Method and system for unique, procedurally generated digital objects via few-shot model

ABSTRACT

Disclosed herein is digital object generator that makes uses a one-way function to generate unique digital objects based on the user specific input. Features of the input are first extracted via a few-shot convolutional neural network model, then evaluated weight and integrated fit. The resulting digital object includes a user decipherable output such as a visual representation, an audio representation, or a multimedia representation that includes recognizable elements from the user specific input.

CROSS-REFERENCE TO RELATED APPLICATIONS

This patent document is a continuation-in-part of and claims priority toU.S. patent application Ser. No. 17/647,592, filed on Jan. 10, 2022. Thecontents of the before-mentioned patent application is incorporated byreference as part of the disclosure of this application.

TECHNICAL FIELD

The disclosure relates to digital input handling and processing togenerate digital composite objects. The disclosure more specificallyrelates to unique, procedurally generated digital objects using one-wayfunctions.

BACKGROUND

A computer can use random elements to generate unique, or seeminglyunique, procedurally generated digital objects (e.g., graphics).However, human viewers typically do not appreciate something as uniqueif it is merely random. Thus, procedural generation of digital objectsis lacking in programming to interpret when output is merely random orwhen it has displayed machine creativity. Prior art has attempted toaddress the randomness issue by providing a set of preset componentsthat are easily intermingled. However, this solution is limited tocombinations of presets and thus repeats, or near-repeat digital objectsas output are likely.

Tangentially, a one-way function is a function that is easy to computeon every input, but hard to invert given the image of a random input.Here, “easy” and “hard” are to be understood in the sense ofcomputational complexity theory, specifically the theory of polynomialtime problems.

BRIEF DESCRIPTION OF THE DRAWINGS

FIG. 1 is an illustration of a sample few-shot model configured toderive graphic features.

FIG. 2 is a block diagram illustrating a data structure of a smartcontract.

FIG. 3 illustrates a block diagram of a system for using emoji sequenceIDs for identifying wallet addresses of blockchain wallets.

FIG. 4 is a flowchart illustrating platform generation of a uniqueprocedurally generated object via user specific parameters.

FIG. 5 is an illustration of a new digital object generated from a setof user input.

FIG. 6 is a flowchart illustrating model operation step of a uniqueprocedurally generated object via user specific parameters.

FIG. 7 is a flowchart illustrating implementation of time-based input todigital object generation.

FIG. 8 is a diagram illustrating a connection between digital objectsand a distributed consensus network supported by a blockchain datastructure.

FIG. 9 is a flowchart illustrating event driven generation of digitalobjects.

FIG. 10 illustrates a number of emoji sequences that are connected viasocial networking features based on the features included in each emojisequence.

FIG. 11 is an illustration of a 3D graphic object.

FIG. 12 is an illustration of a first set of additional features of a 3Dgraphic object.

FIG. 13 is an illustration of a second set of additional features of a3D graphic object.

FIG. 14 is an illustration of a third set of additional features of a 3Dgraphic object.

FIG. 15 is an illustration of a fourth set of additional features of a3D graphic object.

FIG. 16 is a flowchart illustrating a user interface applied to a 3Dgraphic object.

FIGS. 17 and 18 are screenshots of implementations of 3D graphic objectswhere a given set of media data is applied to faces of the 3D graphicobject.

FIG. 19 is a flow chart illustrating graphic object social feeds.

FIG. 20 is a screenshot of a time-based leaderboard interface.

FIG. 21 is a flowchart illustrating a method of implementation of atime-based leaderboard interface.

FIG. 22 is a screenshot of multiple users occupying a matchingleaderboard position.

FIG. 23 is a block diagram of an exemplary computing system.

FIG. 24 is a block diagram illustrating an example machine learning (ML)system, in accordance with one or more embodiments

DETAILED DESCRIPTION

The behavior of owners of digital objects is to frequently trade theirdigital objects and cause significant turnover of those objects. Theconstant turnover of digital objects is not an ideal ecosystem forcreators of said digital objects. Thus, it behooves such creators tomake use of a gamified mechanic for digital objects that encouragesholding on to those digital objects for extended periods. One suchmechanic is a time-based leaderboard.

For a given set of digital objects, a leaderboard indicates how long agiven user has held that digital object and ranking the users based onthat length of time. In some embodiments, the leaderboard uses anabsolute timeclock for a given digital object. In some cases, users willhold multiple digital objects from a given set of digital objects. Thus,in some embodiments, the leaderboard uses a timeclock connected to thelength of time a given user contiguously holds a digital object from agiven collection of digital objects (e.g., the objects do not need tocontiguously need to be the same but are from the collection).

In some embodiments, the leaderboard sorts ties based on number ofdigital objects from the collection held or based on staking of digitalobjects. When a digital object is “staked,” that object is transferredto a holding user for a predetermined length of time. Staking a digitalobject is akin to locking the object away in a vault for a period oftime. While staked with the holding user, the original user cannot tradethe digital object. While staking of a digital object technicallytransfers the digital object away from the original user, for purposesof the leaderboard, the digital object is considered contiguouslycontrolled by the original user.

The leaderboard enables social benefits and loyalty rewards such asgetting early or exclusive access to future distributions of digitalobjects and anything the creator wants to incentivize loyalty (avelocity sink) and award reputational benefits.

Additionally disclosed herein is a generator of unique, procedurallygenerated digital objects that makes use of user specific parameters.Computers can generate unique digital output quite easily through theuse randomizing elements. This type of output results in something thatis strictly unique or seemingly unique, but a human viewer is notnecessarily going to appreciate the output as unique. Depending on thestyle of the output, the uniqueness manifests in different ways. Forpurposes of ease of disclosure, this application largely focuses ongraphical elements, but textual, audio, or multimedia elements aresimilarly implementable.

Prior art techniques have made use of preset elements that are reused ina random order. This sort of process is ultimately subject to the sizeof the presets used, but nevertheless, often appears to output similardigital objects over time. A way to overcome the similarity betweenoutput is to unbound the input such that each user is able to submittheir own input, based on user specific parameters. While the algorithmfor generating the procedural digital object does not change, the variedinput enables more unique objects to be created. Further, the digitalobjects created are more personalized to those who instigate thegeneration.

With respect to user submitted input on “unique” output, a platformneeds a scheme to address the potential of double submission of the sameinput. In some embodiments, input is validated such that an exact set ofinput may only be submitted once. In some embodiments, a user isvalidated such that that user may only submit input once (and in amanner, the user themselves acts as the variation in input). In someembodiments, a randomization element is applied to each submission. Therandomization element (e.g., a salt) is implementable in a number ofways. In some embodiments, the salt changes the manner of proceduralgeneration based on the input. In some embodiments, the salt is treatedin the same manner as the input and acts an additional element of input.

A specific example of an embodiment of the present invention relates tothe generation of cryptographic tokens, or more specificallynon-fungible cryptographic tokens (NFT). In some embodiments, theprocedurally generated digital object is generated based on existingelements in a cryptographic wallet. A given cryptographic wallet has anumber of NFTs present therein. The generator of digital objectsinterprets the various cryptographic protocols related to the NFTspresent in the wallet, identifies content associated therewith, andprocedurally generates a new NFT based on the existing ones present inthe wallet.

Examples of uses of digital objects include as collectors items, ticketsfor events, identity information, art, and/or social networking orcommunity building tokens.

Artificial Intelligence and Few-Shot Models

Artificial intelligence models often operate based on extensive andenormous training models. The models include a multiplicity of inputsand how each should be handled. Then, when the model receives a newinput, the model produces an output based on patterns determined fromthe data it was trained on. Few-shot models use a small number of inputs(a support set) to identify some information about a query input.

The term “few-shot” refers to a model that is trained to interpret a fewsources of input data that the model has not necessarily observedbefore. Few-shot is shorthand for stating that the model has “a fewshots” to determine what the user is seeking. “A few” does notnecessarily refer to “three” as is often applied, but a relatively smallnumber when compared to other models known in the art. Few-shot learning(FSL) refers to the training of ML algorithms using a very small set oftraining data (e.g., a handful of images), as opposed to the very largeset that is more often used. This commonly applies to the field ofcomputer vision, where it is desirable to have an object categorizationmodel work well without thousands of training examples.

FSL is utilized in the field of computer vision, where employing anobject categorization model still gives appropriate results even withouthaving several training samples. For example, where a system categorizesbird species from photos, some rare species of birds may lack enoughlabeled pictures to be used as training images. Consequently, if thereis a classifier for bird images, with the insufficient amount of thedataset, a solution would employ FSL.

In some embodiments, a few-shot model uses 10 or fewer input examples,20 or fewer, 100 or fewer input examples, or 5-7 input examples. Whenapplied to graphic element/feature identification, the number of inputexamples may be directly correlated with the number of graphic featuresthat are possible in queries. The referenced input examples differ fromthose the model is trained with in that those examples used during thefew-shot do not necessarily have any relationship (with the exception ofhaving a comparable data type, like the use of ASCII characters, orimage data). The training of the model is premised in teaching the modelhow to quickly adapt to new training examples, rather than to recognizea given input strictly based on examples that it has seen duringtraining. Rather than evaluate individual inputs, the few-shot model istrained to evaluate few-shots—specifically relationships that existbetween the various examples within the few-shot.

Previous work on FSL requires that each example in the support set(examples for the model to adapt quickly to) contain only a singlelabel. For example, suppose a model can quickly learn to classify imagesof a rare bird species. Prior work requires that each image in thesupport set contain a single bird. Other work relating to few-shotmodels and relation network models include the following references:

Yutian Chen, Yannis M. Assael, Brendan Shillingford, David Budden, ScottE. Reed, Heiga Zen, Quan Wang, Luis C. Cobo, Andrew Trask, Ben Laurie,Çaglar Gülçehre, Aäron van den Oord, Oriol Vinyals, and Nando deFreitas. Sample Efficient Adaptive Text-to-Speech. CoRR, abs/1809.10460,2018.

Chelsea Finn, Pieter Abbeel, and Sergey Levine. Model-AgnosticMetalearning for Fast Adaptation of Deep Networks. CoRR, abs/1703.03400,2017.

Gregory R. Koch. Siamese Neural Networks for One-Shot Image Recognition.2015.

Scott E. Reed, Yutian Chen, Thomas Paine, Aaron van den Oord, S. M. AliEslami,

Danilo Jimenez Rezende, Oriol Vinyals, and Nando de Freitas. Few-shotAutoregressive Density Estimation: Towards Learning to LearnDistributions. CoRR, abs/1710.10304, 2017.

Florian Schroff, Dmitry Kalenichenko, and James Philbin. Facenet: AUnified Embedding for Face Recognition and Clustering. CoRR,abs/1503.03832, 2015.

Flood Sung, Yongxin Yang, Li Zhang, Tao Xiang, Philip H. S. Ton, andTimothy M. Hospedales. Learning to Compare: Relation Network forFew-shot Learning. CoRR, abs/1711.06025, 2017.

Oriol Vinyals, Charles Blundell, Timothy P. Lillicrap, KorayKavukcuoglu, and Daan Wierstra. Matching Networks for One Shot Learning.CoRR, abs/1606.04080, 2016.

