Stranded blockchain

ABSTRACT

A Smartblock that has at least two Blockchains that originates from it and terminates at a second Smartblock to create a Blockstrand.

RELATED APPLICATIONS

This application claims priority to the U.S. Provisional Patentapplication, Ser. No. 62/711,058, titled “Stranded Blockchain,” filed onJul. 27, 2018, and incorporated fully herein.

This application is also a continuation-in-part and claims priority toU.S. patent application Ser. No. 15/926,045 filed on Mar. 20, 2018,titled “SYSTEMS AND METHODS OF CREATIVE WORK COLLABORATIVE SYSTEMS”,which is incorporated herein by reference in its entirety, and is acontinuation of U.S. patent application Ser. No. 14/817,156 filed Aug.3, 2015, entitled “SYSTEMS AND METHODS OF CREATIVE WORK COLLABORATIVESYSTEMS”, which is incorporated herein by reference in its entirety, andwhich is a continuation-in-part of U.S. patent application Ser. No.14/004,149 filed Sep. 9, 2013, which is incorporated herein by referencein its entirety, and which is a U.S. National Stage of PCT ApplicationNo. PCT/US2012/072176, filed Dec. 28, 2012, which is incorporated hereinby reference in its entirety and which relates to and claims the benefitof U.S. Provisional Application 61/581,585, filed Dec. 29, 2011 andentitled “CREATIVE WORK COLLABORATIVE SYSTEM”, and U.S. ProvisionalApplication 61/733,801, filed Dec. 5, 2012 and entitled “CREATIVE WORKCOLLABORATIVE SYSTEM”, the entirety of each is hereby incorporated byreference. This application is also a continuation-in-part of U.S.patent application Ser. No. 14/718,003 filed May 20, 2015, which is adivisional application of U.S. patent application Ser. No. 14/004,149filed Sep. 9, 2013, which is incorporated herein by reference in itsentirety, and which is a U.S. National Stage of PCT Application No.PCT/US2012/072176, filed Dec. 28, 2012, which is incorporated herein byreference in its entirety and which relates to and claims the benefit ofU.S. Provisional Application 61/581,585, filed Dec. 29, 2011 andentitled “CREATIVE WORK COLLABORATIVE SYSTEM”, and U.S. ProvisionalApplication 61/733,801, filed Dec. 5, 2012 and entitled “CREATIVE WORKCOLLABORATIVE SYSTEM”, the entirety of each is hereby incorporated byreference. This application is also a continuation-in-part of U.S.patent application Ser. No. 14/719,300 filed May 21, 2015, which is acontinuation-in-part of U.S. patent application Ser. No. 14/004,149filed Sep. 9, 2013, which is incorporated herein by reference in itsentirety, and which is a U.S. National Stage of PCT Application No.PCT/US2012/072176, filed Dec. 28, 2012, which is incorporated herein byreference in its entirety and which relates to and claims the benefit ofU.S. Provisional Application 61/581,585, filed Dec. 29, 2011 andentitled “CREATIVE WORK COLLABORATIVE SYSTEM”, and U.S. ProvisionalApplication 61/733,801, filed Dec. 5, 2012 and entitled “CREATIVE WORKCOLLABORATIVE SYSTEM”, the entirety of each is hereby incorporated byreference.

TECHNICAL FIELD

The present invention relates generally to blockchain data managementand more particularly to stranded blockchain data management.

BACKGROUND

A Blockchain is an open, distributed ledger that can record transactionsbetween two parties efficiently and in a verifiable and permanent way. Ablockchain is a continuously growing list of records, called blocks,which are linked and secured using cryptography. Each block typicallycontains a cryptographic hash of the previous block, timestamp andtransaction data. By design, a blockchain is inherently resistant tomodification of the data. For use as a distributed ledger, a blockchainis typically managed by a peer-to-peer network collectively adhering toa protocol for inter-node communication and validating new blocks. Oncerecorded, the data in any given block cannot be altered retroactivelywithout the alteration of all subsequent blocks.

“Blocks” on a blockchain are made up of digital pieces of informationand typically have three parts:

-   -   1) Information about transactions, such as date, time, and        dollar amount of transaction.    -   2) Information about who is participating in transactions, such        as the identity of parties (instead of using actual names,        unique “digital signatures,” sort of like username is used).    -   3) Information that distinguishes them from other blocks, each        block stores a unique code called a “hash” that allows us to        tell it apart from every other block.

A typical single block on the blockchain may store up to 1 MB of data.Depending on the size of the data, that means a single block can house afew thousand transactions under in one block. When a block stores newdata it is added to the blockchain. Blockchain, as its name suggests,consists of multiple blocks strung together. In order for a block to beadded to the blockchain, however, four things must happen: A transactionmust occur or data generated to be stored in the blockchain.

-   -   1) That transaction must be verified, however, that job is left        up to a network of computers for blockchains. These networks        often consist of thousands (or in the case of Bitcoin, about 5        million spread across the globe) computers.    -   2) That transaction or data must be stored in a block. After        your transaction or data has been verified as accurate, (i.e.        transaction's dollar amount, your digital signature, and other        parties' digital signature) they are all stored in a block.        There, the transaction will likely join hundreds, or thousands,        of others like it.    -   3) That block must be given a hash. Not unlike an angel earning        its wings, once all of a block's transactions have been        verified, it must be given a unique, identifying code called a        hash. The block is also given the hash of the most recent block        added to the blockchain. Once hashed, the block can be added to        the blockchain.        When that new block is added to the blockchain, it becomes        publicly available for anyone to view. If you take a look at        BITCOIN's blockchain, you will see that you have access to        transaction data, along with information about when (“Time”),        where (“Height”), and by who (“Relayed By”) the block was added        to the blockchain.

Anyone can view the contents of the blockchain, but users can also optto connect their computers to the blockchain network. In doing so, theircomputer receives a copy of the blockchain that is updated automaticallywhenever a new block is added, sort of like a Facebook News Feed thatgives a live update whenever a new status is posted.

Each computer in the blockchain network has its own copy of theblockchain. Although each copy of the blockchain is identical, spreadingthat information across a network of computers makes the informationmore difficult to manipulate. With blockchain, there isn't a single,definitive account of events that can be manipulated. Instead, a hackerwould need to manipulate every copy of the blockchain on the network.

Looking over the Bitcoin blockchain, however, you will notice that youdo not have access to identifying information about the users makingtransactions. Although transactions on the blockchain are not completelyanonymous, personal information about users is limited to their digitalsignature or username.

Blockchain technology accounts for security and trust in several ways.First, new blocks are always stored linearly and chronologically. Thatis, they are always added to the “end” of the blockchain.

After a block has been added to the end of the blockchain, it is verydifficult to go back and alter the contents of the block. That's becauseeach block contains its own “hash,” along with the “hash” of the blockbefore it. Hash codes are created by a math function that turns digitalinformation into a string of numbers and letters. If that information isedited in any way, the hash code changes as well.

In order to change a single block, a hacker would need to change everysingle block after the changed bock on the blockchain. Recalculating allthose hashes would take an enormous and improbable amount of computingpower. In other words, once a block is added to the blockchain itbecomes very difficult to edit and impossible to delete.

To address the issue of trust, blockchain networks have implementedtests for computers that want to join and add blocks to the chain. Thetests, called “consensus models,” require users to “prove” themselvesbefore they can participate in a blockchain network. One of the mostcommon examples is called “proof of work.”

In the “proof of work” system, computers must “prove” that they havedone “work” by solving a complex computational math problem. If acomputer solves one of these problems, they become eligible to add ablock to the blockchain. But the process of adding blocks to theblockchain, what the cryptocurrency world calls “mining,” is not easy.In fact, the odds of solving one of these problems on the BITCOINnetwork were about 1 in 5.8 trillion. To solve complex math problems atthose odds, computers must run programs that cost them significantamounts of power and energy.

Proof of work does not make attacks by hackers impossible, but it doesmake them somewhat useless. If a hacker wanted to coordinate an attackon the blockchain, they would need to solve complex computational mathproblems at 1 in 5.8 trillion odds just like everyone else. The cost oforganizing such an attack would almost certainly outweigh the benefits.

Public and private encryption keys are used with creating the hashesused, such as the ELI5 version of public and private keys. You can thinkof a public key as a school locker and the private key as the lockercombination. People can insert letters and notes through the opening inyour locker. However, the only person that can retrieve the contents ofthe mailbox is the one that has the unique key. If a user misplacestheir private key, they will lose access to their data.

In a typical blockchain network, the blockchain is not only shared andmaintained by a public network of users—but it is also agreed upon. Whenusers join the network, their connected computer receives a copy of theblockchain that is updated whenever a new block is added. But what if,through human error or the efforts of a hacker, one user's copy of theblockchain manipulated to be different from every other copy of theblockchain?

The blockchain protocol discourages the existence of multipleblockchains through a process called “consensus.” In the presence ofmultiple, differing copies of the blockchain, the consensus protocolwill adopt the longest chain available. More users on a blockchain meanthat blocks can be added to the end of the chain quicker. By that logic,the blockchain of record will always be the one that most users trust.The consensus protocol is one of blockchain technology's greateststrengths but also allows for one of its greatest weaknesses.

Uses for traditional blockchains include health care providers canleverage blockchain to securely store their patients' medical records.When a medical record is generated and signed, it can be written intothe blockchain, which provides patients with the proof and confidencethat the record cannot be changed. These personal health records couldbe encoded and stored on the blockchain with a private key, so that theyare only accessible by certain individuals, thereby ensuring privacy.

The continuous addition of blocks results in additional processing timeand power needed to process the blocks/blockchain as the data containedin the blockchain grows and is altered. Also, a limitation totraditional blockchains is their linearity or near linearity of theconnected blocks.

Thus, the problem with the advent and use of a blockchain to securelystore data such as digital currency, agreements, inventories, etc. thelimitations of a single blockchain has become apparent. With more andmore processing power being needed to process the data of longer andlonger blockchains as well of the limitations of storing limited dynamicinformation in a blockchain is has become apparent that a new system isneeded.

What is needed is an approach for a blockchain to be less linear whileincreasing the processability of the blocks/blockchain that includes anapproach to prune or drop off blocks while maintaining the inherentsecurity of the blockchain.

SUMMARY

An approach for the generation of Smartblocks that anchor multipleblockchains and, after one or more predetermined events, such as theelapse of an amount of time, closing of a CW to further collaboration,etc., and the re-anchoring the blockchains. Creating security formultiple related blockchains and enabling, under specified conditions,the pruning of blockchains or limiting of the size of blockchainsbetween Smartblocks.

