] In one embodiment, NFT mint program 207 may process by logging the encoded data in distributed blockchain 117 to generate customized NFTs. The customized NFTs may be received over communication network 111 and may be further verified by NFT generation platform 115. The verified NFTs may be logged in distributed blockchain 117 with a set of protocols for marking a permanent chain of custody on the customized NFTs to prevent editing, modifying, or deletion.
[0044] In one embodiment, training module 209 may provide supervised learning to machine learning module 211 by providing training data that contains input and correct output, to allow machine learning module 211 to learn over time. The training may be performed based on the deviation of a processed result from a documented result when the inputs are fed into machine learning module 211 , e.g., an algorithm measures its accuracy through the loss function, adjusting until the error has been sufficiently minimized. In one embodiment, training data may include sample image data, sample video data, sample NFT data, etc., for training machine learning module 211 to identify the condition of the coral reefs and/or generate NFTs from images/videos for storage into distributed blockchain 117. Training module 209 may conduct the training in any suitable manner, e.g., in batches, and may include any suitable training methodology. Training may be performed periodically, and/or continuously, e.g., in real-time or near real-time.
[0045] In one embodiment, machine learning module 211 may receive the training data from training module 209. Machine learning module 211 may randomize the ordering of the training data, visualize the training data to identify relevant relationships between different variables, identify any data imbalances, split the training data into two parts where one part is for training a model and the other part is for validating the trained model, de-duplicating, normalizing, correcting errors in the training data, and so on. Machine learning module 211 may implement various machine learning techniques, e.g., decision tree learning, association rule learning, neural network (e.g., recurrent neural networks, convolutional neural networks, deep neural networks), inductive programming logic, support vector machines, Bayesian models, etc. In another embodiment, machine learning module 211 may leverage one or more classification models trained to classify the training data and/or one or more prediction models trained to predict an outcome based on the training data. In one example embodiment, machine learning module 211 may input the training data to classification models and/or prediction models to generate NFTs or update the NFTs. In one example embodiment, machine learning module 211 may process, in real-time or near real-time, the data from other modules to determine the deterioration or restoration of the coral reefs and marine ecosystems. The machine learning module may automatically upgrade the NFTs upon determining progress in the restoration of the coral reefs and marine ecosystems. The machine learning module may automatically generate recommendations upon determining a deterioration in the condition of the coral reefs and marine ecosystems, e.g., novel methods to attract customers, new approaches to handle the worsening condition of the coral reefs, etc.
[0046] In one embodiment, user interface module 213 may enable a presentation of a graphical user interface (GUI) in UE 103. User interface module 213 may employ various application programming interfaces (APIs) or other function calls corresponding to application 105 on UE 103, thus enabling the display of NFTs, images/videos, and/or graphics primitives such as icons, menus, buttons, data entry fields, etc. In one example embodiment, user interface module 213 may generate a display of the virtual reefs, e.g., dynamic and evolving 3D reef stars featuring multiple corals, represented by the NFTs. Second sub-system 119 may view the progress of the virtual reef, wherein the progress of the virtual reefs may represent the progress of the physical coral reefs. The virtual reefs also represent memberships with voting rights and benefits, that may grow based on user participation. Through game mechanics, users may be awarded points and benefits that level up their virtual reefs. In another embodiment, user interface module 213 may cause interfacing of guidance information with second sub-system 119 to include, at least in part, one or more annotations, audio messages, video messages, or a combination thereof. In a further example embodiment, user interface module 213 may comprise a variety of interfaces, for example, interfaces for data input and output devices, referred to as I/O devices, storage devices, and the like. Still further, user interface module 213 may be configured to operate in connection with augmented reality (AR) processing techniques, wherein various applications, graphic elements, and features may interact. [0047] FIG. 2B is a diagram of the components of distributed blockchain 117, according to one example embodiment. In one embodiment, the distributed blockchain 117 may include encoder/decoder 215, ledger inquiry and update server 217, smart contract 219, or any combination thereof.
[0048] In one embodiment, distributed blockchain 117 may encrypt data stored in distributed blockchain 117, via encoder/decoder 215, to provide security and/or protect sensitive information. In some embodiments, the latest data stored in distributed blockchain 117 may be periodically or continually retrieved by NFT generation platform 115 to make it accessible to interested parties, e.g., first subsystem 101 and/or second sub-system 119. In such embodiments, distributed blockchain 117 may decode data stored in distributed blockchain 117, via encoder/decoder 215. Embodiments of encoder/decoder 215 are not limited to these examples and may include other suitable functionality in other embodiments. [0049] In one embodiment, ledger inquiry and update server 217 may be one or more of an application, application program interface, software, hardware, server, or protocol that allows the addition of data, e.g., a new attribute or a detail regarding an attribute of a transaction, to distributed blockchain 117. In some embodiments, ledger inquiry and update server 217 may further enable the access or retrieval of data for any attribute of the transaction information from distributed blockchain 117. In one embodiment, ledger inquiry and update server 217 may respond to requests to add attributes of a transaction, dispute one or more of the previously posted data for the transaction attribute, or add a proposed modification to an existing transaction attribute.
[0050] In one embodiment, smart contract 219 may be one or more of an application, application program interface, software, hardware, server, or computerized transaction protocol that facilitates, verifies, and/or enforces the negotiation or performance of a contract. In various embodiments presented herein, the contract is configured to govern the transaction between first sub-system 101 and second sub-system 119.
[0051] The above presented modules and components of NFT generation platform 115 may be implemented in hardware, firmware, software, or a combination thereof. Though depicted as a separate entity in FIG. 2A, it is contemplated that NFT generation platform 115 may be implemented for direct operation by respective UE 103. As such, NET generation platform 115 may generate direct signal inputs by way of the operating system of the UE 103. In another embodiment, one or more of the modules 201-213 may be implemented for operation by respective UEs, as NFT generation platform 115, or a combination thereof. The various executions presented herein contemplate any and all arrangements and models.
[0052] FIG. 3 is a flowchart of a process for generating dynamic NFTs, according to one example embodiment. In various embodiments, NFT generation platform 115 may perform one or more portions of process 300 and may be implemented in, for instance, a chip set including a processor and a memory as shown in FIG. 6. As such, NFT generation platform 115 and/or any of modules 201-219 may provide means for accomplishing various parts of process 300, as well as means for accomplishing embodiments of other processes described herein in conjunction with other components of system 100. Although process 300 is illustrated and described as a sequence of steps, it is contemplated that various embodiments of process 300 may be performed in any order or combination and need not include all of the illustrated steps.
