Systems and methods for asset owner verification in a digital environment

ABSTRACT

Using various embodiments, methods and systems for verification of a digital asset owner in a digital environment are described. In one embodiment, a system is configured to receive a non-fungible token (NFT) associated with a digital asset, the NFT providing proof of ownership of the digital asset through a cryptographic public key and retrieve the digital asset. The system then retrieves a secret pattern from the digital asset, wherein the secret pattern was previously embedded into the digital asset, the secret pattern associated with the cryptographic public key and computes a first identification hash value using a hash function, the hash function receiving a parameter value derived from the secret pattern. The system then receives a second identification hash value and compares the first identification hash value to the second identification hash value. If the first and second identification hash values are identical, then the digital asset is determined to be authentic.

CROSS REFERENCE TO RELATED APPLICATIONS

The present application is a continuation of, and claims priority from,co-pending U.S. patent application Ser. No. 17/574,507, titled “SYSTEMSAND METHODS FOR ASSET OWNER VERIFICATION IN A DIGITAL ENVIRONMENT” filedon Jan. 12, 2022. The contents of the above identified application isincorporated herein by reference for all purposes to the extent thatsuch subject matter is not inconsistent herewith.

FIELD OF THE INVENTION

Embodiments of the present invention relates generally to assets in adigital environment. More particularly, embodiments of the inventionrelate to owner verification of a multi-dimensional asset in amulti-dimensional environment.

BACKGROUND OF THE INVENTION

Since the advent of the digital age, adequately managing digital assets(e.g., a two dimensional image, a three dimensional object, etc.) hasbeen problematic. Piracy, stealing, and copying of digital assets havebeen on the rise and is expected to continue.

Thus, what is needed is systems, methods, and techniques that attempt toovercome the aforementioned problems.

SUMMARY OF THE DESCRIPTION

Using various embodiments, systems, methods, and techniques aredescribed herein for verification of a digital asset owner in a digitalenvironment. A digital asset can include, without limitation, a twodimensional image, a three dimensional object, a non-fungible token, orany object (including, multi-media audio/video assets) that can bedisplayed in a digital environment. In one embodiment, a system can beconfigured to receive a digital asset where the digital asset isconfigured to be displayed in a multi-dimensional environment.Thereafter, the system retrieves a secret pattern within the digitalasset and computes a first identification hash value using a hashfunction. In one embodiment, the hash function receives a parametervalue derived from the secret pattern. The system then compares thefirst identification hash value to a second identification hash value,where the second identification hash value is provided by the owner ofthe digital asset. The system then determines the digital asset asauthentic when the first and second identification hash values areidentical.

In one embodiment, the secret pattern is embedded into the digital assetby the system. In another embodiment, the second identification hashvalue can be previously generated using the secret pattern. In oneembodiment, the secret pattern includes at least one geometric figure,the at least one geometric figure determined by a plurality of digitalasset elements. The plurality of digital asset elements can berepresented by at least one a plurality of pixels, voxels, orhypervoxels, vertices, or using a mesh representation.

In one embodiment, the parameter value is determined by a distancebetween the plurality of digital asset elements of the at least onegeometric figure within the digital asset. In yet another embodiment,the parameter value can be determined by at least one texture valueassigned to the at least one geometric figure formed by the plurality ofdigital asset elements. In one embodiment, the at least one geometricfigure is a triangle mesh.

In yet another one embodiment, the second identifier hash value isretrieved from a blockchain stored in a decentralized and distributeddigital ledger.

BRIEF DESCRIPTION OF THE DRAWINGS

The present invention is illustrated by way of example and notlimitation in the figures of the accompanying drawings in which likereferences indicate similar elements.

FIG. 1 illustrates a flow chart of establishing an owner of a digitalasset, according to one embodiment of the present invention.

FIG. 2 illustrates a flow chart of verifying an owner of a digitalasset, according to one embodiment of the present invention.

FIG. 3 illustrates a flow chart of modifying/transferring ownership of adigital asset, according to one embodiment of the present invention.

FIG. 4 is a block diagram illustrating a data processing system such asa computing system which may be used with one embodiment of theinvention.