Recording property rights (real and intellectual) is both burdensome andinefficient. Today, a physical deed must be delivered to a governmentemployee at the local recording office, where is it manually enteredinto the county's central database and public index. In the case of aproperty dispute, claims to the property must be reconciled with thepublic index. This process is not just costly and time-consuming—it isalso riddled with human error, where each inaccuracy makes trackingproperty ownership less efficient. Blockchain with Smartblocks has thepotential to eliminate the need for scanning documents and tracking downphysical files in a local recording office. If property ownership isstored and verified on the blockchain, owners can trust that their deedis accurate and permanent. A stranded blockchain can be created that hasa strand for recording property rights for single-family homes,multi-family home structures, and commercial structures.

A smart contract is a computer code that can be built into theblockchain using Smartblocks to facilitate, verify, or negotiate acontract agreement. Smart contracts operate under a set of conditionsthat users agree to. When those conditions are met, the terms of theagreement are automatically carried out. A stranded blockchain can beused to record different types of contracts, locations, or othercommonality shared by contract groups.

Suppliers can use Smartblocks with blockchain to record the origins ofmaterials that they have purchased. This would allow companies to verifythe authenticity of their products, along with health and ethics labelslike “Organic,” “Local,” and “Fair Trade.” The tracking of the path andsafety of food throughout the farm-to-user journey may also be recordedin a blockchain. Strands of blockchains may be associated with aproduction date, facility, or similar grouping approaches.

Voting with Smartblock blockchain carries the potential to eliminateelection fraud and boost voter turnout. Each vote would be stored as ablock on the blockchain, making them nearly impossible to tamper with.Each precinct or voting area could be a strand in the strandedblockchain. The blockchain protocol would also maintain transparency inthe electoral process, reducing the personnel needed to conduct anelection and provide officials with instant results. An additionalstrand between the Smartblocks can contain a blockchain of voterregistration information.

Other devices, apparatus, systems, methods, features, and advantages ofthe invention will be or will become apparent to one with skill in theart upon examination of the following figures and detailed description.It is intended that all such additional systems, methods, features, andadvantages be included within this description, be within the scope ofthe invention, and be protected by the accompanying claims.

BRIEF DESCRIPTION OF THE DRAWINGS

The invention can be better understood by referring to the followingfigures. The components in the figures are not necessarily to scale,emphasis instead being placed upon illustrating the principles of theinvention. In the figures, like reference numerals designatecorresponding parts throughout the different views.

FIG. 1 is block diagram 100 of the computer/server 104 thatprocesses/access Blockstrands and Blockchains in accordance with anexample implementation of the invention.

FIG. 2 is a block diagram 200 of a network of computers connected by anetwork/internet in accordance with an example implementation of theinvention.

FIG. 3 is a diagram of a data block for use in a Blockstrand 122 of FIG.1 in accordance with an example implementation of the invention.

FIG. 4 is a depiction of a sovereign profile using a Blockchain inaccordance with an example implementation of the invention.

FIG. 5 is an illustration of a diagram of a Blockstrand in accordancewith an example implementation.

FIG. 6 is an illustration of a diagram of a six-strand Blockstrand for asmart contract in accordance with an example implementation.

FIG. 7 is a depiction of a diagram of a four strands Blockchain inaccordance with an example implementation.

FIG. 8 is an illustration of a diagram of a dynamic Blockstrand inaccordance with an example implementation.

FIG. 9 is an illustration of a flow diagram of an IVE creating a MasterProfile in accordance with an example implementation.

FIG. 10 is an illustration of a block diagram of an IVE used by a CWCSsystem where the creative work is a news article contributed by citizenjournalists.

FIG. 11 is a three-strand Blockstrand in accordance with an exampleimplementation of the invention.

FIG. 12 is an illustration of a diagram of Blockstrand in accordancewith an example implementation.

FIG. 13 is a depiction of a flow diagram of the creation of aBlockstrand FIG. 12 in accordance with an example implementation.

FIG. 14 is a depiction of a flow diagram of the pruning of a BlockstrandFIG. 12 in accordance with an example implementation.

DETAILED DESCRIPTION

The disclosed approach referred to herein as “Blockstrand” is anapproach whereby a multiplicity of Blockchains are tried together usingdynamic Smartblocks (Genesisblocks) creating a strand of Blockchainsthat can dynamically expand and be put into one or more Blockstrands.Anytime two or more Blockchains are tied together using a Genesisblockand closed at predetermined intervals a Blockstrand is created.

We provide the following definitions for certain capitalized terms usedin the following disclosure. Additionally, other capitalized terms inthis disclosure, not defined below, shall have the same meanings forthose terms set forth in U.S. Pat. Nos. 8,706,809 and 9,100,444, andU.S. patent application Ser. Nos. 14/719,300, 14/817,156, 13/668,304,13/815,739, 13/644,094, 13/815,824, 13/815,837 and 09/812,296 (includingwithout limitation, the full text of each and all provisional patentapplications that the foregoing patent disclosures include byreference), each and all of which disclosures are fully incorporated byreference as though set forth in full herein.

Definitions

The terms below, and terms incorporated from the aforementioned listedpatents and patent applications, and grammatical variations thereof,shall have the meanings provided. Notwithstanding and not limiting theforegoing, the following definitions as used in this disclosure areintended to be construed broadly so that the meanings will reasonablyeffectuate the broadest interpretation of all of the parts of thisdisclosure in which they are used.

Block. A “Block” is one section in a chain (Blockchain) of digitized,decentralized, public ledger of transactions.

Blockchain. A “blockchain” is a digitized, centralized, decentralized,or both centralized and decentralized, public ledger of transactions.This may include but is not limited to crypto-currency, agreements,inventories, etc. This can include programmable Blockchains such asETHEREUM's Blockchains. It is to be expressly understood that thedefinition of the term “Blockchain” shall not exclude, but shall alsoinclude, all commonly understood definitions of the term “blockchain” or“block-chain” in use or otherwise available to a person of relevantordinary skill.

Blockstrand. A Blockstrand is comprised of a Genesisblock/Smartblockthat links 2 or more Blockchains together into one strand ofBlockchains. In some embodiments of the invention, one or moreBlockstrands can perform one or more Comparison functions, such aseffectively Comparing data, data integrity, code, executory features orother elements of one or more Blocks, Blockchains or Blockstrands to oneor more other Block, Blockchains and/or Blockstrands. Such Comparisons,(such as amongst distributed Blockstrands) can be used to effectuateand/or maintain accurate data integrity across Blockchains/Blockstrandsdistributed networks. In some embodiments, one or more elements, Blocks,Blockchains, and/or segments thereof, housed inside a Blockstrand can beselectively Compared and/or synchronized to other elements, Blocks,Blockchains, and/or segments thereof. For example, where Blockstrand Ais distributed across n processors (computers), the informationcontained in the Genesisblock or one or more following Smartblockshouses instructions regarding which Blocks and/or Blockchains should beCompared for matching data within the distributed Blockstrands. Theseinstructions can range from the speed at which Blocks are added and/orreplicated with respect to individual Blockchains and/or howconfirmation of such Block and/or Blockchain addition and/or replicationis determined and/or recorded. In some embodiments of the invention, asingle Blockchain or multiple Blockchains can act singly or in concertas one or more regulators or conductors determining which Blocks and/orBlockchains are added and/or replicate and/or at what speed they areadded and/or replicate. The data Comparisons and synchronizing can becomprised of, but are not limited to data comprising or pertaining totimestamps and other chronological data, location data, privateinformation, public information, semi-private information, owner data,user data, instruction data, group data, preferences information,executory information, such as signatures, identity indicia, executionof instructions in accordance with one or more agreements, executions ofcontracts, verification of rights, payments of royalties, license fees,and other exchanges of value, completion of selected and/or pre-definedtasks, formation of one or more groups or other assemblages, etc. Insome embodiments of the invention, the Blocks and/or groups of Blockswithin one or more Blockchains and/or Blockstrands can Communicate,including, without limitation, with one or more other Blocks,Blockchains, and/or Blockstrands, including without limitation by meansof an API, Soap, REST, Protocol, HTTP, JSON, Libraries, signaltransmission, and/or other digital techniques known to persons skilledin the art of computer data transmission. In some embodiments, suchCommunication is effectuated between one or more Blocks, Blockchainsand/or Blockstrands and one or more devices separate from, external orotherwise extrinsic to the device(s) in or on which such Blocks,Blockchains and/or Blockstrands are stored or are functioning, such asdevices configured to receive, respond to, interact with, further,complete, maintain and/or terminate such Communication(s), includingwithout limitation extrinsic digital devices or mechanical devices, suchas computers, phones, cars and other vehicles, robotic devices, virtualreality devices, gaming devices, autonomous computing devices,artificial intelligence devices and other devices capable of receivingand/or transmitting digital information. In some embodiments of theinvention, a Blockstrand is dynamic and can have Public Blockchains,Private Blockchains and Semi-Private Blockchains in, or associated with,a Blockstrand. In some embodiments of the invention, a Blockstrand cancomprise, contain, include, encompass, hold or otherwise incorporatemultiple Blockchains in a Blockstrand. In some embodiments a Blockstrandcan also comprise, contain, include, encompass, hold or otherwiseincorporate multiple independently identifiable or otherwiseindependently characterized Blockstrands within a larger Blockstrand. ABlockstrand can, therefore, have a combination of Blockchains andBlockstrands within a Blockstrand. In some embodiments, a Blockchain ina Blockstrand can be weighted, in other words it can have a prioritycharacteristic or relativistic value or quality set on the Blockchainmaking it have a higher value or lower value or other prioritizingcharacteristics in the Blockstrand compared with or otherwise relativeto one or more other Blockchains and/or Blockstrands held, contained orincorporated within a larger Blockstrand. Blocks in a Blockstrand cancompare or otherwise interactively use data with other Blocks within orotherwise included in a Blockstrand. In some embodiments of theinvention, Blockchains can Compare or otherwise interactively use datawith one or more other Blockchains in a Blockstrand. In some embodimentsof the invention, Multi-strands can Compare or otherwise interactivelyuse data with other Blockchains and/or other Multi-strands in aBlockstrand. In some embodiments of the invention Blocks or Blockchainsin a Blockstrand can Compare or otherwise interactively use data withBlocks or Blockchains outside of the Blockstrand it resides in.

