Architecture for cloudchain driven ecosystem

ABSTRACT

Described are platforms, systems, and methods for a secure exchange of personal data with brand data. In one aspect, a method comprises receiving, from a computing device, a request for ownership of a brand, the request comprising a data grouping; persist a smart contract to a distributed ledger, the smart contract associated with the brand and generated based on the data grouping satisfying a criterion for ownership of the brand; and providing, to the computing device, by executing the smart contract, a plurality of opportunities based on the data grouping satisfying the criterion for ownership.

CROSS-REFERENCE

This application claims the benefit of U.S. Application No. 62/882,376,filed on Aug. 2, 2019, entitled “ARCHITECTURE FOR CLOUDCHAIN DRIVENECOSYSTEM,” the contents of which are incorporated herein by referencefor all purposes.

BACKGROUND

Current digital systems are highly fragmented and do not encourage userengagement. Moreover, personal data privacy and network security aremajor concerns for users as well as various governmental bodies.Contributing to such an ecosystem are large technology based monopoliesthat are dominating brands through the direction (as much as 95 percent)of all internet traffic to a handful of dominant websites. These majorplayers are focused completely on platform monetization and are failingto effectively support brands that are in uncharted territory—having tonavigate a turbulent digital landscape in which their power has beenusurped—and left in a perilous position at the point of sale. As such,these brands are left scrambling to regain direct access to theircustomers.

SUMMARY

In one aspect, disclosed herein are interoperable cloud-based systemscomprising: a distributed ledger; a back-end system; and a personalcomputing device, configured to: provide, to the back-end system, arequest for ownership of a brand, the request comprising usercredentials and a data grouping; and receive, from the back-end system,a data feed comprising a plurality of opportunities associated with thebrand; the back-end system configured to: receive, from a Brand Nodeassociated with the brand, a criterion for ownership and theopportunities, the data grouping determined based the criterion forownership; receive, from the personal computing device, the request forownership of the brand; generate a smart ownership contract associatedwith the user credentials and the brand, the smart ownership contractcomprising a set of instructions, which, when invoked and executed byone or more processors, cause the one or more processors to performoperations comprising: providing, to the personal computing device, thedata feed based on the provided data grouping satisfying the criterionfor ownership; persist the smart ownership contract to the distributedledger; and invoke, when prompted by the Brand Node, the smart ownershipcontract to provide the data feed to the personal computing device. Insome embodiments, the smart ownership contract is updated based on amulti-signature model that requires receiving approval from both theBrand Node and the personal computing device before a change isimplemented. In some embodiments, the back-end system is configured to:receive, from the Brand Node, a proposal to change contents of the datamapping; provide the proposal to the personal computing device; andupdate the smart ownership contract with the changed contents of thedata mapping based on an approval received from the personal computingdevice. In some embodiments, the personal computing device is configuredto: provide a view of the brands owned by the user credentials, theownership of a brand determined based on a respective smart ownershipcontract between the user credentials and each of the respective brandsowned by the user credentials. In some embodiments, facial recognitionor biometrics are used to secure the personal computing device andprovide profile verification. In some embodiments, the generation of thesmart ownership contract does not reveal an identity of a userassociated with the user credentials. In some embodiments, the requestcomprises consent from the user for the Brand Node to access the datagrouping. In some embodiments, the criterion for ownership comprises arequest for at least one specific type of personal data or metric, andthe data grouping comprising the at least one specific type of personaldata or metric for the user. In some embodiments, the user credentialscomprise universal personal identification (UPI) and a private keyassociated with a corresponding public address. In some embodiments, theback-end system is configured to: encrypt the data grouping; and persistthe encrypted data grouping to a second distributed ledger. In someembodiments, the second distributed ledger comprises an identityblockchain, the encrypted data grouping persisted within a block, andthe public address is a pointer in the chain to the encrypted datagrouping. In some embodiments, the personal computing device isconfigured to: receive personal data from a user interface; and generatea Master Data Group comprising the personal data. In some embodiments,the personal computing device is configured to: generate the usercredentials and a recovery seed, through an identity chain serviceprovided by the back-end system; and persist the Master Data Group, theMaster Data Group associated with the generated user credentials and therecovery seed. In some embodiments, the Master Data Group comprises thedata grouping. In some embodiments, the personal computing device isconfigured to: access, through a block explorer provided by the back-endsystem, a transaction history associated with the user credentials andstored to the distributed ledger. In some embodiments, the opportunitiescomprise brand data, and the brand data is self-contained under theBrand Node. In some embodiments, the brand data comprises mediaassociated with the Brand Node. In some embodiments, the brand datacomprises investment capital, corporate events, corporate socialresponsibility, affiliate marketing, product distribution, executiveaccess, product launches, product catalogs, data regarding aheadquarters of the brand, data regarding executives of the, and a stockticker for the brand. In some embodiments, the opportunities aresubscription based. In some embodiments, the opportunities compriseinteractions, incentives, and rewards with the brand. In someembodiments, the set of instructions of the smart ownership contractcomprise: providing the Brand Node associated with the brand access tothe data grouping. In some embodiments, the personal computing device isconfigured to: provide, to the back-end system, user preferences for auser associated with the user credentials, the set of instructions ofthe smart ownership contract comprising: processing the user preferencesthrough a machine-learning model to determine the opportunities, themachine-learning model having been trained with received user preferencefor a respective plurality of users who have claimed ownership of thebrand. In some embodiments, the machine-learning model comprises aweight of match algorithm. In some embodiments, the personal computingdevice is configured to: provide, to the back-end system through ageo-location application programming interface (API), real-timegeo-location data, the back-end system is configured to: perform averification check on a location of the personal computing device basedon the received real-time geo-location data, the opportunitiescomprising real-time incentives based on a verified location of thepersonal computing device. In some embodiments, the data feed comprisescontent provided by a plurality of brands. In some embodiments, the datafeed comprises a user stream and a business opportunities steam. In someembodiments, the user stream and the business opportunities steam areemployed to provide display variance of the content provided to thepersonal computing device based on a plurality of smart ownershipcontracts associated with the user credentials and the brands determinedto be potential matches for ownership. In some embodiments, the datafeed is provided through an encrypted communication channel. In someembodiments, the Brand Node is generated for an on-boarded brand entity,and the on-boarded brand entity populates content, accesses data, andtap networks through a Brand Node Interface. In some embodiments, theon-boarded brand entity comprises the brand. In some embodiments, thedata feed is consumed according to a Brand Data policy provided by astandardization agreement. In some embodiments, the smart ownershipcontract allows a free-flow of information between the personalcomputing device and the Brand Node as a peer-to-peer communicationflow. In some embodiments, a collaborative filtering algorithmrecommends brands and products based on similar activities of otherusers. In some embodiments, the recommended brands and products areprovided to the personal computing device through the data feed andfiltered based on a showcase immersion algorithm. In some embodiments,the collaborative filtering algorithm recommends brands and productsbased on Global/Local locations, brand preferences, similarinteractions, and product interest. In some embodiments, the data feedcomprises a flow of offerings at any given time selected based on apersonality matrix of data for a user associated with the usercredentials, selected preferences, current trends, life events, anddisplay variance. In some embodiments, the opportunities comprise anability to purchase items from the brand. In some embodiments, therequest for ownership of the brand includes a digital signature. In someembodiments, the distributed ledger comprises an opportunitiesblockchain. In some embodiments, the opportunities blockchain comprisesa permissioned private blockchain. In some embodiments, the personalcomputing device is configured to: provide content from the receiveddata feed through a user interface. In some embodiments, the userinterface comprises a display screen. In some embodiments, the contentof the data feed is provided to the display screen via a BrandCubegraphical user-interface received from the back-end system. In someembodiments, the providing of the content of the data feed is compatiblewith advertisement blockers.

In another aspect, disclosed herein are computer-implemented methods fora secure exchange of personal data with brand data comprising:receiving, from a Brand Node associated with a brand, a criterion forownership and a plurality of opportunities, the opportunities comprisingthe brand data; receiving, from a computing device, a request forownership of the brand; the request comprising user credentials and adata grouping, the data grouping determined based the criterion forownership and comprises the personal data; generating a smart ownershipcontract associated with the user credentials and the brand, the smartownership contract comprising a set of instructions, which, when invokedand executed by the one or more processors, cause the one or moreprocessors to perform operations comprising: providing, to the computingdevice, a data feed based on the provided data grouping satisfying thecriterion for ownership, the data feed comprising the opportunities;persisting the smart ownership contract to a distributed ledger; andinvoking, when prompted by the Brand Node, the smart ownership contractto provide the opportunities to the computing device. In someembodiments, the smart ownership contract is updated based on amulti-signature model that requires receiving approval from both theBrand Node and the computing device before a change is implemented. Insome embodiments, the methods comprise: receiving, from the Brand Node,a proposal to change contents of the data mapping; providing theproposal to the computing device; and updating the smart ownershipcontract with the changed contents of the data mapping based on anapproval received from the computing device. In some embodiments, thegenerating of the smart ownership contract does not reveal an identityof a user associated with the user credentials. In some embodiments, therequest comprises consent from the user for the Brand Node to access thedata grouping. In some embodiments, the criterion for ownershipcomprises a request for at least one specific type of personal data ormetric, and the data grouping comprising the at least one specific typeof personal data or metric for the user. In some embodiments, the usercredentials comprise a UPI and a private key associated with acorresponding public address. In some embodiments, the methods comprise:encrypting the data grouping; and persisting the encrypted data groupingto a second distributed ledger. In some embodiments, the seconddistributed ledger comprises an identity blockchain, the encrypted datagrouping persisted within a block, and the public address is a pointerin the chain to the encrypted data grouping. In some embodiments, themethods comprise: providing a block explorer to the computing device,the block explorer providing access to a transaction history associatedwith the user credentials and stored to the distributed ledger. In someembodiments, the opportunities comprise brand data, and the brand datais self-contained under the Brand Node. In some embodiments, the branddata comprises media associated with the Brand Node. In someembodiments, the brand data comprises investment capital, corporateevents, corporate social responsibility, affiliate marketing, productdistribution, executive access, product launches, product catalogs, dataregarding a headquarters of the brand, data regarding executives of the,and a stock ticker for the brand. In some embodiments, the opportunitiesare subscription based. In some embodiments, the opportunities compriseinteractions, incentives, and rewards with the brand. In someembodiments, the set of instructions of the smart ownership contractcomprise: providing the Brand Node associated with the brand access tothe data grouping. In some embodiments, the methods comprise: receiving,from the computing device, user preferences for a user associated withthe user credentials, the set of instructions of the smart ownershipcontract comprising: processing the user preferences through amachine-learning model to determine the opportunities, themachine-learning model having been trained with received user preferencefor a respective plurality of users who have claimed ownership of thebrand. In some embodiments, the machine-learning model comprises aweight of match algorithm. In some embodiments, the methods comprise:receiving, from the computing device, real-time geo-location data; andperforming a verification check on a location of the computing devicebased on the received real-time geo-location data, the opportunitiescomprising real-time incentives based on a verified location of thecomputing device. In some embodiments, the data feed comprises contentprovided by a plurality of brands. In some embodiments, the data feedcomprises a user stream and a business opportunities steam. In someembodiments, the user stream and the business opportunities steam areemployed to provide display variance of the content provided to thecomputing device based on a plurality of smart ownership contractsassociated with the user credentials and the brands determined to bepotential matches for ownership. In some embodiments, the data feed isprovided through an encrypted communication channel. In someembodiments, the Brand Node is generated for an on-boarded brand entity,and the on-boarded brand entity populates content, accesses data, andtap networks through a Brand Node Interface. In some embodiments, theon-boarded brand entity comprises the brand. In some embodiments, thedata feed is consumed according to a Brand Data policy provided by astandardization agreement. In some embodiments, the smart ownershipcontract allows a free-flow of information between the computing deviceand the Brand Node as a peer-to-peer communication flow. In someembodiments, a collaborative filtering algorithm recommends brands andproducts based on similar activities of other users. In someembodiments, the recommended brands and products are provided to thepersonal computing device through the data feed and filtered based on ashowcase immersion algorithm. In some embodiments, the collaborativefiltering algorithm recommends brands and products based on Global/Locallocations, brand preferences, similar interactions, and productinterest. In some embodiments, the data feed comprises a flow ofofferings at any given time selected based on a personality matrix ofdata for a user associated with the computing device, selectedpreferences, current trends, life events, and display variance. In someembodiments, the opportunities comprise an ability to purchase itemsfrom the brand. In some embodiments, the request for ownership of thebrand includes a digital signature. In some embodiments, the distributedledger comprises an opportunities blockchain. In some embodiments, theopportunities blockchain comprises a permissioned private blockchain.

In another aspect, disclosed herein are non-transitory computer-readablestorage media coupled to one or more processors and having instructionsstored thereon which, when executed by the one or more processors, causethe one or more processors to perform operations comprising: providing,to a back-end system, a request for ownership of a brand, the requestcomprising user credentials, a data grouping, and consent for a BrandNode associated with the brand to access the data grouping, the datagrouping determined based on a criterion for ownership of the brand; andreceiving, from the back-end system, a data feed comprising a pluralityof opportunities associated with the brand, the opportunities providedby a smart ownership contract stored to a distributed ledger andassociated with the user credentials and the brand. In some embodiments,the operations comprise: providing, to the back-end system, a firstapproval to update the smart ownership contract, the smart ownershipcontract updated based on a multi-signature model that requires theback-end system receiving the first approval and a second approval fromboth the Brand Node. In some embodiments, the operations comprise:providing a view of brands owned by the user credentials, the ownershipof a brand determined based on a respective smart ownership contractbetween the user credentials and each of the respective brands owned bythe user credentials. In some embodiments, the operations comprise:providing a profile verification based on facial recognition orbiometrics. In some embodiments, the request comprises consent for theBrand Node to access the data grouping. In some embodiments, thecriterion for ownership comprises a request for at least one specifictype of personal data or metric, and the data grouping comprising the atleast one specific type of personal data or metric for a user associatedwith the user credentials. In some embodiments, the user credentialscomprise a UPI and a private key associated with a corresponding publicaddress. In some embodiments, the operations comprise: receivingpersonal data from a user interface; and generating a Master Data Groupcomprising the personal data. In some embodiments, the operationscomprise: generating the user credentials and a recovery seed, throughan identity chain service provided by the back-end system; and persistthe Master Data Group, the Master Data Group associated with thegenerated user credentials and the recovery seed. In some embodiments,the Master Data Group comprises the data grouping. In some embodiments,the operations comprise: accessing, through a block explorer provided bythe back-end system, a transaction history associated with the usercredentials and stored to the distributed ledger. In some embodiments,the opportunities comprise brand data, and the brand data isself-contained under the Brand Node. In some embodiments, the brand datacomprises media associated with the Brand Node. In some embodiments, thebrand data comprises investment capital, corporate events, corporatesocial responsibility, affiliate marketing, product distribution,executive access, product launches, product catalogs, data regarding aheadquarters of the brand, data regarding executives of the, and a stockticker for the brand. In some embodiments, the opportunities aresubscription based. In some embodiments, the opportunities compriseinteractions, incentives, and rewards with the brand. In someembodiments, the operations comprise: providing user preferences for auser associated with the user credentials, the opportunities determinedby processing the user preferences through a machine-learning model, themachine-learning model having been trained with received user preferencefor a respective plurality of users who have claimed ownership of thebrand. In some embodiments, the machine-learning model comprises aweight of match algorithm. In some embodiments, the operations comprise:providing, to the back-end system through a geo-location API, real-timegeo-location data, the opportunities comprising real-time incentivesbased on a verified location determined based on the real-timegeo-location data. In some embodiments, the data feed comprises contentprovided by a plurality of brands. In some embodiments, the data feedcomprises a user stream and a business opportunities steam. In someembodiments, the user stream and the business opportunities steam areemployed to provide display variance of the content based on a pluralityof smart ownership contracts associated with the user credentials andthe brands determined to be potential matches for ownership. In someembodiments, the data feed is provided through an encryptedcommunication channel. In some embodiments, the Brand Node is generatedfor an on-boarded brand entity, and the on-boarded brand entitypopulates content, accesses data, and tap networks through a Brand NodeInterface. In some embodiments, the on-boarded brand entity comprisesthe brand. In some embodiments, the data feed is consumed according to aBrand Data policy provided by a standardization agreement. In someembodiments, the smart ownership contract allows a free-flow ofinformation between the media and the Brand Node as a peer-to-peercommunication flow. In some embodiments, the data feed comprisesrecommended brands and products determined through a collaborativefiltering algorithm based on similar activities of other users. In someembodiments, the collaborative filtering algorithm recommends brands andproducts based on Global/Local locations, brand preferences, similarinteractions, and product interest. In some embodiments, the data feedcomprises a flow of offerings at any given time selected based on apersonality matrix of data for a user associated with the usercredentials, selected preferences, current trends, life events, anddisplay variance. In some embodiments, the opportunities comprise anability to purchase items from the brand. In some embodiments, therequest for ownership of the brand includes a digital signature. In someembodiments, the distributed ledger comprises an opportunitiesblockchain. In some embodiments, the opportunities blockchain comprisesa permissioned private blockchain. In some embodiments, the operationscomprise: providing content from the data feed through a user interface.In some embodiments, the user interface comprises a display screen. Insome embodiments, the content of the data feed is provided to thedisplay screen via a BrandCube graphical user-interface received fromthe back-end system. In some embodiments, the providing of the contentof the data feed is compatible with advertisement blockers.