[0053] In step 301 , NFT generation platform 115, via processor 602 (which may include one or more processors), may receive a request (e.g., a first request) for unique digital identifiers (e.g., NFTs) from at least one device, e.g., UE 103, associated with first sub-system 101. In one embodiment, the request may include a plurality of images and/or videos of coral reefs and marine ecosystems. The images and/or videos include geographic coordinates of the coral reefs and marine ecosystems. In one embodiment, NFT generation platform, 115 via machine learning module 211 , may automatically retrieve images and/or videos associated with coral reefs, marine ecosystems, and second sub-system 119 from various information sources to generate dynamic NFTs. Such automated retrieval may be based on historical data, e.g., frequency of NFT requests, of authenticated first subsystem 101 and/or second sub-system 119. The generated NFTs include images, videos, and/or codes associated with a specific coral reef.
[0054] In step 303, NFT generation platform 115, via processor 602 and NFT content encoder 205, may encode the plurality of images and/or videos of coral reefs and marine ecosystems, thereby linking the generated dynamic NFT with one or more specific coral reef(s) and/or one or more specific coral reef devices (e.g., reef stars). For example, NFT generation platform 115 may link the NFTs and the plurality of images via geotagging, wherein the NFTs includes geographic coordinates of the coral reefs and the marine ecosystem represented by the plurality of images. NFT generation platform 115 may cryptographically hash the plurality of images and may concatenate the plurality of hashed images in a pre-defined order. NFT generation platform 115 may generate dynamic NFTs by minting, on the distributed blockchain 117, the dynamic NFTs. In one embodiment, NFT generation platform 115 may link the dynamic NFTs and the plurality of images via geotagging. In one example embodiment, the dynamic NFTs may be virtual reef NFTs, 3D reef stars featuring vibrant 3D coral and marine life, and may include geographic coordinates of the coral reefs and marine ecosystems represented by the plurality of images and/or videos.
[0055] In step 305, NFT generation platform 115, via processor 602, may receive a request (e.g., second request) for at least one dynamic NFT from a device, e.g., UE 103, associated with second sub-system 119. In one instance, the request is a purchase request to buy at least one NFTs from the plurality of NFTs. In one embodiment, NFT generation platform 115 may receive, via sensors 107, biometric data that is unique to second sub-system 119 with the purchase request. The biometric data includes eye details, facial details, hand geometry, and/or fingerprints of second sub-system 119. NFT generation platform 115 may process the biometric data to create authentication data for second sub-system 119. NFT generation platform 115 may record the authentication data on distributed blockchain 117 to authenticate second sub-system 119 for any transactions to purchase the dynamic NFTs.
[0056] In step 307, NFT generation platform 115, via processor 602, may transmit a value of the requested dynamic NFTs from a second digital access device (e.g., digital wallet) associated with second sub-system 119 to a first digital access device (e.g., digital wallet) associated with first sub-system 101. In one embodiment, the digital wallet may facilitate fast, convenient, and secure NFT transactions by utilizing application 105 of UE 103. In another embodiment, the digital wallet may be a standalone application program or a companion program to a web browser, e.g., a Hypertext Markup Language (“HTML”) compliant web browser or other types of web browser having messaging and storage capabilities. In one example embodiment, to complete the purchase transaction using the digital wallet, second sub-system 119 may navigate to first sub-system 101 ’s website using a web browser and locate the NFTs. After second sub-system 119 indicates a desire to purchase the NFTs, the digital wallet of the second sub-system 119 may interact with the first sub-system 101 ’s website in a secure manner to complete the transaction. Once the transaction is completed, the digital wallet of the first sub-system 101 may receive the value for the NFT, generate a confirmation or receipt for the transaction, and store the confirmation or receipt. The digital wallet may also synchronize the confirmation or receipt with a cloud computing environment, e.g., database 113.
[0057] In step 309, NFT generation platform 115, via processor 602, may transmit the dynamic NFTs from the digital wallet associated with first sub-system 101 to the digital wallet associated with second sub-system 119. As previously discussed, the NFTs represent a non-fungible physical asset owned by first sub-system 101 , and the ownership of the non-fungible physical asset is transferred from first sub-system 101 to second sub-system 119 upon completion of the transaction. In one example embodiment, second sub-system 119 may utilize the NFTs to participate in decision making, e.g., voting, regarding awarding funds to a particular project for protecting and restoring coral reefs, future coral reef restoration regions, and choosing partnering agencies to exponentially grow coral reefs.
[0058] In one embodiment, NFT generation platform 115, via processor 602, may store the dynamic NFTs on transaction blocks of distributed blockchain 117. The distributed blockchain 117 is configured to store the dynamic NFTs received over communication network 111 as a certificate of authenticity for a real object and/or a virtual object. In one embodiment, the dynamic NFTs are associated with programmatically defined smart contracts written to distributed blockchain 117. NFT generation platform 115 may receive a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain.
[0059] In one embodiment, NFT generation platform 115 may monitor, in realtime or near real-time, coral reefs and marine ecosystems represented by the plurality of images and/or videos. NFT generation platform 115 may locate the coral reefs and marine ecosystems based on sensor data or the geographic coordinates embedded within the plurality of images and/or videos. NFT generation platform 115 may determine, in real-time or near real-time, whether the condition of the coral reefs and marine ecosystems meets the pre-determined threshold level.
[0060] In one embodiment, NFT generation platform 115 may match the blockchain address of the dynamic NFTs with the geographic coordinates of the coral reefs and marine ecosystems. NFT generation platform 115 may update metadata associated with the dynamic NFTs based on the condition of the coral reefs and marine ecosystems and the pre-determined threshold level (e.g., comparing the condition of the coral reefs and marine ecosystems to the predetermined threshold level). NFT generation platform 115 may generate a new dynamic NFT based, at least in part, on the updated metadata. The new dynamic NFT is concatenated in the pre-defined order, wherein the pre-defined order includes connecting the new dynamic NFT to preceding dynamic NFTs on the transaction block of distributed blockchain 117.
[0061] FIG. 4A is a flowchart of a process for transacting dynamic NFTs, according to one example embodiment. Although process 400 is illustrated and described as a sequence of steps, it is contemplated that various embodiments of process 400 may be performed in any order or combination and need not include all of the illustrated steps.
[0062] In one example embodiment, second sub-system 119, via UE 103, may navigate to first sub-system 101 ’s website and initiate a purchase transaction of dynamic NFTs. In step 401 , second sub-system 119 may select dynamic NFTs which are then automatically added to the shopping cart, and second sub-system 119 may proceed to checkout. In step 403, second sub-system 119 is presented with a notification in the user interface of UE 103 requesting billing information, e.g., name information, address information, etc., and contact information, e.g., phone number, email address, etc. The second sub-system 119 may enter the requested information, whereupon the second sub-system 119 is navigated to a payment section of the website.
[0063] In step 405, second sub-system 119 is presented with a notification in the user interface of UE 103 requesting payment details, e.g., credit card information, bank account information, security code, credit card expiration date, routing number, or any other payment-related information. The second sub-system 119 may enter the requested information, whereupon the second sub-system 119 is navigated to the confirmation page of the website. In step 407, second sub-system 119 may review the purchase transaction for the NFTs and may confirm the purchase to complete the transaction.