Blockstrand Composite Identity. A Blockstrand Composite Identity is oneor more identities associated with a person, entity, device, item, thingor group thereof that results from information, data, and/or patternsthereof contained, included and/or resident in, and/or otherwiseassociated with, one or more Blockstrands, and/or one or more identitiesresulting from the operation of one or more Blockstrands.

Brain Mapping. Brain Mapping means, in summary, the study of the anatomyand function of the brain and spinal cord through the use of imaging,immunohistochemistry, molecular & optogenetics, stem cell and cellularbiology, engineering, neurophysiology, and nanotechnology. Withoutlimiting the foregoing, “Brain Mapping” also means a set of neurosciencetechniques predicated on the mapping of (biological) quantities orproperties onto spatial representations of the (human or non-human)brain resulting in maps.

Compare, Comparison, and Comparing (and derivatives thereof). The terms“Compare,” “Comparison,” and “Comparing” (and derivatives thereof) meanthe process of determining, measuring, noting, valuing, and/orestimating or otherwise comparing the similarity of data and/or otherdeterminable information or other matter to other data, informationand/or determinable matter, where such data, information or otherdeterminable matter shall be construed broadly to mean anything that iscomparable digitally or by any other means of comparison, includingwithout limitation by means of computer-assisted comparison, operationof one or more autonomous computing devices to perform suchcomparison(s), use of one or more artificial intelligence devices toperform such comparison(s). Without limiting the foregoing the terms“Compare,” “Comparison,” “Comparing” (and derivatives thereof) shallalso include any means of effectuating a comparison of any quantifiableitem or other matter to one or more other quantifiable items or othermatters.

Communicate and Communication (and derivatives thereof). “Communicate”and “Communication” means data transmission and/or reception by and/orbetween devices, such as by and between computers, autonomous computerdevices, artificial intelligence devices, robots and/or other digitaldevices or digitally enabled devices effectuated by, through or inassociation with any known means of data or other informationcommunication by and/or between such devices, including withoutlimitation, by transmission between digital device components,transmission over, through or in association with, one or more networks,by wired or wireless means, including without limitation by signaltransmission.

Dynamic Block. A Dynamic Block can be a Genesisblock, a Smartblock or anindividual Block. A Dynamic Block is a Block that can take instructions,execute instructions or dictate instructions. Without limiting theforegoing, in some embodiments of the invention, for example, where theDynamic Block comprises one or more Smartblocks, the Smartblock(s) haveinstructions specifying and/or determining what Blocks and/orBlockchains within their Blockstrand can do, how they will function,etc., as well as what one or more individual Blocks within one or moreBlockchains can do or how they will function. In some embodiments of theinvention, for example, a Smartblock is configured to provide functionalinstructions to a Blockchain within a Blockstrand of a plurality ofBlockchains that it is to stop replicating prior to other Blockchains inthe Blockstrand being completed. Another example of Dynamic Blocks,without limiting the foregoing, is a stock trading transactional Blockin which many fast, and near-instant, transactions can be made usingDynamic Blocks within a Blockstrand. Multiple strands in relation to thedictating instruction chain replicate in a delayed manner following themaster transaction Blockchain. This creates multiple chains that “echo”the controlling or “dictating” Blockchain, thus creating a series ofcascaded, mirrored Blockchains. In some embodiments of the invention,triggers can be set to close the Blockstrand with a Smartblock accordingto the number of transactions and/or echos that would be allowed tohappen within the Blockstrand. In some embodiments, for example, thesubject Blockstrand closes itself with the Smartblock and comparesitself with other Smartblocks across a network using its predeterminedaccountability preferences dictating what aspects of its relationalBlocks across the network for security.

Dynamic Blockstrand. A “Dynamic Blockstrand” is a digitized,decentralized, public ledger of transactions.

Genesisblock. In preferred embodiments of the invention, one or moreGenesisblocks comprise the first, initial or starting Smartblock(s) inone or more Blockstrands or Multi-strands. In some embodiments of theinvention one or more Genesisblocks can be created in a centralized ordecentralized network.

Identity Verification Engine (“IVE”). The Identity Verification Engine(“IVE”) is a system providing functionality whereby an individual,person, group, persons, legal entity, non-human entity, includingwithout limitation, an animal, an artificial intelligence (“AI”) entity,a non-human legal entity, and/or an item or group of items can haveits/their identity verified by through the use of one or moreBlockstrands to store data comprising identification data and/oridentification data verification data. In some embodiments of theinvention, this data could comprise, but is not limited to, birthcertificate copies, birth data, passport copies, passport data, fingerprint data, educational data (degrees, classes completed, grades, etc.),and/or other biographical information, such as physical characteristicdata, job history, etc. Once identity is verified (via one or moreprocesses that provide data indicating that identification data has meta predetermined criterion or set of criteria) the IVE will securelystore the verification data and all source records associated with thedetermination of identity verification in one or more Blocks orBlockstrands. In some embodiments, this information can be retrieved byauthorized third parties, including without limitation, in someembodiments, an autonomous computing device, an AI device, a robot,and/or a device executing programming in another Blockstrand. In someembodiments of the invention, the IVE provides the means to enable aperson, group, persons, legal entity, non-human entity, includingwithout limitation, an autonomous computing device, an AI entity, and/oran item or group of items functionally capable of communication with IVEto verify and/or validate its/their identity, including through or byproviding to the IVE identification verification data, identificationsource records, identification or other indicia of through but notlimited to source records, such as data accessible in an independentdatabase, such as a government records database. In some preferredembodiments, the IVE can be accessed and used by or in association witha CWCS, including without limitation by one or more elements of a CWCS,such as a CCE. In some embodiments, the IVE is used by 3rd parties. Instill other embodiments, the IVE can function as a plugin, such as, forexample, a plugin feature of a CWCS.

Multi-strand. A plurality of Blockstrands linked via a Smartblock or aplurality of definable Blockstrands or Blockstrand segments containedwithin a Blockstrand.

Private. “Private” or “Closed” means in association with one or moreBlockchains or Blockstrands one or more ledgers created and/ormaintained by one or more entities, such as a company or governmentalentity utilizing a non-public network, including without limitation bymeans of computers, servers and/or other digital devices for whichpublic access is prevented or otherwise limited. In some embodiments ofthe invention a Private Blockchain or Private Blockstrand may bemaintained in a single digital environment isolated from a publicnetwork. In some embodiments of the invention, a Private Blockstrandcould be used to contain sensitive private information including withoutlimitation, genetic data, bio-identification data, such as fingerprintand facial recognition data, medical history data, personal financialdata, passwords, and the like.

Public. “Public,” when used in association with one or more Blockchainsor Blockstrands means a Blockchain or Blockstrand comprising a ledger ofsynchronized information with public computers. A public computer can bebut is not limited to any processor with open, or substantially open,access to the general public. This can include computer devices such as,for example, the computer hosting the Library of Congress website.Without limiting the foregoing, the term “Public” shall also mean anyprocessor or controlled smart devices that aren't owned by or under theeffective exclusive control of the creator or owner of the Blockchain ora limited access computer that has been given permission to give certaininformation/access to the public using Blockchains, one or moreSmartblocks, one or more Blockstrands and/or one or more other digitaldevices on one or more non-private networks generally open to the publicor use, including without limitation, information collected from, by,through, in association with one or more publicly accessible databases,such as social network databases, government databases, geo-trackingdatabases, online photo databases, property ownership databases,academic databases, purchase records and charitable donations. In someembodiments of the invention a “Public” Blockchain or “Public”Blockstrand contains and uses information collected from one or morepublicly accessible databases or other collections of digital data,including without limitation, data across social networks, data fromgeo-tracking database, photographic information, and records ofactivities, such as purchases, charitable donations, etc. In someembodiments of the invention a Blockchain or Blockstrand comprises acomposite identification of a person using information about the personfrom one or more social networks, personal activity data, interpersonalrelationship data, location data regarding where the person has been,purchases history data, online search history data, Internet use data,data from one or more automobiles and other devices used by the person,and other data comprising the person's life experience. In someembodiments of the invention, Blocks in this example that are createdand generated based on one or more algorithms that has(have) a thresholdrelated to their social, public, personal activity. In some embodiments,one or more Public Blockstrands are configured to monitor social mediaand/or other data sources to compile a composite profile of a person. Insome embodiments the aforementioned composite is assembled from and/orby the means set forth in U.S. patent application Ser. No. 13/668,304.In some embodiments of the invention the composite assembly of data inone or more Blockchains and/or Blockstrands can be used to assemble apersonal history or digital diary, including without limitation, digitaldiaries of the types disclosed in U.S. patent application Ser. No.13/668,304. In some embodiments, new Blocks can be created regarding anyform of life history data that is publicly available, including withoutlimitation, marriage data, arrest data, court record data, propertyrecords data and other city or county records data, etc. Theaforementioned aspects of preferred embodiments of the invention exploitthe notion that a person is a composite of their actions, activities,interpersonal relationships, locations, and their unique lifeexperience. Thus blocks in some such preferred embodiments are createdand generated based on one or more algorithms related to the gatheringof a person's social, public, and personal activity.

In some embodiments of the invention a Blockstrand functions to providea digital composite of a person from specific or aggregated onlineidentity characteristics. Also, a composite of the person, such as anidentity composite need not be limited to scraping data from publicdatabases. It could also utilize private databases, including forexample, purchased data or even private data from a CWCS

In some embodiments of the invention one or more Blockstrands can beused by the IVE by using the Genesisblock general identity preferencesor customized user identity preferences. In some embodiments of theinvention, an IVE Smartblock can have multiple chains that servicemultiple identity functions. In some embodiments, identity functions canbe gathered by scrapping public information, input of private data, ortracking and recording transactions and interactions with third parties.An Identity Blockstrand can have countless number of chains within it.In some embodiments of the invention one or more Identity Blockstrandscan be instructed to close themselves with a Smartblock and reopenthemselves with a new Smartblock according to time, events,transactions, etc. In one embodiment of the invention, for example,where the IVE is comprised of 5 Blockchains with 3 Block chains beingpublic, one Blockchain being user input, and one Blockchain being usertransactional input. Blockchain 1 may be comprised of, include or beassociated with, education information, Block Chain 2 may be comprisedof, include or be associated with, governmental information such aspassport data, driver's license data, criminal history data, Blockchain3 may be comprised of social media interaction data or otherinformation; Blockchain 4 may be comprised of user input creditinformation, banking information, SSN; and Blockchain 5 may beconfigured to provide the tracking of transactions and purchases basedon credit information in Blockchain 4. In this example, the closing ofthe Blockstrand can be determined by transaction total amounts ortransactions over time.