In another aspect, disclosed herein are computer-implemented methods fora secure exchange of data comprising: receiving, from a computingdevice, a request for ownership of a brand, the request comprising adata grouping; persist a smart contract to a distributed ledger, thesmart contract associated with the brand and generated based on the datagrouping satisfying a criterion for ownership of the brand; andproviding, to the computing device, by executing the smart contract, aplurality of opportunities based on the data grouping satisfying thecriterion for ownership. In some embodiments, the smart contract isupdated based on a multi-signature model that requires receivingapproval from both the brand and the computing device before a change isimplemented. In some embodiments, the approval from the brand isreceived through a Brand Node. In some embodiments, the methodscomprise: receiving, from the Brand Node, a proposal to change contentsof the data mapping; providing the proposal to the computing device; andupdating the smart contract with the changed contents of the datamapping based on an approval received from the computing device. In someembodiments, the request comprises consent for the brand to access thedata grouping. In some embodiments, the brand accesses the data groupingthrough a Brand Node. In some embodiments, the smart contract providesaccess to the data grouping to the Brand Node. In some embodiments, theopportunities comprise brand data, and the brand data is self-containedunder a Brand Node. In some embodiments, the brand data comprises mediaassociated with the Brand Node. In some embodiments, the brand datacomprises investment capital, corporate events, corporate socialresponsibility, affiliate marketing, product distribution, executiveaccess, product launches, product catalogs, data regarding aheadquarters of the brand, data regarding executives of the, and a stockticker for the brand. In some embodiments, the Brand Node is generatedfor an on-boarded brand entity, and the on-boarded brand entitypopulates content, accesses data, and tap networks through a Brand NodeInterface. In some embodiments, the on-boarded brand entity comprisesthe brand. In some embodiments, the smart contract allows a free-flow ofinformation between the computing device and the Brand Node as apeer-to-peer communication flow. In some embodiments, the criterion forownership comprises a request for at least one specific type of personaldata or metric, and the data grouping comprising the at least onespecific type of personal data or metric for a user. In someembodiments, the request comprises user credentials associated with auser. In some embodiments, the user credentials comprise a UPI and aprivate key associated with a corresponding public address. In someembodiments, the methods comprise: providing a block explorer to thecomputing device, the block explorer providing access to a transactionhistory associated with the user credentials and stored to thedistributed ledger. In some embodiments, the opportunities are providedto the computing device through a data feed. In some embodiments, thedata feed comprises content provided by a plurality of brands. In someembodiments, the data feed comprises a user stream and a businessopportunities steam. In some embodiments, the user stream and thebusiness opportunities steam are employed to provide display variance ofthe content provided to the computing device based on a plurality ofsmart ownership contracts associated with a user associated with thecomputing device and the brands determined to be potential matches forownership. In some embodiments, the data feed is provided through anencrypted communication channel. In some embodiments, the data feed isconsumed according to a Brand Data policy provided by a standardizationagreement. In some embodiments, a collaborative filtering algorithmrecommends brands and products based on similar activities of otherusers. In some embodiments, the recommended brands and products areprovided to the personal computing device through the data feed andfiltered based on a showcase immersion algorithm. In some embodiments,the collaborative filtering algorithm recommends brands and productsbased on Global/Local locations, brand preferences, similarinteractions, and product interest. In some embodiments, the data feedcomprises a flow of offerings at any given time selected based on apersonality matrix of data for a user associated with the computingdevice, selected preferences, current trends, life events, and displayvariance. In some embodiments, the methods comprise: encrypting the datagrouping; and persisting the encrypted data grouping to a seconddistributed ledger. In some embodiments, the second distributed ledgercomprises an identity blockchain, the encrypted data grouping ispersisted within a block, and the public address is a pointer in thechain to the encrypted data grouping. In some embodiments, theopportunities are subscription based. In some embodiments, theopportunities comprise interactions, incentives, and rewards with thebrand. In some embodiments, the methods comprise: receiving, from thecomputing device, user preferences for a user; and processing the userpreferences through a machine-learning model to determine theopportunities, the machine-learning model having been trained withreceived user preference for a respective plurality of users who haveclaimed ownership of the brand. In some embodiments, themachine-learning model comprises a weight of match algorithm. In someembodiments, the methods comprise: receiving, from the computing device,real-time geo-location data; and performing a verification check on alocation of the computing device based on the received real-timegeo-location data, the opportunities comprise real-time incentives basedon a verified location of the computing device. In some embodiments, theopportunities comprise an ability to purchase items from the brand. Insome embodiments, the request for ownership of the brand includes adigital signature. In some embodiments, the distributed ledger comprisesan opportunities blockchain. In some embodiments, the opportunitiesblockchain comprises a permissioned private blockchain.

It is appreciated that methods in accordance with the present disclosurecan include any combination of the aspects and features describedherein. That is, methods in accordance with the present disclosure arenot limited to the combinations of aspects and features specificallydescribed herein, but also may include any combination of the aspectsand features provided.

The details of one or more implementations of the present disclosure areset forth in the accompanying drawings and the description below. Otherfeatures and advantages of the present disclosure will be apparent fromthe description and drawings, and from the claims.

BRIEF DESCRIPTION OF THE DRAWINGS

A better understanding of the features and advantages of the presentsubject matter will be obtained by reference to the following detaileddescription that sets forth illustrative embodiments and theaccompanying drawings of which:

FIG. 1 depicts a non-limiting example architecture of the describedinteroperable cloud-based system;

FIG. 2 depicts a non-limiting example of a high-level applicationinstance model;

FIG. 3 depicts a non-limiting example blockchain instance architecture;

FIG. 4 depicts a non-limiting example process of a Brand Node extendingopportunities through a smart ownership contract;

FIG. 5 depicts a non-limiting example process for self-sovereignidentity key generation and storage;

FIG. 6 depicts a non-limiting example collaborative filtering examplewith conflict review;

FIG. 7 depicts a non-limiting example ownership request process;

FIG. 8 depicts a non-limiting example caching scheme;

FIG. 9 depicts non-limiting color theory examples;

FIGS. 10A-10J depict various non-limiting example pages of a userinterface (UI) for a CloudChain Global Marketplace provided by thedescribed interoperable cloud-based system;

FIGS. 11A-11D depict flowcharts of a non-limiting examples process thatcan be implementation by embodiments of the present disclosure;

FIG. 12 depicts a non-limiting example a computer system that can beprogrammed or otherwise configured to implement methods or systems ofthe present disclosure;

FIG. 13A depicts a non-limiting example environment that can be employedto execute implementations of the present disclosure;

FIG. 13B depicts a non-limiting example application provision systemthat can be provided through an environment and employed to executeimplementations of the present disclosure; and

FIG. 13C depicts a non-limiting example cloud-based architecture of anapplication provision system that can be provided through an environmentand employed to execute implementations of the present disclosure.

DETAILED DESCRIPTION

Described herein, in certain embodiments, are interoperable cloud-basedsystems comprising: a distributed ledger; a back-end system; and apersonal computing device, configured to: provide, to the back-endsystem, a request for ownership of a brand, the request comprising usercredentials and a data grouping; and receive, from the back-end system,a data feed comprising a plurality of opportunities associated with thebrand; the back-end system configured to: receive, from a Brand Nodeassociated with the brand, a criterion for ownership and theopportunities, the data grouping determined based the criterion forownership; receive, from the personal computing device, the request forownership of the brand; generate a smart ownership contract associatedwith the user credentials and the brand, the smart ownership contractcomprising a set of instructions, which, when invoked and executed byone or more processors, cause the one or more processors to performoperations comprising: providing, to the personal computing device, thedata feed based on the provided data grouping satisfying the criterionfor ownership; persist the smart ownership contract to the distributedledger; and invoke, when prompted by the Brand Node, the smart ownershipcontract to provide the data feed to the personal computing device.

Also described herein, in certain embodiments, are computer-implementedmethods for a secure exchange of personal data with brand datacomprising: receiving, from a Brand Node associated with a brand, acriterion for ownership and a plurality of opportunities, theopportunities comprising the brand data; receiving, from a computingdevice, a request for ownership of the brand; the request comprisinguser credentials and a data grouping, the data grouping determined basedthe criterion for ownership and comprises the personal data; generatinga smart ownership contract associated with the user credentials and thebrand, the smart ownership contract comprising a set of instructions,which, when invoked and executed by the one or more processors, causethe one or more processors to perform operations comprising: providing,to the computing device, a data feed based on the provided data groupingsatisfying the criterion for ownership, the data feed comprising theopportunities; persisting the smart ownership contract to a distributedledger; and invoking, when prompted by the Brand Node, the smartownership contract to provide the opportunities to the computing device.

Also described herein, in certain embodiments, are non-transitorycomputer-readable storage media coupled to one or more processors andhaving instructions stored thereon which, when executed by the one ormore processors, cause the one or more processors to perform operationscomprising: providing, to a back-end system, a request for ownership ofa brand, the request comprising user credentials, a data grouping, andconsent for a Brand Node associated with the brand to access the datagrouping, the data grouping determined based on a criterion forownership of the brand; and receiving, from the back-end system, a datafeed comprising a plurality of opportunities associated with the brand,the opportunities provided by a smart ownership contract stored to adistributed ledger and associated with the user credentials and thebrand.

Also described herein, in certain embodiments, are computer-implementedmethods for a secure exchange of data comprising: receiving, from acomputing device, a request for ownership of a brand, the requestcomprising a data grouping; persist a smart contract to a distributedledger, the smart contract associated with the brand and generated basedon the data grouping satisfying a criterion for ownership of the brand;and providing, to the computing device, by executing the smart contract,a plurality of opportunities based on the data grouping satisfying thecriterion for ownership. In some embodiments, the smart contract isupdated based on a multi-signature model that requires receivingapproval from both the brand and the computing device before a change isimplemented.

Interoperable Cloud-Based System

Implementations of the present disclosure are generally directed to aninteroperable cloud-based system that provides for a CloudChain GlobalMarketplace through a CloudChain Helix platform. The described system isthe intersection of brand information stored to a distributed ledger andretrieved via high-performance cloud computing. In some embodiments, thedescribed interoperable cloud-based system provides each user controlover the details that they are sharing with their selected (“owned”)brands. On the brand side, users can be targeted with media andopportunities, which can be broadcast to provide the brand with newstreams of user engagement. These opportunities enhance user connectionswith brands that are “owned” by their respective users.

In some embodiments, the CloudChain Global Marketplace provided by thedescribed interoperable cloud-based system targets these mutuallybeneficial opportunities based on Automated Digital Exclusive Branding(DEB). In some embodiments, opportunities are provided to users (whohave selected to OWN the respective brands) through a BrandCube viewport(BrandCube) based within the CloudChain Global Marketplace.

In some embodiments, the described interoperable cloud-based system ispowered by a CloudChain Helix™ Platform that converges with blockchaintechnology. In some embodiments, the CloudChain Helix platform employsprivate permissioned blockchains. Information provided through theCloudChain Helix platform can include identity information andtransaction information. In some embodiments, such information is loggedto a high-security distributed ledger (e.g., blockchain) for animmutable ledger of brand interaction.

Certain Definitions

Unless otherwise defined, all technical terms used herein have the samemeaning as commonly understood by one of ordinary skill in the art towhich this disclosure belongs. As used in this specification and theappended claims, the singular forms “a,” “an,” and “the” include pluralreferences unless the context clearly dictates otherwise. Any referenceto “or” herein is intended to encompass “and/or” unless otherwisestated.

As used herein, the term “real-time” refers to transmitting orprocessing data without intentional delay given the processinglimitations of a system, the time required to accurately obtain data andimages, and the rate of change of the data and images. In some examples,“real-time” is used to describe the presentation of information obtainedfrom components of embodiments of the present disclosure.

The CloudChain Global Marketplace

In some embodiments, the CloudChain Global Marketplace provided by thedescribed interoperable cloud-based system is a direct-to-consumerportal that enables consumers to access the BrandCube viewport. In someembodiments, the CloudChain Global Marketplace is the consumer point ofengagement for interaction with Brands. In some embodiments, through theCloudChain Global Marketplace these brands can leverage Automated DEBto, for example, frame content, campaigns, opportunities, and otherincentives, for their customer base. In some embodiments, the CloudChainGlobal Marketplace enhances user connections with brands by providing,for example, that above described mutually beneficial opportunities. Insome embodiments, these opportunities provide a mode of interaction witheach respective brand.

Automated Digital Exclusive Branding (DEB)

Automated DEB includes an automatic pairing of brands to users through,for example, machine learning. In some embodiments, Automated DEB isprovided by the described interoperable cloud-based system by processes,through a trained machine learning model, a user data file,questionnaire style questions and answers, known navigation pathways,ownership requests, or related user habits, to discover new brands andprovide recommendations and opportunities for exploration of these newbrands.

In some embodiments, Automated DEB is provided by the describedinteroperable cloud-based system with display variance, which includesthe changing of specified opportunities within a user's data feed. Suchdisplay variance can be determined based on, for example, a retail cycleand brand specific inputs paired with the user preferences from theAutomated DEB. In some embodiments, a user data file includes personalpreferences and browsing history. In some embodiments, a user data filecan be extended by a user.

Personality AI Matrix and Recommendation Services

In some embodiments, the Automated DEB provided through the CloudChainGlobal Marketplace employs a personality matrix to filter brandsprovided to users based on a hybrid filtering approach that combinescollaborative filtering and content filtering to give an optimalexperience. In some embodiments, collaborative filtering includesrecommending brands and products to a user based on the similaractivities of other users. In some embodiments, artificial intelligence(AI) in the form of machine learning is employed to account forpreferences entered into the personality matrix. Aspects that play intoa collaborative filtering algorithm may include, for example,global/local locations, brand preferences, similar interactions, andproduct interest. The opportunities that are provided to the user (e.g.,through the BrandCube) may be change based on the user's inputs. As anexample, a user can designate to share an upcoming marriage with thebrands. This data can be pushed into the personality matrix to augmentthe brands in which a user may be interested in and thus theopportunities provided.