[0064] In step 409, second sub-system 119 may receive the purchase confirmation, purchase details, and a link to a digital wallet service provider. The second sub-system 119 may receive this information via email or as a textual message in UE 103. Second sub-system 119 may click on the link, whereupon second sub-system 119 is navigated to a website that provides digital wallet service. Second sub-system 119 may be requested for login credentials, e.g., user name and password, biometric verification, etc. In step 411 , the registered second sub-system 119 may enter login credentials, whereas a new second sub-system 119 may register with the digital wallet service by creating login credentials.
[0065] In step 413, the digital wallet service provider may display a list of the purchased NFTs for review by authenticated second sub-system 119. In step 415, authenticated second sub-system 119 may review the NFTs to ensure the purchase transaction was accurately executed, e.g., verifying the NFTs are the ones that were intended to be purchased.
[0066] In step 417, second sub-system 119 may be notified to connect the access device (e.g., digital wallet) to their bank accounts, credit cards, debit card accounts, social media accounts or any other type of account. In step 419, second sub-system 119 may connect the digital wallet to their bank accounts, whereupon the transaction performed utilizing the digital wallet may be debited to the bank account of second sub-system 119. In another example embodiment, second sub-system 119 may connect the digital wallet to their credit cards. The digital wallet may store multiple credit cards and may allow second sub-system 119 to set a default payment method during any transaction performed utilizing the digital wallet. In another example embodiment, second sub-system 119 may connect the digital wallet to their social media account, and may share their digital collectibles, e.g., cross-post digital collectibles that they own.
[0067] In step 421 , second sub-system 119 may be notified to initialize the digital wallet. In step 423, a wallet encryption key may be created and the digital wallet is then initialized. The digital wallet may send at least one outgoing transaction, and a correct public key is then recorded on the distributed blockchain 117. Initialization of a digital wallet may secure the digital wallet, as the network may detect nonmatching public keys. In step 425, second sub-system 119 may claim the NFTs. [0068] FIG. 4B is a diagram that illustrates the growth of the dynamic NFTs upon satisfaction of the pre-determined threshold, according to one example embodiment. In this example embodiment, second sub-system 119 has acquired dynamic NFT 427 which is embedded with geographic coordinates of the coral reefs and marine ecosystems it is representing. NFT generation platform 115 may monitor, in realtime or near real-time, the coral reefs and marine ecosystems of dynamic NFT 427 per the methods described herein. NFT generation platform 115 may determine, in real-time or near real-time, whether the condition of the coral reefs and marine ecosystems meets the pre-determined threshold level. For example, NFT 427 may represent coral reef 435, and NFT generation platform 115 may receive, in real-time or near real-time, coral reef data and marine environment data from sensors 107, satellite 441 , divers/researchers 437, and various underwater sensors 439, e.g., underwater camera, underwater robots, etc. NFT generation platform 115 may update metadata of dynamic NFT 427 upon determining the condition of the coral reefs and marine ecosystems satisfy the pre-determined threshold level. In one example embodiment, NFT generation platform 115 may determine the growth of coral reefs satisfies the pre-determined coral reef growth threshold, whereupon dynamic NFT 427 may be upgraded to dynamic NFT 429.
[0069] In one instance, the second sub-system 119 may donate for various research or activities undertaken by the first sub-system 101 to improve the growth of marine animals around the coral reef 435. The NFT generation platform 115 may determine the growth of marine animals around the coral reefs satisfies the predetermined marine population threshold, as a result, dynamic NFT 429 may be upgraded to dynamic NFT 431 .
[0070] Similarly, the second sub-system 119 may contribute to the various research or activities undertaken by the first sub-system 101 to increase marine and coral reef species or improve the water quality around the coral reef 435. NFT generation platform 115 may determine growth in the species of marine animals and coral reefs, and an improvement in water quality around the coral reefs. Such growth and improvements satisfy the pre-determined threshold regarding marine animal species, coral reef species, and water quality. NFT generation platform 115 may upgrade dynamic NFT 431 to dynamic NFT 433. In one embodiment, dynamic NFTs 427, 429, 431 , and 433 may be concatenated in a pre-defined order, e.g., connecting the new dynamic NFT to a preceding dynamic NFTs on the transaction block of distributed blockchain 117.
[0071] In one example embodiment, divers/researchers 437 may plant a geotagged reef star on the floor of the coral reef (e.g., the coral reef 435). The second sub-system 119 may exchange fully developed NFTs, e.g., NFT 433 has reached its top growth level, for the physical geotagged reef star located on the floor of the coral reef. Accordingly, second sub-system 119 may have ownership over the physical geotagged reef star that is positioned in a tangible spot on Earth. In such a manner, real-world coral reefs are prevented and restored with virtual coral NFTs by gamification of donations or NFTs growth.
[0072] One or more implementations disclosed herein include and/or may be implemented using machine learning model, e.g., machine learning module 211 , and/or may be used to train the machine learning model. A given machine learning model may be trained using the data flow 500 of FIG. 5. Training data 512 may include one or more of stage inputs 514 and known outcomes 518 related to the machine learning model to be trained. The stage inputs 514 may be from any applicable source including text, visual representations, data, values, comparisons, stage outputs (e.g., one or more outputs from a step from FIG. 3). The known outcomes 518 may be included for the machine learning models generated based on supervised or semi-supervised training. An unsupervised machine learning model may not be trained using known outcomes 518. Known outcomes 518 may include known or desired outputs for future inputs similar to or in the same category as stage inputs 514 that do not have corresponding known outputs.
[0073] The training data 512 and a training algorithm 520 (e.g., one or more of the modules implemented using the machine learning model and/or may be used to train the machine learning model) may be provided to a training component 530 that may apply the training data 512 to the training algorithm 520 to generate the machine learning model. According to an implementation, the training component 530 may be provided comparison results 516 that compare a previous output of the corresponding machine learning model to apply the previous result to re-train the machine learning model. The comparison results 516 may be used by the training component 530 to update the corresponding machine learning model. The training algorithm 520 may utilize machine learning networks and/or models including, but not limited to a deep learning network such as Deep Neural Networks (DNN), Convolutional Neural Networks (CNN), Fully Convolutional Networks (FCN) and Recurrent Neural Networks (RCN), probabilistic models such as Bayesian Networks and Graphical Models, and/or discriminative models such as Decision Forests and maximum margin methods, or the like.
[0074] The machine learning model used herein may be trained and/or used by adjusting one or more weights and/or one or more layers of the machine learning model. For example, during training, a given weight may be adjusted (e g., increased, decreased, removed) based on training data or input data. Similarly, a layer may be updated, added, or removed based on training data/and or input data. The resulting outputs may be adjusted based on the adjusted weights and/or layers. [0075] In general, any process or operation discussed in this disclosure that is understood to be computer-implementable, such as the process illustrated in FIG. 3 may be performed by one or more processors of a computer system as described herein. A process or process step performed by one or more processors may also be referred to as an operation. The one or more processors may be configured to perform such processes by having access to instructions (e.g., software or computer-readable code) that, when executed by the one or more processors, cause the one or more processors to perform the processes. The instructions may be stored in a memory of the computer system. A processor may be a central processing unit (CPU), a graphics processing unit (GPU), or any suitable types of processing unit.