Few-shot models typically make use of convolutional neural networkspre-trained for feature extraction. Pretraining includes a large amountof media training data. Output of the pretraining model is a set ofvectors. Training for such a network may implement supervised learningor with a Siamese network. Different manners of training will affectoutput prediction accuracy. The output vectors are normalized in orderto establish a common output type for purposes of comparison.

FIG. 1 is an illustration of a sample few-shot model 100 configured toderive graphic features. The sample illustrated is a simplisticimplementation utilizing relatively few, and easy to recognize graphicfeatures. This disclosure is not limited to such simple implementationsand the relevant models may be configured to operate and identify morecomplex sets of graphic features.

In the example, model 100, is a few-shot model designed to identify andcategorize graphic features that are received. In some embodiments, themodel 100 is configured with a set list of graphic features to observe(indicated by a graphic feature matrix). In other embodiments, Model 20includes no explanation what a support set includes and instead merelyidentifies similar patterns in pixels.

The illustration of FIG. 1 includes a three-image support set 102, 104,106 and a single query image 108. The images include some combination ofthree graphical features depicting a frog, a cat, or a dog. When eachimage 102, 104, 106, 108 is supplied to the model 100, the model 100generates a respective vector that describes the image content. Eachvector 110, 112, 114, 116 includes a set of dimensions that together areindicative of the graphic content of the images 102, 104, 106, 108.Image A 102 corresponds to vector A 110. Image B 104 corresponds tovector B 112. Image C 106 corresponds to vector C 114. The query image108 corresponds to the query vector 116. In some embodiments, thesupport set vectors 110, 112, 114 and the query vector 116 are apredetermined number of dimensions in length. Dimensions may relatedirectly to graphical features on a one-to-one basis, or multipledimensions may be used to describe a given graphic feature.

As depicted in the figure, the query image 108 does not include acombination of graphic features that exist in any of the support set.Each feature exists in the support set, but not necessarily by itself,or with an exact same combination. While a human observer can readilyidentify the content of the query image, the image identification systemis taught how to identify via few-shot models.

References to “a model” as discussed herein may refer to a heuristicmodel, an artificial intelligence model, a neural network, aconvolutional neural network, a hidden Markov model, an FSL model, oranother suitable ML model known in the art.

Cryptographic Platforms

Public and private keys are an integral component of cryptocurrenciesbuilt on blockchain networks and are part of a larger field ofcryptography known as public-key cryptography (PKC) or asymmetricencryption. The goal of PKC is to easily transition from a first state(e.g., a private key) to a second state (e.g., a public key) whilereversing the transition from the second state to the first state nearlyimpossible, and in the process, proving possession of a secret keywithout exposing that secret key. The product is subsequently a one-waymathematical function, which makes it ideal for validating theauthenticity of transactions such as cryptocurrency transactions becausepossession of the first state such as the secret key cannot be forged.PKC relies on a two-key model, the public and private key.

The general purpose of PKC is to enable secure, private communicationusing digital signatures in a public channel that is susceptible topotentially malicious eavesdroppers. In the context of cryptographictokens, the goal is to prove that a traded token was indeed signed bythe owner of that token, and was not forged, all occurring over a publicblockchain network between peers. A private key of a blockchain walletunlocks the right for the blockchain wallet's owner to spend transfertokens in the blockchain wallet and therefore must remain private. Awallet address of the blockchain wallet is cryptographically linked tothe blockchain wallet's private key and is publicly available to allusers to enable other users to send NFTs to the user's blockchainwallet. For example, the wallet address may be a public key generatedfrom the blockchain wallet's private key using one or more PKCalgorithms. Public keys are generally used to identify wallets, whereasthe private keys are used to authorize actions of the respective wallet.

Wallet addresses for blockchain wallets are typically represented inhuman-legible form in one of three ways: as a hexadecimalrepresentation, as a Base64 representation, or as a Base58representation. In each of these common ways of representing the walletaddresses, each wallet address is represented using a string of lettersand numbers, typically exceeding 20 characters in length. The length andrandomness of the alphanumeric string makes the wallet address unwieldyand difficult to remember, thereby decreasing its usability andhindering the adoption of cryptocurrencies.

Structurally, in some embodiments, customized, flexible cryptographictokens connected to a smart contract are powered by a less flexible,base cryptocurrency. Miners operating on the network for the basecryptocurrency power execution of a distributed application (dApp) orsmart contract. The smart contract is held by an administrative user andincludes all of the custom cryptographic tokens. The customcryptographic tokens do not “move” in the same sense that the basecryptocurrency moves via transactions. The smart contract is “held” bythe administrative user though secondary users may interact with thesmart contract and various portions (specific tokens) may be attributedto those secondary users.

FIG. 2 is a block diagram illustrating a data structure of a smartcontract. Smart contracts and dApps execute on an Ethereum virtualmachine (“EVM”). The EVM is instantiated on available network nodes.Smart contracts and dApps are applications that execute; thus, theprocessing power to do so must come from hardware somewhere. Nodes mustvolunteer their processors to execute these operations based on thepremise of being paid for the work in Ethereum coins, referred to asEther, measured in “gas.” Gas is the name for a unit of work in the EVM.The price of gas can vary, often because the price of Ether varies, andis specified within the smart contract/dApp.

Every operation that can be performed by a transaction or contract onthe Ethereum platform costs a certain number of gas, with operationsthat require more computational resources costing more gas thanoperations that require few computational resources. For example, at thetime of writing, a multiplication instruction requires 5 gas, whereas anaddition instruction requires 3 gas. Conversely, more complexinstructions, such as a Keccak256 cryptographic hash requires 30 initialgas and 6 additional gas for every 256 bits of data hashed.

The purpose of gas is pay for the processing power of the network onexecution of smart contracts at a reasonably steady rate. That there isa cost at all ensures that the work/processing being performed is usefuland valuable to someone. Thus, the Ethereum strategy differs from aBitcoin transaction fee, which is only dependent on the size inkilobytes of a transaction. As a result that Ethereum's gas costs arerooted in computations, even a short segment of code can result in asignificant amount of processing performed. The use of gas furtherenforces incentivizes coders to generate efficient smartcontracts/algorithms. Otherwise, the cost of execution may spiral out ofcontrol. Unrestricted, an exponential function may bankrupt a givenuser.

While operations in the EVM have a gas cost, gas has a “gas price”measured in ether. Transactions specify a given gas price in ether foreach unit of gas. The fixing of price by transaction enables the marketto decide the relationship between the price of ether and the cost ofcomputing operations (as measured in gas). The total fee paid by atransaction is the gas used multiplied by gas price.

If a given transaction offers very little in terms of a gas price, thattransaction will have low priority on the network. In some cases, thenetwork miners may place a threshold on the gas price each is willing toexecute/process for. If a given transaction is below that threshold forall miners, the process will never execute. Where a transaction does notinclude enough ether attached (e.g., because the transaction results inso much computational work that the gas costs exceed the attached ether)the used gas is still provided to the miners. When the gas runs out, theminer will stop processing the transaction, revert changes made, andappend to the blockchain with a “failed transaction.” Failedtransactions may occur because the miners do not directly evaluate smartcontracts for efficiency. Miners will merely execute code with anappropriate gas price attached. Whether the code executes to completionor stalls out due to excessive computational complexity is of no matterto the miner.

Where a high gas price is attached to a transaction, the transactionwill be given priority. Miners will process transactions in order ofeconomic value. Priority on the Ethereum blockchain works similarly aswith the Bitcoin blockchain. Where a user attaches more ether to a giventransaction than necessary, the excess amount is refunded back to thatuser after the transaction is executed/processed. Miners only charge forthe work that is performed. A useful analogy regarding gas costs andprice is that the gas price is similar to an hourly wage for the miner,whereas the gas cost is like a timesheet of work performed.

A type of smart contract that exists on the Ethereum blockchain areERC-20 tokens (Ethereum Request for Comment-20). ERC-20 is a technicalspecification for fungible utility tokens. ERC-20 defines a common listof rules for Ethereum tokens to follow within the larger Ethereumecosystem, allowing developers to accurately predict interaction betweentokens. These rules include how the tokens are transferred betweenaddresses and how data within each token is accessed. ERC-20 provides aframework for a means to build a token on top of a base cryptocurrency.In some embodiments herein, enhancements are built on top of the ERC-20framework, though use of the ERC-20 technical specification is notinherently necessary and is applicable to circumstances where Ethereumis used as the base cryptocurrency.

Another type of smart contract that exists on the Ethereum blockchainare ERC-721 tokens (Ethereum Request for Comment-721). ERC-721 is atechnical specification for NFTs. The ERC-721 introduces a standard forNFT. An ERC-721 token is unique and can have different exclusivity toanother token from the same smart contract, maybe due to age, rarity orvisuals.

NFTs have a uint256 variable called tokenld. Thus, for any ERC-721contract, the pair contract address, uint256 tokenld must be globallyunique. That said, a given dApp can have a “converter” that uses thetokenld as input and outputs an image.

Disclosure on token protocols has focused on Ethereum. As applicable inthis disclosure, Ethereum is a base cryptocurrency. Other basecryptocurrencies exist now and in the future. This disclosure is notlimited to application on specifically the Bitcoin or Ethereumblockchains.

CryptoKitties is an early example of an NFT platform. Users would engagein breeding and trading of cryptographic tokens that were visuallyrepresented by cartoon cats. Each cat had a family tree that was trackedby a blockchain and went back to the originator cats that digitallysired the subsequent cats. The visual representation of each cat had anappearance dictated by a number of preset options and was at leastpartly controlled by the visual appearance of the parent cat tokens.

Users would mate and auction cats as a game mechanic. When two catsmated, a third cat would be generated by the CryptoKitties dApp. Thethird cat was visually represented by some amalgamation of the featuresof the parents with the potential of a mutation (to potentially gain aparticularly rare feature neither of the parents exhibited). Ultimately,generation of a cryptokitty is based on the user input of existingkitties, and kitties are the only acceptable datatype.

That is to say, no other types of NFT are applicable. One cannot mate acryptokitty with an emoji ID.

CryptoKitties had a number of viral features that were indicative ofexclusivity. These features included particularly rare combinations ofvisual features and a lineage that was relatively close to an originatorcat. In both cases, there was no algorithmic benefit for either of theseexclusivity features.

While CryptoKitties does not implement any algorithmic connection toexclusivity features, some embodiments of the present invention do. Itis frequently the case that exclusivity features of NFTs are connectedto originator or early generation tokens. Additionally, tokens havingrare visual features are considered exclusive. What generation a givenNFT is, is identifiable using either metadata on the token itselfcombined with thresholds or heuristics regarding generationaldefinitions or is identifiable by tracing back the token's generationthrough the respective blockchain of that token. Rarity of visualfeatures is identified via a survey of existing tokens and the existingvisual features thereof. Thus, in embodiments of the instant inventionan evaluation is performed on each relevant token used as input thatidentifies the exclusivity features of that token, then those featuresare captured for use in generation of a new unique procedurallygenerated digital object (e.g., an NFT).