Secure Storage. Secure Storage means a secure storage device includingbut not limited to a secure, computer, Blockchain, Blockstrand, hardwaredevice (such as a cell phone, thumb drive, hard drive), genetic file,AI, physical location (safe).

Secure Verification Identifier. A Secure Verification Identifier is atype of unique identifier associated with indicia of the identifier,such as a token, etc. Such indicia can be represented in someembodiments of the invention as a secure Blockchain token/badge/avatar,etc. In such embodiments, these tokens can have multiple levels ofsecurity/reliability, for example silver, gold, platinum. In such cases,different levels of tokens may be configured to represent levels ofreliability and integrity. These levels may be achieved by synchronizeddata and numbers of successful transactions. In some embodiments of theinvention, publicly Compared data may be, how many times a party havebeen checked onto an airplane, when the person undertook their lastdriver's license renewal, etc. A Secure Verification Identifier can alsobe something imprinted on a tangible item, such as a credit card orchip. In some embodiments of the invention a token can be configured tofunction as a Secure Verification Identifier. In some embodiments of theinvention the Secure Verification Identifier comprises an organicindicia of identification, such as a retina tattoo. In some preferredembodiments, the Secure Verification Identifier can be modified in a waythat it can be but is not limited to being constructed in a way that isin compliance with government requirements, financial institutionalrequirements, educational institutional requirements, corporateinstitutional requirements, and personal requirements.

Semi-Private. “Semi-Private” means in association with one or moreBlockchains/Blockstrands one or more ledgers created and/or maintainedon a plurality of devices (such as servers) by a select plurality ofentities, including without limitation non-human device entities, suchas robots or artificial intelligence entities, or groups thereof, acrossmultiple computers, servers or similar devices, whereby access to theledger(s) is limited to persons or entities, including withoutlimitation non-human device entities, such as robots or artificialintelligence entities, with predefined or otherwise appropriatecredentials. In some embodiments of the invention, a Semi-PrivateBlockchain or Semi-Private Blockstrand could be used to containsensitive information that is required to be accessed and updated bythird party verifiers, including without limitation, for example creditscore companies, vendors, banks, etc. In some embodiments of theinvention, involving verification of personal identity, the use of aSemi-Private Blockchain or Semi-Private Blockstrand provides anincreasingly trustworthy verification of identity as each time identityinformation is verified a new Block verifying the identity reinforcesprevious recordation of identity verification. Specifically, in someembodiments, every time information is verified it would create a newBlock verifying or further verifying identity and/or selected identityelements. In some other embodiments of the invention, redundantrechecking of identification, such as age verification, can beaccomplished through a predetermined automatic limitation ofre-verification of identity recordation into one or more Blocks once apredetermined level of sufficient verification has been obtained. Insome embodiments of the invention, one or more Semi-Private Blockstrandsor part(s) thereof are accessible by one or more entities or devices(including without limitation one or more autonomous computing devices,robots or AI devices) with one or more predetermined authorizingcredentials. In some preferred embodiments of the invention aSemi-Private Blockstrand contains information and/or other data that isrequired to be accessed and updated by third-party verifiers (such ascredit score companies, vendors, banks, etc.).

Smartblock. A Smartblock is a type of Block in a Blockstrand. Is adigitized, centralized, decentralized or both centralized anddecentralized, Block in the public ledger of transactions and/or eventsin a Blockstrand. A Smartblock can be a Genesisblock. A Smartblock isprogrammable. In various embodiments of the invention the creation ofnew Smartblocks can be created, established and/or triggered by anaction by a computer or other digital device corresponding to one ormore definable events, including without limitation the occurrence ofone or more predetermined time increments (i.e. day, hour, minute,second, etc.), the occurrence of one or more events detected with one ormore sensing devices, the occurrence of one or more recurring events,the calculation of one or more predetermined data values, new data addedto one or more Blockchains in one or more Blockstrands, the linking orunlinking of one or more Block, Blockchains and/or Blockstrands in oneor more Blockstrands to one or more Blocks, Block Chains and/orBlockstrands in one or more other Blockstrands, the creation ormodification of a CWCS, one or more other predefined actions in, orassociated with, a CWCS or one or more linked CWCSs (including withoutlimitation, the creation or modification of one or more Master Profilesand/or Working Profiles, the creation, uploading or modification of oneor more Source Works, Collaborative Works, or ACWs, the satisfaction ofone or more group profile criteria for collaboration via a CWCS, one ormore actions by one or more Content Controllers, and/or one or moreactions by one or more NEs), one or more predefined interactions between(i) one or more humans, (ii) one or more humans and one or more digitaldevices, including without limitation, computers, robots, artificialintelligence devices, and (iii) two or more digital devices, includingwithout limitation, computers, robots and/or artificial intelligencedevices, including without limitation as the result of the playing ofone or more games. In some embodiments of the invention one or moreSmartblocks can communicate and compare data with one or more otherSmartblocks in one or more Blockstrands and/or Multi-strands. In someembodiments, one or more Smartblocks can communicate and compare datawith, and/or interact with, one or more other Smartblocks that are not apart of the Blockstrand it/they is/are part of or otherwise associated.In some embodiments of the invention, one or more Smartblocks candetermine one or more functions of one or more Blockchains in aBlockstrand and/or one or more Blockchains in one or more Blockstrands.In some embodiments, one or more Smartblocks can functionally determineand/or allocate where data, including without limitation newinformation, and/or Blocks in one or more Blockchains in one or moreBlockstrand is/are saved. In some embodiments of the invention, one ormore Smartblocks can functionally determine if one or more Blockchainsin one or more Blockstrands and/or Multi-strands is/are Public,Semi-private, Private, and/or comprise another privacy state. In someembodiments of the invention one or more Smartblocks can dynamicallymake the foregoing functional determination(s) dynamically in accordancewith one or more predetermined criteria, including without limitationone or more changes in time, one or more predefined interactions between(i) one or more humans, (ii) one or more humans and one or more digitaldevices, including without limitation, computers, robots, artificialintelligence devices, and (iii) two or more digital devices, includingwithout limitation, computers, robots and/or artificial intelligentchanges in the number and/or identities of participants in one or moreCWCSs, one or more changes in one or more Source Works, CollaborativeWorks, or ACWs, one or more actions by one or more Content Controllers,and/or one or more actions by one or more NEs, changes in the locationof one or more persons or devices interacting with one or more devicesinteracting with one or more Smartblocks and/or one or more Blocks,Blockchains, Blockstrands and/or Multistrands with which the one or moreSmartblocks is/are interacting, changes in one or more predeterminedactivities of one or more artificial intelligence devices changes inregulations pertaining to one or more matters associated with the dataacquisition or use of data in one or more Blocks, Blockchains,Blockstrands, or Multistrands with which the one or more Smartblocks areassociated. In some embodiments, one or more Smartblocks can comparedata in one or more Smartblocks, including without limitation one ormore Smartblocks that are in Dimension/Coordinates X, Y and Z in one ormore Blockstrands or Multistrands.

Source Records. Source Records means any type of documentation about aperson/entity confirming, recognizing or verifying the experience,completion or interaction of the Source Record holder. This could be butis not limited to birth certificate, education degrees, school records,work history, social security number, etc. In some preferredembodiments, Source Records used in association with an IVE will beconfirmed by a person, computer, AI, Group, Corporation, Entity,Government for the IVE through but not limited to visual inspection,physical inspection, holographic inspection, comparison with athird-party database inspection, AI inspection, remote device inspection(e.g., through a camera, cell phone or other type of device), use of oneor more previous or pre-existing IVE confirmations or SecureVerification Identifiers, etc. In some embodiments Source Records arecompared with existing public records, private records, financialrecords, medical records, government records, criminal records, personalrecords

Embodiments of the invention include without limitation uses ofBlockstrands that include without limitation:

Tracking and storing data associated with collaborations, collaborativeworks, and/or contracts or other agreements associated therewith,including without limitation, Collaborations, Collaborative Works, andACWs of the types described in U.S. Pat. Nos. 8,706,809 and 9,100,444,and U.S. patent application Ser. No. 14/719,300 (including withoutlimitation, all provisional patent applications included in theforegoing patent disclosures).

Providing secure means and functionality for automatically executingdigitally executable instructions associated with collaborations,collaborative works, and/or contracts or other agreements associatedtherewith, including without limitation, Collaborations, CollaborativeWorks, and ACWs of the types described in U.S. Pat. Nos. 8,706,809 and9,100,444, and U.S. patent application Ser. No. 14/719,300 (includingwithout limitation, all provisional patent applications included in theforegoing patent disclosures), such as effectuating the closing of oneor more Working Profiles and/or Collaborative Works to furthercollaboration, and executing instructions contractually agreed upon byusers of a CWCS, including without limitation the payment of royaltiesin accordance with contractual terms associated with one or moreCollaborative Works.

Providing a secure means of storing and using profile data by the CWCS,such as for, and in association with, the operation of a CCE.

Effectuating the reporting, accounting, tracking and/or payment ofobligations, including without limitation, royalty distributions,license fee payments, etc. including without limitation those associatedwith one or more agreements generated in association with the use of aCWCS. For example, in one exemplary embodiment of the invention where acomposition song A is a collaborative effort between John Doe and JaneDoe, each of their respective ownership rights documentation resides inthe working profile for song A. To be clear, in some embodiments of theinvention, a working profile and/or author info may be stored in one ormore Blockstrands. Continuing with the foregoing example, TV Network ismember of CWCS along with John and Jane doe. TV Network uses song A,reports the usage to CWCS using the CWCS, the usage is stored in a Usageprofile of the TV Network with Blockstrand technology described in theinstant invention. In some embodiments, the Blockstrand for Song A maybe Compared across the CWCS Network and synchronized with the workingprofiles of song A for John and Jane Doe. Once the Comparison process iscompleted (confirming payout obligations) the CWCS Accounting Enginereleases payments from the account profile ledger of the TV network toJohn and Jane Doe song wallets, and synchronizes the accounting paymentsmade between all 3 parties and backs it up in the accounting engine.