[0076] A computer system, such as a system or device implementing a process or operation in the examples above, may include one or more computing devices. One or more processors of a computer system may be included in a single computing device or distributed among a plurality of computing devices. One or more processors of a computer system may be connected to a data storage device. A memory of the computer system may include the respective memory of each computing device of the plurality of computing devices.
[0077] FIG. 6 illustrates an implementation of a general computer system that may execute techniques presented herein. The computer system 600 can include a set of instructions that can be executed to cause the computer system 600 to perform any one or more of the methods or computer based functions disclosed herein. The computer system 600 may operate as a standalone device or may be connected, e.g., using a network, to other computer systems or peripheral devices. [0078] Unless specifically stated otherwise, as apparent from the following discussions, it is appreciated that throughout the specification, discussions utilizing terms such as "processing," "computing," "calculating," “determining”, analyzing” or the like, refer to the action and/or processes of a computer or computing system, or similar electronic computing device, that manipulate and/or transform data represented as physical, such as electronic, quantities into other data similarly represented as physical quantities.
[0079] In a similar manner, the term "processor" may refer to any device or portion of a device that processes electronic data, e.g., from registers and/or memory to transform that electronic data into other electronic data that, e.g., may be stored in registers and/or memory. A “computer,” a “computing machine,” a "computing platform," a “computing device,” or a “server” may include one or more processors.
[0080] In a networked deployment, the computer system 600 may operate in the capacity of a server or as a client user computer in a server-client user network environment, or as a peer computer system in a peer-to-peer (or distributed) network environment. The computer system 600 can also be implemented as or incorporated into various devices, such as a personal computer (PC), a tablet PC, a set-top box (STB), a personal digital assistant (PDA), a mobile device, a palmtop computer, a laptop computer, a desktop computer, a communications device, a wireless telephone, a land-line telephone, a control system, a camera, a scanner, a facsimile machine, a printer, a pager, a personal trusted device, a web appliance, a network router, switch or bridge, or any other machine capable of executing a set of instructions (sequential or otherwise) that specify actions to be taken by that machine. In a particular implementation, the computer system 600 can be implemented using electronic devices that provide voice, video, or data communication. Further, while a computer system 600 is illustrated as a single system, the term “system” shall also be taken to include any collection of systems or sub-systems that individually or jointly execute a set, or multiple sets, of instructions to perform one or more computer functions.
[0081] As illustrated in FIG. 6, the computer system 600 may include a processor 602, e.g., a central processing unit (CPU), a graphics processing unit (GPU), or both. The processor 602 may be a component in a variety of systems. For example, the processor 602 may be part of a standard personal computer or a workstation. The processor 602 may be one or more general processors, digital signal processors, application specific integrated circuits, field programmable gate arrays, servers, networks, digital circuits, analog circuits, combinations thereof, or other now known or later developed devices for analyzing and processing data. The processor 602 may implement a software program, such as code generated manually (i.e., programmed).
[0082] The computer system 600 may include a memory 604 that can communicate via a bus 608. The memory 604 may be a main memory, a static memory, or a dynamic memory. The memory 604 may include, but is not limited to computer readable storage media such as various types of volatile and non-volatile storage media, including but not limited to random access memory, read-only memory, programmable read-only memory, electrically programmable read-only memory, electrically erasable read-only memory, flash memory, magnetic tape or disk, optical media and the like. In one implementation, the memory 604 includes a cache or random-access memory for the processor 602. In alternative implementations, the memory 604 is separate from the processor 602, such as a cache memory of a processor, the system memory, or other memory. The memory 604 may be an external storage device or database for storing data. Examples include a hard drive, compact disc (“CD”), digital video disc (“DVD”), memory card, memory stick, floppy disc, universal serial bus (“USB”) memory device, or any other device operative to store data. The memory 604 is operable to store instructions executable by the processor 602. The functions, acts or tasks illustrated in the figures or described herein may be performed by the processor 602 executing the instructions stored in the memory 604. The functions, acts or tasks are independent of the particular type of instructions set, storage media, processor or processing strategy and may be performed by software, hardware, integrated circuits, firm-ware, micro-code and the like, operating alone or in combination. Likewise, processing strategies may include multiprocessing, multitasking, parallel processing and the like. [0083] As shown, the computer system 600 may further include a display 610, such as a liquid crystal display (LCD), an organic light emitting diode (OLED), a flat panel display, a solid-state display, a cathode ray tube (CRT), a projector, a printer or other now known or later developed display device for outputting determined information. The display 610 may act as an interface for the user to see the functioning of the processor 602, or specifically as an interface with the software stored in the memory 604 or in the drive unit 606.
[0084] Additionally or alternatively, the computer system 600 may include an input/output device 612 configured to allow a user to interact with any of the components of computer system 600. The input/output device 612 may be a number pad, a keyboard, or a cursor control device, such as a mouse, or a joystick, touch screen display, remote control, or any other device operative to interact with the computer system 600.
[0085] The computer system 600 may also or alternatively include drive unit 606 implemented as a disk or optical drive. The drive unit 606 may include a computer- readable medium 622 in which one or more sets of instructions 624, e.g. software, can be embedded. Further, instructions 624 may embody one or more of the methods or logic as described herein. The instructions 624 may reside completely or partially within the memory 604 and/or within the processor 602 during execution by the computer system 600. The memory 604 and the processor 602 also may include computer-readable media as discussed above.
[0086] In some systems, a computer-readable medium 622 includes instructions 624 or receives and executes instructions 624 responsive to a propagated signal so that a device connected to a network 630 can communicate voice, video, audio, images, or any other data over the network 630. Further, the instructions 624 may be transmitted or received over the network 630 via a communication port or interface 620, and/or using a bus 608. The communication port or interface 620 may be a part of the processor 602 or may be a separate component. The communication port or interface 620 may be created in software or may be a physical connection in hardware. The communication port or interface 620 may be configured to connect with a network 630, external media, the display 610, or any other components in computer system 600, or combinations thereof. The connection with the network 630 may be a physical connection, such as a wired Ethernet connection or may be established wirelessly as discussed below. Likewise, the additional connections with other components of the computer system 600 may be physical connections or may be established wirelessly. The network 630 may alternatively be directly connected to a bus 608.