Emoji Sequence based ID

FIG. 3 illustrates a block diagram of a system 300 for using emojisequence IDs for identifying wallet addresses of blockchain wallets.System 300 includes a blockchain network 302, user device 320, userdevice 330, and server 310.

As shown in FIG. 3 , blockchain network 302 includes a plurality ofnodes 304A-E (e.g., servers) that each maintain respective copies of ablockchain. In actual practice, blockchain network 302 may includehundreds or thousands of nodes. In some embodiments, blockchain network302 may be a distributed peer-to-peer network as is known by thoseskilled in the art. In some embodiments, blockchain network 302 of nodes304A-E implement known consensus algorithms to validate transactionssubmitted to blockchain network 302. A verified transaction may includetransferred cryptocurrency, contracts, records, or other information tobe recorded to the blockchain. In some embodiments, multipletransactions are combined together into a block of data that is verifiedacross blockchain network 302. Once verified, this block of data can beadded to an existing blockchain maintained by each of nodes 304A-E.

In some embodiments, a user can initiate transactions to be submitted toblockchain network 302 using user device 330. For example, the user maysubmit a transaction using application 331 configured to interact withblockchain network 302. For example, application 331 may generate andtransmit cryptocurrency transactions to node 304A for validation andverification. Application 331 may include software downloaded from adigital distribution platform (e.g., App Store on Apple devices orMicrosoft Store on Windows devices) or a content server. In someembodiments, application 331 provides a graphical user interface (GUI)that enables the user to generate transactions between his or herblockchain wallet and a blockchain wallet of a target recipient ofcryptocurrency funds. Conventionally, the target recipient's blockchainwallet is identified by a wallet address in a human-legible textualrepresentation. For example, the wallet address may be a string ofnumbers and/or characters such as in a hex format, a Base64 format, or aBase58 format. As described above, requiring the user to enter longstrings of numbers and/or characters into application 331 to identifythe wallet address of the target recipient is inefficient and prone toerror.

In some embodiments, to enable the user to use an emoji sequence ID touniquely identify a target wallet address for a blockchain wallet incryptocurrency transactions, application 331 can implement an emoji list332, an emoji encoder 334, and an emoji decoder 336.

In some embodiments, emoji list 332 can be stored in memory ofapplication 331 and include a predetermined list of emojis that are usedto enable use of emoji sequence IDs to identify wallet addresses ofblockchain wallets. In some embodiments, the predetermined list includesa subset of emojis selected from the emojis in the Unicode Standard. Forexample, a give emoji list 332 includes 1626 emojis selected from theUnicode Standard. In some embodiments, 1626 emojis are selected becausethree emojis selected from 1626 emojis can uniquely map to a four-bytevalue. For example, an emoji ID of three emojis selected from 1626emojis may include 1626{circumflex over ( )}3 unique emoji IDs, which isless than 0.1% more unique values than the total possible number ofunique values (i.e., 2{circumflex over ( )}32) that can be representedby the four-byte (i.e., 32-bit) value. As will be understood by thoseskilled in the art, other numbers of emojis may be selected to be partof emoji list 332 to represent different number of bits. For example, anemoji list 332 having 46 emojis can represent an 11-bit value using twoemojis (i.e., two emojis result in 46*46=2116 unique emoji IDs, whichprovides slightly more unique values than the possible values, 2048, ofan 11-bit value).

In some embodiments, emojis in emoji list 332 may be selected to bevisually dissimilar to reduce the likelihood that the user enters anincorrect emoji when entering the emoji sequence ID identifying thewallet address of the blockchain wallet. For example, the emojis may beselected such that no two emojis depict the slight variations of thesame object. For example, a single emoji for a cat may be selected andincluded in emoji list 332 and not the multiple emojis depicting catswith different expression (e.g., grinning cat, cat with tears of joy,and pouting cat, etc.).

In some embodiments, to permit conversion between emoji IDs and integervalues, emoji list 332 includes a plurality of emojis associated with aplurality of corresponding values. In some embodiments, emoji list 332can be stored as an array, in which each emoji in the array has acorresponding index based on its position in the array. Therefore, eachvalue associated with an emoji may be an index assigned to the emoji. Inother embodiments, emoji list 332 may include a table that stores aplurality of emojis and that stores a plurality of values correspondingto the plurality of emojis. In these embodiments, emojis in emoji list332 that are pictorially similar may be associated with the same value.In some embodiments, a set of emojis that is pictorially similar caninclude a plurality of emojis that depict types of the same object. Forexample, emoji list 332 may include multiple flag emojis that are eachassigned an associated value of, for example, 9.

In some embodiments, application 331 can include an emoji mapping listthat maps a larger number of emojis to the emojis in emoji list 332. Forexample, the emoji mapping list may include all available emojis in theUnicode Standard (i.e., 3,341 emojis as of January 2022). In someembodiments, by selecting mapping emojis to emojis in emoji list 332,two or more emojis that are pictorially similar may be mapped to thesame emoji. For example, two or more emojis that show a clock depictingdifferent types may be mapped to the same emoji of a clock. The use ofan emoji mapping list may normalize the possible emojis to a list ofemojis that are selected to be visually distinct to reduce error duringuser entry as well as to enhance the ease of visually verifying enteredemoji sequence IDs.

In some embodiments, emoji encoder 334 can be configured to generate anemoji sequence ID that uniquely identifies a wallet address, whichincludes a predetermined number of bits (e.g., a 128-bit address or a256-bit address). In other words, emoji encoder 334 can encode thewallet address into a sequence of emojis such that every wallet addressis uniquely represented by exactly one sequence of emojis. Further, avalid emoji sequence ID represents exactly one wallet address. Theencoding and decoding functions performed by emoji encoder 334 and emojidecoder 336, respectively, are symmetric functions. This means thatencoding a wallet address, a, to its emoji sequence ID, s, and thenapplying the decoding function to emoji sequence ID, s, will alwaysresult in the originally encoded wallet address, a.

In some embodiments, to generate the emoji sequence ID, emoji encoder334 can map a predetermined number of bits of the wallet address to apredetermined number of emojis selected from emoji list 332. In someembodiments, the predetermined number of bits of the wallet address canbe divided into a plurality of non-overlapping groups of sequentialbits. For example, the wallet address may be divided into 4-byte chunks.Then, emoji encoder 334 can convert each group of sequential bits intoan emoji ID including a predetermined number of emojis based on emojilist 332. Finally, emoji encoder 334 can generate the emoji sequence IDidentifying the wallet address by concatenating each emoji ID for eachgroup of sequential bits into an emoji sequence.

In some embodiments, emoji encoder 334 can implement a mapping algorithmto convert the wallet address into the emoji sequence ID. For example,the mapping algorithm may include a BIP39 algorithm, an Electrum schemealgorithm, or a simple mapping from emoji index to a 10-bit value foremoji list 332 having at least 1024 emojis. In some embodiments, emojiencoder 334 can implement a mapping algorithm that uses indices ofemojis in emoji list 332 to convert a numeric value to a predeterminednumber of emojis.

In some embodiments, to generate the emoji sequence ID, emoji encoder334 may calculate a checksum value for the emoji sequence. For example,emoji encoder 334 may apply a checksum algorithm such as the Dammalgorithm to calculate the checksum value. Then, emoji encoder 334 mayconvert the checksum value into an emoji representation including apredetermined number of emojis. Finally, emoji encoder 334 may outputthe emoji sequence ID identifying the wallet address by appending theemoji representation for the checksum to the emoji sequence previouslycalculated.

In some embodiments, emoji decoder 336 can be configured to generate awallet address, which includes a predetermined number of bits (e.g., a128-bit address or a 256-bit address), that is uniquely identified by anemoji sequence ID. In other words, emoji decoder 336 can decode theemoji sequence ID identifying the wallet address into a sequence oftextual representations that uniquely corresponds to the wallet address.In some embodiments, the textual representation can correspond to analphanumeric format for the wallet address that is required byblockchain network 302 to process cryptocurrency transactions. Forexample, the sequence of textual representations may be a hexadecimalstring, a Base64 string, or a Base58 string.

In some embodiments, to generate the sequence of textual representationsthat identifies the wallet address, emoji decoder 336 can map thesequence of emojis in the emoji sequence ID to a numerical valueidentifying the wallet address based on emoji list 332. In someembodiments, emoji decoder 336 can determine the numerical value usingemoji list 332 to identify a plurality of values corresponding to theplurality of emojis in the emoji sequence ID. For example, for an emojiin the emoji sequence ID, emoji decoder 336 may use an index of theemoji identified in emoji list 332 as a value associated with the emojito be used in generating the numerical value. In some embodiments, emojidecoder 336 can convert a generated numerical value into the sequence oftextual representations that uniquely identifies the wallet address.

In some embodiments, emoji decoder 336 can apply a checksum algorithm onthe emoji sequence ID to determine whether the emoji sequence ID isvalid. For example, emoji decoder 336 may apply the checksum algorithmto check whether the last emoji in the emoji sequence ID matches aresult of the checksum algorithm applied to the emoji sequence IDexcluding the last emoji. As described above with respect to emojiencoder 334, the last emoji may be generated to represent a checksumvalue of the emoji sequence ID. In some embodiments, if the checksumfails, emoji decoder 336 can halt processing because emoji sequence IDis invalid. In some embodiments, emoji decoder 336 can generate anotification indicating that the sequence ID is invalid.

In some embodiments, one or more emoji checksum can be extracted fromthe emoji sequence ID to generate a resultant emoji sequence. In someembodiments, the resultant emoji sequence can be divided into aplurality of non-overlapping groups of sequential emojis. For example,for an emoji list 332 having 1626 emojis, the result emoji sequence maybe divided into groups of 3 emojis, with each group representing a4-byte value. Then, emoji decoder 336 can convert each group ofsequential emojis into a textual representation including apredetermined number of bits based on emoji list 332. Finally, emojidecoder 336 can generate the sequence of textual representationsidentifying the wallet address by concatenating each textualrepresentation for each group of sequential emojis.

In some embodiments, functionality of application 331 may be performedelsewhere in system 300 such as on one or more of nodes 304A-E inblockchain network 302. In these embodiments, blockchain network 302 canbe configured to be capable of processing transactions in which walletaddresses are identified using emoji sequence IDs. In some embodiment,an emoji sequence ID is a sequence of a plurality of emojis.

In some embodiments, functionality of application 331 may be performedelsewhere in system 300 such as on server 310. For example, server 310includes emoji list 312, emoji encoder 314, and emoji decoder 316, whichprovides similar functionality as emoji list 332, emoji encoder 334, andemoji decoder 336, respectively. In some embodiments, server 310 may bea web server that enables users to operate a client 322 on user device320 to access the functions of server 310. For example, client 322 maybe a browser that enables the user to connect to a web portal orinterface provided by server 310. Therefore, a user using user device320 may initiate transactions to be verified by and added to blockchainnetwork 302 via server 310.

Unique Digital Object Generation

FIG. 4 is a flowchart illustrating platform generation of a uniqueprocedurally generated object via user specific parameters. In step 402,the digital object generator establishes a set of input types andparameters handled. Examples of the types of input include handled byvarious embodiments include any combination of cryptographic protocols,image data, or multimedia data.

