System and method employing virtual ledger with non-fungible token (NFT) generation

ABSTRACT

A system, method and computer program product for computer based open innovation, includes an asset valuation device receiving asset information regarding tangible or non-tangible assets, and generating a valuation signal, based thereon; a self-executing code device receiving the valuation signal, and generating a self-executing code signal, based thereon; an air router device having both low band radio, and internet router channels for redundant internet communications, and a malicious code removal device for scrubbing malicious code from data received, receiving the valuation signal, and generating a node voting request signal, based thereon; a mesh network having node devices receiving the node voting request signal, and generating vote confirmation signals, based thereon; and computing devices connected to each of the respective node devices, and configured to perform non-fungible token (NFT) generation based on the assets, including tracking respective ownership and valuation of the assets, based on the asset information.

CROSS REFERENCE TO RELATED DOCUMENTS

The present invention is a continuation-in-part of U.S. PatentApplication Ser. No. 16/950,408 of Kerseboom et al., entitled “SYSTEMAND METHOD EMPLOYING VIRTUAL LEDGER,” filed on 17 NOV. 2020, nowpending, which is a continuation-in-part of U.S. Patent Application Ser.No. 17/088,690 of Kerseboom et al., entitled “SYSTEM AND METHODEMPLOYING VIRTUAL LEDGER,” filed on 04 NOV. 2020, now pending, which isa continuation-in-part of U.S. Patent Application Ser. No. 16/846,075 ofVillamar et al., entitled “SYSTEM AND METHOD EMPLOYING VIRTUAL LEDGER,”filed on 10 APR. 2020, now pending, which claims priority to and is acontinuation-in-part of U.S. Provisional Patent Application Ser. No.62/832,786 of Kerseboom et al., entitled “SYSTEM AND METHOD FORSCRUBBING MALICIOUS CODE BETWEEN COMMUNICATIONS DEVICES,” filed on 11APR. 2019, now pending, the entire disclosures of all of which arehereby incorporated by reference herein.

FIELD OF THE INVENTION

The present invention generally relates to systems and methods forsecurity for communication networks, and more particularly to systemsand methods for scrubbing malicious code between communications devices,and the like.

DISCUSSION OF THE BACKGROUND

In recent years, systems and methods for security for communicationnetworks have been developed. However, such systems typically arelacking in effective incorporation of security between communicationsdevices, and the like, in an efficient and cost-effective manner.

SUMMARY OF THE INVENTION

Therefore, there is a need for a method and system that addresses theabove and other problems. The above and other problems are addressed bythe illustrative embodiments of the present invention, which providesystems and methods for scrubbing malicious code between communicationsdevices, and the like.

Accordingly, in illustrative aspects of the present invention there isprovided a system, method and computer program product for computerbased open innovation, includes an asset valuation device receivingasset information regarding tangible or non-tangible assets, andgenerating a valuation signal, based thereon; a self-executing codedevice receiving the valuation signal, and generating a self-executingcode signal, based thereon; an air router device having both low bandradio, and internet router channels for redundant internetcommunications, and a malicious code removal device for scrubbingmalicious code from data received, receiving the valuation signal, andgenerating a node voting request signal, based thereon; a mesh networkhaving node devices receiving the node voting request signal, andgenerating vote confirmation signals, based thereon; and computingdevices connected to each of the respective node devices, and configuredto perform non-fungible token (NFT) generation based on the assets,including tracking respective ownership and valuation of the assets,based on the asset information.

The one or more computing devices include browser capable devices.

The system, method and computer program product collect a predeterminedpercentage of monetization of assets based on the state of valuation ofthe assets as a baseline monetization.

Resulting renumeration based on the non-fungible token (NFT) generationis sent to the baseline monetization.

The node devices process data by themselves or are aligned to perform asingle process divided over many of the node devices.

The node devices form an artificial intelligence (AI) engine.

Still other aspects, features, and advantages of the present inventionare readily apparent from the following detailed description, byillustrating a number of illustrative embodiments and implementations,including the best mode contemplated for carrying out the presentinvention. The present invention is also capable of other and differentembodiments, and its several details can be modified in variousrespects, all without departing from the spirit and scope of the presentinvention. Accordingly, the drawings and descriptions are to be regardedas illustrative in nature, and not as restrictive.

BRIEF DESCRIPTION OF THE DRAWINGS

The embodiments of the present invention are illustrated by way ofexample, and not by way of limitation, in the figures of theaccompanying drawings and in which like reference numerals refer tosimilar elements and in which:

FIGS. 1A-1D is a diagram for illustrative systems and methods forscrubbing malicious code between communications devices, and the like;

FIG. 2 is a diagram for illustrating systems and methods for aninnovation engine, based on FIGS. 1 and 3-21 ;

FIGS. 3A-3F are diagrams for illustrating systems and methods for aninnovation ecosystem, based on FIGS. 1-2 and 4-21 ;

FIG. 4 is a block diagram for illustrating an air router employed in thesystems and methods of FIGS. 1-3 and 5-21 ;

FIG. 5 is a flowchart for illustrating components employed in theinnovation engine of FIGS. 1-4 and 6-21 ;

FIG. 6 is a diagram for illustrating self-executing code employed in theinnovation engine of FIGS. 1-5 and 7-21 ;

FIG. 7 is a diagram for illustrating a mesh protocol employed in theinnovation engine of FIGS. 1-6 and 8-21 ;

FIG. 8 is a diagram for illustrating an asset pool employed in theinnovation engine of FIGS. 1-7 and 9-21 ;

FIG. 9 is a diagram for illustrating a data sharing validator deviceemployed in the innovation engine of FIGS. 1-8 and 10-21 ;

FIG. 10 is a diagram for illustrating a hardware validator deviceemployed in the innovation engine of FIGS. 1-9 and 11-21 ;

FIG. 11 is a diagram for illustrating a software validator deviceemployed in the innovation engine of FIGS. 1-10 and 12-21 ;

FIG. 12 is a diagram for illustrating node interaction over the meshprotocol employed in the innovation engine of FIGS. 1-11 and 13-21 ;

FIG. 13 is a diagram for illustrating an asset value sensor employed inthe innovation engine of FIGS. 1-12 and 14-21 ;

FIG. 14 is a diagram for illustrating a voting device employed in theinnovation engine of FIGS. 1-13 and 15-21 ;

FIG. 15 is a diagram for illustrating an asset storage device employedin the innovation engine of FIGS. 1-14 and 16-21 ;

FIG. 16 is a diagram for illustrating an evaluation device employed inthe innovation engine of FIGS. 1-15 and 17-21 ;

FIG. 17 is a diagram for illustrating an evaluation device employed inthe innovation engine of FIGS. 1-16 and 18-21 ;

FIG. 18 is a diagram for illustrating node processing including problemsolving, cryptocurrency mining, and smart contract processing employedin the innovation engine of FIGS. 1-17 and 19 ;

FIG. 19 is a diagram for illustrating cryptocurrency mining employed inthe innovation engine of FIGS. 1-18 and 20-21 ;

FIG. 20 is a diagram for illustrating multi-device blockchain mining,smart contracting, and the like, employed in the innovation engine ofFIGS. 1-19 and 21 ;

FIG. 21 is a flow chart diagram for illustrating multi-device blockchainmining, smart contracting, and the like, employed in the innovationengine of FIGS. 1-20 ; and

FIGS. 22-23 are diagrams for illustrating non-fungible token (NFT)generation, and the like, employed in the innovation engine of FIGS.1-21 .