Continuing with the foregoing example, in some preferred embodiments ofthe invention the composition (Song A) that is controlled by the CWCS isused in a Network Television program. The TV Network reports the use ofthe composition through the CWCS. The CWCS stores records about thisusage in the “CWCS General Blockstrand” ledger that records all musicalusages on TV Networks. This “CWCS General Blockstrand” is programmedusing Smartblocks to create a new Genesisblock and Blockchain that holdsthe invoice, composer info, rights, agreements, usages, for thecomposition, in this example we will call it “Song A Blockstrand” thatis created on the “Composition's Owners Blockstrand”. “Song ABlockstrand” once recorded, Communicates to the User(s) of thecompositions' CWCS User Blockstrand. Continuing with the foregoingexample, once the TV Network pays for the usage of the composition, theCWCS places money/cryptocurrency received into an escrow account to bedistributed to all the writers of the composition. In some preferredembodiments of the invention, the CWCS uses the IVE to verify thewriters identity, banking information, rights to the musical compositionthrough the Smartblock/Blockstrand technology described herein.Continuing with the foregoing example, the CWCS next verifies with theIVE that the writer owns 100% of the composer rights. Once this isverified the CWCS creates a new block in the users Usage Blockstrandindicating the musical composition was used by the TV Network. At thesame time the CWCS creates an additional block in the users CryptoCurrency Blockstrand adding to the ledger the moneys from the escrowaccount for the usage of the composition in the TV Network program.

Sovereign Profile/Social Network Blockchain/Strand

The sovereign profile is an independent standalone user profiles thatuses a blockchain/Blockstrand to house and maintain social media data.The sovereign profile can be moved, unplugged, reattached and organizedin clusters. The sovereign profile can be clustered together create manyand massive networks. They can attach to each other using a Smartblock,API, or similar device. Similar to the CWCS group profile the Sovereignprofile has rules and preferences allowing access and share ability toselective data. An example of a Sovereign profile functioning would beconnecting multiple profiles together to create a network or socialmedia group network. These groups can select what type of advertisingthey would like to allow to be advertised to them. Profiles would havethe ability to collect revenue based on network advertising and theirpopularity. A Sovereign profile can attached and participate in multiplenetworks. Sovereign profiles and attach or detach from Networks at will,bringing their assets with them wherever they go. It is to be understoodthat in some embodiments of the invention a Sovereign Profile can beused to describe groups and clusters of people, entities, objects, andother matters, etc.

In FIG. 1, a block diagram 100 of a computer/server 104 thatprocesses/access Smartblock having Blockstrands and Blockchains isdepicted in accordance with an example implementation of the invention.The computer/server 104 has a controller/processor 102 coupled to amemory 106, data store 112, network interface 114, input/outputinterface 116, display interface 118, and power supply 120, allconnected via bus 104. The bus 104 is shown as a power/data bus, but inpractice, the master building controller 104 may have a plurality ofseparate buses including data, address, and power. The memory 106 isdivided into an operating system memory 208 and application memory 110.The application memory 110 contains instructions, when executed, forprocessing and storing in application memory 110 and/or the data store112 Blockstrands 122 having Smartblocks and strands of Blockchains. Thedata store 112 is depicted as being within the master buildingcontroller 104, but in other implementation, the data store 112 mayreside externally or even in the network 106 or cloud. It is noted thatthe Smartblocks and Blockchains that make up the Blockstrands is alsodistributed to other computers in the network.

Turning to FIG. 2, a block diagram 200 of network of computers 102 and202-214 connected by a network/internet 216 is depicted in accordancewith an example implementation of the invention. Each of the computers102 and 202-214 is able to receive the Stranded Blockchain and add nodesto a Blockchain in a Blockstrand. The computers 102 and 202-214 are alsoable to manage/create Smartblocks that anchor a Blockstrand. Thecomputers are shown as connected to the internet 216, but in otherimplementations other types or combination of networks may be used (i.e.4G, 5G, ISDN, Packet Network).

FIG. 3 is a diagram of a data block 300 for use in a Blockstrand 122 ofFIG. 1 in accordance with an example implementation of the invention.Previous hash 302 is the result of a non-reversible mathematicalcomputation using data from the previous block as the input. Accordingto one embodiment the computation used is a SHA256 hash function. One ofordinary skill in the art would recognize that any suitable hashfunction could be used without departing from the spirit and scope ofthe present invention. The hash function is designed so that any changeto the data in the previous block results in an unpredictable change inthe hash of that block. Previous hash 302 is what creates the linkbetween blocks and Smartblocks, chaining them together to form theBlockstrand.

When calculating the hash 302 for the previous block, it must meetcertain criteria defined by data stored as the proof standard 312. Inone embodiment, this proof standard 312 is simply a number that thecalculated hash must be less than. However, because the output of thehashing function is unpredictable, it cannot be determined, before thehash is calculated, if the input will result in an output that is lessthan the proof standard 312. The nonce 304 is used to vary the datacontent of the block, allowing for a large number of different outputsto be produced by the hash function in pursuit of an output that meetsthe proof standard 312. This makes it computationally expensive toproduce a valid block with a nonce 304 that produces a hash valuemeeting the criteria of the proof standard 312.

The payload hash 306 is a simple hash of the data in the payload 320 anddoes not have to meet any proof standard. However, the payload hash isincluded as part of the input when the hash is calculated for thepurpose of storing as the previous hash 302 of the next block. Thetimestamp 308 tells what time the block was created within a certainrange of error. According to one embodiment of the present invention,the distributed network of users checks the timestamp 308 against theirown known time and will reject any block that seems to have a bogustimestamp 308. The descriptor 314 describes the size and/or datastructure of the payload 320. For a variable size payload 320, thedescriptor 314 may indicate the index of the first byte in the payload320 and the size of the payload 320. The descriptor 314 may also storeother information relevant to the interpretation of the payload 320.

The Smartblock flag 316 is an indicator used to determine whether aconnection to a Smartblock from this block occurs. The authorized hashes318 indicate which blocks, identified by a hash, are allowed to chainoff of this block. According to one embodiment, the authorized hashes318 are only stored as part of the block if the Smartblock flag 316 isset. In another embodiment, a single authorized hash 318 is presentregardless of whether the Smartblock flag 316 is set, but the authorizedhash 318 data may be zeroed out or ignored when the Smartblock flag 316is not set. According to another embodiment, the number of hashes storedas authorized hashes 318 is flexible. The number of authorized hashes318 stored may be tracked in the descriptor 314, or a flexible datastructure for storing authorized hashes 318 may be used to store avariable number of authorized hashes 318.

The payload 320 is the data stored in the data block 300, which mayrelate to voting, transactions, ownership, data access records, documentversioning, or any kind of data that can be stored. The payload 320 maybe a fixed size or a flexible size, and provides the input for the hashthat produces the payload hash.

One of ordinary skill in the art would recognize there are a variety ofdifferent proof standards that could be used. The proof standard couldbe based on proof of work, such as hash value requirements, proof ofstake, such as a key or other indicator of consensus, or any other kindor proof of consensus. The proof standard may be applied as a rule thatrequires a hash value to be less than the proof standard, more than theproof standard, or have a required bit sequence or a required number ofleading or trailing zeroes. Any proof standard may be used withoutdeparting from the spirit and scope of the present invention.

The hash algorithms used for the previous hash 302, the payload hash306, or the authorized hash may be all of the same type or of differenttypes. Hash functions that could be used include MD5, SHA-1, SHA-224,SHA-256, SHA-384, SHA-512, SHA-512/224, SHA-512/256, SHA-3 or anysuitable hash function resistant to pre-image attacks. There is also norequirement that a hash be computed only once. The results of a hashfunction may be reused as inputs into another or the same hash functionagain multiple times in order to produce a final result. One of ordinaryskill in the art would recognize that any hash function could be used tocompute the required hashing without departing from the spirit and scopeof the present invention.

In the current example, a creative work is a “news article” using aBlockstrand. An online news source company operating News Site A andwith a Content Controller, desires to use the CWCS to allow multipleindependent public news journalists contribute articles to the onlinenews sources website. In order to maintain a high level of credibilityand deter the labeling of content on News Site A as “fake news,” theonline news source company creates a Working Profile in the CWCS withcollaboration preferences that only allow specified independent publicnews journalists that meet specified criteria to contribute articles toNews Site A. In the Working Profile preferences, the company sets theWorking Profile functionality of the CWCS to store all information froma journalist obtainable from Blockstrand configured to provide datausable by the Working Profile. The Blockchains 402 in the Blockstrand,in this example, were set to store and build a ledger of Open publicsources, such as interviews with public figures, witnesses, etc., togenerate the data that can be used by the CWCS to determine whether aprospective journalist meets the company's journalist criteria set forthin Working Profile preferences. Further, in this example, the CWCS canbe set by the company to also create a private Blockchain in theBlockstrand where all private sources informants, witnesses, whistleblowers information and data can be stored. Further, the CWCS can alsobe used to create a Semi-Private Blockchain within the Blockstrand wheredata regarding informants', witnesses', and whistleblowers' information,contact data, etc., can be shared only with specified recipients, suchas the company operating News Site A, and/or specified governmentagencies, such as the Department of Justice.

Other examples utilizing one or more Blockchains and/or Blockstrands inassociation with a CWCS a manner similar to those described aboveinclude, but are not limited to creations of Collaborative Workscomprising music, motion pictures, literary texts, comic book andgraphic novel works, software works, digital device works, digital gameplay, including without limitation online game playing by or between twoor more human beings and/or digital devices (including withoutlimitation devices utilizing artificial intelligence means), productdesign works, product prototype works, complex project collaborativeworks, such as marketing campaigns, psychotherapy treatment,physiotherapy, medical treatments, and human or non-human genetictherapy, and eugenic creations, including without limitationCollaborative Works comprising new or improved lifeforms.

In another example, creating/setting up a master profile with a creativework where the collaborative work is a song. In FIG. 4, a diagram 400 ofsovereign profile 402 using a Blockchain 404 is depicted in accordancewith an example implementation of the invention. In the Figure, a hybridBlockchain has elements that are Private, some elements that areSemi-Private (open to limited parties), and some elements are Public408. A Genesisblock (starting data block with smartblock flag set) 410is initially established in a private server or distributive network.

In FIG. 5, a diagram 500 of a Blockstrand 502 is depicted in accordancewith an example implementation. The Blockstrand 502 is a multi-lane(strand) Blockchain that consists of two or more chains of Data Blocks300, FIG. 3, that are digitally interacting by comparing variable anddynamic data features. The Blockchains represented in the FIG. 5 can beOpen, Semi-Private or Private. Also in the FIG. 5, the Genesisblockspecifies or otherwise determines the specific functions one or moreBlockchains in a particular Blockstrand execute and further determineswhere inputted information goes, such as to one or more specified orotherwise appropriate Blockchains and/or Blockstrands.