[0087] While the computer-readable medium 622 is shown to be a single medium, the term "computer-readable medium" may include a single medium or multiple media, such as a centralized or distributed database, and/or associated caches and servers that store one or more sets of instructions. The term "computer- readable medium" may also include any medium that is capable of storing, encoding, or carrying a set of instructions for execution by a processor or that cause a computer system to perform any one or more of the methods or operations disclosed herein. The computer-readable medium 622 may be non-transitory, and may be tangible.
[0088] The computer-readable medium 622 can include a solid-state memory such as a memory card or other package that houses one or more non-volatile readonly memories. The computer-readable medium 622 can be a random-access memory or other volatile re-writable memory. Additionally or alternatively, the computer-readable medium 622 can include a magneto-optical or optical medium, such as a disk or tapes or other storage device to capture carrier wave signals such as a signal communicated over a transmission medium. A digital file attachment to an e-mail or other self-contained information archive or set of archives may be considered a distribution medium that is a tangible storage medium. Accordingly, the disclosure is considered to include any one or more of a computer-readable medium or a distribution medium and other equivalents and successor media, in which data or instructions may be stored.
[0089] In an alternative implementation, dedicated hardware implementations, such as application specific integrated circuits, programmable logic arrays and other hardware devices, can be constructed to implement one or more of the methods described herein. Applications that may include the apparatus and systems of various implementations can broadly include a variety of electronic and computer systems. One or more implementations described herein may implement functions using two or more specific interconnected hardware modules or devices with related control and data signals that can be communicated between and through the modules, or as portions of an application-specific integrated circuit. Accordingly, the present system encompasses software, firmware, and hardware implementations. [0090] The computer system 600 may be connected to a network 630. The network 630 may define one or more networks including wired or wireless networks. The wireless network may be a cellular telephone network, an 802.11 , 802.16, 802.20, or WiMAX network. Further, such networks may include a public network, such as the Internet, a private network, such as an intranet, or combinations thereof, and may utilize a variety of networking protocols now available or later developed including, but not limited to TCP/IP based networking protocols. The network 630 may include wide area networks (WAN), such as the Internet, local area networks (LAN), campus area networks, metropolitan area networks, a direct connection such as through a Universal Serial Bus (USB) port, or any other networks that may allow for data communication. The network 630 may be configured to couple one computing device to another computing device to enable communication of data between the devices. The network 630 may generally be enabled to employ any form of machine-readable media for communicating information from one device to another. The network 630 may include communication methods by which information may travel between computing devices. The network 630 may be divided into sub-networks. The sub-networks may allow access to all of the other components connected thereto or the sub-networks may restrict access between the components. The network 630 may be regarded as a public or private network connection and may include, for example, a virtual private network or an encryption or other security mechanism employed over the public Internet, or the like.
[0091] In accordance with various implementations of the present disclosure, the methods described herein may be implemented by software programs executable by a computer system. Further, in an exemplary, non-limited implementation, implementations can include distributed processing, component/object distributed processing, and parallel processing. Alternatively, virtual computer system processing can be constructed to implement one or more of the methods or functionality as described herein. [0092] Although the present specification describes components and functions that may be implemented in particular implementations with reference to particular standards and protocols, the disclosure is not limited to such standards and protocols. For example, standards for Internet and other packet switched network transmission (e.g., TCP/IP, UDP/IP, HTML, HTTP) represent examples of the state of the art. Such standards are periodically superseded by faster or more efficient equivalents having essentially the same functions. Accordingly, replacement standards and protocols having the same or similar functions as those disclosed herein are considered equivalents thereof.
[0093] It will be understood that the steps of methods discussed are performed in one embodiment by an appropriate processor (or processors) of a processing (i.e., computer) system executing instructions (computer-readable code) stored in storage. It will also be understood that the disclosure is not limited to any particular implementation or programming technique and that the disclosure may be implemented using any appropriate techniques for implementing the functionality described herein. The disclosure is not limited to any particular programming language or operating system.
[0094] It should be appreciated that in the above description of exemplary embodiments of the invention, various features of the invention are sometimes grouped together in a single embodiment, figure, or description thereof for the purpose of streamlining the disclosure and aiding in the understanding of one or more of the various inventive aspects. This method of disclosure, however, is not to be interpreted as reflecting an intention that the claimed invention requires more features than are expressly recited in each claim. Rather, as the following claims reflect, inventive aspects lie in less than all features of a single foregoing disclosed embodiment. Thus, the claims following the Detailed Description are hereby expressly incorporated into this Detailed Description, with each claim standing on its own as a separate embodiment of this invention.
[0095] Furthermore, while some embodiments described herein include some but not other features included in other embodiments, combinations of features of different embodiments are meant to be within the scope of the invention, and form different embodiments, as would be understood by those skilled in the art. For example, in the following claims, any of the claimed embodiments can be used in any combination.
[0096] Furthermore, some of the embodiments are described herein as a method or combination of elements of a method that can be implemented by a processor of a computer system or by other means of carrying out the function. Thus, a processor with the necessary instructions for carrying out such a method or element of a method forms a means for carrying out the method or element of a method. Furthermore, an element described herein of an apparatus embodiment is an example of a means for carrying out the function performed by the element for the purpose of carrying out the invention.
[0097] In the description provided herein, numerous specific details are set forth. However, it is understood that embodiments of the invention may be practiced without these specific details. In other instances, well-known methods, structures and techniques have not been shown in detail in order not to obscure an understanding of this description.
[0098] Thus, while there has been described what are believed to be the preferred embodiments of the invention, those skilled in the art will recognize that other and further modifications may be made thereto without departing from the spirit of the invention, and it is intended to claim all such changes and modifications as falling within the scope of the invention. For example, any formulas given above are merely representative of procedures that may be used. Functionality may be added or deleted from the block diagrams and operations may be interchanged among functional blocks. Steps may be added or deleted to methods described within the scope of the present invention.