DETAILED DESCRIPTION OF THE PREFERRED EMBODIMENTS

Referring now to the drawings, wherein like reference numerals designateidentical or corresponding parts throughout the several views, and moreparticularly to FIGS. 1A-1D thereof, there is shown systems and methodsfor scrubbing malicious code between communications devices, and thelike.

In FIGS. 1A-1D, an intrinsic depiction of the inner workings of a SUBBC(Scrub/Unify and Break Bad code) system are described, includinginterception of harmful data, malicious code, and the like, and the waysuch data is then communicated to other nodes, and ultimately the waythey communicate with servers, and the like. The workings of theencryption schemes that are used to protect the customers data beforesending it anywhere on either RF or Network are also described.

The Interceptor and crypto engine: (which will be named Custos or 104hereafter), wherein Custos (104) analyzes all the packets that are sentthrough the node. It does this in what is called a “zerocopy” setup;which means it picks it up directly from the kernel data stream withoutdelay of copying it to any other service whilst not causing a timedelay.

The RF and comm handler: (which will be named Missus or 105 hereafter):

Missus (105) is responsible for communicating messages from node tonode, using the out-of-band RF channel, and from node to server, usingthe in-band channel. It is also responsible for the inline encryption.

Architecture:

Missus (105) runs as a single process with multiple threads. All threadsoperate on a single data structure and use a mutex to guard against raceconditions. This mutex ensures only a single thread can access the datastructure at once. The following threads are present:

-   -   main: responsible for generating periodic info messages    -   tcp_listen: responsible for handling incoming messages from        Custos (104)    -   rf_receiver: responsible for handing incoming RF packets    -   rf_transmitter: responsible for sending RF packets    -   processor: responsible for handling received RF packets and        preparing RF packets for sending    -   transmitter: responsible for sending UDP packets

Internally, the data structure tracks stream objects. Each stream objectrepresents a (partial) message and a follow-up action for the node.Whenever a message is received from Custos (104), through the tcp_listenthread, a stream is created and scheduled for transmission, eitherthrough the transmitter thread, in case of a breakout node, or throughthe rf_transmitter thread.

Communication:

Missus (105) creates a local TCP socket on the loopback adapter which isable to receive analysis objects from Custos (104). This TCP socket isonly able to receive messages on the local system and is checked forintegrity. Messages intended for the server are encoded from a ruststruct into an array of bytes. The breakout nodes use a public-keyencryption scheme to encrypt and sign messages before sending them tothe server. In this scheme, both parties have some a priori knowledge,set up before deployment of the node.

The breakout node has an encryption keypair, including a public key anda secret key: (Npk, Nsk). The server also has an encryption keypair:(Spk, Ssk). Both parties have a priori knowledge of each other's publickey. This allows the breakout node to perform an offline encryption ofthe message, using a key derived from (Nsk, Spk), and this allows theserver to perform an offline decryption of the message using (Ssk, Npk).Currently the public key encryption is implemented using X25519(Elliptic Curve Diffie-Hellman (ECDH) over Curve25519) keys, theXSalsa20 cypher and Poly1305 authentication.

In-band communication:

For in-band communication, certain nodes will be assigned to act as a“breakout” node. Breakout nodes have the capability to inject ethernetframes on a network line. By doing so, this allows a breakout node tocommunicate with an external server.

Because the nodes operate in a passive/tap configuration where they arenot an active part of the network, the nodes will need to borrow/spoofsettings for an active network interface in order to craft packets thatcan be routed from the local network to our server. For this purpose,the node will use the interface settings from (one of) the endpointnode(s) it is protecting. Thus, any suitable packet sent by a breakoutnode, designated for our server, will have an origin media accesscontrol (MAC) and internet protocol (IP) address of the endpoint node.

This also implies that the nodes cannot use any stateful protocol (e.g.,like TCP) because that employs the node performing a handshake, in whichboth parties involved need to send packets. Any data returned from theserver will be routed to the endpoint behind our node. Since the nodehas a passive role on the network, it is unable to intercept responsetraffic. To overcome these issues, the breakout node communicates to theserver using UDP packets. Whenever the node has a message for theserver, the message is encoded into one or more UDP packets. If theserver would reply to this traffic, the node would be able to observeand isolate the response traffic and the endpoint node would simply dropor ignore the UDP response packet.

Out-of-band communication:

For out-of-band communication, between nodes, a hardware RF adapter isused. The adapter is accessed through a serial interface. The RF layeroperates on a specific channel (frequency, bandwidth and baud-rate). TheRF layer identifies a network using a four-byte identifier. Within anetwork, each message sent is received by all nodes in range, so eachmessage is broadcasted to all nodes on the network. Each node on thenetwork has a unique two-byte identifier.

Format and Encryption:

The RF uses two layers of encryption, a hardware layer and a softwarelayer. Messages intended for the server are encoded from a rust structinto an array of bytes.

Format:

The RF adapter sends and receives messages in packets of 60 bytes. Whena node needs to send a message, the message is split into two or morechunks of 60 bytes. Additional space is divided over the messages usinga custom padding scheme.

Encryption in the Software Layer (105):

The breakout nodes use a public-key encryption scheme to encrypt andsign messages before sending them to the server. In this scheme, bothparties have some a priori knowledge, set up before deployment of thenode. The breakout node has an encryption keypair, including a publickey and a secret key: (Npk, Nsk). The server also has an encryptionkeypair: (Spk, Ssk). Both parties have a priori knowledge of eachother's public key. This allows the breakout node to perform an offlineencryption of the message, using a key derived from (Nsk, Spk), and thisallows the server to perform an offline decryption of the message using(Ssk, Npk). Currently the public key encryption is implemented usingX25519 (Elliptic Curve Diffie-Hellman (ECDH) over Curve25519) keys, theXSalsa20 cypher and Poly1305 authentication. The software encryptionlayer uses an X25519 encryption scheme and an Ed25519 authenticationscheme. In this scheme several keypairs are involved:

-   -   Ed25519 master signing key (MSpk, MSsk)    -   Ed25519 node signing key (NSpk, NSsk)    -   X25519 network key (Npk, Nsk)    -   X25519 node ephemeral key (NEpk, NEsk)

Before deployment, each node generates a signing key NS. Using themaster key MS a signature S_NS=Sign(NSpk, MSsk) is generated. Each nodehas a priori knowledge of MSpk, allowing each node to verify thesignature S_NS. During operation, each node generates an ephemeral keyNE and signs it with their signing key NS: S_NE=Sign(NEpk, NSsk). When anode announces itself on the network, it sends its ephemeral public keyNEpk, the signature S_NE, the verification key NSpk and the signatureS_NS. This allows a verification that the node was accepted by themaster key, by validating the signature S_NS against the public keyMSpk. This also allows a verification that the provided ephemeral keywas generated by the node, by validating the signature S_NS against thepublic key NSpk. And it allows decryption of messages using Nepk.

Encryption in the Hardware Layer (105):

The RF adapter uses a hardware AES-256 encryption engine. All nodes on anetwork have a priori knowledge of the 16-byte hardware key. The key isprogrammed into the adapter before operation. Nodes perform no activeoperations on the hardware encryption. Each packet sent to the adapteris transparently encrypted before being sent and also decrypted beforebeing received at the serial level.