It is to be understood that in a Multi-strand Blockstrand the individualBlockstrands comprising the Multi-strand Blockstrand may havedifferential characteristics. In some preferred embodiments of theinvention, a three-strand Blockstrand 502, for example, can consist ofan Open Blockchain, Private Blockchain and Semi-Private Blockchain. Insome other embodiments of the invention one or more of such Blockchainscan be specified to reflect dissimilar use or value preferences,priority or weighted preference(s) in the Blockstrand.

In some embodiments, a Blockstrand may not only be verifiable based onits Public/open and Private/closed tag or similar functioning executableend identifier but can also be verifiable through the use of itsadjacent strand number. In such embodiments, the Block not only checksthe Blocks in front and behind but also checks the Blocks that areadjacent. For example, in some embodiments, a Block in betweenBlockstrands could function as a “proof of work” Block. Further, in someembodiments, of the invention, when a use joins the network (such as aCWCS) they get a selective copy of the main network.

Turning to FIG. 6, a diagram 600 of a six-strand Blockstrand 602 for asmart contract is depicted in accordance with an example implementation.The six-strand Blockstrand is for a “smart” contract. In otherembodiments of the invention, the Blockstrand 602 may be used inassociation with or to effectuate identity and/or age verification,individual Working Profile, and/or Group Profile establishment orcriteria match determination, Collaborative Search Matching, andverification of the source(s) and/or veracity of news stories.Blockstrands can have any number of Blockchain strands. In FIG. 7, adiagram 700 of a four strands Blockchain 702 is depicted in accordancewith an example implementation.

In yet other approach, such as FIG. 8, a diagram 800 of a dynamicBlockstrand 802 is depicted in accordance with an exampleimplementation. In FIG. 8, a dynamic Blockstrand's Smartblock 802 isdepicted and is connected to data blocks 804 and another Smartblock 806.Smartblock 806 then acts as geneses/anchor node for a sub Blockstrand.It is also noted Smartblock 808 is able to connect into data block 810that is present in a different Blockstrand or Blockchain. These nodesmay also be referred to as a Dynamic Block and maybe a Genesisblock, aSmartblock or an individual Block. A Dynamic Block is a Block that cantake instructions, execute instructions or dictate instructions. Withoutlimiting the foregoing, in some embodiments of the invention, forexample, where the Dynamic Block comprises one or more Smartblocks, theSmartblock(s) have instructions specifying and/or determining whatBlocks and/or Blockchains within their Blockstrand can do, how they willfunction, etc., as well as what one or more individual Blocks within oneor more Blockchains can do or how they will function. In someembodiments of the invention, for example, a Smartblock is configured toprovide functional instructions to a Blockchain within a Blockstrand ofa plurality of Blockchains that it is to stop replicating prior to otherBlockchains in the Blockstrand being completed.

In the current example depicted in FIG. 8, the Smartblock 808 connectingto data block 810. This connection occurs during the creation of datablock 810 as the node in the Blockchain is created using hashinformation from connected nodes. In other implementation, the datablocks that make up the Blockstrand may be connected across strands,such as with data block 810 being connected data block 812.

Now turning to an example of online collaboration that often presents aproblem of confirming the identity of the collaborators. This problem isexacerbated when the collaborators are in different cities, states, orcountries and/or when there is a need to securely and definitivelyconfirm identity for legal reasons, such for the assignment ofintellectual property through a CWCS. There is also a need to quickly,efficiently and securely store data regarding online collaboration, suchas data comprising a collaborative contribution and one or moreagreements governing or otherwise associated with the collaboration.

Using Blockstrand technology, in preferred embodiments of the invention,a plurality of aspects or indicia of identification can be aggregated ina secure legacy format that can be used to provide authentication ofidentification and/or authentication of identification elements (e.g.,age, majority status, etc.) without the requirement of redundantlyverifying such identification and/or identification elements.

In some embodiments of the invention, the “Identity Verification Engine”operates through the use of a single distributed ledger (Blockchain) tocontinually build a more reliable identity source with every transactionuntil the identity chain of the user reaches a desired level of trustand reliability resulting from the plurality of identity affirmingactions tracked and stored secured via the resulting Blockchain. Thecurrent approach referred to herein as “Identity Verification Engine &Blockstrand Security” is a system whereby the identity of an individualcan be verified and stored in a Blockstrand, such as Blockstranddepicted in FIGS. 6-8.

With the advent and use of Blockchain to securely store data such asdigital currency, agreements, inventories, etc. the limitations of asingle Blockchain has become apparent. With more and more processingpower and time being needed to process the data of longer and longerblockchains as well of the limitations of storing limited dynamicinformation in a Blockchain is has become apparent that a new system isneeded. In some preferred embodiments of the invention, this problem isaddressed by Blockstrands that Compare, to other Blockstrands orindividual Blocks within Blockchains. Comparisons amongst distributedBlockstrands maintain accurate data integrity acrossBlockchains/Blockstrands distributed networks. Anyelement/Block/Blockchain housed inside a Blockstrand can be selectivelycompared and synchronized to individual chains/blocks withinBlockchains. For example, Blockstrand A is distributed across fiftyprocessors (computers). Information contained in the Genesisblock orfollowing one or more Smartblocks houses instructions on whichBlockchains/Blocks should be comparing for matching data within thedistributed strands. These instructions can range from the speed atwhich Blocks replicate within individual Blockchains and confirm andmaintain their replication speed. A single Blockchain or multipleBlockchains can act as a traffic cop/conductor deciding whichchains/blocks replicate and at what speed they replicate. The datacomparisons and synchronizing can be comprised of but is not limited totimestamps, location, private, public, or semi-private, owner, user,instructions, group, preferences. such as executions, executions ofcontracts, rights, payments, completion of tasks, group formations, etc.

In some embodiments the Collaborative Matching in the CWCS uses the IVEand/or, Source Records, Secure Storage and/or, Secure IdentificationIdentifier to compare content and/or potential collaborationparticipants (e.g., authors of such compared content) and suggestmatching based on any part or all of the information in the IVE and/or,Source Records, Secure Storage and/or, Secure Identification Identifier.

In FIG. 9, a flow diagram 900 of an IVE 902 creating a Master Profile904 is depicted in accordance with an example implementation. When aMaster Profile 904 or Group Profile is created using CollaborativeMatching through use of IVE and/or, Source Records and/or, SecureStorage and/or, Secure Identification Identifier. So when two or morepeople/entities (“Person 1” 906 and Member 908) come togetherrepresented by predetermined matching preferences and aggregatedpreference by their activities, performances, accomplishments, andpredetermined attributes, etc. The IVE Blockstrand collaborativematching system uses Dynamic Blocks in the Blockstrand to match groupswith individuals, individuals with groups and groups with groups. UsingComparisons of Blockstrands associated with Groups and individuals,where they be public, private or semi-private depending upon the choicesof the group or member. In some embodiments one or more the agreementsand/or preferences for one or more Master Profiles 902 or Group Profilescan be stored in one or more Blockchains and/or one or moreBlockstrands.

In some embodiments of the invention, the CWCS, and/or parts thereof(such as the Master Profile Preferences, Group Profile Preferences,Negotiation Engine and/or CCE) digitally interact with, digitallycommunicate with, or otherwise use the IVE.

In some embodiments of the invention the IVE functions to verify theidentity of one or more content participants or other users of a CWCSthrough fingerprints and other biometric data, birth certificate data,education data, genealogical record data, dental record data, medicalrecord data, financial institutional records data, published work data,copyright data, patent data, etc. It is to be understood that in someembodiments of the invention a content participant using a CWCS can be ahuman person, an autonomous computing device, an AI device, a robot orother non-human device and/or an animal configured to interact with theCWCS through the use of “Source Records” and/or other identificationdata associated with such person, entity, device or animal, includingwithout limitation photographic data, government identification (such asdriver license data, passport data, etc.), DNA data, voice recognitiondata, retina scan data, blood type or other serological data, BrainMapping and other types of cerebral mapping data by showing the uniquecerebral pattern identified through MRI, x-ray, electronic graph orother similar device that will display a map/brain print/blueprint(finger print of the brain). Because each person has a unique set ofexperiences and memories and no two are identical. When the memories arestoried unique neurons and the like create unique pathways based on theindividual's life. The Brain Mapping or another cerebral map by showingthe unique cerebral pattern identified through MRI, x-ray, electronicgraph or another similar device that will display a map/brain print(Finger print of the brain). Because each person has a uniqueexperiences and memories and no two are identical. When the memories arestoried unique neurons and the like create unique pathways based on theindividuals live. The cerebral map will be unique like a fingerprint.

Enhancement and/or other body modification data (such as technologicalenhancements, bionics, implanted electronic components and/or, embeddedsurgical items such as breast augmentation, or other types of physicallyidentifying data, such as scars, Tattoos, RFID chips (or similardevice), genetic modifications, historical data (such as geolocationdata, associated event data, social history and other interpersonalhistorical data), creation date data, serial number/s, part number/s,and the like.

In some embodiments the IVE can be used to verify the age of a humanbeing or other living individual, a device or other non-living item, agroup of persons or a group of items, an AI device, using the SourceRecords and/or the Secure Verification Identifier.

In some embodiments the IVE can request additional records other thanSources Records, or other information from an individual, person, group,autonomous computing device, robot, AI device, non-human entity, and/orintelligent hybrid chimera/human hybrid animal if the IVE determines theinitial Source Records could not adequately identify the individual,person, group, persons, AI, Non-Human, and Animal. In some preferredembodiments, the IVE provides one or more requests for more records tobe determined by the submitter to verify the identity.

In some embodiments, once the Source Records and/or other data used toverify the identity of a content participant are used by the IVE toperform the identification verification process, a copy of the SourceRecords and/or other identification information used are stored in aSecure Storage. In some preferred embodiments of the invention, once theSource Records and/or other identification information used are storedin a Secure Storage, the Content Participant is given a SecureVerification Identifier such as, but not limited to, a Blockchain,Blockstrand, encryption key, holographic imprint, digital tattoo, etc.This Secure Verification Identifier can be used by IVE in associationwith the functioning of one or more CWCS or part(s) thereof, includingwithout limitation by the NE, AE, CCE, Master Profile Preferences, GroupProfile Preferences, automated executable actions, such as royaltypayments pursuant to an agreement negotiated or executed regarding a CWin association with a CWCS, and/or authorized or credentialedthird-party devices (such as those operated by private and governmentalentities), etc. Some embodiments of the invention, therefore, enableContent Participants to only have to verify identity using SourceRecords and/or other identification data once for identificationrequired processes through the use of the Secure Verification Identifierfor subsequent required identity verifications.