[0099] The above disclosed subject matter is to be considered illustrative, and not restrictive, and the appended claims are intended to cover all such modifications, enhancements, and other implementations, which fall within the true spirit and scope of the present disclosure. Thus, to the maximum extent allowed by law, the scope of the present disclosure is to be determined by the broadest permissible interpretation of the following claims and their equivalents, and shall not be restricted or limited by the foregoing detailed description. While various implementations of the disclosure have been described, it will be apparent to those of ordinary skill in the art that many more implementations and implementations are possible within the scope of the disclosure. Accordingly, the disclosure is not to be restricted except in light of the attached claims and their equivalents.
[00100] The present disclosure furthermore relates to the following aspects.
[00101] Example 1. A computer-implemented method comprising: receiving, by one or more processors, a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating, by the one or more processors, the unique digital identifiers by encoding the plurality of images; receiving, by the one or more processors, a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting, by the one or more processors, a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting, by the one or more processors, the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second sub-system.
[00102] Example 2. The computer-implemented method of example 1 , wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing, by the one or more processors, the plurality of images; and concatenating, by the one or more processors, the plurality of hashed images in a pre-defined order
[00103] Example 3. The computer-implemented method of example 2, wherein the plurality of images are images of coral reefs and marine ecosystems.
[00104] Example 4. The computer-implemented method of example 3, wherein generating the unique digital identifiers further comprises: linking, by the one or more processors via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.
[00105] Example 5. The computer-implemented method of example 4, wherein generating the unique digital identifiers further comprises: storing, by the one or more processors, the unique digital identifiers on transaction blocks of a distributed blockchain, wherein the unique digital identifiers are associated with programmatically defined smart contracts written to the distributed blockchain; and receiving, by the one or more processors, a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain.
[00106] Example 6. The computer-implemented method of example 5, further comprising: monitoring, by the one or more processors, the coral reefs and marine ecosystems represented by the plurality of images based, at least in part, on the geographic coordinates and sensor data; and determining, by the one or more processors, whether condition of the coral reefs and the marine ecosystems satisfy a pre-determined threshold.
[00107] Example 7. The computer-implemented method of example 6, further comprising: matching, by the one or more processors, the blockchain address of the at least one unique digital identifier with the geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images; updating, by the one or more processors, metadata associated with the at least one unique digital identifier based, at least in part, on the determined condition of the coral reefs and the marine ecosystems; generating, by the one or more processors, a new unique digital identifier based, at least in part, on the updated metadata; and concatenating, by the one or more processors, the new unique digital identifier in the pre-defined order, wherein the pre-defined order includes connecting the new unique digital identifier to a preceding unique digital identifier on the transaction block of the distributed blockchain.
[00108] Example 8. The computer-implemented method of example 5, further comprising: minting, by the one or more processors, on the distributed blockchain, the unique digital identifier.
[00109] Example 9. The computer-implemented method of example 5, wherein receiving the second request from the at least one device associated with the second sub-system comprises: receiving, by the one or more processors via one or more sensors, biometric data that is unique to the second sub-system; processing, by the one or more processors, the biometric data to create authentication data for the second sub-system; and recording, by the one or more processors, the authentication data on the distributed blockchain to authenticate the second subsystem during a transaction of the unique digital identifier.
[00110] Example 10. The computer-implemented method of example 5, wherein the distributed blockchain is configured to store the unique digital identifier received over a communication network as a certificate of authenticity for a real object, a virtual object, or a combination thereof.
[00111] Example 11. A system comprising: one or more processors; a non- transitory computer readable medium storing instructions that, when executed by the one or more processors, cause the one or more processors to perform a method comprising: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second sub-system.
[00112] Example 12. The system of example 11 , wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing the plurality of images; and concatenating the plurality of hashed images in a pre-defined order.
[00113] Example 13. The system of example 12, wherein the plurality of images are images of coral reefs and marine ecosystems.
[00114] Example 14. The system of example 13, wherein generating the unique digital identifiers further comprises: linking, via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.
[00115] Example 15. The system of example 14, wherein generating the unique digital identifiers further comprises: storing the unique digital identifiers on transaction blocks of a distributed blockchain, wherein the unique digital identifiers are associated with programmatically defined smart contracts written to the distributed blockchain; and receiving a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain. [00116] Example 16. The system of example 15, further comprising: monitoring the coral reefs and the marine ecosystems represented by the plurality of images based, at least in part, on the geographic coordinates and sensor data; and determining whether condition of the coral reefs and the marine ecosystems satisfy a pre-determined threshold.
[00117] Example 17. The system of example 16, further comprising: matching the blockchain address of the at least one unique digital identifier with the geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images; updating metadata associated with the at least one unique digital identifier based, at least in part, on the determined condition of the coral reefs and the marine ecosystems; generating a new unique digital identifier based, at least in part, on the updated metadata; and concatenating the new unique digital identifier in the pre-defined order, wherein the pre-defined order includes connecting the new unique digital identifier to a preceding unique digital identifier on the transaction block of the distributed blockchain.
[00118] Example 18. A non-transitory computer readable medium, the non- transitory computer readable medium storing instructions which, when executed by one or more processors of a computing system, cause the one or more processors to perform operations, comprising: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second subsystem; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first subsystem to the second digital access device associated with the second sub-system. [00119] Example 19. The non-transitory computer readable medium of example 18, wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing the plurality of images, wherein the plurality of images are images of coral reefs and marine ecosystems; and concatenating the plurality of hashed images in a predefined order.
[00120] Example 20. The non-transitory computer readable medium of example 19, wherein generating the unique digital identifiers further comprises: linking, via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.