DETAILED DESCRIPTION

Various embodiments and aspects of the inventions will be described withreference to details discussed below, and the accompanying drawings willillustrate the various embodiments. The following description anddrawings are illustrative of the invention and are not to be construedas limiting the invention. Numerous specific details are described toprovide a thorough understanding of various embodiments of the presentinvention. However, in certain instances, well-known or conventionaldetails are not described in order to provide a concise discussion ofembodiments of the present inventions.

Reference in the specification to “one embodiment” or “an embodiment” or“another embodiment” means that a particular feature, structure, orcharacteristic described in conjunction with the embodiment can beincluded in at least one embodiment of the invention. The appearances ofthe phrase “in one embodiment” in various places in the specification donot necessarily all refer to the same embodiment. The processes depictedin the figures that follow are performed by processing logic thatcomprises hardware (e.g., circuitry, dedicated logic, etc.), software,or a combination of both. Although the processes are described below interms of some sequential operations, it should be appreciated that someof the operations described can be performed in a different order.Moreover, some operations can be performed in parallel rather thansequentially.

Techniques described herein present novel implementations to identifythe owner of a digital asset to prevent piracy, stealing, hacking,illegal copying, etc. of the asset. As described herein, a ‘digitalasset’ or ‘asset’ refers to an N-th dimensional digital property, where‘N’ is a real number that is greater than one and signifies the numberof dimensions of the digital property in a multi-dimensionalenvironment. A digital asset, without limitation, includes a twodimensional image, a three dimensional object, a non-fungible token, orany object (including, multi-media audio/video assets) that can bedisplayed in a digital environment. A multi-dimensional environmentsignifies a digital environment having two or more dimensions. Further,while a multi-dimensional environment having three or more dimensionsmay be, according to one implementation, a two-dimensional digitalrendition of a three (or more) dimensional digital asset to create anillusion to the viewer's eye, the invention described herein, includes,and is not limited to, such rendering/display techniques.

FIG. 1 illustrates a flow chart of establishing an owner of a digitalasset, according to one embodiment of the present invention. Asillustrated, at 102 the system receives a digital asset from auser/owner. The digital asset can be configured to be displayed in amulti-dimensional environment. At 104, the system determines whether thedigital asset has an embedded secret pattern, and if so, controltransfers to verifying the owner of the digital asset as illustrated inFIG. 2 .

However, if no secret pattern is embedded in the digital asset, at 106,the system embeds a secret patterns into the asset. In one embodiment,secret pattern includes at least one geometric figure, the at least onegeometric figure determined by a plurality of digital asset elements.The digital asset elements may include pixels, voxels, hypervoxels, acombination thereof, etc.

At 108, the digital asset comprising the embedded secret pattern isassociated with the owner information. In one embodiment, the ownerinformation can be determined from a cryptographic public key providedby the owner associated with blockchain technology. In any case, theowner information is associated with the digital asset comprising theembedded secret pattern and stored in a database. Without limitation, adatabase, as referenced herein can be any storage mechanism, including aconventional database, a distributed database, or a storage systemdeveloped using blockchain technology.

At 110, in one embodiment, an identification hash value is computedusing a hash function. In this embodiment, the hash function can receivea parameter value derived from the secret pattern. The parameter valuecan be determined by a distance between the plurality of digital assetelements of the at least one geometric figure within the digital asset.In one embodiment, the parameter value includes a seed generated using arandom number generator function to generate the identification hashvalue. This seed value can then be associated with the digital asset andstored in a database, and can be optionally also associated with theowner information. Once the identification value is generated using thehash function, at 112, the generate value is provided to the owner forsafe keeping.

As a non-limiting example, in reference to a two dimensional digitalasset, the secret pattern can be determined using a geometric figure(e.g., line, triangle, polygon, etc.) composed from pixels in thedigital asset. In one embodiment, the parameter value passed to the hashfunction can be the geometric figure or a portion thereof. The hashfunction can then determine the distance between the pixels from apredetermined reference point to compute a corresponding hash value.

Similarly, in reference to a three dimensional digital asset, the secretpattern can be determined using a geometric figure determined by apolygon mesh composed from voxels in the digital asset. In oneembodiment, a polygon mesh is a collection of vertices, edges and facesthat defines the shape of a polyhedral object. The faces generallyconsist of triangles (triangle mesh), quadrilaterals (quads), or othersimple convex polygons (n-gons).