Opportunity Types—Business

In some embodiments, the described interoperable cloud-based systemprovides business opportunities to brands and users. Such businessopportunities provide a way for users to interact their favorite brands,such as applying for jobs, soliciting capital, taking advantage ofaffiliate marketing programs, and so forth. Example businessopportunities are listed in detail below.

Opportunity Types—User

User opportunities include user-focused opportunities geared to providea consumption-based opportunity type to users. Types of useropportunities include product catalogs, LookBook, and Retail Live. Theseopportunities themselves are described in detail below. In someembodiments, brands have the option of what and how much to sell as wellas what tier of loyal customer can access, for example, a discounted orfull-price product.

Display Variance

In some embodiments, a matrix completion algorithm in employed withinthe described interoperable cloud-based system to provide displayvariance. In some embodiments, display variance includes the continuousdelivery (e.g., through the user's data feed) of fresh brands andopportunities based on a user's preferences in a pull versus pushmanner. In some embodiments, to provide such display variance a matrixcompletion algorithm is employed to predict unknown brands that a usermight want to follow. In some embodiments, the provided display variancealso takes in a collaborative filtering approach, and contentrecommendations. In some embodiments, collaborative measures brand datathat is used by similar users and what such users they consider“trending” or “hot” at any given time. In some embodiments, the displayvariance provided by the described interoperable cloud-based systemensures that new brands on the platform are constantly being exploredand exposed globally in various parts of the world. In some embodiments,this display variance is the driving force behind Automated DEB provideby the described system.

Automated Digital Exclusive Branding

In some embodiments, personalization in the CloudChain GlobalMarketplace is a privacy first approach that relies on personal data forprocessing. For example, a user can input details to a PersonalityMatrix for processing. The user can then set expiration dates on lifeevents or a due date for expiration of a given set of productparameters. In some embodiments, the marketplace Automated DEBintegrates this information into a recommendation engine that employsmachine learning to provide detailed explorations of opportunities basedon current life events and personality alignment. In some embodiments,the features that build the algorithm base are opt-in, which means thatthe user is automatically subscribing and determining the terms of therelationship with the brands they choose to OWN (e.g., enter into asmart ownership contract).

In some embodiments, the recommendation engine employed neural-networksand/or a Generalized Additive Model (GAM) classifier are employed tocapture non-linearities in predictor sets. In some embodiments,predictor sets are employed to train a machine learning model with theresidual error for a brand. In some embodiments, a predictor setincludes: personal details (e.g., name, email, age, gender, andlocalization), family status (e.g., siblings, parents, significantothers, and marital), professional personal details (resume, current jobtitle, curriculum vitae (CV), electronic (E)-Graph, pitch data, andapplication history), and/or consumer inputs (e.g., “Owns”, brandinteractions, and opportunity transactions). These data points and setsadd up to output the major predictor set referred to as “BrandPersonality Matrix.” In some embodiments, a classifier step function isemployed through machine-learning to determine engagements on theCloudChain Global Marketplace.

In some embodiments, a classifier step function employed within thedescribed interoperable cloud-based system is define according to:

${\hat{r}( {u,m} )} = {{r_{res}( {u,m} )} + {\alpha \{ {\begin{matrix}{{\mu_{a}{if}\mspace{14mu} {p_{i}( {u,m} )}} < x} \\{{\mu_{b}{if}\; {p_{i}( {u,m} )}} \geq x}\end{matrix},} }}$

where:

u is the user and m the brand being predicted;

r_(res) (u, m) is the residual error of the previous classifier for thatuser-brand pair;

p_(i)(u, m) is the value of predictor I for that user-brand pair;

μ_(a) is the average of all samples in the initial set for which Pi<x;

μ_(b) is the average of all samples in the initial set for which Pi≥x;

{circumflex over (r)} is the predicted score for a brand m or thepredicted residual error for brand m, since the model is computed onresidual errors.

Own—Brand Ownership

In some embodiments, an “own” is the subscription contract (e.g., thesmart ownership contract) that a user agrees to with a brand. In someembodiments, the own, allows the user to explore the opportunities thata brand has extended. In some embodiments, brands are in control of theopportunities that they can extend via ownership. In some embodiments,ownership levels also exist, and users are rewarded based on theirloyalty to their owned brands.

In some embodiments, the OWN button 1072 allows a smart ownershipcontract to be signed with an open pathway to the opportunities that abrand provides. This button serves as a gateway to the opportunitiesthat a brand offers. In some embodiments, the total number of Owns is animportant metric for which brands to pay attention. For example, growthin Owns and decreases in Owns can give insight to the current usersentiment (see FIG. 7).

Smart Ownership Contract

Smart contracts are digitization of the legal contracts and includeexecutable code which represents, for example, contract terms. As such,a smart contract not only defines the rules and penalties related to anagreement in the same way that a traditional contract does, but alsoautomatically enforces those obligations. A smart contract mayaccomplish this by taking information as input, assigning a value tothat input through the rules set out in the contract, and executing theactions required by those contractual clauses. For example, a smartcontract may determine whether an asset should be sent to a destinationentity or whether it should be returned to an originating entity. Smartcontacts may be coded in a programming language, such as Solidity™ Forexample, a smart contract may be programmed to deliver payment when anitem is received. In this format, a contract is converted to computercode, stored and replicated on the system, and supervised by a networkof computers that run a blockchain. Smart contracts can call other smartcontract just like an Object-oriented object to create and use objectsof another class. Smart contracts can store data. The data stored can beused to record information, fact, associations, balances and any otherinformation needed to implement logic for real world contracts. In someembodiments, a smart contract is deployed, stored, and executed withinthe virtual machine.

A smart ownership contract is a smart contract that is created based onUser—Brand interactions, incentives and rewards. In some embodiments, anownership contract is presented to an end-user. By signing this contractwith their public key, a user agrees to the terms of the contract and toextend the required data grouping (e.g., personal details and/ormetrics) to the respective brand. Within a peer-to-peer opportunitychannel from which both sides benefit, users and brands can propose tochange the details and contents of this agreement at any time.

A data group includes a specified grouping of personal information. Adata group can be tied to a smart ownership contract (e.g., the personaldetails and/or metrics extended to the brand from a user).

Distributed Ledger/Blockchain Overview

A distributed ledger can be described as a ledger of any transactions orcontracts maintained in decentralized form across different locationsand people, eliminating the need of a central authority to keep a checkagainst manipulation. All the information on it is securely andaccurately stored using cryptography and can be accessed using keys andcryptographic signatures. Once the information is stored, it becomes animmutable database, which the rules of the network govern. Distributedledgers are inherently harder to attack than, for example, a centralizedledger because all the distributed copies need to be attackedsimultaneously for an attack to be successful. Moreover, these recordsare resistant to malicious changes by a single party.

An example distributed ledger is the commonly known Blockchain (orblockchain). Blockchain is referenced within the present disclosure forpurposes of illustration. It is contemplated, however, that anyappropriate distributed ledger can be used in implementations of thepresent disclosure. A blockchain is a continuously growing list ofrecords or blocks that are linked and secured using cryptography. Eachblock with the blockchain may include transaction data provided fromtransactions that have been executed in one or more contexts, such asnegotiable instrument transactions, digital currency transactions, andso forth. In some examples, a transaction includes an agreement betweena buyer and seller, a supplier and a user, or a provider (e.g., a brand)and a user that there would be exchange of assets (e.g., a data group),products, or services in lieu of currency, crypto-currency or some otherasset either in present or in future. In some examples, a single blockmay include transaction data provided from multiple transactions (e.g.,multiple deposits of different checks by different people). A blockchainmay grow as completed blocks are added with a new set of transactionsthus forming a ledger of the transaction. Each block may include a hashpointer to a previous block and a timestamp along with the transactiondata in a permanent manner.

In some embodiments, the transactions in a block of a blockchain arehashed and encoded into a Merkle tree (e.g., the transactions are leafnodes of a Merkle tree). A Merkle tree (or hash-based tree) is ahash-based data structure that is a generalization of a hash list. AMerkle tree includes a tree structure in which each leaf node is aresult of a cryptographic hash function (CHF) applied to the transactionto generate a hash value or “hash” and each non-leaf node is labelledwith the cryptographic hash of the labels of its child nodes. ExampleCHF include the secure hash algorithm 256 (SHA-256), SHA-3, and messagedigest 5 (MD5), among others. In general, the CHF receives informationas input, and provides a hash value as output. The hash value can be apredetermined length. For example, SHA-256 outputs a 256-bit (32-byte,64-character) hash value. In some examples, the hash value is a one-wayhash value, in that the hash value cannot be ‘un-hashed’ to determinewhat the input was. Additionally, a Merkle tree may be implemented as ak-ary tree, which is a rooted tree data structure in which each node hasno more than k children. For example, a Merkle tree may be implementedas binary tree where each node may have 0, 1, or 2 children. The Merkleroot (or root hash) of such a binary tree can be generated by repeatedlyhashing each pair of nodes until only one hash is left. In someexamples, when the number of transactions is odd, the last hash isduplicated once to create an even number of leaf nodes. If a singledetail in any of the transactions or the order of the transactionschanges, so does the Merkle root. As such, the Merkle root summarizesall of the data in the related transactions, and can be stored in ablock to maintain the integrity of the data. Thus the employment of aMerkle tree allows for a quick and simple test of whether a specifictransaction is included in the set or not.

In general, blocks are added to the blockchain in a linear,chronological order by one or more computing devices in a peer-to-peernetwork of interconnected computing devices that execute a blockchainprotocol. In short, the peer-to-peer network can be described as aplurality of interconnected nodes, each node being a computing devicethat uses a client to validate and relay transactions (e.g., deposits ofchecks). Each node maintains a copy of the blockchain, which isautomatically downloaded to the node upon joining the peer-to-peernetwork. The blockchain protocol provides a secure and reliable methodof updating the blockchain, copies of which are distributed across thepeer-to-peer network, without use of a central authority.

Because all entities on the blockchain network may need to know allprevious transactions (e.g., deposits, withdrawals, etc.) to validate arequested transaction, entities must agree on which transactions haveactually occurred, and in which order. For example, if two entitiesobserve different transaction histories, they will be unable to come tothe same conclusion regarding the validity of a transaction. Theblockchain enables the entities to come to an agreement as totransactions that have already occurred, and in which order. In short,and as described in further detail below, a ledger of transactions isagreed to based on the amount of work required to add a transaction tothe ledger of transactions (e.g., add a block to the blockchain). Inthis context, the work is a task that is difficult for any single node(e.g., computing device) in the peer-to-peer network to quicklycomplete, but is relatively easy for a node (e.g., computing device) toverify.

A typical peer-to-peer network includes so-called miners (e.g.,computing devices) that add blocks to a blockchain based on theblockchain protocol. In general, multiple miners validate transactionsthat are to be added to a block, and compete (e.g., perform work, asintroduced above) to have their block added to the blockchain.Validation of transactions includes verifying digital signaturesassociated with respective transactions. For a block to be added to theblockchain, a miner must demonstrate a PoW before their proposed blockof transactions is accepted by the peer-to-peer network. A blockchainprotocol includes a PoW scheme that is based on a CHF. In someembodiments, the blockchain protocol can require multiple pieces ofinformation as input to the CHF. For example, the input to the CHF caninclude a reference to the previous (most recent) block in theblockchain, details of the transaction(s) that are to be included in theto be created block, and a nonce value.

Multiple nodes may compete to hash a set of transactions and provide thenext block that is to be added to the blockchain. The blockchainprotocol provides a threshold hash to qualify a block to be added to theblockchain. For example, the threshold hash can include a predefinednumber of zeros (0's) that the hash value must have at the beginning(e.g., at least the first four characters of the hash value must each bezero). The higher the number of zeros, the more time-consuming it is toarrive at a qualifying hash value.

In a blockchain-based smart contract platform, for example, each blockproducing node may go through a number of steps to create a candidateblock. For example, a number of transactions are selected from apublicly-shared pool of pending transactions. In some embodiments, theselected transactions are assigned in an order in, for example, a linearlist. Typically, there is some mechanism to limit the maximum number oftransactions that can be included. In many embodiments, however, thereis no enforced minimum. Computations specified by the transactions areperformed. In some embodiments, each computation has access to a globalshared state, and can make certain changes to that shared state.Moreover, in some embodiments, the input of one transaction could dependon the output of another transaction. In such embodiments, it isimportant that these computations are strictly performed in order. Thetransactions are combined with a snapshot of the final global stateresulting from processing those transactions. The results are broadcastto the rest of the network. In some embodiments, the “snapshot” is ahash of the global state, and can be in the form of, for example, theroot node of a Merkle tree.

In some embodiments, each node in the network that receives a candidateblock verifies that the computations implied by the transaction listhave been computed correctly. These nodes re-perform all of thecomputations in the order specified by the candidate block. The nodesthen compare the snapshot of the final global state they have computedwith the snapshot in the candidate block from the original node. If thesnapshots match, the block is considered a valid candidate.

Public blockchains are decentralized where no one body has control overthe network, ensuring the data cannot be changed once validated on theblockchain. Some well-known examples of Public Blockchains would beBitcoin and Ethereum. In unspent transaction output (UTXO) blockchains,such as Bitcoin, only transactions that successfully transfer tokens canbe included in a block. On the other hand, in state-model blockchains,like Ethereum and Zeus, it is valid (and even common) to includetransactions that fail. In some embodiments, these transactions areincluded in the block, but do not modify the global state (aside fromthe payment of the transaction fees). Thus, a transaction that is“processed correctly” may not actually do what was intended by userinitiating the transaction.

A private blockchain is a permissioned blockchain. Permissioned networksplace restrictions on who is allowed to participate in the network andin what transactions. Blockchains that are private or permissioned worksimilarly to public blockchains but with access controls that restrictthose that can join the network, meaning it operates like a centralizeddatabase system of today that limits access to certain users. Privateblockchains also have one or multiple entities that control the network,leading to the reliance on third-parties to transact.

Once one or more valid candidate blocks are produced, the network usessome consensus mechanism for collectively agreeing on a single validcandidate. This is typically “proof-of-work” in current blockchains, butthere are many proposals for future networks—or evolutions of existingnetworks—that use “proof-of-stake”. The embodiments decentralizedcomputation system, described herein, work equally well with eitherfamily of consensus mechanisms, but is most powerful when coupled withinstant-finality, proof-of-stake consensus.

CloudChain Helix Platform™

In some embodiments, the described interoperable cloud-based system isprovided through a CloudChain Helix Platform. Such a platform allows,for example, a user to register securely and maintain their personalrecords transparently to share the records through smart ownershipcontracts with their favorite brands. Additionally, through thedescribed system provided by the CloudChain Helix Platform users caninteract and exchange personal preferences and information with brands.

FIG. 1 depicts an example architecture 100 for the CloudChain HelixPlatform. The example architecture 100 provides the described systemthat allows brands to build opportunities for users in the cloud whilethese users securely interact with the opportunities via a blockchain.The CloudChain Helix Platform allows users to exchange personal data,which is secured cryptography via a blockchain, with brand data that isstored in the cloud. In some embodiments, each user can build their ownexperience through the described system provided by the CloudChain HelixPlatform by interacting with, saving, and owning brands. In someembodiments, through the described system provided by the CloudChainHelix Platform, brands can extend opportunities tailored to userpreferences while ensuring data security, privacy, and high performancefor the end-user.