Obfuscation and Misdirection (105):

A Cryptographic engine and RF handler that optimizes and obfuscates datafor transport. In Communicating with the outside a form of obfuscationis used; the goal is to misdirect attempts to decrypt and read the datathe system is protecting. This is done by employing entropic obfuscationby adding seemingly random bytes that are added in a specific order thatis based on the total data that is being sent. Furthermore, headerlesscompression is added to the now obfuscated finalized encrypted data.

The collection and re-assembly of this data that could be harvested witha presumed “man in the middle or replay” attack, becomes exponentiallymore difficult, if not impossible. As the data itself is nowdeliberately corrupted and can be harvested by decompilation in theexact same way as described above. The nonce (a nonce is an arbitrarynumber that can be used just once in a cryptographic communication), isa 24 bit random sequence that safeguards the key entropy needed toencrypt the messages correctly. This is sent via the first packet of astream called “header.” The systems on both sides therefore canextrapolate the data on both sides. As a nonce is only used once, thismeans that this nonce sets the bandwidth of the used entropy. Themaximum of data sent is within a single encryption parameter, below anyreasonable minimum employed for re-assembling this data; thus thwartingor frustrating any hack attempt.

Radio transceiver (106):

A radio transceiver that broadcasts messages to other nodes or on to anetwork.

Data scrubber (105):

The data scrubber is used to replace “Bad data/executable code” withbenign data. It receives the data size and mathematical parametersemployed from (104). It then creates a harmless equivalent of this datablock. When this is done it performs a cyclic redundancy check (CRC), tosee if it complies with the data stream it was taken from, and is infact of the same value mathematically, but has become harmless datainstead. This process can be done separately with both incoming data,“(E1)” and outgoing data, “(E2)” packets.

Bump in the wire (103):

TG1 and G2 are rj45 connectable bump in the wire like sockets. Theyfunction to intercept/become an in-between on a rj45cable.

Network data traffic source (101 and 102):

A1=Any Network data traffic source.

A2=Any Computer or router connected to the data traffic source.

Another system identical to (108):

Another SUBBC system that is being warned about an attack over it'sradio comm channel.

Half duplex RF signal (107):

Element 107 are representations of half duplex channel communicationsfrom node to node.

Networked communication:

Networked communication between servers and Nodes and client hardware(elements 111, 112, 113, 114, 115, 116, 117, and 118):

Element 111: halfduplex push connections made from customer nodes toupdate servers with client network info.

Element 112: connection for pulling data to customer including enricheddata about data that was delivered with 111.

Element 113: outside connections can be made through a secured buffermachine to the servers for maintenance and control.

Element 114: enrichment data is pulled from the web to specific sourcesthat include vulnerability databases.

Element 115: half duplex push connections made from enriched databaseserver to customers.

Element 116: access verification tunnel between customer and Api server.

Element 117: access verification (knock sequence) tunnel betweenmaintenance crew and servers

Element 118: after verification layer 1 (117) has taken place secondaryverification takes place based on shared key ssh sequence.

Element 119: An isolated gateway that collects outside enrichment dataand does integrity checks.

Element 120: An isolated gateway that checks for the integrity of nodecommunication.

Element 121: An isolated gateway that does a secondary integrity checkof above-described communication (120).

Element 122: An isolated gateway that provides a pinhole into the servernetwork for maintenance purposes. In order to communicate through thispinhole; a series of verifications is needed via (122). it then connectsto (130), thereafter it gives access to elements 131 to 135.

Element 123: outgoing half duplex tcp communication to (119).

Element 124: incoming half duplex tcp communication to (128)

Element 125: full duplex communication between (121) and (129)

Element 126: full duplex communication between (122) and (130)

Element 127: this server harvests and stores informational meta dataabout viruses, malware, network and other vulnerabilities, that isavailable on the internet.

Element 128: This is a half-duplex, “write to only”, database wherecustomer meta data can be stored for processing.

Element 129: This is an API server that supplies the customer withalerts and enriched meta data.

Element 130: This is a secured staging server to connect to the serverson inner local level of the servers connected to a local network.

Element 131: half duplex communication between “incoming (127)” and“outgoing (129)”.

Element 132: Half duplex read only database server.

Element 133: ssh full duplex communication between (113) via (122) toand from all the internal connected servers (127, 128, 129, 130, 132,134, and 135).

Element 134: encrypted database server where all customer meta data ishoused that is collected from (111, 119, and 132).

Element 135: encrypted database server where all customer data andcustomer related encryption keys are housed that gives the ability todecrypt the data from server (134). which then in turn is served to(132) and becomes readable to only specific customer coming from (112).

Advantageously, the illustrative systems and methods allow for efficientand cost-effective scrubbing of malicious code between communicationsdevices, and the like.

Although the illustrative systems and methods are described in terms ofefficient and cost-effective scrubbing of malicious code betweencommunications devices, and the like, the illustrative systems andmethods can be applied to any other suitable types of securityapplications, as will be appreciated by those of ordinary skill in therelevant arts.

And further illustrative embodiments, the systems and methods of FIGS.1-2 , advantageously, can be employed to configure an open innovationecosystem, as will further described with respect to FIGS. 2-21 . Forexample, FIG. 2 shows a diagram for illustrating systems and methods foran innovation engine, based on FIGS. 1 and 3-21 . In FIG. 2 , fourillustrative elements, hardware platform 202, software platform 204,collaboration platform 206, and valuation platform 208, and the like,with respective interacting elements, nodes 210, hardware routing 212,patent value sensor 214, weighting machine 216, patent pooling device218, coin contracting device 220, voting device 222, and the like, canmake up the innovation engine.

Advantageously, the hardware platform 202, the software platform 204,the collaboration platform 206, and the valuation platform 208 are theillustrative platforms that subsequently are made up of the nodes 210,the hardware routing 212, the patent value sensor 214, the weightingmachine 216, the patent pooling device 218, the coin contracting device220, the voting device 222, and the like, provide for an efficient,robust and secure system implementation. For example, in the hardwareplatform 202, the nodes 210 can employ the routing hardware 212 totransmit and receive data sent within the mesh network 518, as furtherdescribed. Such functionality can employ internet communications viaconventional routing and/or by employing a redundant, over air routednetwork or skywave 402, as further described. Furthermore, both the airrouter 402 and the nodes 510, and the like, as further describe,advantageously, can provide a secondary channel for redundancy, dataintegrity, scrubbing of malicious code, security checks, and the like.

The software platform 204 harvests content (e.g., relating tointellectual property, patents, other assets, etc.) from the hardwareplatform 202, and automatically values the content (e.g., performsrule-based, artificial intelligence (AI)-based patent valuation, etc.)with patent value sensor 214, and weighting machine 216. When thecontent is weighted, it is then presented to a collaboration platform206, and the like. A patent pooling device 218 can be used to merge thenew patent data (e.g., ownership, inventorship, terms, features, updatedvaluations, etc.) in an asset storage device 504, as further described,that is then offered to the node(s) that include a coin contract 220(e.g., blockchain-based, smart-contract-based, etc.) for that node(s),and after which synchronization, and the like, is performed with thevaluation platform 208 and the asset storage device 504. Thereafter,voting automatically takes with the automated voting device 222, and thelike, for example, which can include an automated system that presentsusers with a vote with respect to the already weighted data, asdescribed above.