In one embodiment, digital assets created with polygon meshes can storedifferent types of digital asset elements. Thus, in this embodiment, thegeometric figure can include vertices, edges, faces, polygons andsurfaces. In one embodiment, a vertex is the point at which two or morelines of a polygon mesh connect. These are predefined points createdduring creation of the digital asset and can be manipulated to changethe shape of the digital asset. The vertex is a position (usually in 3Dspace) along with other information such as color, normal vector andtexture coordinates. As defined herein, an edge is a connection betweentwo vertices and a face is a closed set of edges. Thus, a triangle facecan have three edges and a quad face has four edges. A polygon is acoplanar set of faces. The normal is a directional vector associatedwith a vertex, intended as a replacement to the true geometric normal ofthe surface. In one embodiment, it is computed as the normalized averageof the surface normal of the faces that contain that vertex. A UVcoordinate system is a two dimensional representation of the mesh‘unfolded’ to show what portion of a two-dimensional texture map isapplied to different polygons of the mesh.

In one embodiment, index arrays are used to represent a mesh using twoseparate arrays—one array holding the vertices, and another holding setsof three indices into that array which define a triangle mesh. Thegraphics system processes the vertices first and renders the trianglesafterwards, using the index sets working on the transformed data.

In one embodiment, any of the aforementioned information related to amesh (e.g., vertex position, face, edge, color, normal vector, texturecoordinates, UV coordinates, index arrays, or a combination thereof) canbe used as a parameter value derived from the secret pattern and passedto the hash function. In another embodiment, the parameter value can bedetermined by at least one texture value assigned to the at least onegeometric figure formed by the plurality of digital asset elements.

FIG. 2 illustrates a flow chart of verifying an owner of a digitalasset, according to one embodiment of the present invention. When thedigital asset is a non-fungible token (NFT), the data can be stored on ablockchain, forming a digital ledger. As known to a person havingordinary skill in the art, an NFT is a digital asset which providesproof of ownership of an associated or related digital asset. The NFTcan thus be associated with one or more photographs, videos, audio, orimages, which are also referred to as digital assets, as set forthabove. While, generally, a blockchain can be used to provide a publiccertificate of authenticity or proof of ownership, it does not restrictthe sharing or copying of the underlying digital files. To overcome thisissue, in one embodiment, a secret pattern from a digital asset (that ispreviously authenticated by the owner as illustrated in FIG. 1 ), can beretrieved, as illustrated at 202. At 204, it is determined whether thepattern is already associated with another digital asset. If so, averification hash value is derived using the hash function by utilizingthe extracted secret pattern from the digital asset available to thesystem. Here, the hash function receives a parameter value derived fromthe extracted secret pattern. As illustrated in FIG. 1 and itscorresponding disclosure, here as well, the parameter value can bedetermined by a distance between the plurality of digital asset elementsof the at least one geometric figure within the digital asset. In anycase, the same techniques employed to generate the verification hashvalue for the owner (in FIG. 1 ) are utilized here to generate theverification hash value.

In embodiments where the parameter value included the seed generatedusing a random number generator function, the system obtains the seedvalue that was associated with the digital asset. The user is then, at208, asked to provide the identification hash value that was previouslygenerated when the digital asset was associated with the owner. If theuser fails to provide this hash value or supplies an incorrect value, itis presumed that the digital asset is stolen andauthentication/verification of the asset fails.

If, however, the user provides the identification hash value, at 210,the value is compared with the verification hash value computed at 206.At 212, the digital asset is determined to be verified when theverification hash value and the user supplied identification hash valueare identical.

FIG. 3 illustrates a flow chart of modifying/transferring ownership of adigital asset, according to one embodiment of the present invention. Asillustrated, at 302, the owner intends to sell their digital asset. As304, the identity of the owner is confirmed as described in FIG. 2 andits corresponding disclosure herein. At 305, the system permits sale ofthe digital asset. In an optional embodiment, at 306, the secret patternthat was previously embedded into the asset is removed. At 308, a newsecret pattern is embedded into the asset as set forth in FIG. 1 and itscorresponding disclosure. In the embodiment in which the secret patternassociated with the previous owner is not removed, embedding a newpattern permits the system to identify the previous owner(s) associatedwith the digital asset, since the previously embedded patterns remainassociated with the respective ownership information. Doing so wouldpermit the system to validate and maintain a chain of ownership of thedigital asset.