As depicted, the example architecture 100 employs cloud computingresources 102 and various blockchains 104. As depicted, the cloudcomputing resources 102 includes cloud data, cloud services, backendserver BM.org, backend server CC.org, authorization server, and searchserver. As depicted, cloud data includes raw back up, raw data, results,deriver data, and raw logs. As depicted, cloud chain services includeemail services, Global Positioning System (GPS) service, social connect,scheduler, machine learning, and media process. As depicted, backendserver BM.org includes data API, media processor, and routers. Asdepicted, backend server CC.org includes data API, media processor, androuters. As depicted, authorization server includes authentication,facial recognition, and cloud security. As depicted, search serverincludes elastic search and search cache. As depicted, the cloudcomputing resources 102 and the blockchains 104 are connect via networkCloudChain calls and through a payment processor.

As depicted, the blockchains 104 include a brand chain, a cloudchain.js,smart data sum, and an identity chain and are labeled as identity andbrand nodes. As depicted, the example architecture 100 also includes abrand services, a market place, a brand wallet, and a private keyprocess.

As depicted, the brand services and market place are load balanced. Asdepicted, the brand services include a business-to-business (B2B)marketplace, key performance indicators (KPIs) and metrics, andcampaigns. As depicted, the marketplace includes, data cache, retaillive, LookBook, product catalog, montage, cohorts, and jobs. Themarketplace is synchronized via backend e-commerce synchronization. Asdepicted, the example architecture 100 allows consumers tocloudchain.org to communicate with brand mangers through key encryption.As depicted, the example architecture 100 allows brand managers tocommunicate with brandmedia.org.

As depicted, the private key process includes user details, keygeneration, facial recognition, key request, key storage and digitalsignature.

The described interoperable cloud-based system providesultra-high-performance cloud capabilities through a global-tenant modelbuilt for speed and scalability. The CloudChain Helix™ Platform uniquelyblends this multitenant cloud with the security and data privacy ofblockchain technology. In some embodiments, CloudChain Helix™ Platformemploys a permissioned blockchain that is held up by a consortium ofsubscribing brands hosting their own Brand Nodes. In some embodiments,brand nodes are dynamic systems of verifying bodies and storage housefor the smart ownership contract held between brands and users. In someembodiments, the CloudChain Helix platform cryptographically signs datainto secure blocks to consolidate the data. In some embodiments, theblocks are accessible only through discrete Brand Nodes and User Nodesinterfaces that employ a multi-signature model. In some embodiments, theemployed node regime establishes the benchmark for industry andregulatory standards in data and privacy at a global level.

In some embodiments, the described interoperable cloud-based systemincludes a pool of redundant computing infrastructure, from which data,products, and service infrastructure can be accessed, provisioned onrequest, and released when not required—within a globally scalableapplication runtime environment. The CloudChain Helix Platform providesseveral APIs such as a stream of subscription-based opportunitiesguarded by an authoritative Blockchain. In some embodiments, theauthorization process for the described system includes an IdentityBlockchain, PublicKey Cryptography and intelligent routing specified toa user's credentials. In some embodiments, the CloudChain Helix Platformserves content and media from secure contracts between users and brandswhile providing encrypted communication channels. In the depictedexample, the cloud converges with the decentralized and distributedprivate Blockchain solution to form the CloudChain Helix Platform.

In some embodiments, the CloudChain Helix Platform provides a set ofavailable services routed by a secure gateway API that directs usercredential (e.g., a unique identifier(s) public key(s), and so forth) toa Hyperledger Blockchain and keeps brand data self-contained under eachindividual Brand Node. The CloudChain Helix Platform employs securenetworking and supports controlled social sharing by users (e.g., via aViral Sharing Button™). The CloudChain Helix Platform helps usersmaintain their feeds of, for example, brands, commerce, andopportunities, using the brand wallet, and by tracking transactions onour platform.

Global-Tenant Cloud Architecture

FIG. 2 depicts an example a high-level application instance model(global-tenant) 200 that launches new branded nodes for each on-boardedbrand entity. As depicted, the global-tenant model 200 includes, a brandnode cloud architecture that is connected to a security adapter, a shortmessaging service (SMS) adapter, user-interface front-end components,messaging adapters, a secure API gateway, and database adapters. Asdepicted, the messaging adapters connect the brand node cloudarchitecture to a video process and inter-application messaging. Asdepicted, the database adapters connect the brand node cloudarchitecture to non-relational databases, relational databases, and acryptographic databases. As depicted, secure API gateway connects thebrand node cloud architecture to user application clients, such asmacOS™, iOS™, Windows™, Android™, and internet of things clients.

Through this global-tenant model 200, brands can populate content,access data and tap networks at any desired scale. In some embodiments,application instances are generated and replicated horizontally aroundthe globe based on, for example, request times, location of requests,and the status of each application instance cache. In some embodiments,global caches are employed to provide an optimal user experience. Insome embodiments, brand nodes work together to secure the network andverify the transactions of the entire platform.

The depicted Global-tenant architecture 200 leverages high scalabilityand security through cloud based services. In some embodiments, branddata APIs are accessed via user authenticated identity. In someembodiments, the described system employs an IDKey that is adecentralized identity system that provides the mechanisms needed forpublic key cryptography. In some embodiments, a UPI is assigned to eachuser.

Data feeds provided by various brands are programmed and consumed in anumber of ways in accordance with respective brand data policies. As anexample, a brand may fill out a Brand Catalog, queue up a product launchvia LookBook or extend open career opportunities via Jobs. In someembodiments, these opportunities are only able to be accessed byauthenticated users who have agreed to the smart ownership contract ofthe Brand. In some embodiments, when the criteria of ownership areagreed and signed upon with an authorized IDKey identity, the user isable to access the respective brand opportunity feed through theBrandCube provided by the CloudChain Helix Platform.

In some embodiments, Secure Sockets Layer (SSL) is used to automaticallygenerate SSL certificates to keep every Brand Node SSL connection up todate in real-time. The SSL encryption fully encrypts the access to BrandNodes on the system.

In some embodiments, brand data APIs are secured and allow access todata that is provided by the respective brands. In some embodiments,brand data is syndicated through secure APIs for authorized parties toview and take advantage of regardless of platform. In some embodiments,each brand configures campaigns through a scheduler application, whichis a campaign coordinator that employs collision detection and machinelearning to determine the best times to schedule content around a giventopic, geographical reach, media type, consumption details, and retailcycle.

Retail Live Geo-Location API

In some embodiments, a Geo-Location API is provided to Brand Nodesthrough the Global-tenant architecture 200. In some embodiments, aGeo-Location API is used in Retail Live to perform a verification checkat various locations to provide real-time incentives these locations. Insome embodiments, the Retail Live Geo-Location API is a cloud basedservice that is accessible to Brand Nodes. For example, as a user entersa storefront, they can use their precise GPS coordinates to verify withthe brand in real-time that they are at the brand's event, office, oranywhere else of interest to the brand and/or user. In some embodiments,a communication stream of incentives and other opportunities arecontinuously extended to the user via the Geo-Location API. In someembodiments, being a permission-based system, users are notified bytheir devices and CloudChain that a choice Brand is accessing theirlocation.

Use of Blockchain Technology

FIG. 3 depicts an example blockchain instance architecture 300 thatprovides a brand wallet 306 interaction and identity authenticationthrough the CloudChain Helix Platform, depicted as the CloudChain 310.As depicted, the blockchain instance architecture 300 includes anidentity chain 302 and an opportunity chain 304. In some embodiments,the identity chain 302 is employed to authenticate and verify legitimacyof users using Zero Knowledge Succinct Non-Interactive Argument ofKnowledge (SNARK). In some embodiments, SNARK allows the proof of anidentity, secret data, etc. to be proved without revealing thatinformation between a verifier and proving person. In some embodiments,the opportunity chain 304 allows brands to log opportunity transactionsand expose their immutability, searchability, and history. In someembodiments, the transactions take place over a Secure API Gateway whereusers can access the immutability, searchability, and history via ablock explorer, which is authenticated by their brand wallet.

Blockchain Use-Cases

The employed blockchains provides peer-to-peer connectivity, dataprivacy, and security. In some embodiments, blockchains are employed tostore encrypted identity information encrypted that allows users toengage in smart ownership contracts with brands without the need ofrevealing their true identities without permission. In some embodiments,each transaction is logged to the blockchain using the IDKey protocol.In some embodiments, the IDKey protocol uses user credentials, such asthe user's public key and unique identifier, which may be generated uponregistration. Identification Key (IDKey) is a self-sovereign identityprocess that a user employs to secure their personal information on theCloudChain Helix platform.

FIG. 4 depicts an example process 400 of a Brand Node 402 extendingopportunities through a smart ownership contract 404. In someembodiments, the Brand Node 402 generates the smart ownership contract404 for the user 406. In some embodiments, the smart ownership contract404 act as an application that can programmed, for example, through aUI. In some embodiments, a brand can extend smart ownership contracts,such as the smart ownership contract 404, to their users, such as user406. In some embodiments, the user 406 authenticates using the IdentityBlockchain 302 and Public Key Infrastructure required for access to thespecific data. In some embodiments, this opportunity transaction,including the ownership, is logged on the Opportunity Blockchain 304.Once a smart ownership contract, such as the smart ownership contract404, is generated between a user and a brand, the respective user hasexclusive access to pass personal details and requested data groups tothe Brand.

In some embodiments, smart ownership contracts, such as the smartownership contract 404, are executed as channels between a Brand and auser. Such channels allow the free-flow of information between the twoparties as a peer-to-peer communication flow and provide the incentivespromised. In some embodiments, each party involved in a smart ownershipcontract must endorse the contracts as defined within an extendedopportunity. The endorsement states what the identity (e.g., the user)and the organization (e.g., the brand) are required to sign off on toexecute the contract. In some embodiments, the user and the brand areboth required to sign the transaction of opening a new ownershipcontract via an ownership contract endorsement. In some embodiments,once both ends of the contract are signed by the brand and the user, theuser has access to the brands extended opportunities and can exchangedata groupings with the brand and the brand can propose newopportunities, incentives, or data rules through the Ownership Contract.

Private Key Generation Process—Self-Sovereign Identity Private KeyInfrastructure

FIG. 5 depicts an example process 500 for self-sovereign identity keygeneration and storage. As depicted, a user 502 initiates an applicationto generate a private-public key pair. In some embodiments, thegenerated private key is stored on the user's personal device 506accessible by brand wallet 504 running on the device 506. In someembodiments, a UPI is generated and grouped with the Public Key to besaved on the Identity Chain 302 as an identifier for later lookupprocesses. In some embodiments, a seed key for backing up a user'scredential is generated. In some embodiments, such a seed key can beused to restore the account in question and unlock the brands andopportunities that are saved to that digital identity.

In some embodiments, following the identifier being created and loggedinto the identity chain 302, a user creates a Master Data Group 510 thatincludes personal details that a user can derive into subsequent datagroupings (e.g., data groupings 512, 514, and 516). In some embodiments,the Master Data Group is stored on a personal computing device andsubsequent sharable groupings are encrypted and placed on-chain. In someembodiments, the public key becomes a pointer in the chain to be foundwith the Block Explorer. Data can now be encrypted and stored on theblockchain through the user's credentials. In some embodiments, a useremploys the identity chain service to generate a private—public keypair. In some embodiments, the private key gets saved to their device inan encrypted file.

In some embodiments, a user enters personal details into the Master DataGroup for their profile. In some embodiments, this Master Data Group isstored on file and during the initial creation of credentials, such as aUPI or other unique identifier, as well as a seed key for recovery. Insome embodiments, optional personal data groupings are able to be formedfor sharing purposes or entry into a smart ownership contract withchoice brands. In some embodiments, facial recognition and biometricsare used to secure the file on the user's personal device. In someembodiments, public keys are posted to the secure API gateway.

In some embodiments, the back-end cloud router routes the traffic to thecorrect CloudChain application instance and data store. In someembodiments, the public key and unique identifier point at the user'sidentity for verification. In some embodiments, data is encrypted andstored on the identity chain with the UPI and Private Key for access tothe data groups that have been created.

In some embodiments, a combination of Merkle DAGs and digital signaturesare used to verify the integrity of an end-user's personal privacy data.In some embodiments, a private key stored by the user on their deviceallows for the access to that data. For example, each user can generatea specific public address that allows exposure of given personal profiledetails in order to allow an authorized party to use their private keyto open/decrypt that data. In some embodiments, identity can persistacross devices by utilizing a seed, image-based connection or privatekey.

In some embodiments, users are able to protect their personal detailsbehind a profile based facial recognition authorization that accessestheir transactions and personal details on their personal device. Insome embodiments, this facial authentication can be used as a way tosecure private keys on a device. In some embodiments, a facialrecognition algorithm assigns a seed keyword to each point that isrecorded by a camera, which can be used together with the users face tounlock an account from any device.

Showcase Immersion Algorithm

In some embodiments, on application initialization a user and theiractive brands are initialized for the navigation and queue of CloudChainbrands. In some embodiments, a showcase immersion algorithm is employedto keep the flow of fresh opportunities front and center to each user.In some embodiments, the brands selected as active for a user are basedon, for example, brands owned by the use (e.g., determined via theuser's brand wallet) and via the collaborative filtering algorithm aswell as brands determined based on accessible user data, such as, theactive user's age, gender, personality traits, logins, registrations,payments. In some embodiments, users are shown a mixture of brandopportunities based the showcase immersion algorithm processing theseactive brands. In some embodiments, users are shown owned brands withthe most recent consumer opportunity determined based on the showcaseimmersion algorithm. In some embodiments, certain global states maypause or interrupt the showcase immersion algorithm. Such global statesmay include, for example, interacting with a media player, call toaction, global searches, choosing a trending opportunity to populate,interacting with any system cube (e.g., ledger, or brand wallet,), viralbutton, brand story, ownership, and opportunity buttons. The constantfeed of brands presented to a user, as determined based on the showcaseimmersion algorithm, immerses the user in new brands with a blend of thefamiliar favorite brands.

In some embodiments, each user employs a public key authenticationmethod that interfaces with the identity chain to form a response thatunlocks a personal profile assigned to the user. In some embodiments,this profile contains private data pertaining to the authenticated user.In some embodiments, the showcase immersion algorithm uses, for example,past owns, active life events, geography, dislikes and active worldevents, and the brad wallet of owned brands to generate a showcase viewfor the user. In some embodiments, the showcase view is a BrandCubeViewport that a user may interact with when the user initiallyauthenticates to the CloudChain Global Marketplace. In some embodiments,the showcase immersion algorithm generates an owned brand opportunityfollowed by an explore (e.g., an unowned brand) opportunity to deliver aconstant flow of new and existing brands with which to the user to mayinteract. In some embodiments, the data determined by the showcaseimmersion algorithm is employed to retrain (e.g., via machine learning)the algorithm to better understand what brands to showcase for eachuser.

Collaborative Filtering Example

FIG. 6 depicts a collaborative filtering example with conflict review.As depicted, user 602 and user 604 who share common connections andpersonal data smart contracts 620 with brands 612, 614, and 616. Asdepicted, user 602 has a singular connection (data smart contract 622)with brand 618 that is not approved by user 604. In some embodiments andas depicted, a collaborative recommendation 642 is generated by aconflict review algorithm 640 based on an interaction history andpersonality matrix 630. In some embodiments, the conflict reviewalgorithm 640 runs through the personality matrix 630 providing personalpreferences, life events, and past feedback that are provided viainteraction methods. As an example, if a user has a signified a lifeevent, such as “Purchased a Home,” then a furniture company would be a“Good Recommendation.” In some embodiments of the conflict reviewalgorithm 640, a number of sets are blended using a linear regressionmodel specific to each user. In some embodiments, a linear regression ofpredictions is generated based on samples from an initial set. In someembodiments, the linear model is trained specific to each userpreference using ridge regression, which minimizes the expression.