Input handling refers to the types of input a given platform understandsor recognizes. When designing input handling, the platform firstrecognizes what sort of input is given to it, and then when to do withthe parameters of the input.

With reference to recognition of cryptographic protocols, a given inputmay be a cryptographic wallet, and the tokens associated therewith. Insome cases, a given cryptographic wallet is associated with tokens frommultiple cryptographic object types that each have their own smartcontract, or blockchain upon which those objects are tracked. A commonblockchain used for NFTs at the time of this application is the Ethereumblockchain. However, it is contemplated, that NFTs may operate ondifferent blockchains in the future. A given token within a wallettypically has a call or an identifying feature that indicates which dAppthe token is associated with.

With reference to image data, a given input may be a .jpeg or some otherdigital image format. In such examples, the file extension identifieswhat the input is, and the parameters thereof are identified viacomputer vision techniques. Similar input identification is applied tomultimedia input.

Other data types may include user accounts, or game save files. Gamesave files often include data regarding characters the user has played,a total play time, items held by the user's character, choices thecharacter has made, or other game related aspects. An example of a useraccount is a social media account, where data included relates to numberof posts made, posts that had the highest amount of interaction (in anycombination of negative/positive), number of followers, and other socialmedia related aspects. Some embodiments of the present invention makeuse of these data types and parameters.

In step 404, the digital object generator establishes a model thatprocedurally converts the received user parameters and input into adigital object via a one-way function. The model used varies based onthe style of input used. The process is ultimately transformative on theinput and while, in some embodiments, the output may be indicative orreminiscent of the original input, computationally deriving the exactinputs from the output is not seen as a viable problem using moderncomputing techniques.

The simplest embodiment is a hash function the converts data embodied ina given format (e.g., binary, alphanumeric, ASCII, array of values,etc.) into a hash value. More complex embodiments make use of multiplemodels or schemes to convert multiple data types into a common datatype/data structures and subsequently apply a model that generates anamalgamated output. For example, with respect to ERC-721 tokens, a modelidentifies exclusivity features of that ERC-721 token. The exclusivityfeatures are identified via examination of the relevant smart contractusing an associated dApp plugin/API with the ERC-721 token. Theexclusivity features for that given token may differ based on therelevant smart contract the token is associated with, though someexclusivity features are relatively universal.

Examples of identifying exclusivity features include ID number (numericcount) or identifying the generation of the token as compared to thetotal number of generations of token. Generations in this context referto how close the token is to originally minted tokens of the same smartcontract. Generations are cycles or series of minting of tokens in agiven smart contract. Typically, earlier generation tokens areconsidered more exclusive. Further traceable features include a numberof times a given token has changed hands, a value of each exchange ofthat token in cryptocurrency or fiat, and rarity of visual featuresincluded with the token.

Rarity of visual features on a token varies on a smart contract by smartcontract basis. In some cases, there is an algorithmic rarity offeatures dictated in the smart contract. In such cases, the rarity ofvisual features is a static lookup. In some cases, the rarity of a givenvisual feature or combination of visual features is determined via asurvey of existing NFTs associated with a given contract. With respectto a cryptokitty, a rare color is “cloud white” coloring. In each case,a model evaluates these features and weights each and generating arespective weight across a given set of input for the user.

A type of model that has advantages over reviewing potentiallydissimilar data types is a few-shot model. Initially the few-shot modelis trained using various data that users associate with themselves.Examples include are social networking profiles, art, videos, audiorecordings, virtual environments, ERC-721 tokens and associatedprotocols and dApps, and publicly posted Internet discourse. Trainingdata typically refers to an enormous number of examples, such ashundreds of thousands or millions of examples. After being trained, theuser specific parameters act as a few-shot. Each of the user input itemsneed not be of a similar type, and the model will attempt to fit thereceived input into categories the model has been trained with. Each ofthe input parameters potentially has very little in common with respectto data types.

The few-shot model is designed to identify and extract particular mediafeatures in the few-shot (the user's specific parameters). A follow upmodel then identifies which features to use and what to do with thosefeatures. For example, a graphic feature of one element of user specificinput may include a hat, while yet another graphic feature of adifferent element of user specific input may include a head. The modelis trained that hats go on heads and that the graphic feature of a hatfrom one element may be transposed onto the graphic feature of the otherelement including a head.

Based on configurations of the model the resulting digital object mayvary. One example of a resulting digital object is an ERC-721 token thatincludes a visual component. In some embodiments, the visual componenttakes exclusivity elements from the user's input and integrates thosecomponents into a single visual representation. A given example is asingle image of a mashup of initial input. Another example is a 3Dvirtual environment that includes a set of trophies resembling theinitial input. A third example is a written poem that rhymes variouselements of the initial input. The digital object need not be an NFT.Rather, a digital object refers to a set of data that describes adiscrete output in a digital format.

In step 406, a given user submits their user specific parameters to thedigital object generator. In step 408, the model executes utilizing theuser specific parameters and generals a user specific, unique, digitalobject. In some embodiments, the generation of the object is embodied bythe minting of an ERC-721 token. In step 410, where there are additionalusers, the process repeats from step 406.

FIG. 5 is an illustration of a new digital object generated from a setof user input.

The illustration includes three visual representations of existing NFTs,Specifically, a cryptokitty input 502, a Bored Ape input 504, and a Yatinput 506 as provided as examples of initial user input. Each of theNFT's is further connection to a cryptographic record on a dApp, and thevisual representation is interpreted by the respective dApp. A newdigital object 508 is depicted that incorporates elements of the visualrepresentation of each. In this illustrative example of the new digitalobject 508, the cryptokitty graphic of the cryptokitty input 502 appearswith a hat and cigar graphic from the bored ape input 504, and the emojiof the Yat input 506 positioned on the belly of the cryptokitty graphic.

FSL embodiments applied to this particular set of input identifies eachgraphic feature of the user input. The cryptokitty input 502 is acartoon cat, the cat has a head, a mouth, and a clearly delineatedstomach area (among other body parts). The bored ape input 504 is acartoon of an ape wearing a hat and smoking a cigar. The Yat input 506is an emoji graphic.

Given the extracted features a model trained to select and combine thefeatures that fit with one another matches a hat to a head a mouth to acigar and an emoji graphic to an open space to position a graphic (e.g.,well-defined stomach area).

The resulting digital object is the result of a one-way function. In thedepicted example, one cannot, for instance, identify all of the detailsof the bored ape input 504, but may be able to identify that theoriginal input included a bored ape based on the art style.

FIG. 6 is a flowchart illustrating model operation step of a uniqueprocedurally generated object via user specific parameters. In step 602,a set of user specific parameters are received by a feature extractionmodel. An embodiment of the feature extraction model is a few-shotmodel. The term “feature” refers to graphic features, audio features,cryptographic protocol features, video features, spatial virtualfeatures, textual features, and/or social media features.

In step 604, extracted features are indicated to a feature evaluationmodel. The feature evaluation model identifies which of the extractedfeatures to use in generation of the digital object. The model choosesfeatures based on distinctiveness (e.g., how different they are fromother available features), interoperability (e.g., how functionally agiven feature can mix with another feature), and/or exclusivity (e.g.,the rarity of a given feature).

In step 606, the chosen features are amalgamated by an artistic model.In some embodiments the artistic model and the feature evaluation modelgenerate a result together. The artistic model is trained regarding whatfeatures go together. In some cases, “going together” is defined in themodel semantically. That is to say, for example, that hats go on heads.That is a semantic connection between objects. However, some embodimentsof the artistic model define “going together” as graphic matches betweencontours, colors, shadings, or other visual elements. For example, onecurved element is a near match to another curved element, so one ofthose elements may overlay on another using curve matching. Similar tographic matching, auditory matching may combine audio clips at a pointwhere a similar note series occurs.

In step 608, once the elements are extracted, evaluated and combined,the digital object generator prints/mints the new digital object.

Time/Location-Based Modification of Digital Objects

User parameters have thus far been defined as something that solely agiven user provides. However, in some embodiments, parameters used bythe digital object generator are circumstantial to the minting request.Examples include a current generation/minting series of digital objectsbeing generated, the serial numbers of the digital objects being minted,the timestamp the digital object is being minted at, or current eventsaround the time of minting (e.g., The Superbowl, a concert, aconvention, etc.). Location is identified as a device location of a userdevice requesting generation/minting of the digital object as associatedwith addresses, buildings, or events. Device location is determined viaGPS data and/or wireless network triangulation. The location data isassociated with the physical area by overlaying the location data on amapping program that includes metadata of buildings and/or events at thephysical area of the location data.

In some embodiments, the time/location-based modification is used as asalt or a randomization element to a given input set. In someembodiments, the time/location-based modification element isidentifiable from the resulting digital object is (e.g., while thefunction is one-way, at least the time-based input feature is fullyidentifiable). Time/location-based input features enable an additionalmeans of variation, distinction, and social features.

FIG. 7 is a flowchart illustrating implementation of time-based input todigital object generation. In step 702, the digital object generatorreceives a request to mint a new digital object. In step 704, userspecific parameters are received by the digital object generator. Instep 706, one or more of a time element and/or a location element iscaptured based on any of the present time, the minting status of digitalobjects, and/or where the request of step 702 was made from.

In step 708, the models responsible for digital object generationevaluate the user specific parameters and the time/location elementgiving high weight to the time/location element. In step 710, thedigital object generator mints a digital object including thetime/location element.

Blockchain Tracing of Digital Objects

Like Emoji sequences as described above, embodiments of the digitalobjects are encodable to a distributed consensus network such as ablockchain. An example blockchain is the Ethereum blockchain, viaERC-721 tokens. Whereas emoji sequences have a finite number ofpotential characters, the digital objects described herein do not. Atheoretical encoding scheme is unable to scale indefinitely to match thenumber of characters/elements/formats that embody a given digitalobject.

A means to limit the number of variables to represent in a given digitalobject is to limit the number of digital objects in any given series orgeneration (e.g., 1000 digital objects). Where a series or generation isencoded to a portion of a cryptographic token, encoding may be refreshedand reused in subsequent series. For example, a first data unit (e.g., abyte) is used to identify the generation of the digital object whereassubsequent data units are used to encode the visual features of thedigital object. The same encoding is subsequently used in a differentgeneration to refer to a different visual feature.

Generational divisions are also effectuated through event-based mintingof digital objects. FIG. 8 is a diagram illustrating a connectionbetween digital objects and a distributed consensus network supported bya blockchain data structure. A digital object creation platform 800interfaces with a blockchain 802 via a dApp/smart contract 804A/B. Thesmart contract 804B is executed by miners 806.

When a user 808 requests minting of a new digital object via the dApp804A, the dApp makes calls to other dApps connected with the user device810 in order to identify other NFTs that the user has possession of viathe other dApps. Embodiments of triggers to call other dApps includeidentifying other dApp software on the device 810 making the request tomint the new digital object, checking a list of popular dApps, and/orenabling the user to identify/flag (e.g., via GUI) which dApps they wishto flag for inspection for purposes of generating the new digitalobject.

In some embodiments, the dApp 804A ensures possession of the other NFTsused as input in the same user wallet 812 as the user wallet 812associated with the initial request to generate the digital object. Inthis way, users are forced to actually own the NFTs that they aresupplying as input for the generation of the digital object.