FIGS. 3A-3F are used to Illustrate systems and methods for an openinnovation ecosystem based on FIGS. 1, 2 and 4-21 . In FIG. 3A, thesystems and methods for the open innovation ecosystem 300 can include anopen innovation engine 302, a baseline monetization 306 (e.g., 10%,etc.), one or more monetization events (e.g., portfolio sales, profitsfrom startups, products and/or services, etc.) 304, one or moreinventors 314, one or more team members 312 (e.g., patent attorney teammembers, finance team members, marketing team members, etc.), one ormore smart contracts 308 (e.g., Blockchain smart contracts, etc.), andone or more portfolios (e.g., patent portfolios, etc.) 310. Accordingly,the one or more groups of inventors 314, and team members 312 can enterinto respective smart contracts 308 with respect to terms fordevelopment and the monetization 304 of the portfolios 310. The openinnovation engine 302 collects a baseline monetization 306 for operatingcosts, to fund further projects, and the like. As the open innovationecosystem 300 is based on distributed technology (e.g., blockchain,etc.), tokens (not shown) can be issued based on computer generatedvaluations (e.g., AI-based, ruled based, blockchain-based, etc.) of therespective portfolios 310, and the like. When one or more of theportfolios 310 lead to the monetization events 304, the tokens canincrease in value and be distributed to the baseline monetization 306,and the respective team members 312, and the inventors 314, based onterms agreed to within the respective smart contracts 308.

FIGS. 3B-3F are used to illustrate various views from the variouscomponents of the open innovation ecosystem 300 of FIG. 3A. For example,in FIG. 3B, there is illustrated a view from the open innovation engine302 point of view, with respect to the smart contracts 308, themonetization events 304, and the baseline monetization 306. In FIG. 3C,there is illustrated a view from the open innovation engine 302 and theportfolios 310 point of view, with respect to one of the smart contracts308 with the monetization event 304, and the respective sharedportfolios 310. In FIG. 3D, there is illustrated a view from the openinnovation engine 302 and the contracts 308 point of view, with respectto the smart contracts 308, the corresponding monetization event 304 ofthe portfolio 310, and the corresponding inventors 314, and team members312. In FIG. 3E, there is illustrated a view from the open innovationengine 302 and the inventors 314 point of view, with respect to thesmart contracts 308, and the corresponding monetization event 304 of theportfolio 310 (not shown). In FIG. 3F, there is illustrated a view fromthe monetization event 304 point of view, with respect to the openinnovation engine 302, the smart contract 308, the portfolio 310 withthe monetization events 304, and with the respective inventors 314, andthe team members 312.

FIG. 4 is a block diagram for illustrating an air router employed in thesystems and methods of FIGS. 1-3 and 5-21 . In FIG. 4 , advantageously,the illustrative method and system can employ an air router 402 forsending data, for example, over a lowland frequency, and the like, viaantenna 410 that is capable of using a skywave air link 418 (e.g.,skywave or skip refers to the propagation of radio waves reflected orrefracted back toward Earth from the ionosphere, etc.) for connection tothe internet 416 and/or via the router 414, and the like. With the useof a load coil inductor 408, and a software defined radio (SDR) 404, afull duplex signal is created to maintain a data channel that canconnect to other users with similar hardware setups, and the like. Theincoming signal from the SDR 404 is translated to IP routable traffic,in the send and receive directions, and the like. A WiFi router 406 withmagnetic antenna 412 can be employed for connecting to a WiFi network,and the like. Advantageously, the created IP-routable network can sendand receive data over the sky-wave link 418 for added redundancy,security, voting, and the like. In order to maintain data integrity, anysuitable radio data protocols (e.g., ft8, jt65, jt9 ft4, ask, rtty,etc.) can be employed. Accordingly, the radio routed data can employintegrity, security, and the like, protocols, as described with respectto FIG. 1A.

FIG. 5 is a flowchart for illustrating components employed in theinnovation engine of FIGS. 1-4 and 6-21 . In FIG. 5 , elements of theinnovation engine are ordered in way, for example, with respect to howinformation related to a patent, and the like, flows to determine avaluation thereof for the innovation engine. An evaluation device 502can calculate value by employing any suitable AI algorithm, and thelike, that can weight a value of a patent, and the like. For example,evaluation at step 502 can employ automated verification and weightingof various patent-related parameters, such as forward citations (e.g.,at a ˜45% weight, etc.), age of patent from priority date (e.g., at a˜19% weight, etc.), independent claim count (e.g., adjusted by number ofmeans-plus-function claims, etc.) (e.g., at a ˜14% weight, etc.), claimword count (e.g., one or more of the independent claims at a ˜12%weight, etc.), family size and international filings (e.g., at a ˜10%weight, etc.), and the like. Then, when the initial evaluation iscomplete, the relevant information can be sent to an asset storagedevice at step 504. The asset storing step 504, stores the patentinformation, for example, divided across several databases, and thelike, advantageously, ensuring quick lookups, queries, updated,retrieval, and the like. Advantageously, such data and resultinginformation can be grouped by interest, patent content, technology area,patent classifications, and the like, employing any suitable AI-basedsystem, and the like.

After such grouping, and the like, the data, related information, andthe like, can be shared over the network at step 518 using a meshprotocol, and the like, to then be voted on by individual nodes of themesh network at step 510, and with software validation at step 524, tocheck for data originality, viability, and the like. Such evaluation canbe performed by a voting device at step 506, for example, which can beimplanted on the hardware and software described with respect to FIGS.1A-1D and 4 at step 508, the node devices at step 510, and the validatordevices at step 522, and the like. After performing such operations, andthe like, employing security, integrity, validation, validity checks,and the like, the information is sent to the asset pool step 512, wherethe patent information, and the like, can employ information containers,and the like, that are tailored so as to be accessed by programs, andthe like, that search for specific data similarities, and the like. Anasset value sensor step 514, for example, determines if there areelements from the asset pool step 512 that can be added to individualchains of self-executing code (e.g., smart contract-based,blockchain-based, etc.) at step 516.

Advantageously, step 516 determines, for example, an overall value for acontract holder, and the like. For example, the self-executing code atstep 516, as a whole, can be a value holder that can recalibrate valueto a respective owner with help of a ledger that is kept within code,thereof, and the like. Such container employed at step 516, for example,can include the original content that was stored when filing a patentthrough the innovation engine through the processes of steps 502, 504,506, 506, 510, 512 and 514), and the like. As the self-executing code atstep 516 has now set and locked the new corrected values and informationin to the ledger, step 516 can publish itself over the mesh protocol ofstep 518 and to other nodes at step 510, and the like. Upon arrival tothe nodes, the nodes check the published data for integrity and sharethe acceptance or decline of the updated self-executing code of step516, and the reasons for doing so, for example, with the data sharingvalidator device at step 520. The hardware validator device step 522 canalso make a determination of whether or not the shared content isconfirmed by the secondary channel of air router 402, for example, viasky-waves and/or the internet, as described with respect to FIGS. 1A,1B, 1C, 1D, 4, and 10 . Advantageously, such content can be validated,and the like, with a checksum, and the like, for integrity, timingverification, and the like, by the software validator device at step524, and the like, by comparing how the data was originally shared incomparison to when it was sent over the secondary channels, and thelike.