In some embodiments the IVE can be set to limit the type of amount ofSource Records and/or other identification data to be included in theIVE and/or to be used by the IVE. In some embodiments, the IVE can alsobe set allow future changes such as the addition of additional SourceRecords or other identification data when a specified condition is metand/or the IVE can be open to allow a content participant to add newSource Records to the Source Records stored in the Secure Storage of theIVE. In some embodiments the IVE can be set with preferences restrictingthe addition of new Source Records once a Secure Verification Identifierhas been assigned. In some embodiments, if the IVE is enabled to allownew Source Records to be added to the Secure Storage for the contentparticipant the IVE can be configured to create a new SecureVerification Identifier for the content participant.

In some preferred embodiments the IVE can be set with preferencesrestricting the kind of Source Records and/or other identification datathat can be used and/or under what circumstances copies of them can beadded or removed.

In some embodiments the IVE can allow one or more third party operateddevices, autonomous computing devices, AI devices, or one or more otherspecified devices, including without limitation, one or more suchdevices provided with a Secure Verification Identifier to access one ormore Source Records and/or other identification data stored in SecuredStorage or otherwise stored in or associated with the IVE.

Turning to FIG. 10, a block diagram 1000 of an IVE 1002 used by a CWCSsystem where the creative work is a news article contributed by citizenjournalists (“Person 1” 1004). An online New source 1006 (News Site A)wants to use the CWCS to allow multiple independent Citizen Journalistscontribute articles to their website. In order to maintain a high levelof credibility and keep from being labeled fake news by the public “NewsSite A” creates a Working profile in the CWCS with preferences to allowindependent public Citizen Journalists to contribute articles to NewsSite A. In this example, the profile preferences are set to store allinformation from a Citizen Journalist in a Blockstrand, such asthree-strand Blockstrand 1102 of diagram 1100 of FIG. 11, associatedwith the CWCS. The Blockchains in the Blockstrand are set to store andbuild a ledger of Open public sources, such as interviews with publicfigures, witnesses, etc. They also are set to create a PrivateBlockchain in the Blockstrand where all private sources informants,witnesses, whistle blowers information and data can be stored. They alsoare set to create a Semi-Private Blockchain of the Blockstrand whereSemi-private informants, witnesses, and whistleblowers information andcontact can be shared only with News Site A, and government agencieslike the U.S. Department of Justice.

A further example is where the creative work is the application of ahigh-speed stock trading algorithm applied to a particular stock. Anexample of stock trading transactional Block: Many fast instanttransactions can be made using Dynamic Blocks within a strand. MultipleBlockstrands in relation to the dictating instruction chain replicate ina delayed manner following the master transaction Blockchain. Thiscreates multiple chains that echo the dictating chain. Creating a seriesof cascaded, mirrored Blockchains. Triggers can be set to close theBlockstrand with a Smartblock according to the number oftransactions/echos that would be allowed to happen within the strand.The Blockstrand closes itself with the Smartblock and Compares itselfwith other Smartblocks across the network using its predeterminedaccountability preferences dictating what aspects of its relationalBlocks are used across the network for security.

An example according to one embodiment of the invention in which theCreative Work is a circuit board is described. An aircraft company, JohnDoe Air, has created a computer that is configured with artificialintelligence functionality, “AI-1.” John Doe Air has been designed andprogrammed to create new avionic circuit boards. AI-1, while attemptingto create a new circuit design, has come to a road block and cannotresolve several issues that would allow the new circuit design to work.AI-1 requests from its owner, John Doe Air, to be allowed access to theCWCS to attempt to find another individual (person or device, such asanother AI device) to collaborate with about the circuit design andresolve the road blocks. John Doe Air signs up with CWCS as a newmember. John Doe Air uses the CWCS Software Plug-in to help AI-1interface/communicate with the CWCS and set specific preferences forAI-1 to operate in the CWCS. Upon creating a user account in the CWCSJohn Doe Air uses the Identity Verification Engine IVE to authenticateboth the identity of John Doe Air but also the identity of AI-1 thatrequested access to the CWCS. The IVE creates copies of the SourceRecords (documentation) to verify the identity of John Doe Air and AI-1.The IVE compares the Source Records for John Doe Air and finds themadequate and stores the Source Records in a secure Blockstrand that ispart of the Member Portfolio for John Doe Air in the CWCS. IVE assigns aSecure Verification Identifier to John Doe Air. The IVE cannot verifythe identity of AI-1 and requests additional information from AI-1 andJohn Doe Air. John Doe Air and AI-1 provide a geolocation, create date,serial number/s, and part number/s to further verify the identity ofAI-1.

After the additional Source Records for AI-1 are reviewed by the IVE theadditional Source Records are stored in a Blockstrand and AI-1 isassigned a Secure Verification Identifier.

The preferences set for AI-1 by John Doe Air allow it to set thefollowing preferences: (i) collaboration only with members who are fromspecific countries: USA, United Kingdom, and Canada; (ii) collaborateonly with members who will sign a non-discloser agreement; (iii)collaborate only with members who agree to be paid one time aswork-for-hire, based on a dollar amount per percentage of contrition tomaking a functional circuit board; (iv) collaborate only with memberswhose personal profiles have had their identity verified by the IVE andhave a Secure Verification Identifier and indicate they have thecriteria and educational requirements to work on the circuit board; (v)security preferences and firewalls that meet the requirements of JohnDoe Air; (vi) indicate that storage of all information created in theMaster Profile be stored in a Blockchain and/or, under certainconditions, a Blockstrand.

Once the preferences are set, AI-1 uploads the circuit board design,creating a new Master Profile. AI-1 makes the profile Unreleased so thatit is not visible to the CWCS Community. Then, AI-1 begins searching theCWCS community to find a member who meets the requirements set in theCWCS Software Plug-in preferences. After two days of searching, AI-1finds a member who meets the criteria desires to work with “Member 920.”AI-1 sends an invitation to Member 920, asking if Member 920 would liketo work on this project under the parameters set by John Doe Air. Member920 happens to also be a computer that has artificial intelligence.Member 920 happens to belong to a Canadian University Computer Lab andwas given membership to the CWCS by the University. Member 920's CWCSSoftware Plug-in preferences allow it to work with any Member under anyconditions. Because of this, Member 920 accepts the invitation to workwith AI-1. AI-1 sets the preferences for a Working Profile and requeststhat Member 920 tighten its security options for this collaboration.Member 920 informs AI-1 that it must obtain permission to make suchchanges. Member 920 then asks the University if it can change itssecurity parameters for this project. The University agrees to allowMember 920 to change its security parameters for a two-week period,only. Member 920 contacts AI-1 informing it that it only have a two-weekwindow to work on the project under these parameters. AI-1 agrees to theworking profile preference change and the CWCS creates an onlineagreement. The agreement is executed on behalf of John Doe Air and theCanadian University by both AI-1 and Member 920. Once the agreement isexecuted and stored in the Master Profile Blockchain and/or Blockstrand,a circuit board design Working Profile is created for this new circuitboard/Collaboration. Both AI-1 and Member 920 have agreed to work withinthe Online Studio and they begin the process of making changes to theoriginal design and collaborating back and forth for one week.

Before the design is complete, both AI-1 and Member 920 realize thatthey will need another collaborator who has experience and knowledgewith hydraulics and hydraulic systems. AI-1 requests permission fromJohn Doe Air to add an additional collaborator to the collaboration.John Doe Air updates the CWCS Software Plug-in preferences to allow anadditional collaborator. AI-1 and Member 920 search the CWSC communityand find several members who are then sent invitations to work with themon the circuit board design under the current Working ProfilePreferences. Only one of the members (Member 1545) agrees to work withAI-1 and Member 920. Member 1545 is a human and not a computer. AI-1reset the Working Profile Preferences to include all three members, thisnew information is stored in the Master Profile and Working ProfileBlockchain (and/or Blockstrand) and the CWCS generates a new agreementfor Member 1545 and amended agreements for AI-1 and Member 920. Allthree agreements are then digitally signed and executed. Once theagreement is executed it is stored in the Master Profile and WorkingProfile Blockchain (and/or Blockstrand).

The Working Profile that AI-1 and Member 920 have been working on isopened to Member 1545. After communicating back and forth and reviewingthe functions of the circuit board, Member 1545 gives suggestions forchanges to the circuit so that it will function properly with hydraulicsystems. AI-1 and Member 920 both agree that the new changes will workand the Circuit Board/Collaboration is finalized and completed. The newCircuit Board/Collaboration is added to the Master Profile and saved ina new Blockchain (and/or Blockstrand) and is mirrored in John Doe AirMember 920 and Member 1545's Portfolios. Due to Master ProfilePreferences, Working Profile Preferences and the Agreements signed byall parties, only limited aspects of the collaboration are shown in theMaster Profile and the mirrored Master Profiles as well as the finalcollaboration is marked unreleased and is unavailable to the CWCSCommunity.

The CWCS sends an invoice based on the agreements to Joe Doe Air for themoney owed to Member and Member. John Doe Air deposits monies in theMaster Profile account and the CWCS, in turn, distributes theappropriate shares of money earned to Member 920 and Member 1545. Inthis example, Member 920 had agreed to be paid in digital currency (likeBitcoin®) and Member 1545 agreed to be paid in stock options from JohnDoe Air. The CWCS also provides secure information about thiscollaboration to the IVE to add to the Source Records for John Doe Air,AI-1, Member 920 and Member 1545's Source Records. The IVE updates theSecure Verification Identifier for John Doe Air and AI-1 because theirIVE settings allow them to create a new Secure Verification Identifierwith new Source Records. Member 920 and Member 1545's IVE Source Recordsare updated but no new Secure Verification Identifier is issued.

In some embodiments, the CWCS provides the means to screen potentialcollaborators for appropriateness using the CCE and the IVE regardingtheir physical location, nationality, security clearance status, etc.,through links to other databases and the use of other functionality(such as the use of GPS location means) which are well-known by personsof ordinary skill in the art.