The check identifies the public key that is associated with both therequestor 808, and all of the user specific parameter/input. By natureof public keys being public information, no secret information need beshared with the dApp 804A.

Once minted, the dApp 804A delivers the new digital object as acryptographic token/NFT to the cryptographic wallet 812 associated withthe requesting user 808 via the smart contract 804A.

FIG. 9 is a flowchart illustrating event driven generation of digitalobjects. Event driven digital objects aid in limiting the number ofdigital objects in a series or generation such that only digital objectsthat were generated during or at a given event exist, thereby limitingthe total number. Limiting the total number serves both exclusivity ofthe digital objects and simplicity of coding the objects. Fewer digitalobjects mean fewer total variations across the entire set of digitalobjects and thus less data is required to represent the visual assetsassociated therewith.

In step 902, a set of users attend an event. Verification of attendanceoccurs in one or more of user device location data, ticket data, guestlist data, user activity on a predetermined web host, and/or ownershipof an NFT connected to event admittance (e.g., convention, gala,sporting event, etc . . . ). In step 904, during the event an attendinguser requests to mint a new digital object. In step 906, the digitalobject generation platform generates a digital object based on theevent. In step 908, the non-cryptographic, user decipherablerepresentation of the digital object is encoded to the smart contractusing assets that are linked to the event.

Digital Object Social Networking Communities

Embodiments of social networks connect users based on possession ofdigital objects. A social network is a computing construct that connectsusers in a graph data structure including social features.

FIG. 10 illustrates a number of emoji sequences that are connected viasocial networking features based on the features included in each emojisequence. Emoji sequences such as those under marketed as Yats includeorder specific sequences of emojis that are selected by their respectiveusers. Users select particular sequences of emoji for any number ofreasons, though some do so out of an affinity to a given emoji or seriesof emojis. Some users further use the sequence of emojis to tell anarrative.

Emoji sequences 1002A-D are arranged to align commonality between eachsequence vertically. A sample social network for a user havingpossession of the emoji sequence 1002C is portrayed. Specially, the userin possession of sequence 1002C is connected 1004 to users in possessionof 1002A and 1002B by virtue of sharing a sunglasses smiley emoji ineach respective emoji sequence. In some embodiments (not pictured),social connections are limited to those emoji sequences that positionmatching emojis in matching sequence locations.

Emoji sequence 1002C and 1002D are further socially connected 1006 basedon similar inclusion of the telescope emoji. In some embodiments adegrees of connection analysis (e.g., “6 degrees”) is performed tofurther connect users associated with emoji sequences. For example, theuser associated with emoji sequence 1002A is connected via one degreeaway from emoji sequence 1002D, via the social connection to 1002C. Insome embodiments social features between connected users enable sharednewsfeeds, message delivery, and/or interactive games.

While the example depicted in the figure pertains to social connectionsvia emoji sequences, similar social connections are established betweendigital object owners. For example, digital object owners that haverespective digital objects that similarly made use of a give type ofERC-721 token are linked in the same way users with matching emoji useare linked (e.g., users that have a Yat, or users that have acryptokitty, etc.).

Social media users frequently craft an image or identity around theirprofiles. However, existing social media profiles are static based on agiven set of settings or preferences. That is, changes to a social mediaprofile are preconfigured or require active participation by the user tomake changes to their profile. Embodiments of the unique digital objectdisclosed herein are implemented as “profile pictures” or otherwisecustomizable social media expressiveness. IN some embodiments, a novelprofile picture cycles through a set of user submitted input. An exampleof such a profile picture cycles through visual representations ofcryptographic tokens linked to a cryptographic wallet they control.

Some embodiments of the profile picture unique digital objects make useof 3D shapes such as polygons or spheres.

FIG. 11 is an illustration of a 3D graphic object 1100. An embodiment ofa 3D graphic object 1100 is a 3D polygon including six faces (e.g., acube) that displays user supplied input/content. An implementation of asocial media profile making use of the 3D graphic object 1100 presentsthe 3D polygon on the social media profile in place of a profile pictureor other element of the social media profile. The cube revolves (e.g.,following a random or preconfigured path through faces) and/or may bedragged into a given position by a user. The preprogrammed path followsa user selected order, or a preconfigured setting (e.g., display facesas chronologically added, display faces with fewer impressions first,etc . . . ).

In some embodiments, user interaction with the 3D graphic object 1100 inpredetermined ways is logged in the social networking platform. Forexample, spinning, clicking, dragging, or swatting the 3D graphic object1100 is recorded as social interactions including options such as:“like”, “dislike,” “follow,” “friend request,” “post,” etc. . . .

The 3D polygon enables some liquidity to a user's self-selectedpersona/profile picture. Multiple images or avatars 1104 existsimultaneously for that user as each is represented on a face 1102 ofthe 3D polygon. The number of images/avatars 1104 are not limited by thenumber of faces on the polygon -- rather, in some embodiments, facesrotate. For example, where the 3D graphic object 1100 is presented in a2D plane, a face 1102 that is currently out of view or opposite a frontface is modified to present a different image/avatar 1104. The digitalobject described herein may be implemented as an identity digitalobject.

The Figure depicts use of a polygon (cube) with sides or faces 1102;however, spherical embodiments make use of surface regions instead ofstrict faces 1102. Surface regions occupy some predetermined portion ofthe surface of the sphere and acts similarly as a face. In someembodiments, the sphere is depicted as a globe, and the regions aredepicted as “landmasses/continents” found thereon.

In some embodiments, the images/avatars 1104 implemented by the 3Dgraphic object 1100 are representations of cryptographic tokens (visualor otherwise). In these embodiments, there is further data or metadata1106 that is associated with the cryptographic token. Examples of themetadata 1106 associated with a cryptographic token includes a smartcontract or dApp that the token is connected to, the period of time thegiven user has held the token with their cryptographic wallet, thenumber of times the token has changed wallets, a list of prior users whoheld the token, a generation of the token, a serial number of the token,and/or a name of the token. The metadata 1106 is displayed by the 3Dgraphic object 1100. Some embodiments display the metadata on aforward-facing face 1102 of the 3D graphic object 1100.

Some social networking platforms make use of the metadata 1106 (even ifnot actively displayed) for tracking, analytics, impression data,advertisement placement, and matching purposes.

The 3D graphic object 1100 inserts directly into social media profileswhere profile pictures or avatars traditionally are placed. In someembodiments, the 3D graphic object is given a more prominent position onthe user interface of the social network, specifically taking up agreater portion of the page/window. Still other embodiments make use ofthe 3D graphic object in an extended reality (XR) setting. For example,is a digital or digitally augmented environment, the 3D graphic object1100 follows the user or an avatar of the user around (e.g., as a pet orcompanion).

FIG. 12 is an illustration of a first set of additional features of a 3Dgraphic object 1200. Where the polygon depicted in FIG. 11 is a cube,FIG. 12 depicts a dodecahedron. Various embodiments employ differentnumbers of faces 1202, fewer and greater. Various embodiments expand andcontract faces 1202 based on user and/or platform settings.

In some embodiments, the 3D graphic object 1200 includes additionalfocus or highlighting 1204 on certain elements 1206 based on user and/orplatform settings. For example, where a given element 1206 is newlyincluded in the 3D graphic object 1200, a highlight glow 1204 is addedto the appearance of the given element 1206 to alert users to thepresence of the new element 1206. In another example, the highlight glow1204 is applied to an element 1206 as chosen by the user.

In some embodiments, elements 1206 displayed by the 3D graphic object1200 are verified 1208. Where a given element 1206 is a representationof a cryptographic token verification may be performed on the token toauthenticate the token as being representative of an intended token.Token representations are digital data that can be copied andreproduced. Those representations may be subsequently linked to tokensthat are not connected to a platform from which the representationoriginated. Therefore, a verification performed to ensure that therepresentation that appears on the 3D graphic object 1200 is linked to acryptographic token that is connected to a smart contract or dAppconsistent with the representation. For example, a cryptokitty graphicmay be re-minted onto a cryptographic token that is unconnected to thecryptokitties dApp. Verification markings certify that the cryptokittyrepresentation on the 3D graphic object 1200 is connected to acryptographic token on the cryptokitties dApp/smart contract.

Verification is performed by human verification (e.g., a comparison ofthe token representation to the underlying token that the representationis drawn from), heuristic analysis (e.g., comparing known art styles ofthe representation to expected dApp's drawn from a popular list), or viaa machine learning model that was trained on identification of tokenrepresentations.

FIG. 13 is an illustration of a second set of additional features of a3D graphic object 1300. Not all elements 1302 included on a 3D graphicobject 1300 need be images. Other examples include audio data, videodata, or multimedia data. As depicted in the figure, a play buttonappears that users may interact with. Activating the play buttontriggers the underlying multimedia element 1302 to play.

FIG. 14 is an illustration of a third set of additional features of a 3Dgraphic object 1400. Not all elements 1402 included on a 3D graphicobject 1400 need be represented in 2D. Examples include 3D renderingsthat extend out or inward from the 3D graphic object 1400. As depictedin the figure, an animated character appears bursting from the 3Dgraphic object 1400.

FIG. 15 is an illustration of a fourth set of additional features of a3D graphic object 1500. Not all elements 1502 associated with a 3Dgraphic object 1400 need be locked to the surface or face 1504 of the 3Dgraphic object 1500. Embodiments include orbiting elements 1502. Theorbiting elements 1502 track around the 3D graphic object 1500. Asdepicted in the figure, an animated character 1502A appears to bewalking a dog around the surface of the 3D graphic object 1500.Additionally, a spaceship element 1502B orbits the 3D graphic object1500 at a distance. The orbiting elements 1502 as positioned in slotssimilarly to other elements included, the slots are merely associatedwith a different region relative to the 3D graphic object 1500 thanthose positioned on the faces 1504.

FIGS. 11 through 15 depict various features of various embodiments of 3Dgraphic objects. The figures are intended as illustrative examples andnot to be construed as limiting combinations of features. The featuresare interchangeable, and embodiments include each combination thereof.Input used for the 3D graphic object may include any of the describeduser specified parameters described herein and/or pre-generatedelements.

FIG. 16 is a flowchart illustrating a user interface applied to a 3Dgraphic object.

In step 1602, a set of user specific parameters are received by anobject generator. The user specific parameters are employed as elementsin the 3D graphic object. User specific parameters refers to graphicrepresentations, audio representations, cryptographic protocolrepresentations, video representations, spatial virtual representations,textual representations, and/or social media representations.

In step 1604, the platform receives input regarding positioning andimplementation of the user submitted parameters. The user is enabled todesign the appearance of the 3D graphic object based on the usersubmitted parameters used as elements and the configuration of thoseelements.

In step 1606, the chosen features are amalgamated according to theconfiguration and the 3D graphic object is inserted into a social mediaprofile of the user. In some embodiments the 3D graphic model is mintedas an NFT. The minted version of the 3D graphic object may beimplemented in any other portion of the disclosure herein where an NFTis referenced.

The above-described process directly refers to generation of the 3Dgraphic object, though other processes described herein may alsogenerate 3D graphic objects as well. Generation thereof is not limitedto the process depicted in FIG. 16 .