FIG. 6 is a diagram for illustrating self-executing code employed in theinnovation engine of FIGS. 1-5 and 7-21 . In FIG. 6 , illustrated is thechoice sequence of the self-executing contract code of step 516 thatstores ownership, validate patent values, and the like. Theself-executing code container of step 516 can employ any suitableprogram that can adapt itself with new content, and a ledger that storesownership, value, and the like. For example, by calculating a checksum,step 516, for example, can verify the date and information, for example,with respect to when handled, who owns it and to what degree, and thelike. Step 516 also can interact with other contracts, and the like, andcan adjust parameters thereof, content, value, and the like.

Accordingly, an input validation device, at step 604, determines who orwhat is being interacted with, checks parameters, with respect tocontent received, and the like. After step 604, ownership validation isperformed at step 606, for example, to determine if a handler of acontract is allowed to alter data in the corresponding self-executingcode contract of step 516. Accordingly, step 608 performs checking of aledger device, for example, for correlation of given parameters versusknown parameters, and the like, that are drawn from the ledger itself,and the like. When checked and found legitimate, relevant informationcan be sent to an execution device for execution at step 610. Aconfirmation generation device at step 612 performs a peer verification,and the like, with a data exchange device at step 614, over the meshnetwork at step 518, and the like.

FIG. 7 is a diagram for illustrating a mesh protocol employed in theinnovation engine of FIGS. 1-6 and 8-21 . In FIG. 7 , the mesh protocolvalidates and retransmits messages and data sent throughout the meshnetwork. The protocol of step 518, has similarity to other meshnetworks, such as holo-chain networks, b.a.t.m.a.n. networks, and thelike, for example, with novel advantages with respect to validating thecommunication with a plurality of node validators at steps 702-706. Suchdata validation can partly take place over the secondary channel, forexample, as described with respect to FIGS. 4-5 .

FIG. 8 is a diagram for illustrating an asset pool employed in theinnovation engine of FIGS. 1-7 and 9-21 . In FIG. 8 , the asset poolstep 512 assures the synchronization of all relevant patent data, andcategories same to a function, a function group, and the like, in orderto validate content thereof. Accordingly, synchronizing the data overthe node network is performed at step 802, and the lie. The extractingof new data with the help of any suitable Al filtering algorithm isperformed at step 804, and which extracts groups, and the like,patent-related data, and the like (e.g., patent landscaping, patentwhitespace, analysis, etc.). At step 806, the resulting information goesthrough a patent validator device, which checks to see if the extracteddata is relevant and related to the patent asset pool of step 512.

FIG. 9 is a diagram for illustrating a data sharing validator deviceemployed in the innovation engine of FIGS. 1-8 and 10-21 . In FIG. 9 ,the data sharing validator device step 520 validates data that is sharedamongst the mesh network, and tries to predict, determine, and the like,through suitable AI technology, and the like, to which patents theshared data could be valuable, and the like. Accordingly, at step 902,an AI data validator, and the like, assesses the data value that was putin by the asset pool of step 512, and then either stores or discards thedata at steps 904, 906, and 908, and the like.

FIG. 10 is a diagram for illustrating a hardware validator deviceemployed in the innovation engine of FIGS. 1-9 and 11-21 . In FIG. 10 ,a hardware validator device assures there is in fact a verified networkto connect to, either through the air router 402 or via the mesh networkof step 518. Steps 1002, 1004 and 1006 determine if a connection isviable and together make up the hardware validator device step 522.

FIG. 11 is a diagram for illustrating a software validator deviceemployed in the innovation engine of FIGS. 1-10 and 12-21 . In FIG. 11 ,when a connection is validated and shared by the hardware validatordevice of step 522, a software validation device is employed, whichvalidates shared keys, and the like, and tries to do secondary channelverification via the air router 402, or other suitable routing, and thelike. The hardware validator, for example, employs a suitable algorithmat step 1102, which checks for the total nodes that receive the “datathat will be validated,” and makes a choice based on its own choice, andat least 2 others confirming the legitimacy of transmission. If suchparameters are not met, retransmission is requested at step 1106, untila confirmation performed at step 1104.

FIG. 12 is a diagram for illustrating node interaction over the meshprotocol employed in the innovation engine of FIGS. 1-11 and 13-21 . InFIG. 12 , the mesh protocol creates a private network over the internet,for example, where all suitable routing data is shared to peers that areclosest to each other. Accordingly, the mesh protocol of step 516 caninclude several nodes at steps 1202 communicating over either theinternet 416 and/or via the skywaves 418, where all suitable nodes 1202can maintain constant contact to route data to each other over suchmedia, and the like.

Advantageously, the one or more computing devices 1206-1214 connected toeach of the respective node devices 1202 form a mesh network that can beemployed to more efficiently, with added speed, and the like, performthe problem solving, smart contract processing, cryptocurrency mining,and the like, as compared to conventional serial processing methods, andsystems, and the like.

FIG. 13 is a diagram for illustrating an asset value sensor employed inthe innovation engine of FIGS. 1-12 and 14-21 . In FIG. 13 , the assetvalue sensor ascertains the value, if any, of the newly obtained datasent via the mesh network as described in step 518. Accordingly,determining if an asset is valuable at step 1302, assigning asset valueat step 1304, or tasking no action at step 1306 can be part of the assetvalue sensor step 514.

FIG. 14 is a diagram for illustrating a voting device employed in theinnovation engine of FIGS. 1-13 and 15-21 . In FIG. 14 , the votingdevice commits and calculates votes generated by the respective memberusers of nodes of step 1202. The voting device of step 506, collects andcalculates votes at steps 1402 and 1404 and weighs them when they arereceived and sent through the mesh network of step 518.

FIG. 15 is a diagram for illustrating an asset storage device employedin the innovation engine of FIGS. 1-14 and 16-21 . In FIG. 15 , theasset storage device, can be a normalized database that is tuned foreasy and fast categorized access, as previously described. The resultscoming from the vote calculator step 1402 are stored as weighingparameters in the asset storage device of step 504 via steps 1502, 1504and 1506, where various databases store each characteristic separatelyfor easy subject group access, and the like, as previously described.

FIG. 16 is a diagram for illustrating an evaluation device employed inthe innovation engine of FIGS. 1-15 and 17-21 . In FIG. 16 , theevaluation device of step 502 is the filter that determines the value ofan asset or patent based on AI parameters, and the like, as previouslydescribed. The parameters, which are gathered from other processes arestored in step 504 and used as input for the evaluation device step 502in step 1602. As all the suitable patent data can now be grouped andinterlinked with patents that have similar features, and the like, andconnected to the measured parameters, a value can be determined at step1604.

FIG. 17 is a diagram for illustrating an evaluation device employed inthe innovation engine of FIGS. 1-16 and 18-21 . In FIG. 17 , shown isthe decision chain of a transaction within the innovation engine. Froman unfiltered transaction at step 1702, the data flows through theself-executing code at step 1704, and then various of the previouslydescribed filters and checks are performed to synchronize with otherexisting already categorized data at step 1706. Based on suchparameters, the data is than either validated or discarded at step 1708,and finally the transaction can be confirmed at step 1710, creating anupdated self-executing code contract at step 1704.