Transaction Logging

In some embodiments, the transactions that take place between the brandand user are logged on a shared private permissioned blockchain. Asusers take advantage of opportunities that are extended via the brands,final actions are logged in an immutable ledger. This ledger can beaccessed by brands and users via the CloudChain Helix Platform.

FIG. 7 depicts an example ownership request process 700. As depicted, auser 702 completes a public key 704 generation process to generate apointer to which to sync data. The private key is stored to the user'sbrand wallet 703. The user's 702 identity is verified by the IdentityBlockchain 706. Once verified, an ownership request 708 is provided to abrand 710 by pressing the OWN Button. The brand 710 extends the smartownership contract 712. The smart ownership contract 712 includes arequest for a digital signature 714 and a data grouping 716 (thatsatisfies criteria for ownership provided by the brand) to be providedby the user 702. The user 702 provides the digital signature 714 to signthe smart ownership contract 712 and chooses a data grouping 716 toextend back to the smart ownership contract 712. The smart ownershipcontract 712 completes and gives the user 702 the reward. A block iscreated on the opportunity blockchain 718 that includes the encrypteddata behind the transaction (e.g., the smart ownership contract 712, thedigital signature 714, and the data grouping 716. In some embodiments,the data stored to the opportunity blockchain 718 is only able to beviewed and un-encrypted by the two originators of the contract (e.g.,the brand 710 and the user 702). In some embodiments, a Block Explorerprovided by the described interoperable cloud-based system allows theuser 702 to review the details of all transactions with brandopportunities.

High Performance Bandwidth

In some embodiments, brands employ a respective brand node that providerequest caching and subscription updates that allow each brand to beindependent from other brands bandwidth. In some embodiments, each brandnode includes its own limit and does not share resources with the restof the platform. In some embodiments, each brand node handles requestsvia a Secure API and return brand API to provide data quickly tointerested parties.

FIG. 8 depicts an example caching scheme 800 that can be employed withinthe described interoperable cloud-based system. As depicted, a user 802make secured or insecure request 804 to the CloudChain Helix Platformvia http/https. A webserver 806, such as a NGINX, reverse proxies therequests to a cache system. The cache will return 808 if it can quicklydeliver assets. If not, the webserver accesses an object storage 810.The cache is checked if it can return assets at this level and if itcannot it will read the database and return data. If Cache is good thenit will deliver a response 812 over redirected Hypertext TransferProtocol Secure (HTTPS) and user cached for next time.

BrandCube Viewport

In some embodiments, the BrandCube provides the core brand opportunitiesto the users and is the viewport into the interactions that take placeon CloudChain Global Marketplace. In some embodiments, the BrandCubeprovides a mode of interaction with the opportunities extended bybrands. In some embodiments, the BrandCube includes interactive call toaction buttons and brand specific details. In some embodiments, a userprofile is center to the BrandCube and is displayed as a large avatarfor logged in user.

As depicted in FIG. 10A, the example BrandCube frame 1000 includesbuttons around the perimeter including an “OWN” button, a brand coin, acountry flag, a business button, a call to action button, and a userbutton. The OWN Button includes the action of owning a brand based on asmart ownership contract on the CloudChain Helix platform. Below that,as depicted in example frame 1000, is a brand wallet quick view. In someembodiments, the quick view presents the most recent owned brands insuccession in a drawer. Also, in some embodiments, a user can explorefor new brands with “Explore Brands”. In some embodiments, a brand canenter information regarding an opportunity through a customer successplatform.

In some embodiments, the BrandCube is the delivery mechanism of mediaand opportunities. In some embodiments, the BrandCube features a colorcoordinated frame, trigger flags, access to brand website, access to thebrands mobile applications, brand story, Brand Message, brand valuesthat can be accessed by interacting with the BrandCube. In someembodiments, the BrandCube includes color modules, graphics, coloredborders and capabilities specific to the opportunity present within it.In some embodiments, the BrandCube presents a unique blend ofcustomization and standardization for brands and delivers an expectedresult for the Brands followers.

In some embodiments, the BrandCube provides a data feed to each user.Such a data feed may include, for example, standardized offerings (e.g.,opportunities) across user and business touchpoints determined accordingto a trained machine-learning algorithms that ascribes a personalitymatrix of data, and combine it with current trends and life events. Insome embodiments, the opportunities provided via the feed are based on auser's personality matrix and provide new insights and offerings thateach user can control.

In some embodiments, the call to action buttons on the cube are onlyseen in showcase cubes on owned brands. In some embodiments, when a userclicks one of these call to action buttons, they change a secondarystate and initiate loading of an inner-cube engine. In some embodiments,the only call to action that an explore brands cube has are own (theyhave access to media controls though play, pause, replay, volume, etc).In some embodiments, an interrupt of the showcase immersion algorithmmay alter the secondary state. In some embodiments, the secondary stateis defined by the Inner-Cube Types: Commerce, Communication, SystemActions, and External Actions.

In some embodiments, the Commerce type includes LookBook, Retail Live,Brand Catalog, affiliate marketing, product distribution. In someembodiments, when the secondary state is set to the Commerce type, aninner-cube state is set to commerce initiated and loads ecommerce stepsnavigation, and optionally, smart data questions for the respectivebrand. In some embodiments, commerce cubes support specific styles ofpayments and logistics. In some embodiments, brands set the availablelogistic types and payment types. In some embodiments, logisticsincludes delivery, local delivery, pick-up, and reserve. In someembodiments, each commerce type follows a numbered step process of whatthey are doing at any given time in-cube.

In some embodiments, the Communication type includes jobs, investmentopportunities, EA, and corporate social responsibility (CSR). In someembodiments, when the secondary state is set to the Communication type,a mode of communication is set. In some embodiments, the mode ofcommunication may be set to pitch (e.g., a video based communicationprotocol) or prompt (e.g., text based communication protocol). In someembodiments, navigational paths for a current user and brand combinationare determined based on the set mode of communication.

In some embodiments, the system actions type includes search, wallet,ledger, settings, and user. In some embodiments, when the secondarystate is set to a system actions type and resume the showcase immersionalgorithm on close of the system action. As an example, as a usersearches a wallet or for a new opportunity the showcase immersionalgorithm is paused. As soon as the action is completed and if the userdoes not select a brand from the wallet, the showcase immersionalgorithm resumes. In such an example, the showcase immersion algorithmwould not resume when a Brand or opportunity interaction is taken as aresult of the searching.

In some embodiments, the external actions types include sendingopportunities and cubes to social media platforms or sharing them withother CloudChain users. In some embodiments, the external actions typeincludes viral, and external website integration. In some embodiments,the showcase immersion algorithm resumes once the respective action iscomplete.

In some embodiments, the UI and user experience (UX) design of theBrandCube is color coordinated based on the active opportunity or mediain view. In some embodiments, high color contrast and clear paths toaction present the user with a new intuitive way to shop, communicate ornetwork with one another. In some embodiments, the actions andinteractions that can happen on the BrandCube are standardized, notbrand dependent, and operate the same for brand verticals. In someembodiments, opportunities are assigned a based color when presented toa user. In some embodiments, shines and sheens used off this based colorto generate “covering” of a cube (e.g., to provide display variance).

In some embodiments, the BrandCube includes sections for Montage,Cohorts, LookBook, Brand Catalog, Retail Live, Jobs, and a user's brandwallet.

Montage

The montage UI provides channels that brands can use to extend theirstories or for affiliate marketing, product distribution, user socialresponsibility, corporate events, executive access, investment capital,and so forth. In some embodiments, the montage UI provides acommunication and engagement channel for users and brands. In someembodiments, a brand can populate, via a Brand Node, the montage UIwith, for example, affiliate sale items, corporate events, investmentopportunities, product distribution opportunities, or executive access.In some embodiments, the montage UI allows users to follow brands and togain an insight into how each brand operates. For example, a brand maygain a grass-roots style following with a much-needed productivity pushthat helps the organization meet their goals while giving the user someskin in the game.

Cohorts

The cohorts UI provide a peer-to-peer action network facilitated by, forexample, real-time video chat. A brand or user can log on to the cohortsUI as a way to fulfill a need in, for example, employment, expertise, ormentorship on a certain topic. Users can, for example, offer theirskillsets to business cohorts for searchability and can be asked to joina cohort around a specialization. For example, a cohort can be createdto find top tier talent for a particular skill set. In some embodiments,a limit to the number of people that can get into the group and usersand brands are added to each cohort. In some embodiments, cohorts havean uninterrupted face-to-face style group meeting.

LookBook

In some embodiments, the LookBook service provides a fear of missing out(FOMO) opportunity that may be employed to, for example, execute productlaunches. For example, a brand may take pre-sales and obtain a barometerreading on the latest products. In some embodiments, users wait fornotifications or opportunity feed media that shows the new products frombrands that they OWN (e.g., with whom they have a smart ownershipcontract).

In some embodiments, the LookBook provides a way for users to downloaddigital catalogs and request physical LookBook catalogs from brands. TheLookBook aims to provide a way for Brands to show off product to theusers that love them. In some embodiments, through the LookBook usershave access to the upcoming products that a Brand will put out in thecoming cycle before anyone else. As such, loyal customers can takeadvantage of limited launches, presales, and product launches directlythrough the LookBook.

Brand Catalog

In some embodiments, Brand Catalog UI provides a brand specific catalogwith exclusive and scarcity driven commerce with limited quantities andincentives for brand owners. In some embodiments, through the BrandCatalog UI, brands have the option of what and how much to provide(e.g., merchandise) to various users. In some embodiments, the BrandCatalog UI allows brands to select the tier(s) of users that access, forexample, a discounted. In some embodiments, Brand Catalog UI provides aproduct catalog that is standardized across all brands to provide afamiliar experience as well as a streamlined checkout process.

In some embodiments, AI including machine learning, and scarcity-basedelectronic (E)-commerce, fuels E-commerce sales on the describedinteroperable cloud-based system. Products may be limited in quantityand based on the preferences of a currently logged in user account. Insome embodiments, brands can provide variable shopping rewards and otherincentives via the Brand Catalog UI. In some embodiments, the BrandCatalog UI provides rotating catalogs, new offerings, and the variablerewards to users to incentives returning to the product catalog for agiven product or Brand. In some embodiments, a product catalog serves asa performant pass-through to the Brand's existing E-commerce operation.The pass-through can be referred to as background sync that allows abrand to enter payment gateway preferences into a respective branddashboard.

Retail Live

In some embodiments, services provided through the RetailLive UI(RetailLive) enhance brick and mortar visits by using, for example, aGeo-location API and in-store locations to extend incentives inreal-time based on location and limited timing. In some embodiments,Retail Live allows brands to showcase opportunities (e.g., via theshowcase view) that get users in-store or on premise. In someembodiments, Retail Live allows brands to, for example, verify that auser is in their brick and mortar establishment and push live updatesand discounts to the users verified to be in-store.

In some embodiments, proximity algorithms and real-time geo-locationdata are employed in tandem to prove the location of a user in order toprovide, for example, coupons and discounts in real-time.

Jobs

In some embodiments, services provided through Jobs UI includes a jobdiscovery and application service that allows applicants to useshortened video pitches to apply to open positions with limited openingratios. In some embodiments, these services also include, for example,following up on jobs as well as providing a digital CV,electronic-graph, and/or video pitch for a job. In some embodiments, theJobs UI includes a dashboard page that includes an employment moduleattached to each user profile that allows a user to store employmentinformation to their identity. In some embodiments, a user can controland provide job information with brands in order to take advantage ofopen positions. In some embodiments, a digital CV can be edited and sentto a brand with a posted open opportunity.

In some embodiments, video storage and recording is provided by the JobsUI and can be employed to associated users' investment pitches, jobinterview pitches, and other video content, with other opportunitytypes. In some embodiments, video clips have a standardized limit oftime and are specifically used for applying to jobs, requesting capital,and pitching new business ideas. In some embodiments, the Jobs UI can beemployed to manage users in a given cohort, attend cohort meetings,share webinars, and view cloud video content recordings. In someembodiments, this media can be accessed after the meetings haveadjourned. In some embodiments, a pitch includes a short, limited timevideo application that is exchanged securely with a brand in turn forjobs, investment capital, and other brand opportunities. In someembodiments, a pitch delivers video in a peer-to-peer way to brands.

Brand Wallet™

In some embodiments, ownership of each user's owned brands is provideddisplayed through their brand wallet is provided in return for exclusiveaccess to products, brand employees, jobs and more incentives. In someembodiments, the brand wallet allows users to move through paymentmethods, identification documents, and so forth. In some embodiments,the brand wallet gives control over who has access to what pieces ofdata—with the user as the power holder in this process. In someembodiments, the brand wallet is secured and controlled by the user andcan be accessed through facial authorization, seed keys, and/or IDKey.In some embodiments, the user maintains control over brand accessibilityto personal details using the Brand Wallet.

In some embodiments, a user can sift through their choice owned brandsdata and gains direct access to opportunities through the BrandCube. Asan example, a user indicates that he or she is getting married soon. Theuser owns “Al-Clad Cookware” as an owned brand. Al-Clad can categorizedifferent opportunities based on a market segments or keywords and ifmarriage is one of the life events is being marketing, then the user whohave a life event of marriage listed are likely to see theseopportunities.

In some embodiments, the brand wallet provides users an area to discoverwhat they have recently purchased from Brands as well as what pre-ordersor sales that they are awaiting. In some embodiments, the e-commercewallet functionality is located on a separate tab within the brandwallet and can also be accessed from the navigation bar. A user can usethe wallet to see what pre-orders they have currently on the way andtheir status. In some embodiments, the Brand can update the user on thestatuses of a given order. In some embodiments, a wish-list style cartfunctionality allows users to save opportunities to their brand walletwith customized notifications on when they expire.

In some embodiments, the brand wallet allows authenticated users to peerinto the past and present smart ownership contracts that exist on theblockchain. In some embodiments, the block explorer allows searchabilityof the opportunities of which a user has taken advantage. The searchingthrough of past opportunities provides for the formations of newopportunities and repeat purchases.

In some embodiments, a blockchain style user identity managementverifies users' identity. In some embodiments, a verified identity cancommunicate with the databases or data stores associated with them inthe cloud. In some embodiments, user will have full control over theirrespective identity and can provide proof of sharing to a brand of theirchoice in return for access to the CloudChain Global Marketplace.

Color Theory

FIG. 9 depicts color theory examples 900 that can be employed within thedescribed interoperable cloud-based system. In some embodiments, theBrandCube augments and changes color based on the opportunities andinteractions that take place. In some embodiments, the BrandCube actslike an organic force that changes in style and coordination based on anumber of factors, such as trigger flag, opportunity type, timeremaining, limited quantities and so forth, that have an effect onurgency and coordinate with the cube to relay that message. In someembodiments, opportunities are color coded to give a visual indicator ofexactly what type of opportunity you are interacting with. Some examplesinclude: Black Friday trigger flags that emit holiday-based color themeswith buttons and call to actions that are standardized and areconsistent with color theory meanings.