FIGS. 17 and 18 are screenshots of implementations of 3D graphic objectswhere a given set of media data is applied to faces of the 3D graphicobject. One of ordinary skill in the art is able to ascertain embodimentand implementation details therefrom.

Additional social media features include indexed searches based onlinked digital objects. Given a social media profile connected to afirst user, indexed by an application server and searchable using asearch function of an association social media platform, the user maylink digital objects that enable search to identify the profile. Searchfor the social media profile is based on a query match to one or morepredetermined fields of the social media profile, the one or morepredetermined fields including a digital object field. Other fieldsinclude known details such as account name (real or otherwise),birthday, location, schools attended, employer, etc.

The digital object field refers to a digital object or token within theuser's possession or previously in the user's possession. Where thedigital object is a web3 object such as an NFT that is tracked on ablockchain data structure, on-chain history indicates both currentownership as well as previous ownership. When a given object is linkedto a social media profile, that profile is searchable based on anyrecorded state of the digital object. For example, a search query mayinclude a time threshold (e.g., possession within the last year, orpossession within one week of object generation, etc . . . )

The digital object as a cryptographic object stored on a distributedpublic ledger includes a human decipherable representation. The humandecipherable representation includes any combination of an imagedescription, a generation number, a serial number, or an associateddApp. Where the cryptographic object is an amalgamation of multiplecryptographic objects the human decipherable representation issubdivided by each of the multiple cryptographic objects. In theembodiments where multiple cryptographic objects are used, the searchquery may be constructed to target one of the multiple cryptographicobjects or multiple cryptographic objects at the same time for greaterspecificity.

Cryptographic objects further include elements that are not generallyhuman decipherable, such as the cryptographic identifier of the object.Other elements, such as chain of ownership and time of ownership do nothave human decipherable records; however, through use of graphicinterfaces and chain viewer applications, time of possession elementsare presentable in a human decipherable manner.

In response to a search query including the human decipherablerepresentation or a subset of the human decipherable representation ofthe cryptographic object, the application server return the soughtsocial media profile or a set of social media profiles that match thesearch query (included the target profile).

Examples of a search queries include “all users with cryptokitties”,“all users who had a cryptokitty within 1 week of generation”, “allusers who have a second generation cryptokitty” or “the user whopresently holds the cryptokitty having serial number 12,345 ingeneration 0.”

In some embodiments, the social platform is directly linked to theuser's cryptographic wallet and can therefore verify the authenticity oflinkages between users and cryptographic objects. In some embodiments,the linkage to the wallet is via direct sharing of cryptographic keysthat provides full access to the wallet. In some embodiments the linkageis proven via a zero-knowledge proof on performance of a zero-knowledgeproof based on a digital wallet linked to the cryptographic object.

The zero-knowledge proof enables the owner of the cryptographic walletdemonstrate ownership of the wallet without revealing walletcredentials. The contents of the wallet are typically publiclyobservable, thus once the connection is established with the wallet,further evidence is not required to show ownership to the social networkplatform. Once a wallet is connected to the social network platform, theapplication server for the social network establishes listeners tomonitor the wallet for changes to reflect on the social media profile ofthe user.

A Yat (an emoji sequence) is an example of a cryptographic object that auser may use to identify or index their profile. The emojis in the emojisequence are individual characters that may be used to perform searches(either in specific order or not) for the social media profile.

By connecting a cryptographic wallet to a social media profile newinteraction features are available. Cryptographic objects arecollectables. Physical collectables, like trading cards are generallystored in binders. Collectors share with one another by laying out theirbinders to display their collection to one another. Children who havetrading cards associated with games frequently do not play theassociated game by the published rules to instead share their cardbinder with one another.

There is no previously invented platform that enables owners ofcryptographic objects to display their objects and carry on aconversation about those cryptographic objects. Thus, a graphicinterface that presents the contents of a cryptographic wallet in abinder-like presentation is advantageous. In some embodiments, thebinder-like presentation includes digital pages with flippinganimations. The pages include renderings of the visual representationsof the cryptographic objects. In other embodiments, the binder-likepresentation is a simpler presentation of the visual representations ofthe cryptographic objects in a scrollable page, window, or web object.

In some embodiments a social media profile defined by a Yat (emojisequence) has a linked cryptographic wallet which includes a record ofon-chain behavior (e.g., dated ownership or participation incryptographic object drops/projects). Based on that on-chain behavior,users may opt-in to groups they have qualified to enter. Social groupsmay be public or private. Public groups are configured to influence abroader social feed. For example, when members of a group trend towardcollecting a new set of cryptographic objects, a public newsfeedgenerates a notification.

FIG. 19 is a flow chart illustrating graphic object social feeds. Instep 1902, a user links a cryptographic wallet to a social media userprofile. The linking is based either on reveal of login credentials tothe social platform, or via zero-knowledge proof.

In step 1904, the social media platform observes the contents of thecryptographic wallet and identifies the on-chain behavior of the userconnected to the wallet. On chain behavior refers to current ownership,past ownership, ownership of a certain threshold ofobjects/tokens/coins, or a combination of thereof. Past ownership isdefinable based on absolute/binary statistics or time thresholds (e.g.,held for a certain length of time, held within a certain threshold of agiven timestamp or period, etc.)

Observing on-chain behavior is not human decipherable. On-chain behavioris connected to cryptographic records on the public blockchain datastructure. Reference to a given cryptographic object is connected tomachine inspection of many blocks in the data structure, many of whichdo not include reference to the sought or tracked cryptographic object.The process of observing requires scraping the blockchain for particularcryptographic objects.

For computational efficiency, the scraping or crawling of the blockchainonly stores data related to wallets that are linked to the platform. Inthis way, the size of the database remains smaller than the entireblockchain itself, and calling the data is more efficient. New data iscaptured and added to the database based on listeners established forthe relevant cryptographic objects and wallets. When a new wallet isadded to the platform for tracking, the platform performs a morethorough machine inspection of the blockchain in order to capture therelevant wallet data into the database.

In step 1906, a user joins a social network group based on meetingcertain on-chain behavior criteria. In some embodiments, users areinvited directly to groups. Groups are public or private. Private groupsinclude social features internally within the group, while public groupsinclude both social features internally and externally to the group.

In step 1908, the platform provides an in-group newsfeed. The in-groupnews feed includes notifications reporting the current on-chain behaviorof group members. Current on-chain behavior refers to the addition ofnew cryptographic objects to the respective linked cryptographic wallet,or participation in new cryptographic object projects (e.g., prior tothe acquisition of a new cryptographic object).

In step 1910, the platform provides an object display interface thatenables group members to display in binder-like graphicalrepresentations of the cryptographic objects linked to their wallets. Insome embodiments, the binder-like presentation includes digital pageswith flipping animations. The pages include renderings of the visualrepresentations of the cryptographic objects. In other embodiments, thebinder-like presentation is a simpler presentation of the visualrepresentations of the cryptographic objects in a scrollable page,window, or web object. The object display interface further includeschat features, such as text messages, media messages, and voicechannels.

In step 1912, the platform provides a public newsfeed. The publicnewsfeed is based on an analysis of public group behavior and trends.For example, a given group associated with current and past ownership ofcryptokitties is observed to include a threshold percentage of usersparticipating in a new cryptographic object drop. A notification ispresented to the social network at large regarding the trend inparticipation. Other notifications pertain to tropics of newsworthiness.

Time-Based Leaderboard

The behavior of owners of NFTs is to frequently trade their digitalobjects and cause significant turnover of those objects. The constantturnover of digital objects is not an ideal ecosystem for administratorsor artists related to those NFTs. The time-based leaderboard thusencourages users and holders of NFTs to hold their NFTs longer.

The leaderboard indicates how long a given user has held a given NFT forexample from a particular collection/generation of NFTs. A collectionmay be defined as a particular drop, from one smart contract/dApp, or asthe entirety of the NFTs within a given smart contract. In someembodiments, the time-based leaderboard is based off NFTs from acontemporaneous collection so as to compare fairly. In suchcircumstances, all users who have continuously held their NFTs from thatcollection will be tied for first.

Thus, sorting ties is an important detail for purposes of theleaderboard. In some embodiments, ties are sorted by a number of digitalobjects from the collection held or based on staking of digital objects.When a NFT is “staked,” that NFT is transferred to a holdingwallet/contract for a predetermined length of time. Staking an NFT locksthat NFT from transfer by the owner. While staking of a NFT technicallytransfers the NFT away from the owner's wallet, for purposes of theleaderboard, the NFT is considered contiguously owned by the originaluser.

The leaderboard enables social benefits and loyalty rewards such asgetting early or exclusive access to future distributions of NFTs andanything the creator wants to incentivize loyalty (a velocity sink) andaward reputational benefits.

Identity on the leaderboard is displayed in a number of ways. Additionalinformation provided to the leaderboard enables additional manners ofrepresenting an identity on the leaderboard. At a base level, acryptographic address associated with a wallet that holds an NFT servesas a functional identity for users on the leaderboard. However, whenavailable (e.g., tied to a given cryptographic address), the leaderboardis enabled to use a 3D graphic object (described above) as a rotating orcycling representation of a user's identity. Other examples of identityinclude social network handles, Yats, usernames, and/or real names.

FIG. 20 is a screenshot of a time-based leaderboard interface 2000. Theleaderboard 2000 pertains to a particular collection 2002 of digitalobjects/ NFTs. As depicted in the Figure, the collection 2002 is “TheWicked Craniums,” a set of procedurally generated art of skeletoncharacters based on artist created visual assets. The leaderboard 2000further includes a counter 2004 for the number of users who have an NFTfrom the collection 2002. The leaderboard 2000 is embodied by a chart ofranks 2006 which orders the users based on the contiguous length of timethey have possessed an NFT from the collection 2002.

The chart of ranks 2006 displays the numerical ranks 2008 of each userand an identity 2010 for each user. In the chart of ranks 2006, theuser's identity 2010 is displayed using a 2D representation 2010A of anidentity digital object (described above). The media displayed by theuser identity 2010A is either of a cycling/rotating media data or apredetermined “front face” of the identity digital object.

To the right side of the screen, an active user's profile 2012 isdepicted. An identity digital object is further depicted in 3D 2010B,with faces each having media content as described above. The leaderboardfurther includes an average length of possession of NFTs 2014. Furtherlinked to the users are Yats 2016. In this depiction, a Yat 2016 isanother NFT type that is linked to the identity digital object, on aone-to-one basis. However, in some embodiments, linking of NFT types isperformed on a many-to-one or many-to-many basis.

The data underlying the leaderboard is available in cryptographicrecords on a relevant blockchain as associated with the smart contractlinked to the collection 2002. In some embodiments, while theleaderboard itself is public, the underlying data is gated behindcollection controls. For example, the artist that administrations thecollection 2002 has access to the underlying data in a sorted format.The underlying data is used to implement leaderboard rewards such asearly or exclusive access to subsequent collections. Because access isbased on connection to a valid public cryptographic address, theunderlying data identifying users based on the public cryptographicaddresses is useful for issuing leaderboard rewards.