Accordingly, an encryption scheme according to the present disclosurecan include a novel way of enclosing and obfuscating compressed datainside, for example, a X25519 encryption scheme, and the like, aspreviously described, advantageously, minimizing the traceability ofrepeated characters of data to encrypted. In addition, a system forscrubbing malicious code is provided between communications devices, forexample, including one or more of the systems, sub-systems and/ordevices, as described with respect to FIGS. 1A-1D, and the like.

For example, to hide such above-noted functions, a header and footer arecut off from the compressed data, advantageously, preventing recognitionby hackers, third parties, and the like. Advantageously, a shared keyprinciple is partly based on the size of the checksum of the encrypteddata, as well as the checksum of the data after compression, but beforeencryption, by utilizing a size of the data to be encrypted as an inputparameter to define the level of compression before encryption, as wellas a chosen key curve scheme, and the like. In addition, such size-basedparameters are also used to define a cutoff point, and the like, forboth header and footer of the encrypted data, and the like.

The air router 402 provides for advantageous and novel secured skywavecommunications, and the like, and employs low band frequencycommunication (e.g., skywave communication, etc.), advantageously,securing, and the like, for example, TCP/IP network communications, andthe like. For example, employed are translation of an alphabet mapping,and the like, into a set of predetermined sound combinations thatrepresent characters of a character map (e.g., as seen on a regularkeyboard, etc.). Advantageously, much higher levels of data compressionemployed, as compared to conventional technologies, as well providing amechanism to encrypt, obfuscate, and the like, data, information, andthe like.

In this respect, as a tone combination is only as real as a chosenscheme, and the number of characters in it, there are infinite number ofcombinations possible based on such parameters, while still providing arelatively simple key pair to recognize communicated messages, ascompared to conventional technologies. Advantageously, a chosen keypair,for example, can be generated from a frequency employed to communicatethe keypair, and a size of the transmission, and the like. By contrast,with conventional radio data communications, and the like, checking forstatic or real data is a big part of the data transport, and the like,Advantageously, such overhead, and the like, can be eliminated based onthe present disclosure, for example, by listening to a specific sinusbandwith for certain tone libraries, which then in turn are triggers forfiltering out the corresponding data, as compared to conventionalsystems and methods that must sample all data that comes off of anantenna, and the like.

In addition, the present disclosure teaches a novel redistribution ofvalue of assets (e.g., intellectual property, patents, etc.) byemploying executable coin contracting, and the like. Such as a scheme,advantageously, can be employed to enumerate intellectual property, andthe like, by employing the self-executing code ledger contract, and thelike, over a mesh routed network, and the like.

FIG. 18 is a diagram for illustrating node processing including problemsolving, cryptocurrency mining, and smart contract processing employedin the innovation engine of FIGS. 1-17 . In FIG. 18 , node processingsystem 1800 includes one or more of the nodes 1202 that can includemulticore processors (not shown) that can be employed as determined atstep 1802 in serial and/or parallel manner to perform problem solving atstep 1804, smart contract processing at step 1806, and/or cryptocurrencymining at step 1808 with any suitable resulting renumeration sent to thebaseline monetization 306. Advantageously, each of the nodes 1202 canprocess data by itself or the nodes 1202 can be aligned to perform asingle process divided over many of the nodes 1202 and/or cores withinthe nodes 1202. The nodes 1202 can be implemented as part of the airrouting platform of FIG. 4 , as previously described.

Advantageously, the node processing system 1800 is modular and can beused in various ways such as to solve a computational challenge, whichcould include finding the number for the 12th position of the fibunaccisequence, any other suitable problems, and the like. In addition, thenode processing system 1800 can be employed to process a smart contractwhich interacts with existing conditions in other contracts to adapt orchange/influence the other contracts, such as, for example, changing thecontent of a to be filed patent application by inserting new contentthat is determined to have value. Further, the node processing system1800 can be used for number crunching, processing bitcoin exchangeoperations (e.g., mining), and the like.

The nodes 1202 can include hardware capable of hashing data, connectingto other nodes 1202 within the system, and the like, to performintegrity and referencing checks over a duplex medium, such as the airrouting platform of FIG. 4 , and the like, where one or more of thenodes 1202 send a signal (e.g., data, problem solution, valuation, etc.)with a integrity check that is confirmed on the other medium (e.g., airrouted signals checked on network and visa versa). Advantageously, thenode processing system 1800 can immediately add value to the basemonetization 306, irrespective of the value added by the portfolioassets 310. Advantageously, the nodes 1202 can be used to form anartificial intelligence (AI) engine, and the like.

FIG. 19 is a diagram for illustrating cryptocurrency mining employed inthe innovation engine of FIGS. 1-18 and 20-21 . In FIG. 19 ,cryptocurrency mining is illustrated using the nodes 1202. The processof FIG. 19 can be applied to the problem solving, smart contractprocessing, previously described, and the like. For example, at step1902 the nodes 1202 determine which of one or more coins to mine, suchas bitcoin, litecoin, a new coin to be developed, and the like. At steps1904-1908, the one or more respective coins are mined with any suitableresulting renumeration sent to the baseline monetization 306. Thedetermination of which coin(s) to mine can be based on various factors,for example, including actual value, change in value, projected value,polling, based on a suitable artificial intelligence, Al algorithm, andthe like.

FIG. 20 is a diagram for illustrating multi-device blockchain mining,smart contracting, and the like, employed in the innovation engine ofFIGS. 1-19 and 21 . In FIG. 20 , the multi-device blockchain mining 2000employed in the innovation engine, includes web server node 2002, andthe cryptocurrency mining node 1808, and the baseline monetization node306, as previously described. The web server node 2002 serves web miningpages through one or more of the nodes 1202 to be served by one morerespective browser capable devices 2006-2014 (e.g., laptops 2006, gamingconsoles 2008, appliances 2010, cell phones 2012, portable devices 2014,etc.) connected to the node 1202.

For example, the web mining pages can run compiled code as a WebAssembly(wasm) engine, and the like, that can compute blocks of data subsets,and the like. The web server node 2002 serves the wasm engine thatallows the devices 2006-2014 to open a client through a web browser viaa network supplied by the ring made up of the nodes 1202, for example,on a local network within a VPN, and the like. The devices 2006-2014compute the mining data subsets and when the mining data is processedcorrectly, the processed data is sent back to the web server node 2002.The wasm engine running on the devices 2006-2014 can request newcomputations, as well as serve back computed answers, and the like.Advantageously, the data subsets can include any suitable general,computational data block, and the like (e.g., SETI data, DNA sequencingdata, cure for cancer data, traffic control data, AI decision makingdata, etc.). The web server node 2002 confirms that the receivedprocessed data holds value, which is then sent to the baselinemonetization 306 for further processing.

FIG. 21 is a flow chart diagram for illustrating multi-device blockchainmining, smart contracting, and the like, employed in the innovationengine of FIGS. 1-20 . In FIG. 21 , at step 2102 the web server node2002 serves the web mining page to the nodes 1202 that at step 2104serve the respective pages having the wasm engines to the devices2006-2014. The devices 2006-2014 compute the mining data subsets at step2106 and step 2108 determines whether or not the data subsets have beenprocessed correctly. If so, control returns to step 2102, and otherwisethe processing continues at step 2110. Once the data block is determinedto be complete at the web server node 2002 at step 2112, the data blockholds value and at step 2114 is transmitted to the baseline monetization306, completing the process.