Virality Button—Social Platform Sharing

In some embodiments, users can share the opportunities provided throughtheir respective data feed to social media, such as Twitter™, Facebook™,LinkedIn™ or Instagram™, by clicking a specific icon and sending a linkfrom CloudChain to that social media that provides a path to onboardmore users for that brand. In some embodiments, clout is provided to areferring user and user who build brands achieve variable rewardopportunities. In some embodiments, brands are provided insight into whoare their most loyal users. This functionality is referred to as theViral “V” button. This button connects to users' social profile and canact as a pass-through for the opportunity the users are sharing. In someembodiments, the functionality and extensibility of this feature can belimited by the brands as follows. For example, an exclusive type can beset by a respective brand to not be shared via the viral button, a viraltype can be shared by anyone and viewed by anyone, and an owned type canbe shared by the user and only accessed after they agree to the smartownership contract presented.

Gamification—Network Effect

In some embodiments, top tier loyal brand followers receive an edge overother owners (users). Network effect can come in the form of addedbadges or profile notification that the user are an earlyadopter/ambassador for the brand by, for example, having users sign onand follow or OWN a brand. This functionality could be used to provideclout to the initial user or to create a top tier of owners (loyalists).

In some embodiments, an initial mining style reward can be extended(similar to a crypto currency) for the first owners to recruit theirfriends to join the platform and extend crypto currency as a way to takeadvantage of the offerings on the platform. In some embodiments, theserewards can be in the form of blanket discount coupons that are linkedto the user who supplies them to their friends and family.

In some embodiments, tracking a user's progress towards a given goal canbe employed to keep the user engaged and working toward an end result.For example, as a user fills out their profile they are provided aprogress to completion that shows how complete the profile is. In someembodiments, transactional email can be used to remind users of theirgoals.

Trigger Flags

In some embodiments, brands can label opportunities with trigger flagsto call attention finite opportunities. Trigger flags can also stand formetric specific details such as: market leader, trending brand, andproduct launch. In some embodiments, trigger flags sync with the colortheory behind the opportunity itself and are built directly into the UIof the BrandCube.

In some embodiments, trigger flags include targeted labels affixed tothe BrandCube to mark the content in the viewable section by a specificevent or meaning. Examples include Black Friday Deal, Christmas Sale,Mother's Day Deal, Market Leader, Product Launch, and so forth. In someembodiments, the trigger flag employ color theory as a means ofsubliminal connection to the given brand opportunities. Color can beused in such a way that conveys excitement and freshness as well astaxonomy for the opportunities that are provided from brands. In someembodiments, a trigger flag is includes in the header of pages ofBrandCube.

In some embodiments, dynamic scheduling algorithms place trigger flagsin a priority queue with, for example, a round-robin algorithm forassigning the schedule of a given trigger flag. In some embodiments,trigger flag holidays are a factor due to the detailed label that givesan offering inside the cube a better chance of being interacted with. Insome embodiments, trigger flags algorithms accept priority events suchas, for example, holidays, retail cycles, life events and deadlines, andso forth.

In some embodiments, the described interoperable cloud-based systememploys a dynamic scheduling algorithm, such as a shortest pathalgorithm, for scheduling based on, for example, loyal follower productlaunch.

Additional Brand Cube Attributes

In some embodiments, each brand has a corresponding country flag beneaththeir brand coin logo on the BrandCube. In some embodiments, this flagnotifies the current company headquarters or origin for open visibilityto the users on the platform. In some embodiments, brands based indifferent areas of the world make for an interesting search as well asthe ability to locate brands from your heritage.

In some embodiments, each brand has the ability to share a mission,story or values with their followers and potential followers.

In some embodiments, the BrandCube is split into two bottom fixedbuttons to the right and left. In some embodiments, the right mostbutton is the business button that allows users to explore businessopportunities that the featured brand has available once that brand isowned by the user. Example business offerings include: Jobs, Montage,and Cohorts.

In some embodiments, the leftmost button depicted in the BrandCube is auser button. In some embodiments, this button directs a user to view allof the user based offerings that a brand might have. In someembodiments, the user offerings are made up of LookBook, Product Catalogand Retail Live.

BrandCube Viewport Example Pages

FIGS. 10A-10J depict various example pages provide in the CloudChainGlobal Marketplace.

FIG. 10A depicts an example framework page 1000 for the CloudChainGlobal Marketplace. The example framework page 1000 can be employ toprovided, for example, a perennial feed of brand-based opportunities(e.g., with the BrandCube).

FIG. 10B depicts an example page 1010 on the BrandCube with a featuredshowcase view with the brand wallet in view.

FIG. 10C depicts an example montage page 1020 that provides, forexample, a matrix of opportunities. Such a matrix may include, forexample, investment capital, corporate events, corporate socialresponsibility, affiliate marketing, product distribution, and executiveaccess.

FIG. 10D depicts an example cohorts page 1030 that includes apeer-to-peer action network. Such a peer-to-peer action network mayfacilitate, for example, team building, company building, and talentpursuits. In some embodiments, the cohorts page 1030 may incorporatevideo chat technology to provide a rich user experience around userbrand connections.

FIG. 10E depicts an example of the an example LookBook page 1040 thatcan provide, for example, extend upcoming and not yet ready products totheir loyal owners in a standardized way.

FIG. 10F depicts an example of the an example Brand Catalog page 1050that can provide, for example, a traditional commerce-based opportunitythat provides offerings directly to users.

FIG. 10G depicts an example of the an example Retail Live page 1060 thatcan provide, for example, incentives in real-time based on location andlimited timing.

FIG. 10H depicts an example dashboard page 1070 that provides forlimited video and file transfer-based employment applications.

FIG. 10I depicts an example Open Jobs and Jobs Opportunities UI 1080provided by the described interoperable cloud-based system.

FIG. 10J an example of the an example Trigger Flag page 1090 that canprovide, for example, specific labels (trigger flags) that signify thetype of opportunity that are being viewed within the BrandCube. In someembodiments, trigger flags correspond to, for example, retail cycles,holiday calendars and other special dates or days dictated by otherbusinesses, cultures and societies. Some examples of trigger flag typesinclude Christmas Deals, Black Friday, Singles Day, Cyber Monday,Thanksgiving Day Sale, Memorial Day Sale, Boxing Day, Mother's Day,Father's Day, and so forth.

Example Processes

FIGS. 11A, 11B, 11C, and 11D each depict a flowchart of an exampleprocess, 1100, 1120, 1130, and 1140 respectively, that can beimplemented by embodiments of the present disclosure. The exampleprocesses 1100, 1120, 1130, and 1140 can be implemented by thecomponents of the described interoperable cloud-based system, such asdescribed above in FIG. 1. The example processes 1100, 1120, 1130, and1140 show in more detail how a user device interacts with the describedsystems. The flowcharts generally show how a user device receivesopportunities through a data feed based on a provided data groupingsatisfying at least one criterion for ownership of a brand. In someembodiments, the processes 1100, 1120, 1130, and 1140 provide for asecure exchange of personal data with brand data.

For clarity of presentation, the description that follows generallydescribes the example processes 1100, 1120, 1130, and 1140 in thecontext of FIGS. 1-10I, and 12A-13C. However, it will be understood thatthe processes 1100, 1120, 1130, and 1140 may be performed, for example,by any other suitable system, environment, software, and hardware, or acombination of systems, environments, software, and hardware asappropriate. In some embodiments, various operations of the processes1100, 1120, 1130, and 1140 can be run in parallel, in combination, inloops, or in any order.

For process 1100 as depicted in FIG. 11A, at 1110 a back-end system 1104receives a criterion for ownership and a plurality of opportunities froma Brand Node associated with a brand. In some embodiments, the requestcomprises consent from the user for the Brand Node to access the datagrouping. In some embodiments, the criterion for ownership comprises arequest for at least one specific type of personal data or metric, andthe data grouping comprising the at least one specific type of personaldata or metric for the user. In some embodiments, the opportunitiescomprise brand data. In some embodiments, the brand data isself-contained under the Brand Node. In some embodiments, the brand datacomprises media associated with the Brand Node. In some embodiments, thebrand data comprises investment capital, corporate events, corporatesocial responsibility, affiliate marketing, product distribution,executive access, product launches, product catalogs, data regarding aheadquarters of the brand, data regarding executives of the, and a stockticker for the brand. In some embodiments, the opportunities aresubscription based. In some embodiments, the opportunities compriseinteractions, incentives, and rewards with the brand. In someembodiments, the Brand Node is generated for an on-boarded brand entity,and the on-boarded brand entity populates content, accesses data, andtap networks through a Brand Node Interface. In some embodiments, theon-boarded brand entity comprises the brand. From 1110, the process 1100proceeds to 1112.

At 1112, a personal computing device 1102 provides a request forownership of a brand to the back-end system 1104. In some embodiments,the request comprises user credentials and a data grouping. In someembodiments, the data grouping is determined based the criterion forownership. In some embodiments, the user credentials comprise a UPI anda private key associated with a corresponding public address. In someembodiments, the personal computing device 1102 receives personal datafrom a user interface, and generates a Master Data Group comprising thepersonal data. In some embodiments, the personal computing device 1102generates the user credentials and a recovery seed, through an identitychain service provided by the back-end system, and persists the MasterData Group. In some embodiments, the Master Data Group is associatedwith the generated user credentials and the recovery seed. In someembodiments, the Master Data Group comprises the data grouping. In someembodiments, the request for ownership of the brand includes a digitalsignature. From 1112, the process 1100 proceeds to 1114.

At 1114, the back-end system 1104 receives the request for ownership ofthe brand from the personal computing device 1102. From 1114, theprocess 1100 proceeds to 1115.

At 1115, the back-end system 1104 generates a smart ownership contract1106 associated with the user credentials and the brand. In someembodiments, the smart ownership contract is updated based on amulti-signature model that requires receiving approval from both theBrand Node and the personal computing device before a change isimplemented. In some embodiments, the back-end system 1104 receives aproposal to change contents of the data mapping from the Brand Node,provides the proposal to the personal computing device 1102, and updatesthe smart ownership contract 1106 with the changed contents of the datamapping based on an approval received from the personal computing device1102. In some embodiments, the generation of the smart ownershipcontract does not reveal an identity of a user associated with the usercredentials. In some embodiments, the smart ownership contract allows afree-flow of information between the personal computing device and theBrand Node as a peer-to-peer communication flow. From 1115, the process1100 proceeds to 1116.

At 1116, the back-end system 1104 persist the smart ownership contract1106 to a distributed ledger 1108. In some embodiments, the back-endsystem 1104 encrypts the data grouping, and persists the encrypted datagrouping to a second distributed ledger. In some embodiments, the seconddistributed ledger comprises an identity blockchain. In someembodiments, the encrypted data grouping is persisted within a block. Insome embodiments, the public address is a pointer in the chain to theencrypted data grouping. In some embodiments, the distributed ledger1108 comprises an opportunities blockchain. In some embodiments, theopportunities blockchain comprises a permissioned private blockchain.From 1116, the process 1100 proceeds to 1117.

At 1117, the back-end system 1104 invokes the smart ownership contract1106 to provide the data feed to the personal computing device 1102 whenprompted by the Brand Node. From 1117, the process 1100 proceeds to1118.

At 1118, smart ownership contract 1106 provides the data feed to thepersonal computing device based on the provided data grouping satisfyingthe criterion for ownership. In some embodiments, the data feedcomprises the opportunities. In some embodiments, the smart ownershipcontract 1106 provides the Brand Node associated with the brand accessto the data grouping. In some embodiments, the personal computing device1102 provides user preferences for a user associated with the usercredentials to the back-end system 1104. In some embodiments, the smartownership contract 1106 processes the user preferences through amachine-learning model to determine the opportunities, themachine-learning model having been trained with received user preferencefor a respective plurality of users who have claimed ownership of thebrand. In some embodiments, the machine-learning model comprises aweight of match algorithm. From 1118, the process 1100 proceeds to 1119.

At 1119, the personal computing device 1102 receives the data feed fromthe back-end system 1102. In some embodiments, the personal computingdevice 1102 provides a view of the brands owned by the user credentials.In some embodiments, the ownership of a brand is determined based on arespective smart ownership contract between the user credentials andeach of the respective brands owned by the user credentials. In someembodiments, facial recognition or biometrics are used to secure thepersonal computing device 1102 and provide profile verification. In someembodiments, the personal computing device 1102 accesses, through ablock explorer provided by the back-end system 1104, a transactionhistory associated with the user credentials and stored to thedistributed ledger. In some embodiments, the personal computing device1102 provides real-time geo-location data, to the back-end system 1104through a geo-location API. In some embodiments, the back-end system1104 performs a verification check on a location of the personalcomputing device based on the received real-time geo-location data. Insome embodiments, the opportunities comprise real-time incentives basedon a verified location of the personal computing device. In someembodiments, the data feed comprises content provided by a plurality ofbrands. In some embodiments, the data feed comprises a user stream and abusiness opportunities steam. In some embodiments, the user stream andthe business opportunities steam are employed to provide displayvariance of the content provided to the personal computing device basedon a plurality of smart ownership contracts associated with the usercredentials and the brands determined to be potential matches forownership. In some embodiments, the data feed is provided through anencrypted communication channel. In some embodiments, the data feed isconsumed according to a Brand Data policy provided by a standardizationagreement. In some embodiments, a collaborative filtering algorithmrecommends brands and products based on similar activities of otherusers. In some embodiments, the recommended brands and products areprovided to the personal computing device 1102 through the data feed andfiltered based on a showcase immersion algorithm. In some embodiments,the collaborative filtering algorithm recommends brands and productsbased on Global/Local locations, brand preferences, similarinteractions, and product interest. In some embodiments, the data feedcomprises a flow of offerings at any given time selected based on apersonality matrix of data for a user associated with the usercredentials, selected preferences, current trends, life events, anddisplay variance. In some embodiments, the opportunities comprise anability to purchase items from the brand. In some embodiments, thepersonal computing device 1102 provides content received from providedthe data feed through a user interface. In some embodiments, the userinterface comprises a display screen. In some embodiments, the contentof the data feed is provided to the display screen via a BrandCubegraphical user-interface received from the back-end system 1104. In someembodiments, the providing of the content of the data feed is compatiblewith advertisement blockers. From 1119, the process 1100 ends.

For process 1120 as depicted in FIG. 11B, at 1122 a criterion forownership and a plurality of opportunities is received from a Brand Nodeassociated with a brand. In some embodiments, the opportunities comprisethe brand data. From 1122, the process 1120 proceeds to 1124.

At 1124, a smart ownership contract associated with the user credentialsand the brand is generated. From 1124, the process 1120 proceeds to1126.

At 1126, the smart ownership contract is persisted to a distributedledger. From 1126, the process 1120 proceeds to 1128.

At 1128, the smart ownership contract is invoked, when prompted by theBrand Node, to provide the opportunities to the computing device. From1128, the process 1120 proceeds to 1129.

At 1129, a data feed is provided to the computing device by processing aset of instructions that are included in the smart ownership contract.In some embodiments, the data feed is provided based on the provideddata grouping satisfying the criterion for ownership. In someembodiments, the data feed comprises the opportunities. From 1129, theprocess 1120 ends.

For process 1130 as depicted in FIG. 11C, at 1132 a request forownership of a brand is provided to a back-end system. In someembodiments, the request comprises user credentials, a data grouping,and consent for a Brand Node associated with the brand to access thedata grouping. In some embodiments, the data grouping is determinedbased on a criterion for ownership of the brand. From 1132, the process1130 proceeds to 1134.

At 1134, a data feed comprising a plurality of opportunities associatedwith the brand is received from the back-end system. In someembodiments, the opportunities are provided by a smart ownershipcontract stored to a distributed ledger and associated with the usercredentials and the brand. From 1134, the process 1130 ends.