FIG. 20 is a flowchart illustrating a method of implementation of atime-based leaderboard interface. In step 2102, a leaderboard platformloads a set of digital object collection data. In step 2104, theleaderboard platform generates a rank order based on length ofpossession for digital objects in the collection by user.

In step 2106, the leaderboard breaks ties. Ties are broken by number ofdigital objects held and/or length of object staking. In step 2108, theleaderboard platform receives a request to stake a digital object for apredetermined period of time.

In response to the request to stake the digital object, in step 2110,the digital object is transferred to a universal staking wallet wherethe digital object is locked and prevented from interaction for thepredetermined time. Staked digital objects protocol limited digitalobjects that indicate a future of holding the digital object. Stakingdemonstrates greater than an intent to hold, as there is no way toreturn a staked digital object before the predetermined time expires. Insome embodiments, there are separate leaderboards for length of stakes(e.g., divorced from past holding time).

In step 2112, the universal wallet provides the owner with a stakingticket digital object that tracks the staked digital object. In someembodiments the staking ticket enables return of the staked digitalobject to cryptographic address other than the address the digitalobject had been in. The staking ticket includes identity informationsuch that the owner may be identified separate from the originalcryptographic address. For example, in some embodiments, the stakingticket includes encrypted data that is verified via zero-knowledgeproof. Verification via the zero-knowledge proof enables the user toredirect the return of the digital object after the staking period hasended.

In embodiments where the identity digital object includes digitalobjects represented on faces, such as on a 3D object, the platform thatgenerates the identity digital object and connects the content ofcryptographic wallets to those faces is enabled to use digital objectsthat are staked despite those staked objects not being present in thelinked wallets. The connection of the staked object to the identitydigital object is made through the smart contract that stakes digitalobjects and/or the staking ticket object. In effect, the owner of thedigital object still retains the display benefits of the digital object,but does not retain the ability to trade/transfer/sell said digitalobject.

In step 2114, the leaderboard revises ranks based on the stake. Stakesobjects may be re-staked for longer periods by their users. Re-stakingenables users to “one-up” other users on the leaderboard.

In step 2116, after the predetermined staking period ends, the digitalobject is returned to the original owner of the digital object. In someembodiments, the return is automatic to the original wallet that thedigital object was transferred from. However, it is sometimes the casethat wallets are compromised, and thus the staking ticket enables usersof compromised wallets to indicate return to some other wallet.

FIG. 22 is a screenshot of multiple users occupying a matchingleaderboard position. The leaderboard 2200 illustrates five users tiedfor first place 2202 and some undetermined number of users tied forsecond place 2204. In some embodiments, ties on the leaderboard arepermitted.

Interrelation of Digital Objects

In some embodiments digital objects interrelate and have functionalitywith one another. Described below are a number of embodiments ofinterrelation:

A) a first digital object is enabled to generate further derivativedigital objects. The derivative digital objects may be distributed atwill, but if the first digital object changes possession, all derivativedigital objects deactivate. For purposes of this disclosure and otherexamples, the term “Deactivate” refers to any of: losing allfunctionality, losing any user decipherable representation, and/or beingdeleted. Various embodiments implement deactivation either throughinternal programing of the digital object, or as conditions within asmart contract the digital object is associated with. A userdecipherable representation refers to visual representations or datathat is intended to be read by humans (e.g., not hash values). Examplesinclude identity data that identifies the owner of the digital object.

B) a first digital object is an NFT and is associated with acryptographic wallet. Contents of the cryptographic wallet are used asthe input used to generate the first digital object. Where any of theoriginal input are transferred away from the cryptographic wallet, thefirst digital object is deactivated.

C) a first digital object is an NFT and is associated with acryptographic wallet.

Contents of the cryptographic wallet are used as the input used togenerate the first digital object. Where the first digital object istransferred away from the cryptographic wallet, the first digital objectis deactivated.

D) a first digital object is an NFT and is associated with acryptographic wallet. Contents of the cryptographic wallet are used asthe input used to generate the first digital object. Where the contentof the cryptographic wallet changes, data associated with the digitalobject also changes. For example, where a new NFT is added to thecryptographic wallet, a visual representation of the digital object isupdated to include reference to or elements of the new NFT that has beenadded. The update to the digital object enables the digital object toevolve as changes occur to the cryptographic wallet.

In some embodiments of the evolving digital object, the digital objectgeneration platform is executed subsequent times to modify the originaldigital object. The input scheme of evolving digital objectsaccommodates multiple schema. For example, in some embodiments, thevisual representation of the digital object is remade from the currentexisting input (e.g., deleted and re-created). In other embodiments, theexisting visual representation is used as a base element that ismodified or embellished based on the changes to the cryptographicwallet. Where the existing visual representation is used as a baseelement, additional weight is given to the existing visualrepresentation in the machine learning models such that the outputremains recognizable as having originated from the base element.

In each of the examples above, some alternate embodiments replacedeactivation with a broader modification. For example, some or part ofthe human decipherable content is deleted or changed. Where the digitalobject carried identity information, the visual representation mayremain, but the identity portion may be deleted or updated to a newowner.

Where the digital object is an NFT that is modified, the changes to theNFT occur in the smart contract from which the NFT is associated.Changes to the visual representation or other data associated with theNFT are based on how the smart contract encodes cryptographic data ofthe NFT to human decipherable components. Where human decipherableelements are modified, no change need by made to cryptographic elementsof the NFT. Where cryptographic elements of the NFT are changed, thosechanges are based upon conditions precedent within the smart contract(e.g., a process for revocation of a cryptographic token).

Computing Platform

FIG. 23 is a block diagram illustrating an example computer system 2300,in accordance with one or more embodiments. In some embodiments,components of the example computer system 2300 are used to implement thesoftware platforms described herein. At least some operations describedherein can be implemented on the computer system 2300.

The computer system 2300 can include one or more central processingunits (“processors”) 2302, main memory 2306, non-volatile memory 2310,network adapters 2312 (e.g., network interface), video displays 2318,input/output devices 2320, control devices 2322 (e.g., keyboard andpointing devices), drive units 2324 including a storage medium 2326, anda signal generation device 2320 that are communicatively connected to abus 2316. The bus 2316 is illustrated as an abstraction that representsone or more physical buses and/or point-to-point connections that areconnected by appropriate bridges, adapters, or controllers. The bus2316, therefore, can include a system bus, a Peripheral ComponentInterconnect (PCI) bus or PCI-Express bus, a HyperTransport or industrystandard architecture (ISA) bus, a small computer system interface(SCSI) bus, a universal serial bus (USB), IIC (I2C) bus, or an Instituteof Electrical and Electronics Engineers (IEEE) standard 1394 bus (alsoreferred to as “Firewire”).

The computer system 2300 can share a similar computer processorarchitecture as that of a desktop computer, tablet computer, personaldigital assistant (PDA), mobile phone, game console, music player,wearable electronic device (e.g., a watch or fitness tracker),network-connected (“smart”) device (e.g., a television or home assistantdevice), virtual/augmented reality systems (e.g., a head-mounteddisplay), or another electronic device capable of executing a set ofinstructions (sequential or otherwise) that specify action(s) to betaken by the computer system 2300.

While the main memory 2306, non-volatile memory 2310, and storage medium2326 (also called a “machine-readable medium”) are shown to be a singlemedium, the term “machine-readable medium” and “storage medium” shouldbe taken to include a single medium or multiple media (e.g., acentralized/distributed database and/or associated caches and servers)that store one or more sets of instructions 2328. The term“machine-readable medium” and “storage medium” shall also be taken toinclude any medium that is capable of storing, encoding, or carrying aset of instructions for execution by the computer system 2300. In someembodiments, the non-volatile memory 2310 or the storage medium 2326 isa non-transitory, computer-readable storage medium storing computerinstructions, which can be executed by the one or more centralprocessing units (“processors”) 2302 to perform functions of theembodiments disclosed herein.

In general, the routines executed to implement the embodiments of thedisclosure can be implemented as part of an operating system or aspecific application, component, program, object, module, or sequence ofinstructions (collectively referred to as “computer programs”). Thecomputer programs typically include one or more instructions (e.g.,instructions 2304, 2308, 2328) set at various times in various memoryand storage devices in a computer device. When read and executed by theone or more processors 2302, the instruction(s) cause the computersystem 2300 to perform operations to execute elements involving thevarious aspects of the disclosure.

Moreover, while embodiments have been described in the context of fullyfunctioning computer devices, those skilled in the art will appreciatethat the various embodiments are capable of being distributed as aprogram product in a variety of forms. The disclosure applies regardlessof the particular type of machine or computer-readable media used toactually effect the distribution.

Further examples of machine-readable storage media, machine-readablemedia, or computer-readable media include recordable-type media such asvolatile and non-volatile memory devices 2310, floppy and otherremovable disks, hard disk drives, optical discs (e.g., Compact DiscRead-Only Memory (CD-ROMS), Digital Versatile Discs (DVDs)), andtransmission-type media such as digital and analog communication links.

The network adapter 2312 enables the computer system 2300 to mediatedata in a network 2314 with an entity that is external to the computersystem 2300 through any communication protocol supported by the computersystem 2300 and the external entity. The network adapter 2312 caninclude a network adapter card, a wireless network interface card, arouter, an access point, a wireless router, a switch, a multilayerswitch, a protocol converter, a gateway, a bridge, a bridge router, ahub, a digital media receiver, and/or a repeater.

The network adapter 2312 can include a firewall that governs and/ormanages permission to access proxy data in a computer network and tracksvarying levels of trust between different machines and/or applications.The firewall can be any number of modules having any combination ofhardware and/or software components able to enforce a predetermined setof access rights between a particular set of machines and applications,machines and machines, and/or applications and applications (e.g., toregulate the flow of traffic and resource sharing between theseentities). The firewall can additionally manage and/or have access to anaccess control list that details permissions including the access andoperation rights of an object by an individual, a machine, and/or anapplication, and the circumstances under which the permission rightsstand.

The techniques introduced here can be implemented by programmablecircuitry (e.g., one or more microprocessors), software and/or firmware,special-purpose hardwired (i.e., non-programmable) circuitry, or acombination of such forms. Special-purpose circuitry can be in the formof one or more application-specific integrated circuits (ASICs),programmable logic devices (PLDs), field-programmable gate arrays(FPGAs), etc. A portion of the methods described herein can be performedusing the example ML system 2300 illustrated and described in moredetail with reference to FIG. 23 .

Machine Learning System

FIG. 23 is a block diagram illustrating an example ML system 2300, inaccordance with one or more embodiments. The ML system 2300 isimplemented using components of the example computer system 2300illustrated and described in more detail with reference to FIG. 9 .Likewise, embodiments of the ML system 2300 can include different and/oradditional components or be connected in different ways. The ML system2400 is sometimes referred to as a ML module.