Claims

CLAIMS WHAT IS CLAIMED IS:
1. A computer-implemented method comprising: receiving, by one or more processors, a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request include a plurality of images; generating, by the one or more processors, the unique digital identifiers by encoding the plurality of images; receiving, by the one or more processors, a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting, by the one or more processors, a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting, by the one or more processors, the at least one unique digital identifier from the first digital access device associated with the first subsystem to the second digital access device associated with the second subsystem.
2. The computer-implemented method of claim 1 , wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing, by the one or more processors, the plurality of images; and concatenating, by the one or more processors, the plurality of hashed images in a pre-defined order.
3. The computer-implemented method of claim 2, wherein the plurality of images are images of coral reefs and marine ecosystems.
4. The computer-implemented method of claim 3, wherein generating the unique digital identifiers further comprises: linking, by the one or more processors via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.
5. The computer-implemented method of claim 4, wherein generating the unique digital identifiers further comprises: storing, by the one or more processors, the unique digital identifiers on transaction blocks of a distributed blockchain, wherein the unique digital identifiers are associated with programmatically defined smart contracts written to the distributed blockchain; and receiving, by the one or more processors, a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain.
6. The computer-implemented method of claim 5, further comprising: monitoring, by the one or more processors, the coral reefs and marine ecosystems represented by the plurality of images based, at least in part, on the geographic coordinates and sensor data; and determining, by the one or more processors, whether condition of the coral reefs and the marine ecosystems satisfy a pre-determined threshold.
7. The computer-implemented method of claim 6, further comprising: matching, by the one or more processors, the blockchain address of the at least one unique digital identifier with the geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images; updating, by the one or more processors, metadata associated with the at least one unique digital identifier based, at least in part, on the determined condition of the coral reefs and the marine ecosystems; generating, by the one or more processors, a new unique digital identifier based, at least in part, on the updated metadata; and concatenating, by the one or more processors, the new unique digital identifier in the pre-defined order, wherein the pre-defined order includes connecting the new unique digital identifier to a preceding unique digital identifier on the transaction block of the distributed blockchain.
8. The computer-implemented method of claim 5, further comprising: minting, by the one or more processors, on the distributed blockchain, the unique digital identifier.
9. The computer-implemented method of claim 5, wherein receiving the second request from the at least one device associated with the second sub-system comprises: receiving, by the one or more processors via one or more sensors, biometric data that is unique to the second sub-system; processing, by the one or more processors, the biometric data to create authentication data for the second sub-system; and recording, by the one or more processors, the authentication data on the distributed blockchain to authenticate the second sub-system during a transaction of the unique digital identifier.
10. The computer-implemented method of claim 5, wherein the distributed blockchain is configured to store the unique digital identifier received over a communication network as a certificate of authenticity for a real object, a virtual object, or a combination thereof.
11 . A system comprising: one or more processors; a non-transitory computer readable medium storing instructions that, when executed by the one or more processors, cause the one or more processors to perform a method comprising: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second sub-system.
12. The system of claim 1 1 , wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing the plurality of images; and concatenating the plurality of hashed images in a pre-defined order.
13. The system of claim 12, wherein the plurality of images are images of coral reefs and marine ecosystems.
14. The system of claim 13, wherein generating the unique digital identifiers further comprises: linking, via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.
15. The system of claim 14, wherein generating the unique digital identifiers further comprises: storing the unique digital identifiers on transaction blocks of a distributed blockchain, wherein the unique digital identifiers are associated with programmatically defined smart contracts written to the distributed blockchain; and receiving a blockchain address and a verification for each of the transaction blocks recorded in the distributed blockchain.
16. The system of claim 15, further comprising: monitoring the coral reefs and the marine ecosystems represented by the plurality of images based, at least in part, on the geographic coordinates and sensor data; and determining whether condition of the coral reefs and the marine ecosystems satisfy a pre-determined threshold.
17. The system of claim 16, further comprising: matching the blockchain address of the at least one unique digital identifier with the geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images; updating metadata associated with the at least one unique digital identifier based, at least in part, on the determined condition of the coral reefs and the marine ecosystems; generating a new unique digital identifier based, at least in part, on the updated metadata; and concatenating the new unique digital identifier in the pre-defined order, wherein the pre-defined order includes connecting the new unique digital identifier to a preceding unique digital identifier on the transaction block of the distributed blockchain.
18. A non-transitory computer readable medium, the non-transitory computer readable medium storing instructions which, when executed by one or more processors of a computing system, cause the one or more processors to perform operations, comprising: receiving a first request for unique digital identifiers from at least one device associated with a first sub-system, wherein the first request includes a plurality of images; generating the unique digital identifiers by encoding the plurality of images; receiving a second request for at least one of the unique digital identifiers from at least one device associated with a second sub-system; transmitting a value of the at least one unique digital identifier from a second digital access device associated with the second sub-system to a first digital access device associated with the first sub-system; and transmitting the at least one unique digital identifier from the first digital access device associated with the first sub-system to the second digital access device associated with the second sub-system.
19. The non-transitory computer readable medium of claim 18, wherein the unique digital identifiers are dynamic non-fungible tokens, and wherein generating the unique digital identifiers comprises: cryptographically hashing the plurality of images, wherein the plurality of images are images of coral reefs and marine ecosystems; and concatenating the plurality of hashed images in a pre-defined order.
20. The non-transitory computer readable medium of claim 19, wherein generating the unique digital identifiers further comprises: linking, via geotagging, the unique digital identifiers and the plurality of images, wherein the unique digital identifiers includes geographic coordinates of the coral reefs and the marine ecosystems represented by the plurality of images.
PCT/US2023/080930 2022-11-28 2023-11-22 Systems and methods for generating unique digital identifiers for linking to coral reef devices Ceased WO2024118437A1 (en)