For process 1140 as depicted in FIG. 11D, at 1142 a request forownership of a brand is received for a computing device. In someembodiments, the request comprising a data grouping. From 1142, theprocess 1130 proceeds to 1144.

At 1144, a smart contract is persisted to a distributed ledger. In someembodiments, the smart contract is associated with the brand andgenerated based on the data grouping satisfying a criterion forownership of the brand. From 1144, the process 1130 proceeds to 1146.

At 1146, a plurality of opportunities is provided, based on the datagrouping satisfying the criterion for ownership, to the computing deviceby executing the smart contract. From 1146, the process 1140 ends.

Processing Devices and Processors

In some embodiments, the platforms, systems, media, and methodsdescribed herein include a computer, or use of the same. In furtherembodiments, the computer includes one or more hardware centralprocessing units (CPUs) or general purpose graphics processing units(GPGPUs) that carry out the device's functions. In still furtherembodiments, the computer comprises an operating system configured toperform executable instructions. In some embodiments, the computer isoptionally connected a computer network. In further embodiments, thecomputer is optionally connected to the Internet such that it accessesthe World Wide Web. In still further embodiments, the computer isoptionally connected to a cloud computing infrastructure. In otherembodiments, the computer is optionally connected to an intranet. Inother embodiments, the computer is optionally connected to a datastorage device.

In accordance with the description herein, suitable computers include,by way of non-limiting examples, server computers, desktop computers,laptop computers, notebook computers, sub-notebook computers, netbookcomputers, netpad computers, handheld computers, Internet appliances,mobile smartphones, tablet computers, and vehicles. Those of skill inthe art will recognize that many smartphones are suitable for use in thesystem described herein. Those of skill in the art will also recognizethat select televisions, video players, and digital music players withoptional computer network connectivity are suitable for use in thesystem described herein. Suitable tablet computers include those withbooklet, slate, and convertible configurations, known to those of skillin the art.

In some embodiments, the computer includes an operating systemconfigured to perform executable instructions. The operating system is,for example, software, including programs and data, which manages thedevice's hardware and provides services for execution of applications.Those of skill in the art will recognize that suitable server operatingsystems include, by way of non-limiting examples, FreeBSD, OpenBSD,NetBSD®, Linux, Apple® Mac OS X Server®, Oracle® Solaris®, WindowsServer®, and Novell® NetWare®. Those of skill in the art will recognizethat suitable personal computer operating systems include, by way ofnon-limiting examples, Microsoft® Windows®, Apple® Mac OS X®, UNIX®, andUNIX-like operating systems such as GNU/Linux. In some embodiments, theoperating system is provided by cloud computing. Those of skill in theart will also recognize that suitable mobile smart phone operatingsystems include, by way of non-limiting examples, Nokia® Symbian® OS,Apple® iOS®, Research In Motion® BlackBerry OS®, Google® Android®,Microsoft® Windows Phone® OS, Microsoft® Windows Mobile® OS, Linux®, andPalm® WebOS®.

In some embodiments, the device includes a storage or memory device. Thestorage or memory device is one or more physical apparatuses used tostore data or programs on a temporary or permanent basis. In someembodiments, the device is volatile memory and requires power tomaintain stored information. In some embodiments, the device isnon-volatile memory and retains stored information when the computer isnot powered. In further embodiments, the non-volatile memory comprisesflash memory. In some embodiments, the volatile memory comprises dynamicrandom-access memory (DRAM). In some embodiments, the non-volatilememory comprises ferroelectric random access memory (FRAM). In someembodiments, the non-volatile memory comprises phase-change randomaccess memory (PRAM). In other embodiments, the device is a storagedevice including, by way of non-limiting examples, compact discread-only memory (CD-ROM), digital versatile disc (DVD), flash memorydevices, magnetic disk drives, magnetic tapes drives, optical diskdrives, and cloud computing based storage. In further embodiments, thestorage and/or memory device is a combination of devices such as thosedisclosed herein.

In some embodiments, the computer includes a display to send visualinformation to a user. In some embodiments, the display is a liquidcrystal display (LCD). In further embodiments, the display is a thinfilm transistor liquid crystal display (TFT-LCD). In some embodiments,the display is an organic light emitting diode (OLED) display. Invarious further embodiments, on OLED display is a passive-matrix OLED(PMOLED) or active-matrix OLED (AMOLED) display. In some embodiments,the display is a plasma display. In other embodiments, the display is avideo projector. In yet other embodiments, the display is a head-mounteddisplay in communication with a computer, such as a virtual reality (VR)headset. In further embodiments, suitable VR headsets include, by way ofnon-limiting examples, HTC Vive, Oculus Rift, Samsung Gear VR, MicrosoftHoloLens, Razer Open-Source Virtual Reality (OSVR), FOVE VR, Zeiss VROne, Avegant Glyph, Freefly VR headset, and the like. In still furtherembodiments, the display is a combination of devices such as thosedisclosed herein.

In some embodiments, the computer includes an input device to receiveinformation from a user. In some embodiments, the input device is akeyboard. In some embodiments, the input device is a pointing deviceincluding, by way of non-limiting examples, a mouse, trackball, trackpad, joystick, game controller, or stylus. In some embodiments, theinput device is a touch screen or a multi-touch screen. In otherembodiments, the input device is a microphone to capture voice or othersound input. In other embodiments, the input device is a video camera orother sensor to capture motion or visual input. In further embodiments,the input device is a Kinect, Leap Motion, or the like. In still furtherembodiments, the input device is a combination of devices such as thosedisclosed herein.

Computer control systems are provided herein that can be used toimplement the platforms, systems, media, and methods of the disclosure.FIG. 12 depicts an example a computer system 1210 that can be programmedor otherwise configured to implement platforms, systems, media, andmethods of the present disclosure. For example, the computing device1210 can be programmed or otherwise configured to receive the abovedescribe CloudChain Global Marketplace, the BrandCube, and/or a datafeed provided by the described interoperable cloud-based system.

In the depicted embodiments, the computing device 1210 includes a CPU(also “processor” and “computer processor” herein) 1212, which isoptionally a single core, a multi core processor, or a plurality ofprocessors for parallel processing. The computing device 1210 alsoincludes memory or memory location 1217 (e.g., random-access memory,read-only memory, flash memory), electronic storage unit 1214 (e.g.,hard disk), communication interface 1215 (e.g., a network adapter) forcommunicating with one or more other systems, and peripheral devices1216, such as cache, other memory, data storage and/or electronicdisplay adapters. In some embodiments, the memory 1217, storage unit1214, interface 1215 and peripheral devices 1216 are in communicationwith the CPU 1212 through a communication bus (solid lines), such as amotherboard. The storage unit 1214 comprises a data storage unit (ordata repository) for storing data. The computing device 1210 isoptionally operatively coupled to a computer network, such as thenetwork 1310 depicted and described in FIG. 13A, with the aid of thecommunication interface 1215. In some embodiments, the computing device1210 is configured as a back-end server deployed within the describedinteroperable cloud-based system.

In some embodiments, the CPU 1212 can execute a sequence ofmachine-readable instructions, which can be embodied in a program orsoftware. The instructions may be stored in a memory location, such asthe memory 1217. The instructions can be directed to the CPU 1212, whichcan subsequently program or otherwise configure the CPU 1212 toimplement methods of the present disclosure. Examples of operationsperformed by the CPU 1212 can include fetch, decode, execute, and writeback. In some embodiments, the CPU 1212 is part of a circuit, such as anintegrated circuit. One or more other components of the computing device1210 can be optionally included in the circuit. In some embodiments, thecircuit is an application specific integrated circuit (ASIC) or a FPGA.

In some embodiments, the storage unit 1214 stores files, such asdrivers, libraries and saved programs. In some embodiments, the storageunit 1214 stores user data, e.g., user preferences and user programs. Insome embodiments, the computing device 1210 includes one or moreadditional data storage units that are external, such as located on aremote server that is in communication through an intranet or theinternet.

In some embodiments, the computing device 1210 communicates with one ormore remote computer systems through a network. For instance, thecomputing device 1210 can communicate with a remote computer system.Examples of remote computer systems include personal computers (e.g.,portable PC), slate or tablet PCs (e.g., Apple® iPad, Samsung® GalaxyTab, etc.), smartphones (e.g., Apple® iPhone, Android-enabled device,Blackberry®, etc.), or personal digital assistants. In some embodiments,a user can access the computing device 1210 via a network.

In some embodiments, the platforms, systems, media, and methods asdescribed herein are implemented by way of machine (e.g., computerprocessor) executable code stored on an electronic storage location ofthe computing device 1210, such as, for example, on the memory 1217 orthe electronic storage unit 1214. In some embodiments, the CPU 1212 isadapted to execute the code. In some embodiments, the machine executableor machine readable code is provided in the form of software. In someembodiments, during use, the code is executed by the CPU 1212. In someembodiments, the code is retrieved from the storage unit 1214 and storedon the memory 1217 for ready access by the CPU 1212. In some situations,the electronic storage unit 1214 is precluded, and machine-executableinstructions are stored on the memory 1217. In some embodiments, thecode is pre-compiled. In some embodiments, the code is compiled duringruntime. The code can be supplied in a programming language that can beselected to enable the code to execute in a pre-compiled or as-compiledfashion.

In some embodiments, the computing device 1210 can include or be incommunication with an electronic display 1220. In some embodiments, theelectronic display 1220 provides a UI 1225 that depicts various screensuch as the examples depicted in FIGS. 10A-10J.

FIG. 13A depicts an example environment 1300 that can be employed toexecute implementations of the present disclosure. The example system1300 includes computing devices 1302, 1304, 1306, a back-end system1330, and a network 1310. In some embodiments, the network 1310 includesa local area network (LAN), wide area network (WAN), the Internet, or acombination thereof, and connects web sites, devices (e.g., thecomputing devices 1302, 1304, and 1306) and back-end systems (e.g., theback-end system 1330). In some embodiments, the network 1310 includesthe Internet, an intranet, an extranet, or an intranet and/or extranetthat is in communication with the Internet. In some embodiments, thenetwork 1310 includes a telecommunication or a data network. In someembodiments, the network 1310 can be accessed over a wired or a wirelesscommunications link. For example, mobile computing devices (e.g., thesmartphone device 1302 and the tablet device 1306), can use a cellularnetwork to access the network 1310.

The described interoperable cloud-based system may be employed withinthe example environment 1300 to, for example, employ machine learning/AItechniques for processing the user preferences through amachine-learning algorithm to determine the opportunities, the machinelearning algorithm having been trained with received user preference fora respective plurality of users who have claimed ownership of the brand.

In some examples, the users 1322, 1324, and 1326 interact with thedescribed interoperable cloud-based system through a GUI or applicationthat is installed and executing on their respective computing devices1302, 1304, and 1306. In some examples, the computing devices 1302,1304, and 1306 provide viewing data to screens with which the users1322, 1324, and 1326, can interact. In some embodiments, the computingdevices 1302, 1304, 1306 are sustainably similar to computing device1210 depicted in FIG. 12. The computing devices 1302, 1304, 1306 mayeach include any appropriate type of computing device such as a desktopcomputer, a laptop computer, a handheld computer, a tablet computer, apersonal digital assistant (PDA), a cellular telephone, a networkappliance, a camera, a smart phone, an enhanced general packet radioservice (EGPRS) mobile phone, a media player, a navigation device, anemail device, a game console, or an appropriate combination of any twoor more of these devices or other data processing devices. Three usercomputing devices 1302, 1304, and 1306 are depicted in FIG. 13A forsimplicity. In the depicted example environment 1300, the computingdevice 1302 is depicted as a smartphone, the computing device 1304 isdepicted as a tablet-computing device, and the computing device 1306 isdepicted a desktop computing device. It is contemplated, however, thatimplementations of the present disclosure can be realized with any ofthe appropriate computing devices, such as those mentioned previously.Moreover, implementations of the present disclosure can employ anynumber of devices as required.

In the depicted example environment 1300, the back-end system 1330includes at least one server device 1332 and at least one data store1334. In some embodiments, the device 1332 is sustainably similar tocomputing device 1210 depicted in FIG. 12. In some embodiments, theback-end system 1330 may include server-class hardware type devices. Insome embodiments, the server device 1332 is a server-class hardware typedevice. In some embodiments, the back-end system 1330 includes computersystems using clustered computers and components to act as a single poolof seamless resources when accessed through the network 1310. Forexample, such implementations may be used in data center, cloudcomputing, storage area network (SAN), and network attached storage(NAS) applications. In some embodiments, the back-end system 1330 isdeployed using a virtual machine(s). In some embodiments, the data store1334 is a repository for persistently storing and managing collectionsof data. Example data store that may be employed within the describedinteroperable cloud-based system include data repositories, such as adatabase as well as simpler store types, such as files, emails, and soforth. In some embodiments, the data store 1334 includes a database. Insome embodiments, a database is a series of bytes or an organizedcollection of data that is managed by a database management system(DBMS).

In some embodiments, the at least one server system 1332 hosts one ormore computer-implemented services, such as described above, provided bythe described interoperable cloud-based system that users 1322, 1324,and 1326 can interact with using the respective computing devices 1302,1304, and 1306.

FIG. 13B depicts an example application provision system 1340 that canbe provided through an environment, such as the example environment 1300and employed to execute implementations of the present disclosure. Asdepicted, the example application provision system 1340 includes theback-end system 1330 configured to include one or more data stores 1334accessed by a relational database management system (RDBMS) 1348.Suitable RDBMSs include Firebird, MySQL, PostgreSQL, SQLite, OracleDatabase, Microsoft SQL Server, IBM DB2, IBM Informix, SAP Sybase, SAPSybase, Teradata, and the like. As depicted, the example applicationprovision system 1340 includes the back-end system 1330 configured toinclude one or more application severs 1346 (such as Java servers, .NETservers, PHP servers, and the like) and one or more web servers 1342(such as Apache, IIS, GWS and the like). The web server(s) 1342optionally expose one or more web services via an API 1344 via thenetwork 1310. In some embodiments, the example application provisionsystem 1340 provides browser-based or mobile native UIs to the computingdevices 1302, 1304, 1306.

FIG. 13C depicts an example cloud-based architecture of an applicationprovision system 1350 that can be provided through an environment, suchas the example environment 1300, and employed to execute implementationsof the present disclosure. The application provision system 1350includes the back-end system 1330 configured to include elastically loadbalanced, auto-scaling web server resources 1372, application serverresources 1374, as well as synchronously replicated stores 1376. In someembodiments, of the example cloud-based architecture of an applicationprovision system 1350, content 1362 of services are provided through acontent delivery network (CDN) 1360 coupled with the back-end system1330. In some embodiments, a CDN is a geographically distributed networkof proxy servers and respective data centers that provides highavailability and high performance through distributing the servicespatially relative to the receiving devices, such as commuting devices1302, 1304, and 1306.

Non-Transitory Computer Readable Storage Medium

In some embodiments, the platforms, systems, media, and methodsdisclosed herein include one or more non-transitory computer readablestorage media encoded with a program including instructions executableby the operating system of an optionally networked computer. In furtherembodiments, a computer readable storage medium is a tangible componentof a computer. In still further embodiments, a computer readable storagemedium is optionally removable from a computer. In some embodiments, acomputer readable storage medium includes, by way of non-limitingexamples, CD-ROMs, DVDs, flash memory devices, solid state memory,magnetic disk drives, magnetic tape drives, optical disk drives, cloudcomputing systems and services, and the like. In some cases, the programand instructions are permanently, substantially permanently,semi-permanently, or non-transitorily encoded on the media.