Advantageously, the value that is extracted can be distributed inproportion to amount of data processed, computing power employed, andthe like, by the respective nodes 2102, and the like. However, variousother sharing options of coins, tokens, and the like, that are mined canbe employed and shared in a fair manner, and/or as needed. The baselinemonetization 306 can hold various types of value, such as coins, tokens,contracts, solved problems, and/or any suitable form of value that canbe remunerated, and the like.

FIGS. 22-23 are diagrams for illustrating non-fungible token (NFT)generation, and the like, employed in the innovation engine of FIGS.1-21 . In FIG. 22 , a unique token, for example, based on a digitalasset, such as a patent, NFT, and the like, upload, transfer,generation, and the like, is performed at 2202. At 2204, ownership isdetermined, and split, and the like, on a digital platform (e.g., ablockchain-based platform, digital wallet, etc.) into percentual parts,and the like. At 2206, the token, for example, a patent, and the like,is weighted and valued, and the like, employing processes, for example,as further described with respect to FIG. 16 , element 1604.Advantageously, the token, for example, a patent, and the like, isweighted and valued using an automated and transparent process, forexample, which establishes current value and relative weight of thepatent within a given patent portfolio, and the like. The tokens aredigitally issued at step 2210, based on the patent weighting andvaluation process, and the like, wherein each token reflects the totalvalue of the patent, for example, including the shares owned by theinventor (e.g., 90%) and the engine (e.g., 10%).

After completion of the above-noted processes, the new token ownersacquire, for example, the right to: (1) market patents individually topotential buyers or licensees, as well as collectively to investors aspart of the patent portfolio; and (2) when a patent is to be bought as awhole, tokens associated with specific patents are sold at the currentvalue to buyers, which in turn causes those tokens to be burned, removedfrom circulation, and the like, precluding future sales or licensingwithin the marketplace of the given patent, and the like.

In FIG. 23 , a collaboration, based on FIG. 22 , is described, whereinseparate patent holders in the system collaborate to create a new patentderived from older patents, newly created ideas, a combination of both,and the like. For example, existing patents that were created earlierare shown at 2302 and 2312, with respective platform wallets at 2304 and2314, and the like, where renumeration, and the like, of tokens can takeplace are shown. Valuations at 2306 and 2316 are calculated, andderivative tokens at 2310 and 2318 are generated, as previouslydescribed in FIG. 22 . Advantageously, a new synergistic patent based onthe combining of minds, patents, and the like, is possible, as furtherdescribed.

For example, a new patent is created, for example, as an NFT at 2320,with ownership determined at step 2322, and with the patent valuated at2324, based on input from 2302, 2304, 2306, 2312, 2314 and 2316, andderivative tokens are generated at 2326. Advantageously, weighted ideas,patents, and the like, and the created tokens, NFTs, and the like, canbe issued to new collaborative owners, and the like.

For example, two patent holders can provide the system with two separateweighted ideas/patents, alongside with enumerations, and walletaddresses, and the like. Then, when entered into the system, a newpatent is generated, based on the ideas/patents from both parties, afterwhich the new NFT is created holding ownership and content from insertedcontent from both parties, whereafter tokens are distributed and dividedover the weight each input carries.

Although the present invention is described in terms of assets, such aspatents, and the like, the present invention is suitable for use withany suitable tangible and/or intangible assets, property, and the like,based on the teachings of the present disclosure, as will be appreciatedby those of ordinary skill in the relevant art(s).

The above-described devices and subsystems of the illustrativeembodiments can include, for example, any suitable servers,workstations, PCs, laptop computers, PDAs, Internet appliances, handhelddevices, cellular telephones, wireless devices, other devices, and thelike, capable of performing the processes of the illustrativeembodiments. The devices and subsystems of the illustrative embodimentscan communicate with each other using any suitable protocol and can beimplemented using one or more programmed computer systems or devices.

One or more interface mechanisms can be used with the illustrativeembodiments, including, for example, Internet access, telecommunicationsin any suitable form (e.g., voice, modem, and the like), wirelesscommunications media, and the like. For example, employed communicationsnetworks or links can include one or more wireless communicationsnetworks, cellular communications networks, G3 communications networks,Public Switched Telephone Network (PSTNs), Packet Data Networks (PDNs),the Internet, intranets, a combination thereof, and the like.

It is to be understood that the devices and subsystems of theillustrative embodiments are for illustrative purposes, as manyvariations of the specific hardware used to implement the illustrativeembodiments are possible, as will be appreciated by those skilled in therelevant art(s). For example, the functionality of one or more of thedevices and subsystems of the illustrative embodiments can beimplemented via one or more programmed computer systems or devices.

To implement such variations as well as other variations, a singlecomputer system can be programmed to perform the special purposefunctions of one or more of the devices and subsystems of theillustrative embodiments. On the other hand, two or more programmedcomputer systems or devices can be substituted for any one of thedevices and subsystems of the illustrative embodiments. Accordingly,principles and advantages of distributed processing, such as redundancy,replication, and the like, also can be implemented, as desired, toincrease the robustness and performance of the devices and subsystems ofthe illustrative embodiments.

The devices and subsystems of the illustrative embodiments can storeinformation relating to various processes described herein. Thisinformation can be stored in one or more memories, such as a hard disk,optical disk, magneto-optical disk, RAM, and the like, of the devicesand subsystems of the illustrative embodiments. One or more databases ofthe devices and subsystems of the illustrative embodiments can store theinformation used to implement the illustrative embodiments of thepresent inventions. The databases can be organized using data structures(e.g., records, tables, arrays, fields, graphs, trees, lists, and thelike) included in one or more memories or storage devices listed herein.The processes described with respect to the illustrative embodiments caninclude appropriate data structures for storing data collected and/orgenerated by the processes of the devices and subsystems of theillustrative embodiments in one or more databases thereof.

All or a portion of the devices and subsystems of the illustrativeembodiments can be conveniently implemented using one or more generalpurpose computer systems, microprocessors, digital signal processors,micro-controllers, and the like, programmed according to the teachingsof the illustrative embodiments of the present inventions, as will beappreciated by those skilled in the computer and software arts.Appropriate software can be readily prepared by programmers of ordinaryskill based on the teachings of the illustrative embodiments, as will beappreciated by those skilled in the software art. Further, the devicesand subsystems of the illustrative embodiments can be implemented on theWorld Wide Web. In addition, the devices and subsystems of theillustrative embodiments can be implemented by the preparation ofapplication-specific integrated circuits or by interconnecting anappropriate network of conventional component circuits, as will beappreciated by those skilled in the electrical art(s). Thus, theillustrative embodiments are not limited to any specific combination ofhardware circuitry and/or software.

Stored on any one or on a combination of computer readable media, theillustrative embodiments of the present inventions can include softwarefor controlling the devices and subsystems of the illustrativeembodiments, for driving the devices and subsystems of the illustrativeembodiments, for enabling the devices and subsystems of the illustrativeembodiments to interact with a human user, and the like. Such softwarecan include, but is not limited to, device drivers, firmware, operatingsystems, development tools, applications software, and the like. Suchcomputer readable media further can include the computer program productof an embodiment of the present inventions for performing all or aportion (if processing is distributed) of the processing performed inimplementing the inventions. Computer code devices of the illustrativeembodiments of the present inventions can include any suitableinterpretable or executable code mechanism, including but not limited toscripts, interpretable programs, dynamic link libraries (DLLs), Javaclasses and applets, complete executable programs, Common Object RequestBroker Architecture (CORBA) objects, and the like. Moreover, parts ofthe processing of the illustrative embodiments of the present inventionscan be distributed for better performance, reliability, cost, and thelike.