In one embodiment, the process described in FIG. 3 is performedautomatically using blockchain technology (e.g., smart contracts). Inthis embodiment, a smart contract is created authorizing the sale of thedigital asset if the system, as described herein, is able to verify andauthenticate the owner of the asset. Thus, in this embodiment, the ownerprovides the digital asset they intend to sell, their cryptographicpublic key, the identification hash value known to them, and thebuyer's/new owner's cryptographic public key. Once the ownerverification is complete, the sale transaction is permitted to complete,as illustrated at 305. Thereafter, a new secret pattern is embedded andthe digital asset is associated with the new owner's cryptographicpublic key, as described in FIG. 1 and its corresponding disclosure. Thesystem then returns the digital asset and the newly generatedidentification hash value to the new owner.

FIG. 4 is a block diagram illustrating a data processing system such asa computing system 400 which may be used with one embodiment of theinvention. For example, system 400 can be implemented as part of asystem for verification of a digital asset owner in a digitalenvironment. It should be apparent from this description that aspects ofthe present invention can be embodied, at least in part, in software.That is, the techniques may be carried out in a computer system or othercomputer system in response to its processor, such as a microprocessor,executing sequences of instructions contained in memory, such as a ROM,DRAM, mass storage, or a remote storage device. In various embodiments,hardware circuitry may be used in combination with software instructionsto implement the present invention. Thus, the techniques are not limitedto any specific combination of hardware circuitry and software nor toany particular source for the instructions executed by the computersystem. In addition, throughout this description, various functions andoperations are described as being performed by or caused by softwarecode to simplify description. However, those skilled in the art willrecognize what is meant by such expressions is that the functions resultfrom execution of the code by a processor.

System 400 can have a distributed architecture having a plurality ofnodes coupled through a network, or all of its components may beintegrated into a single unit. Computing system 400 can represent any ofthe data processing systems described above performing any of theprocesses or methods described above. In one embodiment, computer system400 can be implemented as integrated circuits (ICs), discrete electronicdevices, modules adapted to a circuit board such as a motherboard, anadd-in card of the computer system, and/or as components that can beincorporated within a chassis/case of any computing device. System 400is intended to show a high level view of many components of any dataprocessing unit or computer system. However, it is to be understood thatadditional or fewer components may be present in certain implementationsand furthermore, different arrangement of the components shown may occurin other implementations. System 400 can represent a desktop, a laptop,a tablet, a server, a mobile phone, a programmable logic controller, apersonal digital assistant (PDA), a personal communicator, a networkrouter or hub, a wireless access point (AP) or repeater, a set-top box,or a combination thereof.

In one embodiment, system 400 includes processor 401, memory 403, anddevices 405-408 via a bus or an interconnect 422. Processor 401 canrepresent a single processor or multiple processors with a singleprocessor core or multiple processor cores included therein. Processor401 can represent one or more general-purpose processors such as amicroprocessor, a central processing unit (CPU), Micro Controller Unit(MCU), etc. Processor 401 can be a complex instruction set computing(CISC) microprocessor, reduced instruction set computing (RISC)microprocessor, very long instruction word (VLIW) microprocessor, orprocessor implementing other instruction sets, or processorsimplementing a combination of instruction sets. Processor 401 may alsobe one or more special-purpose processors such as an applicationspecific integrated circuit (ASIC), a cellular or baseband processor, afield programmable gate array (FPGA), a digital signal processor (DSP),a network processor, a graphics processor, a network processor, acommunications processor, a cryptographic processor, a co-processor, anembedded processor, or any other type of logic capable of processinginstructions. Processor 401, can also be a low power multi-coreprocessor socket such as an ultra low voltage processor, may act as amain processing unit and central hub for communication with the variouscomponents of the system. Such processor can be implemented as a systemon chip (SoC).

Processor 401 is configured to execute instructions for performing theoperations and methods discussed herein. System 400 further includes agraphics interface that communicates with graphics subsystem 404, whichmay include a display controller and/or a display device. Processor 401can communicate with memory 403, which in an embodiment can beimplemented via multiple memory devices to provide for a given amount ofsystem memory. In various implementations the individual memory devicescan be of different package types such as single die package (SDP), dualdie package (DDP) or quad die package (QDP). These devices can in someembodiments be directly soldered onto a motherboard to provide a lowerprofile solution, while in other embodiments the devices can beconfigured as one or more memory modules that in turn can couple to themotherboard by a given connector. Memory 403 can be a machine readablenon-transitory storage medium such as one or more volatile storage (ormemory) devices such as random access memory (RAM), dynamic RAM (DRAM),synchronous DRAM (SDRAM), static RAM (SRAM), or other types of storagedevices such as hard drives and flash memory. Memory 403 may storeinformation including sequences of executable program instructions thatare executed by processor 401, or any other device. System 400 canfurther include IO devices such as devices 405-408, including wirelesstransceiver(s) 405, input device(s) 406, audio IO device(s) 407, andother IO devices 408.