Computer Program

In some embodiments, the platforms, systems, media, and methodsdisclosed herein include at least one computer program, or use of thesame. A computer program includes a sequence of instructions, executablein the computer's CPU, written to perform a specified task. Computerreadable instructions may be implemented as program modules, such asfunctions, objects, API, data structures, and the like, that performparticular tasks or implement particular abstract data types. In lightof the disclosure provided herein, those of skill in the art willrecognize that a computer program may be written in various versions ofvarious languages.

The functionality of the computer readable instructions may be combinedor distributed as desired in various environments. In some embodiments,a computer program comprises one sequence of instructions. In someembodiments, a computer program comprises a plurality of sequences ofinstructions. In some embodiments, a computer program is provided fromone location. In other embodiments, a computer program is provided froma plurality of locations. In various embodiments, a computer programincludes one or more software modules. In various embodiments, acomputer program includes, in part or in whole, one or more webapplications, one or more mobile applications, one or more standaloneapplications, one or more web browser plug-ins, extensions, add-ins, oradd-ons, or combinations thereof.

Machine Learning

In some embodiments, machine learning algorithms are employed to build amodel to determine brands to provide is a respective data feed for auser to provide display variance. Examples of machine learningalgorithms may include a support vector machine (SVM), a naïve Bayesclassification, a random forest, a neural network, deep learning, orother supervised learning algorithm or unsupervised learning algorithmfor classification and regression. The machine learning algorithms maybe trained using one or more training datasets. For example, previouslyreceived user data mappings and preferences may be employed to trainvarious algorithms. Moreover, as described above, these algorithms canbe continuously trained/retrained using real-time user data as it isreceived. In some embodiments, the machine learning algorithm employsregression modelling where relationships between variables aredetermined and weighted.

Web Application

In some embodiments, a computer program includes a web application. Inlight of the disclosure provided herein, those of skill in the art willrecognize that a web application, in various embodiments, utilizes oneor more software frameworks and one or more database systems. In someembodiments, a web application is created upon a software framework suchas Microsoft® .NET or Ruby on Rails (RoR). In some embodiments, a webapplication utilizes one or more database systems including, by way ofnon-limiting examples, relational, non-relational, object oriented,associative, and XML database systems. In further embodiments, suitablerelational database systems include, by way of non-limiting examples,Microsoft® SQL Server, mySQL™, and Oracle®. Those of skill in the artwill also recognize that a web application, in various embodiments, iswritten in one or more versions of one or more languages. A webapplication may be written in one or more markup languages, presentationdefinition languages, client-side scripting languages, server-sidecoding languages, database query languages, or combinations thereof. Insome embodiments, a web application is written to some extent in amarkup language such as Hypertext Markup Language (HTML), ExtensibleHypertext Markup Language (XHTML), or eXtensible Markup Language (XML).In some embodiments, a web application is written to some extent in apresentation definition language such as Cascading Style Sheets (CSS).In some embodiments, a web application is written to some extent in aclient-side scripting language such as Asynchronous JavaScript and XML(AJAX), Flash® ActionScript, JavaScript, or Silverlight®. In someembodiments, a web application is written to some extent in aserver-side coding language such as Active Server Pages (ASP),ColdFusion, Perl, Java™, JavaServer Pages (JSP), Hypertext Preprocessor(PHP), Python™, Ruby, Tcl, Smalltalk, WebDNA®, or Groovy. In someembodiments, a web application is written to some extent in a databasequery language such as Structured Query Language (SQL). In someembodiments, a web application integrates enterprise server productssuch as IBM® Lotus Domino®. In some embodiments, a web applicationincludes a media player element. In various further embodiments, a mediaplayer element utilizes one or more of many suitable multimediatechnologies including, by way of non-limiting examples, Adobe® Flash®,HTML 5, Apple® QuickTime®, Microsoft® Silverlight®, Java™, and Unity®.

Mobile Application

In some embodiments, a computer program includes a mobile applicationprovided to a mobile computer. In some embodiments, the mobileapplication is provided to a mobile computer at the time it ismanufactured. In other embodiments, the mobile application is providedto a mobile computer via the computer network described herein.

In view of the disclosure provided herein, a mobile application iscreated by techniques known to those of skill in the art using hardware,languages, and development environments known to the art. Those of skillin the art will recognize that mobile applications are written inseveral languages. Suitable programming languages include, by way ofnon-limiting examples, C, C++, C #, Objective-C, Java™, JavaScript,Pascal, Object Pascal, Python™, Ruby, VB.NET, WML, and XHTML/HTML withor without CSS, or combinations thereof.

Suitable mobile application development environments are available fromseveral sources. Commercially available development environmentsinclude, by way of non-limiting examples, AirplaySDK, alcheMo,Appcelerator®, Celsius, Bedrock, Flash Lite, .NET Compact Framework,Rhomobile, and WorkLight Mobile Platform. Other development environmentsare available without cost including, by way of non-limiting examples,Lazarus, MobiFlex, MoSync, and Phonegap. Also, mobile devicemanufacturers distribute software developer kits including, by way ofnon-limiting examples, iPhone and iPad (iOS) SDK, Android™ SDK,BlackBerry® SDK, BREW SDK, Palm® OS SDK, Symbian SDK, webOS SDK, andWindows® Mobile SDK.

Those of skill in the art will recognize that several commercial forumsare available for distribution of mobile applications including, by wayof non-limiting examples, Apple® App Store, Google® Play, ChromeWebStore, BlackBerry® App World, App Store for Palm devices, App Catalogfor webOS, Windows® Marketplace for Mobile, Ovi Store for Nokia®devices, Samsung® Apps, and Nintendo® DSi Shop.

Standalone Application

In some embodiments, a computer program includes a standaloneapplication, which is a program that is run as an independent computerprocess, not an add-on to an existing process, e.g., not a plug-in.Those of skill in the art will recognize that standalone applicationsare often compiled. A compiler is a computer program(s) that transformssource code written in a programming language into binary object codesuch as assembly language or machine code. Suitable compiled programminglanguages include, by way of non-limiting examples, C, C++, Objective-C,COBOL, Delphi, Eiffel, Java™, Lisp, Python™, Visual Basic, and VB .NET,or combinations thereof. Compilation is often performed, at least inpart, to create an executable program. In some embodiments, a computerprogram includes one or more executable complied applications.

Software Modules

In some embodiments, the platforms, systems, media, and methodsdisclosed herein include software, server, and/or database modules, oruse of the same. In view of the disclosure provided herein, softwaremodules are created by techniques known to those of skill in the artusing machines, software, and languages known to the art. The softwaremodules disclosed herein are implemented in a multitude of ways. Invarious embodiments, a software module comprises a file, a section ofcode, a programming object, a programming structure, or combinationsthereof. In further various embodiments, a software module comprises aplurality of files, a plurality of sections of code, a plurality ofprogramming objects, a plurality of programming structures, orcombinations thereof. In various embodiments, the one or more softwaremodules comprise, by way of non-limiting examples, a web application, amobile application, and a standalone application. In some embodiments,software modules are in one computer program or application. In otherembodiments, software modules are in more than one computer program orapplication. In some embodiments, software modules are hosted on onemachine. In other embodiments, software modules are hosted on more thanone machine. In further embodiments, software modules are hosted oncloud computing platforms. In some embodiments, software modules arehosted on one or more machines in one location. In other embodiments,software modules are hosted on one or more machines in more than onelocation.

Databases

In some embodiments, the platforms, systems, media, and methodsdisclosed herein include one or more databases, or use of the same. Inview of the disclosure provided herein, those of skill in the art willrecognize that many databases are suitable for receiving weather,maritime, environmental, civil, governmental or military data. Invarious embodiments, suitable databases include, by way of non-limitingexamples, relational databases, non-relational databases, objectoriented databases, object databases, entity-relationship modeldatabases, associative databases, and XML databases. Furthernon-limiting examples include SQL, PostgreSQL, MySQL, Oracle, DB2, andSybase. In some embodiments, a database is internet-based. In furtherembodiments, a database is web-based. In still further embodiments, adatabase is cloud computing-based. In other embodiments, a database isbased on one or more local computer storage devices.

While preferred embodiments of the present disclosure have been shownand described herein, it will be obvious to those skilled in the artthat such embodiments are provided by way of example only. Numerousvariations, changes, and substitutions will now occur to those skilledin the art without departing from the described system. It should beunderstood that various alternatives to the embodiments described hereinmay be employed in practicing the described system.

What is claimed is:
 1. An interoperable cloud-based system, comprising:a distributed ledger; a back-end system; and a personal computingdevice, configured to: provide, to the back-end system, a request forownership of a brand, wherein the request comprises user credentials anda data grouping; and receive, from the back-end system, a data feedcomprising a plurality of opportunities associated with the brand; theback-end system configured to: receive, from a Brand Node associatedwith the brand, a criterion for ownership and the opportunities, whereinthe data grouping is determined based the criterion for ownership;receive, from the personal computing device, the request for ownershipof the brand; generate a smart ownership contract associated with theuser credentials and the brand, the smart ownership contract comprisinga set of instructions, which, when invoked and executed by one or moreprocessors, cause the one or more processors to perform operationscomprising: providing, to the personal computing device, the data feedbased on the provided data grouping satisfying the criterion forownership; persist the smart ownership contract to the distributedledger; and invoke, when prompted by the Brand Node, the smart ownershipcontract to provide the data feed to the personal computing device. 2.The system of claim 1, wherein the smart ownership contract is updatedbased on a multi-signature model that requires receiving approval fromboth the Brand Node and the personal computing device before a change isimplemented; and wherein the back-end system is configured to: receive,from the Brand Node, a proposal to change contents of the data mapping;provide the proposal to the personal computing device; and update thesmart ownership contract with the changed contents of the data mappingbased on an approval received from the personal computing device.
 3. Thesystem of claim 1, wherein the personal computing device is configuredto: provide a view of the brands owned by the user credentials, whereinthe ownership of a brand is determined based on a respective smartownership contract between the user credentials and each of therespective brands owned by the user credentials.
 4. The system of claim1, wherein facial recognition or biometrics are used to secure thepersonal computing device and provide profile verification.
 5. Thesystem of claim 1, wherein the generation of the smart ownershipcontract does not reveal an identity of a user associated with the usercredentials, wherein the request comprises consent from the user for theBrand Node to access the data grouping, and wherein the criterion forownership comprises a request for at least one specific type of personaldata or metric, and wherein the data grouping comprises the at least onespecific type of personal data or metric for the user.
 6. The system ofclaim 1, wherein the user credentials comprise universal personalidentification (UPI) and a private key associated with a correspondingpublic address; wherein the back-end system is configured to: encryptthe data grouping, and persist the encrypted data grouping to a seconddistributed ledger; wherein the second distributed ledger comprises anidentity blockchain; wherein the encrypted data grouping is persistedwithin a block; and wherein the public address is a pointer in the chainto the encrypted data grouping.
 7. The system of claim 1, wherein thepersonal computing device is configured to: receive personal data from auser interface, and generate a Master Data Group comprising the personaldata; wherein the personal computing device is configured to: generatethe user credentials and a recovery seed, through an identity chainservice provided by the back-end system, and persist the Master DataGroup, wherein the Master Data Group is associated with the generateduser credentials and the recovery seed; and wherein the Master DataGroup comprises the data grouping.
 8. The system of claim 1, wherein thepersonal computing device is configured to: access, through a blockexplorer provided by the back-end system, a transaction historyassociated with the user credentials and stored to the distributedledger.
 9. The system of claim 1, wherein the opportunities comprisebrand data, and wherein the brand data is self-contained under the BrandNode, wherein the brand data comprises media associated with the BrandNode, and wherein the brand data comprises investment capital, corporateevents, corporate social responsibility, affiliate marketing, productdistribution, executive access, product launches, product catalogs, dataregarding a headquarters of the brand, data regarding executives of the,and a stock ticker for the brand.
 10. The system of claim 1, wherein theset of instructions of the smart ownership contract comprise: providingthe Brand Node associated with the brand access to the data grouping.11. The system of claim 1, wherein the personal computing device isconfigured to: provide, to the back-end system, user preferences for auser associated with the user credentials, wherein the set ofinstructions of the smart ownership contract comprise: processing theuser preferences through a machine-learning model to determine theopportunities, the machine-learning model having been trained withreceived user preference for a respective plurality of users who haveclaimed ownership of the brand.
 12. The system of claim 1, wherein thepersonal computing device is configured to: provide, to the back-endsystem through a geo-location application programming interface (API),real-time geo-location data, wherein the back-end system is configuredto: perform a verification check on a location of the personal computingdevice based on the received real-time geo-location data, wherein theopportunities comprise real-time incentives based on a verified locationof the personal computing device.
 13. The system of claim 1, wherein thedata feed comprises content provided by a plurality of brands, whereinthe data feed comprises a user stream and a business opportunitiessteam, and wherein the user stream and the business opportunities steamare employed to provide display variance of the content provided to thepersonal computing device based on a plurality of smart ownershipcontracts associated with the user credentials and the brands determinedto be potential matches for ownership.
 14. The system of claim 1,wherein the Brand Node is generated for an on-boarded brand entity, andwherein the on-boarded brand entity populates content, accesses data,and tap networks through a Brand Node Interface.
 15. The system of claim1, wherein the smart ownership contract allows a free-flow ofinformation between the personal computing device and the Brand Node asa peer-to-peer communication flow.
 16. The system of claim 1, wherein acollaborative filtering algorithm recommends brands and products basedon similar activities of other users, wherein the recommended brands andproducts are provided to the personal computing device through the datafeed and filtered based on a showcase immersion algorithm.
 17. Thesystem of claim 1, wherein the request for ownership of the brandincludes a digital signature.
 18. A computer-implemented method for asecure exchange of personal data with brand data, the method beingexecuted by one or more processors and comprising: receiving, from aBrand Node associated with a brand, a criterion for ownership and aplurality of opportunities, wherein the opportunities comprise the branddata; receiving, from a computing device, a request for ownership of thebrand; wherein the request comprises user credentials and a datagrouping, wherein the data grouping is determined based the criterionfor ownership and comprises the personal data; generating a smartownership contract associated with the user credentials and the brand,the smart ownership contract comprising a set of instructions, which,when invoked and executed by the one or more processors, cause the oneor more processors to perform operations comprising: providing, to thecomputing device, a data feed based on the provided data groupingsatisfying the criterion for ownership, wherein the data feed comprisesthe opportunities; persisting the smart ownership contract to adistributed ledger; and invoking, when prompted by the Brand Node, thesmart ownership contract to provide the opportunities to the computingdevice.
 19. One or more non-transitory computer-readable storage mediacoupled to one or more processors and having instructions stored thereonwhich, when executed by the one or more processors, cause the one ormore processors to perform operations comprising: providing, to aback-end system, a request for ownership of a brand, wherein the requestcomprises user credentials, a data grouping, and consent for a BrandNode associated with the brand to access the data grouping, wherein thedata grouping is determined based on a criterion for ownership of thebrand; and receiving, from the back-end system, a data feed comprising aplurality of opportunities associated with the brand, wherein theopportunities are provided by a smart ownership contract stored to adistributed ledger and associated with the user credentials and thebrand.
 20. A computer-implemented method for a secure exchange of data,the method being executed by one or more processors and comprising:receiving, from a computing device, a request for ownership of a brand,the request comprising a data grouping; persist a smart contract to adistributed ledger, the smart contract associated with the brand andgenerated based on the data grouping satisfying a criterion forownership of the brand; and providing, to the computing device, byexecuting the smart contract, a plurality of opportunities based on thedata grouping satisfying the criterion for ownership.