As stated above, the devices and subsystems of the illustrativeembodiments can include computer readable medium or memories for holdinginstructions programmed according to the teachings of the presentinventions and for holding data structures, tables, records, and/orother data described herein. Computer readable medium can include anysuitable medium that participates in providing instructions to aprocessor for execution. Such a medium can take many forms, includingbut not limited to, non-volatile media, volatile media, transmissionmedia, and the like. Non-volatile media can include, for example,optical or magnetic disks, magneto-optical disks, and the like. Volatilemedia can include dynamic memories, and the like. Transmission media caninclude coaxial cables, copper wire, fiber optics, and the like.Transmission media also can take the form of acoustic, optical,electromagnetic waves, and the like, such as those generated duringradio frequency (RF) communications, infrared (IR) data communications,and the like. Common forms of computer-readable media can include, forexample, a floppy disk, a flexible disk, hard disk, magnetic tape, anyother suitable magnetic medium, a CD-ROM, CDRW, DVD, any other suitableoptical medium, punch cards, paper tape, optical mark sheets, any othersuitable physical medium with patterns of holes or other opticallyrecognizable indicia, a RAM, a PROM, an EPROM, a FLASH-EPROM, any othersuitable memory chip or cartridge, a carrier wave or any other suitablemedium from which a computer can read.

While the present inventions have been described in connection with anumber of illustrative embodiments, and implementations, the presentinventions are not so limited, but rather cover various modifications,and equivalent arrangements, which fall within the purview of theappended claims.

What is claimed is:
 1. A system for computer based open innovation, thesystem comprising: an asset valuation device receiving asset informationregarding one or more tangible or non-tangible assets, and generating avaluation signal, based on the asset information; a blockchain codedevice receiving the valuation signal, and generating a code signal,based on the valuation signal; an air router device having both a lowband radio channel, and an internet router channel for redundantinternet communications data integrity, and a malicious code removaldevice for scrubbing malicious code from data received, receiving thevaluation signal, verifying data integrity thereof, and generating anode voting request signal, based on the valuation signal; wherein thelow band radio channel receives the redundant internet communicationsbefore internet router channel for the verifying of the data integrity;a mesh network having a plurality of node devices receiving the nodevoting request signal, and generating vote confirmation signals, basedon the node voting request signal; and one or more computing devicesconnected to each of the respective node devices; wherein the one ormore computing devices of the node devices of the mesh network areconfigured to perform non-fungible token (NFT) generation based on theone or more tangible or non-tangible assets, including trackingrespective ownership and valuation of the one or more tangible ornon-tangible assets, based on the asset information regarding the one ormore tangible or non-tangible assets; wherein the system collects apredetermined percentage of monetization of assets based on the state ofvaluation of the assets as a baseline monetization; wherein thenon-fungible token (NFT) generation includes asset information,ownership information, and valuation information regarding the one ormore tangible or non-tangible assets; and wherein resulting renumerationbased on the non-fungible token (NFT) generation is sent to the baselinemonetization can hold value including one of coins, tokens, contracts,and solved problems.
 2. The system of claim 1, wherein the one or morecomputing devices include browser capable devices.
 3. The system ofclaim 1, wherein the node devices process data by themselves or arealigned to perform a single process divided over many of the nodedevices.
 4. The system of claim 1, wherein the node devices form anartificial intelligence (AI) engine.
 5. A computer-implemented methodfor computer based open innovation, the method comprising: receivingwith an asset valuation device asset information regarding one or moretangible or non-tangible assets, and generating a valuation signal,based on the asset information; receiving with a blockchain code devicethe valuation signal, and generating a code signal, based on thevaluation signal; receiving with an air router device having both a lowband radio channel, and an internet router channel for redundantinternet communications data integrity, and a malicious code removaldevice for scrubbing malicious code from data received, the valuationsignal, verifying data integrity thereof, and generating a node votingrequest signal, based on the valuation signal; wherein the low bandradio channel receives the redundant internet communications beforeinternet router channel for the verifying of the data integrity;receiving with a mesh network having a plurality of node devices thenode voting request signal, and generating vote confirmation signals,based on the node voting request signal; and performing with one or morecomputing devices connected to each of the respective node devicesnon-fungible token (NFT) generation based on the one or more tangible ornon-tangible assets, including tracking respective ownership andvaluation of the one or more tangible or non-tangible assets, based onthe asset information regarding the one or more tangible or non-tangibleassets; wherein the system collects a predetermined percentage ofmonetization of assets based on the state of valuation of the assets asa baseline monetization; wherein the non-fungible token (NFT) generationincludes asset information, ownership information, and valuationinformation regarding the one or more tangible or non-tangible assets;and wherein resulting renumeration based on the non-fungible token (NFT)generation is sent to the baseline monetization can hold value includingone of coins, tokens, contracts, and solved problems.
 6. The method ofclaim 5, wherein the one or more computing devices include browsercapable devices.
 7. The method of claim 5, wherein the node devicesprocess data by themselves or are aligned to perform a single processdivided over many of the node devices.
 8. The method of claim 5, whereinthe node devices form an artificial intelligence (AI) engine.
 9. Anon-transitory computer-readable medium for computer based openinnovation and with instructions stored thereon, that when executed by aprocessor, perform the steps comprising: receiving with an assetvaluation device asset information regarding one or more tangible ornon-tangible assets, and generating a valuation signal, based on theasset information; receiving with a blockchain code device the valuationsignal, and generating a code signal, based on the valuation signal;receiving with an air router device having both a low band radiochannel, and an internet router channel for redundant internetcommunications data integrity, and a malicious code removal device forscrubbing malicious code from data received, the valuation signal,verifying data integrity thereof, and generating a node voting requestsignal, based on the valuation signal; wherein the low band radiochannel receives the redundant internet communications before internetrouter channel for the verifying of the data integrity; receiving with amesh network having a plurality of node devices the node voting requestsignal, and generating vote confirmation signals, based on the nodevoting request signal; and performing with one or more computing devicesconnected to each of the respective node devices non-fungible token(NFT) generation based on the one or more tangible or non-tangibleassets, including tracking respective ownership and valuation of the oneor more tangible or non-tangible assets, based on the asset informationregarding the one or more tangible or non-tangible assets; wherein thesystem collects a predetermined percentage of monetization of assetsbased on the state of valuation of the assets as a baselinemonetization; wherein the non-fungible token (NFT) generation includesasset information, ownership information, and valuation informationregarding the one or more tangible or non-tangible assets; and whereinresulting renumeration based on the non-fungible token (NFT) generationis sent to the baseline monetization can hold value including one ofcoins, tokens, contracts, and solved problems.
 10. The computer-readablemedium of claim 9, wherein the one or more computing devices includebrowser capable devices.
 11. The computer-readable medium of claim 9,wherein the node devices process data by themselves or are aligned toperform a single process divided over many of the node devices.
 12. Thecomputer-readable medium of claim 9, wherein the node devices form anartificial intelligence (AI) engine.