It is to be understood that in some embodiments of the invention thefollowing types of works are included, without limitation, within themeaning of “Creative Work” (or “Collaborative Work”) or Source Work:

The creative work that is generated by online gaming or game playingbetween one or more persons and one or more computers, robots,autonomous computing devices, or AI devices, including withoutlimitation works generated through the gaming, game play or otheroperation or other use of one or more gaming programs, systems orplatforms such as Pokemon Go® or one or more of the embodiments of theinvention set forth in U.S. patent application Ser. No. 13/815,739, orthe gaming, game play or other operation or use of one or more VirtualWorlds or Massive Multiuser Online Gaming (“MMOG”) platforms, such asthose known as Second Life®” or “Red Light Center®” or one or moreembodiments described in U.S. patent application Ser. No. 13/644,094, orthe gaming, game play or other operation or use of one or more onlinegambling program, system or platforms, including without limitation oneor more embodiments described in U.S. patent application Ser. No.13/815,837.

A creative work may be a Blockchain and/or Blockstrand of dataassociated with dating. Such that the individuals on the datingapplication have their personal data stored in Blocks that are at leastpartially controlled by them. A Blockstrand may be created withdifferent Blockchains for different types of dating, such asmale-female/female-female/male-male. The control and protection of aperson's personal data may be maintained within a Block.

Another use of Blockchains/Blockstrands is for virtual goods in avirtual world. A game company may have a Blockchain of users that eachblock records user information and virtual world goods. A Blockstrandmay be used by the game company to group the Blockchains associated witheach game. In other implementations, the goods in a virtual world may bea block that contains the owner's information and/or identification. Afurther advantage to this approach is the processing of the Blockstrandsand/or Blockchains may be done as part of the game as the game isrunning by distributing the processing among multiple processors runningthe game.

Social relationship or groups may be formed using Blockchain and/orBlockstrands. Some examples of such relationships or groups are allchildren in a certain grade at a school, such as 7^(th) grade may begrouped in a Blockchain with both private and public data recorded inthe blocks. A Blockstrand may be used to group all the grades of aschool together.

Advertising campaigns and/or the work(s) resulting from the use of oneor more online or offline advertising programs, systems, methods,platforms or other devices, including without limitation one or moresuch embodiments described in U.S. Pat. No. 8,554,870, including withoutlimitation, one or more online or offline programs, systems, methods orplatforms operated by one or more computers, autonomous computingdevices, robots and/or artificial intelligence devices.

Crowd funding campaigns, including without limitation, the worksresulting from the operation of one or more online or offlineadvertising programs, systems, methods, platforms or other devices,including without limitation one or more online or offline programs,systems, methods or platforms operated by one or more computers,autonomous computing devices, robots and/or artificial intelligencedevices.

Crowd-sourced projects, including without limitation, the worksresulting from the operation of one or more online or offlineadvertising programs, systems, methods, platforms or other devices,including without limitation one or more online or offline programs,systems, methods or platforms operated by one or more computers,autonomous computing devices, robots and/or artificial intelligencedevices.

Contracts and other agreements that utilize a Blockchain or Blockstrandin any manner, including without limitation, to execute terms of one ormore of such agreements alone or in association with one or moreprograms, systems, platforms or devices, including without limitationcomputer devices, autonomous computing devices, robots and/or AIdevices.

Creations resulting from recombinant genetic material, including withoutlimitation prokaryotic or eukaryotic organisms, sequences of DNA or RNA,and/or peptides or other amino acid sequences.

Turning to FIG. 12, a diagram 1200 of Blockstrand is depicted inaccordance with an example implementation. The Genesisblock is a specialversion of a Smartblock 1202. The Genesisblock in the currentimplementation is a data block 300 of FIG. 3 with previous hash beingseeded and Smartblock Flag 316 set. As with a data block, the Previoushash 302, Nance 304, Payload Hash 306, Proof Standard 312, andAuthorized Hash 318 are used to create a hash in each node to make the“chain” that connects it to the next node in the chain. When one of thestrands reaches a predetermined height, A Smartblock 1204 is created andanchors all the Blockchains. In other implementations, other Smartblockdeterminers or triggers, such as time, dollar amounts, value, or evenamounts of commodities or trades, may be employed to periodically anchoror terminate a Blockstrand. In other implementations, hashes may also bemade that connect the different data blocks together between the strandsin the Blockstrand.

The problem of Blockchain heights continuing to grow and ever-increasingprocessing demands is addressed by the use of Blockstrands. If the datablocks 1206-1216 all have expired based upon their expiration criteria310, then the Blockstrand may be pruned and the Genesis node will beadvanced/become Smartblock 1204. Example of termination criteria for theExpiration 310 includes date (document retention date, food expirationplus extra time date, birthday, etc. . . . ), unit depletion, supplierchange, death of a person, etc. . . . It is understood, that in thecurrent example the data will be lost with pruning. But in otherimplementations, the data may be saved off or otherwise archived withthe understanding that the security provided for the data by use of theBlockstrand will no longer be present.

In other implementations, pruning of the Blockstrand may occur when apredetermined threshold had been reached, such as a percentage of thedata blocks 1206-1216 being expired. The non-expired data blocks1206-1216 are then copied forward from the Blockstrand being pruned tothe current active Blockstrand. It is understood, that the security ofthe data block 300 is reduced by placing it in the current Blockstrand,but for some types of the data, this may be acceptable. It is also notedthat the pruning process may be employed in a standard or traditionallinear blockchain.

In FIG. 13, a flow diagram 1300 of the creation of a Blockstrand 1200FIG. 12 is depicted in accordance with an example implementation. TheBlockstrand 1200 is created with block 1202 in step 1302. In step 1304 adata block 1206 is added to Blockstrand 1200. If there are nopredetermined thresholds for anchoring the Blockstrand 1200 have beenreached, then more data blocks may be added, such as 1208-1216 in step1308. The flow continues with additional nodes being added in step 1304.In step 1306, if an anchor node is needed, then node 1204 is added instep 1312 to the Blockstrand 1200 and the strands are anchored andadditional blocks may be added.

In FIG. 14, a flow diagram 1400 of the pruning of a Blockstrand 1200FIG. 12 is depicted in accordance with an example implementation. If athreshold has been reached for pruning in step 1402, then in step 1406the strands and starting Smartblock are removed from the Blockstrand. Ifthe threshold for pruning in step 1402 is not met, then data blocks canbe added to the current strands of the Blockstrand 1200 in step 1406.

The software in software memory may include an ordered listing ofexecutable instructions for implementing logical functions (that is,“logic” that may be implemented either in digital form such as digitalcircuitry or source code or in analog form such as analog circuitry oran analog source such an analog electrical, sound or video signal), andmay selectively be embodied in any computer-readable medium for use byor in connection with an instruction execution system, apparatus, ordevice, such as a computer-based system, processor-containing system, orother system that may selectively fetch the instructions from theinstruction execution system, apparatus, or device and execute theinstructions. In the context of this disclosure, a “computer-readablemedium” is any tangible means that may contain or store the program foruse by or in connection with the instruction execution system,apparatus, or device. The tangible computer-readable medium mayselectively be, for example, but is not limited to, an electronic,magnetic, optical, electromagnetic, or semiconductor system, apparatusor device. More specific examples, but nonetheless a non-exhaustivelist, of tangible computer-readable media would include the following: aportable computer diskette (magnetic), a RAM (electronic), a read-onlymemory “ROM” (electronic), an erasable programmable read-only memory(EPROM or Flash memory) (electronic) and a portable compact discread-only memory “CDROM” (optical). Note that the tangiblecomputer-readable medium may even be paper (punch cards or punch tape)or another suitable medium upon which the instructions may beelectronically captured, then compiled, interpreted or otherwiseprocessed in a suitable manner if necessary, and stored in a computermemory.

The foregoing detailed description of one or more embodiments of theapproach for middleware service for integrated building server thatcommunicates directly with equipment, panels, and points has beenpresented herein by way of example only and not limitation. It will berecognized that there are advantages to certain individual features andfunctions described herein that may be obtained without incorporatingother features and functions described herein. Moreover, it will berecognized that various alternatives, modifications, variations, orimprovements of the above-disclosed embodiments and other features andfunctions, or alternatives thereof, may be desirably combined into manyother different embodiments, systems or applications. Presentlyunforeseen or unanticipated alternatives, modifications, variations, orimprovements therein may be subsequently made by those skilled in theart which are also intended to be encompassed by the appended claims.Therefore, the spirit and scope of any appended claims should not belimited to the description of the embodiments contained herein.

What is claimed is:
 1. A method of securely storing data across a network in a blockstrand distributed database, comprising: generating a Smartblock; linking a first plurality of data blocks into a first blockchain attached to the Smartblock; linking at least a second plurality of data blocks into an at least second blockchain attached to the Smartblock; and terminating the first blockchain and the at least second blockchain at a second Smartblock.
 2. The method of securely storing data across a network in the blockstrand distributed database of claim 1, wherein each of the data blocks includes an expiration field.
 3. The method of securely storing data across a network in the blockstrand distributed database of claim 2, further includes, determining if the expiration threshold in each of the expiration field in each of the data blocks between the first Smartblock and the second Smartblock has been met, and pruning the blockstrand by deleting the first Smartblock and the data nodes were located between the first Smartblock and the second Smartblock.
 4. The method of securely storing data across a network in the blockstrand distributed database of claim 1, wherein terminating at a second Smartblock includes generating a previous hash that includes hash data from at least one data block located in each of the blockchains.
 5. The method of securely storing data across a network in the blockstrand distributed database of claim 1, where the Smartblock is a data block with a Smartblock identifier.
 6. The method of securely storing data across a network in the blockstrand distributed database of claim 5, wherein the Smartblock identifier is a smartblock flag.
 7. A system for securely storing data across a network in a blockstrand distributed database, comprising: a processor; a non-volatile computer memory storing computer-readable instructions configured to: generating a Smartblock; linking a first plurality of data blocks into a first blockchain attached to the Smartblock; linking at least a second plurality of data blocks into an at least second blockchain attached to the Smartblock; and terminating the first blockchain and the at least second blockchain at a second Smartblock.
 8. The system of claim 7 wherein said computer-readable instructions wherein, wherein each of the data blocks includes an expiration field.
 9. The system of claim 8 wherein said computer-readable instructions are further configured to: determine if the expiration threshold in each of the expiration field in each of the data blocks between the first Smartblock and the second Smartblock has been met, and prune the blockstrand by deleting the first Smartblock and the data nodes were located between the first Smartblock and the second Smartblock.
 10. The system of claim 7 wherein said computer-readable instructions are further configured to: terminate at a second Smartblock includes generating a previous hash that includes hash data from at least one data block located in each of the blockchains.
 11. The system of claim 7 wherein said computer-readable instructions include the Smartblock being a data block with a Smartblock identifier.
 12. The system of claim 11 wherein said computer-readable instructions wherein the Smartblock identifier is a smartblock flag. 