The ML system 2400 includes a feature extraction module 2408 implementedusing components of the example computer system 2300 illustrated anddescribed in more detail with reference to FIG. 23 . In someembodiments, the feature extraction module 2408 extracts a featurevector 2412 from input data 2404. For example, the input data 2404 caninclude one or more images, sets of text, audio files, or video files.The feature vector 2412 includes features 2412 a, 2412 b, . . . 2412 n.The feature extraction module 2408 reduces the redundancy in the inputdata 2404, e.g., repetitive data values, to transform the input data2404 into the reduced set of features 2412, e.g., features 2412 a, 2412b, . . . 2412 n. The feature vector 2412 contains the relevantinformation from the input data 2404, such that events or data valuethresholds of interest can be identified by the ML model 2416 by usingthis reduced representation. In some example embodiments, dimensionalityreduction techniques, such as principal component analysis (PCA) orautoencoders are used by the feature extraction module 2408.

In alternate embodiments, the ML model 2416 performs deep learning (alsoknown as deep structured learning or hierarchical learning) directly onthe input data 2404 to learn data representations, as opposed to usingtask-specific algorithms. In deep learning, no explicit featureextraction is performed; the features 2412 are implicitly extracted bythe ML system 2400. For example, the ML model 2416 can use a cascade ofmultiple layers of nonlinear processing units for implicit featureextraction and transformation. Each successive layer uses the outputfrom the previous layer as input. The ML model 2416 can learn insupervised (e.g., classification) and/or unsupervised (e.g., patternanalysis) modes. The ML model 2416 can learn multiple levels ofrepresentations that correspond to different levels of abstraction,wherein the different levels form a hierarchy of concepts. In thismanner, the ML model 2416 can be configured to differentiate features ofinterest from background features.

In alternative example embodiments, the ML model 2416, e.g., in the formof a CNN generates the output 2424, without the need for featureextraction, directly from the input data 2404. The output 2424 isprovided to the computer device 2428. The computer device 2428 is aserver, computer, tablet, smartphone, smart speaker, etc., implementedusing components of the example computer system 2300 illustrated anddescribed in more detail with reference to FIG. 23 . In someembodiments, the steps performed by the ML system 2400 are stored inmemory on the computer device 2428 for execution. In other embodiments,the output 2424 is displayed on high-definition monitors.

A CNN is a type of feed-forward artificial neural network in which theconnectivity pattern between its neurons is inspired by the organizationof a visual cortex. Individual cortical neurons respond to stimuli in arestricted region of space known as the receptive field. The receptivefields of different neurons partially overlap such that they tile thevisual field. The response of an individual neuron to stimuli within itsreceptive field can be approximated mathematically by a convolutionoperation. CNNs are based on biological processes and are variations ofmultilayer perceptrons designed to use minimal amounts of preprocessing.

The ML model 2416 can be a CNN that includes both convolutional layersand max pooling layers. The architecture of the ML model 2416 can be“fully convolutional,” which means that variable sized sensor datavectors can be fed into it. For all convolutional layers, the ML model2416 can specify a kernel size, a stride of the convolution, and anamount of zero padding applied to the input of that layer. For thepooling layers, the ML model 2416 can specify the kernel size and strideof the pooling.

In some embodiments, the ML system 2400 trains the ML model 2416, basedon the training data 2420, to correlate the feature vector 2412 toexpected outputs in the training data 2420. As part of the training ofthe ML model 2416, the ML system 2400 forms a training set of featuresand training labels by identifying a positive training set of featuresthat have been determined to have a desired property in question and anegative training set of features that lack the property in question.The ML system 2400 applies ML techniques to train the ML model 2416,that when applied to the feature vector 2412, outputs indications ofwhether the feature vector 2412 has an associated desired property orproperties.

The ML system 2400 can use supervised ML to train the ML model 2416,with features from the training sets serving as the inputs. In someembodiments, different ML techniques, such as support vector machine(SVM), regression, naïve Bayes, random forests, neural networks, etc.,are used. In some example embodiments, a validation set 2432 is formedof additional features, other than those in the training data 2420,which have already been determined to have or to lack the property inquestion. The ML system 2400 applies the trained ML model 2416 to thefeatures of the validation set 2432 to quantify the accuracy of the MLmodel 2416. In some embodiments, the ML system 2400 iterativelyre-trains the ML model 2416 until the occurrence of a stoppingcondition, such as the accuracy measurement indication that the ML model2416 is sufficiently accurate, or a number of training rounds havingtaken place.

The description and drawings herein are illustrative and are not to beconstrued as limiting. Numerous specific details are described toprovide a thorough understanding of the disclosure. However, in certaininstances, well-known details are not described in order to avoidobscuring the description. Further, various modifications can be madewithout deviating from the scope of the embodiments.

Consequently, alternative language and synonyms can be used for any oneor more of the terms discussed herein, nor is any special significanceto be placed upon whether or not a term is elaborated or discussedherein. Synonyms for certain terms are provided. A recital of one ormore synonyms does not exclude the use of other synonyms. The use ofexamples anywhere in this specification including examples of any termdiscussed herein is illustrative only and is not intended to furtherlimit the scope and meaning of the disclosure or of any exemplifiedterm. Likewise, the disclosure is not limited to various embodimentsgiven in this specification.

It is to be understood that the embodiments and variations shown anddescribed herein are merely illustrative of the principles of thisinvention and that various modifications can be implemented by thoseskilled in the art.

Note that any and all of the embodiments described above can be combinedwith each other, except to the extent that it may be stated otherwiseabove or to the extent that any such embodiments might be mutuallyexclusive in function and/or structure.

Although the present invention has been described with reference tospecific exemplary embodiments, it will be recognized that the inventionis not limited to the embodiments described, but can be practiced withmodification and alteration within the spirit and scope of the appendedclaims. Accordingly, the specification and drawings are to be regardedin an illustrative sense rather than a restrictive sense.

1. A method of presentation of digital objects within a socialnetworking platform comprising: scraping an immutable cryptographicledger based on a first cryptographic wallet address, wherein saidscraping identifies all cryptographic objects linked to the firstcryptographic wallet address and stores visual representations of thecryptographic objects as associated with a first social media profilelinked to the first cryptographic wallet address; and providing agraphic user interface that displays each of the visual representationsof the cryptographic objects associated with the first social mediaprofile in a single navigable application interface, wherein the graphicuser interface is accessible by members of a social media platform groupto which the first social media profile is affiliated with.
 2. Themethod of claim 1, further comprising: enabling the first social mediaprofile to affiliate with the social media platform group based onrecorded action taken by the first cryptographic wallet on the immutablecryptographic ledger.
 3. The method of claim 2, wherein the recordedaction includes any combination of: current association with one or moreparticular cryptographic objects belonging to a particular set ofcryptographic objects; past association with one or more particularcryptographic objects belonging to a particular set of cryptographicobjects; or past association with one or more particular cryptographicobjects belonging to a particular set of cryptographic objects within abounded time period.
 4. The method of claim 1, further comprising:linking the first social media profile with the first cryptographicaddress based on satisfaction of a zero-knowledge proof by userestablishing possessions of credentials to the first cryptographicaddress.
 5. The method of claim 1, wherein the graphic user interface isa binder-like presentation including digitally rendered pages includingthe visual representations that users flip based on user controls. 6.The method of claim 1, wherein the graphic user interface is ascrollable page, window, or web object including the visualrepresentations.
 7. The method of claim 1, further comprising:providing, by a social media application a public newsfeed; andautomatically generating notifications to the public newsfeed based onreal-time scraped behavior of members of the social media platform groupas recorded on immutable cryptographic ledger.
 8. A system ofpresentation of digital objects within a social networking platformcomprising: A processor; A memory including instructions that whenexecuted cause the processor to: scrape an immutable cryptographicledger based on a first cryptographic wallet address, wherein saidscraping identifies all cryptographic objects linked to the firstcryptographic wallet address and stores visual representations of thecryptographic objects as associated with a first social media profilelinked to the first cryptographic wallet address; and provide a graphicuser interface that displays each of the visual representations of thecryptographic objects associated with the first social media profile ina single navigable application interface, wherein the graphic userinterface is accessible by members of a social media platform group towhich the first social media profile is affiliated with.
 9. The systemof claim 8, the instructions further comprising: enabling the firstsocial media profile to affiliate with the social media platform groupbased on recorded action taken by the first cryptographic wallet on theimmutable cryptographic ledger.
 10. The system of claim 9, wherein therecorded action includes any combination of: current association withone or more particular cryptographic objects belonging to a particularset of cryptographic objects; past association with one or moreparticular cryptographic objects belonging to a particular set ofcryptographic objects; or past association with one or more particularcryptographic objects belonging to a particular set of cryptographicobjects within a bounded time period.
 11. The system of claim 8, theinstructions further comprising: linking the first social media profilewith the first cryptographic address based on satisfaction of azero-knowledge proof by user establishing possessions of credentials tothe first cryptographic address.
 12. The system of claim 8, wherein thegraphic user interface is a binder-like presentation including digitallyrendered pages including the visual representations that users flipbased on user controls.
 13. The system of claim 8, wherein the graphicuser interface is a scrollable page, window, or web object including thevisual representations.
 14. The system of claim 8, the instructionsfurther comprising: providing, by a social media application a publicnewsfeed; and automatically generating notifications to the publicnewsfeed based on real-time scraped behavior of members of the socialmedia platform group as recorded on immutable cryptographic ledger. 15.A non-transitory computer-readable medium having executable instructionsstored thereon for presentation of digital objects within a socialnetworking platform, that when executed by one or more processors,perform the operations of: scrape an immutable cryptographic ledgerbased on a first cryptographic wallet address, wherein said scrapingidentifies all cryptographic objects linked to the first cryptographicwallet address and stores visual representations of the cryptographicobjects as associated with a first social media profile linked to thefirst cryptographic wallet address; and provide a graphic user interfacethat displays each of the visual representations of the cryptographicobjects associated with the first social media profile in a singlenavigable application interface, wherein the graphic user interface isaccessible by members of a social media platform group to which thefirst social media profile is affiliated with.
 16. The non-transitorycomputer-readable medium of claim 15, the instructions furthercomprising: enabling the first social media profile to affiliate withthe social media platform group based on recorded action taken by thefirst cryptographic wallet on the immutable cryptographic ledger. 17.The non-transitory computer-readable medium of claim 16, wherein therecorded action includes any combination of: current association withone or more particular cryptographic objects belonging to a particularset of cryptographic objects; past association with one or moreparticular cryptographic objects belonging to a particular set ofcryptographic objects; or past association with one or more particularcryptographic objects belonging to a particular set of cryptographicobjects within a bounded time period.
 18. The non-transitorycomputer-readable medium of claim 15, the instructions furthercomprising: linking the first social media profile with the firstcryptographic address based on satisfaction of a zero-knowledge proof byuser establishing possessions of credentials to the first cryptographicaddress.
 19. The non-transitory computer-readable medium of claim 15,wherein the graphic user interface is a binder-like presentationincluding digitally rendered pages including the visual representationsthat users flip based on user controls.
 20. The non-transitorycomputer-readable medium of claim 15, wherein the graphic user interfaceis a scrollable page, window, or web object including the visualrepresentations.
 21. The non-transitory computer-readable medium ofclaim 15, the instructions further comprising: providing, by a socialmedia application a public newsfeed; and automatically generatingnotifications to the public newsfeed based on real-time scraped behaviorof members of the social media platform group as recorded on immutablecryptographic ledger.