Applications Claiming Priority (2)

Application Number Priority Date Filing Date Title
US202263385118P 2022-11-28 2022-11-28
US63/385,118 2022-11-28

Publications (1)

Publication Number Publication Date
WO2024118437A1 true WO2024118437A1 (en) 2024-06-06

Family

ID=89308636

Family Applications (1)

Application Number Title Priority Date Filing Date
PCT/US2023/080930 Ceased WO2024118437A1 (en) 2022-11-28 2023-11-22 Systems and methods for generating unique digital identifiers for linking to coral reef devices

Country Status (1)

Country Link
WO (1) WO2024118437A1 (en)

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210287195A1 (en) * 2020-03-16 2021-09-16 Field Genie, Inc. Personal photographer service, making them available as digital collectible, curating and local restricted marketplace
KR102470154B1 (en) * 2022-04-22 2022-11-24 주식회사 대하에프앤씨 Method, device and system for providing medical equipment trading and sharing platform service based on blockchain

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20210287195A1 (en) * 2020-03-16 2021-09-16 Field Genie, Inc. Personal photographer service, making them available as digital collectible, curating and local restricted marketplace
KR102470154B1 (en) * 2022-04-22 2022-11-24 주식회사 대하에프앤씨 Method, device and system for providing medical equipment trading and sharing platform service based on blockchain

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
HOWSON PETER ED - DE SANTO ELIZABETH ET AL: "Building trust and equity in marine conservation and fisheries supply chain management with blockchain", MARINE POLICY, PERGAMON, AMSTERDAM, NL, vol. 115, 13 February 2020 (2020-02-13), XP086094186, ISSN: 0308-597X, [retrieved on 20200213], DOI: 10.1016/J.MARPOL.2020.103873 *

Similar Documents

Publication Publication Date Title
US12204672B2 (en) Systems and methods for blockchain-based non-fungible token (NFT) authentication
US11907955B2 (en) System and method for blockchain automatic tracing of money flow using artificial intelligence
US20220309131A1 (en) System and method for the creation and the exchange of a copyright for each ai-generated multimedia via a blockchain
US12327171B2 (en) Data platform to protect security of data
CN109544396A (en) Account recommended method, device, server, terminal and storage medium
US12340355B2 (en) Methods and systems for collecting and releasing virtual objects between disparate augmented reality environments
CN114467279A (en) User data management for augmented reality using distributed ledgers
US20250124436A1 (en) Systems and methods for data security
US11861528B1 (en) Infringement detection system
US12469027B2 (en) Artificial intelligence model and dataset security for transactions
US20240311266A1 (en) Inductive methods of data validation for digital simulated twinning through supervised then unsupervised machine learning and artificial intelligence from aggregated data
Alotaibi Cybersecurity Attacks and Detection Methods in Web 3.0 Technology: A Review
US12423396B2 (en) Validating live humans and verifying engagement activity in virtual settings
US20250037008A1 (en) Apparatus and method for integrating a plurality of proximate provider data structures in a digital environment
US20230306441A1 (en) System and method for bilateral trades of greenhouse gases and environmental rights
WO2024118437A1 (en) Systems and methods for generating unique digital identifiers for linking to coral reef devices
US20240155000A1 (en) Systems, methods, and apparatuses for detection of data misappropriation attempts across electronic communication platforms
EP4571622A1 (en) System and method for bilateral trades of greenhouse gases and environmental rights
US20240127343A1 (en) System and method for bilateral trades of greenhouse gases and environmental rights
Charles Financial Inclusion and Climate Resilience: The Role for an AI-Enhanced Digital Wallet in Caribbean SIDS
Oyedokun Balancing Innovation and Privacy in the Age of Artificial Intelligence
US20240413997A1 (en) Secure apparatus to share and deploy machine build programs utilizing unique hash tokens
US20250358115A1 (en) Separate encryption of different parameters of an access token
US20240305609A1 (en) Method for resource transfer mode evaluation in distributed network using semi-dynamic tokenized graph node processing
EP4668191A1 (en) Brand-focused machine learning model training engine in an item listing system

Legal Events

Date Code Title Description
121 Ep: the epo has been informed by wipo that ep was designated in this application

Ref document number: 23828313

Country of ref document: EP

Kind code of ref document: A1

NENP Non-entry into the national phase

Ref country code: DE

122 Ep: pct application non-entry in european phase

Ref document number: 23828313

Country of ref document: EP

Kind code of ref document: A1