Wireless transceiver 405 can be a WiFi transceiver, an infraredtransceiver, a Bluetooth transceiver, a WiMax transceiver, a wirelesscellular telephony transceiver, a satellite transceiver (e.g., a globalpositioning system (GPS) transceiver), or other radio frequency (RF)transceivers, network interfaces (e.g., Ethernet interfaces) or acombination thereof. Input device(s) 406 can include a mouse, a touchpad, a touch sensitive screen (which may be integrated with displaydevice 404), a pointer device such as a stylus, and/or a keyboard (e.g.,physical keyboard or a virtual keyboard displayed as part of a touchsensitive screen). Other optional devices 408 can include a storagedevice (e.g., a hard drive, a flash memory device), universal serial bus(USB) port(s), parallel port(s), serial port(s), a printer, a networkinterface, a bus bridge (e.g., a PCI-PCI bridge), sensor(s) (e.g., amotion sensor such as an accelerometer, gyroscope, a magnetometer, alight sensor, compass, a proximity sensor, etc.), or a combinationthereof. Optional devices 408 can further include an imaging processingsubsystem (e.g., a camera), which may include an optical sensor, such asa charged coupled device (CCD) or a complementary metal-oxidesemiconductor (CMOS) optical sensor, utilized to facilitate camerafunctions, such as recording photographs and video clips. Certainsensors can be coupled to interconnect 422 via a sensor hub (not shown),while other devices such as a keyboard or thermal sensor may becontrolled by an embedded controller (not shown), dependent upon thespecific configuration or design of system 400.

To provide for persistent storage of information such as data,applications, one or more operating systems and so forth, in oneembodiment, a mass storage (not shown) may also couple to processor 401.In various embodiments, to enable a thinner and lighter system design aswell as to improve system responsiveness, this mass storage may beimplemented via a solid state device (SSD). However in otherembodiments, the mass storage may primarily be implemented using a harddisk drive (HDD) with a smaller amount of SSD storage to act as a SSDcache to enable non-volatile storage of context state and other suchinformation during power down events so that a fast power up can occuron RE-initiation of system activities. Also a flash device may becoupled to processor 401, e.g., via a serial peripheral interface (SPI).This flash device may provide for non-volatile storage of systemsoftware, including a basic input/output software (BIOS) as well asother firmware of the system.

Note that while system 400 is illustrated with various components of adata processing system, it is not intended to represent any particulararchitecture or manner of interconnecting the components; as suchdetails are not germane to embodiments of the present invention. It willalso be appreciated that network computers, handheld computers, mobilephones, and other data processing systems which have fewer components orperhaps more components may also be used with embodiments of theinvention.

Thus, methods, apparatuses, and computer readable medium forverification of a digital asset owner in a digital environment aredescribed. Although the present invention has been described withreference to specific exemplary embodiments, it will be evident thatvarious modifications and changes may be made to these embodimentswithout departing from the broader spirit and scope of the invention asset forth in the claims. Accordingly, the specification and drawings areto be regarded in an illustrative rather than a restrictive sense.

The invention claimed is:
 1. A system to provide proof of ownership of adigital asset associated with a non-fungible token (NFT), comprising: amemory device; a processing system, comprising at least one hardwarecore, configured to: receive the NFT associated with the digital asset,the NFT providing proof of ownership of the digital asset through acryptographic public key which is stored on a blockchain associated withthe NFT; retrieve the digital asset associated with the received NFT,the digital asset configured to be displayed in a multi-dimensionalenvironment; retrieve a secret pattern from the digital asset, whereinthe retrieved secret pattern was previously embedded into the digitalasset and is associated with the stored cryptographic public key on theblockchain; compute a first identification hash value using a hashfunction, wherein the hash function receives a parameter value derivedfrom the retrieved secret pattern; receive a second identification hashvalue; compare the computed first identification hash value to thereceived second identification hash value; and determine the digitalasset as authentic when the first and second identification hash valuesare identical.
 2. The system of claim 1, wherein the digital asset is atleast one of a photograph, video, audio, image, a two dimensionalobject, or a three dimensional object.
 3. The system of claim 1, whereinsecond identification hash value was previously generated using thesecret pattern.
 4. The system of claim 1, wherein the secondidentification hash value is provided by the owner of the digital asset.5. The system of claim 1, wherein the second identifier hash value isretrieved from a blockchain stored in a decentralized and distributeddigital ledger associated with the NFT.
 6. The system of claim 1,wherein the secret pattern includes at least one geometric figure, theat least one geometric figure determined by a plurality of digital assetelements.
 7. The system of claim 5, wherein the parameter value isdetermined by a distance between the plurality of digital asset elementsof the at least one geometric figure within the digital asset.
 8. Amethod for providing proof of ownership of a digital asset associatedwith a non-fungible token (NFT) comprising: receiving, by a computerdevice, the NFT associated with the digital asset, the NFT providingproof of ownership of the digital asset through a cryptographic publickey which is stored on a blockchain associated with the NFT; retrievingthe digital asset associated with the received NFT, wherein the digitalasset is configured to be displayed in a multi-dimensional environment;retrieving a secret pattern from the digital asset, wherein theretrieved secret pattern was previously embedded into the digital assetdigital asset and is associated with the stored cryptographic public keyon the blockchain; computing a first identification hash value using ahash function, wherein the hash function receives a parameter valuederived from the retrieved secret pattern; receiving a secondidentification hash value; comparing the computed first identificationhash value to the received second identification hash value; anddetermining the digital asset as authentic when the first and secondidentification hash values are identical.
 9. The method of claim 8,wherein the digital asset is at least one of a photograph, video, audio,image, a two dimensional object, or a three dimensional object.
 10. Themethod of claim 8, wherein second identification hash value waspreviously generated using the secret pattern.
 11. The method of claim8, wherein the second identification hash value is provided by the ownerof the digital asset.
 12. The method of claim 8, wherein the secondidentifier hash value is retrieved from a blockchain stored in adecentralized and distributed digital ledger associated with the NFT.13. The method of claim 8, wherein the secret pattern includes at leastone geometric figure, the at least one geometric figure determined by aplurality of digital asset elements.
 14. The system of claim 13, whereinthe parameter value is determined by a distance between the plurality ofdigital asset elements of the at least one geometric figure within thedigital asset.
 15. A non-transitory computer readable medium comprisinginstructions which when executed by a processing device executes amethod for providing proof of ownership of a digital asset associatedwith a non-fungible token (NFT), comprising: receiving the NFTassociated with the digital asset, the NFT providing proof of ownershipof the digital asset through a cryptographic public key which is storedon a blockchain associated with the NFT; retrieving the digital assetassociated with the received NFT, wherein the digital asset isconfigured to be displayed in a multi-dimensional environment;retrieving a secret pattern from the digital asset, wherein theretrieved secret pattern was previously embedded into the digital assetand is associated with the stored cryptographic public key on theblockchain; computing a first identification hash value using a hashfunction, wherein the hash function receives a parameter value derivedfrom the retrieved secret pattern; receiving a second identificationhash value; comparing the computed first identification hash value tothe received second identification hash value; and determining thedigital asset as authentic when the first and second identification hashvalues are identical.
 16. The non-transitory computer readable medium ofclaim 15, wherein the digital asset is at least one of a photograph,video, audio, image, a two dimensional object, or a three dimensionalobject.
 17. The non-transitory computer readable medium of claim 15,wherein second identification hash value was previously generated usingthe secret pattern.
 18. The non-transitory computer readable medium ofclaim 15, wherein the second identification hash value is provided bythe owner of the digital asset.
 19. The non-transitory computer readablemedium of claim 15, wherein the second identifier hash value isretrieved from a blockchain stored in a decentralized and distributeddigital ledger associated with the NFT.
 20. The non-transitory computerreadable medium of claim 15, wherein the secret pattern includes atleast one geometric figure, the at least one geometric figure determinedby a plurality of digital asset elements, and wherein the parametervalue is determined by a distance between the plurality of digital assetelements of the at least one geometric figure within the digital asset.