Cryptographic digital asset architecture with selectively-lockable dynamic evolution

    公开(公告)号:US11922415B2

    公开(公告)日:2024-03-05

    申请号:US18305308

    申请日:2023-04-21

    Applicant: NIKE, Inc.

    CPC classification number: G06Q20/389 G06Q20/3672 G06Q20/3825

    Abstract: A method of selectively locking a cryptographic digital asset includes instructing or requesting the creation or minting of a plurality of cryptographic tokens via a first common digital contract registered to a distributed ledger. Each cryptographic token is a digital asset that includes at least one attribute that is operative to evolve or change through a plurality of evolutionary stages. The plurality of cryptographic tokens are then instructed to be transferred to a plurality of token holders. The method further includes receiving a request from a token holder to selectively lock their digital asset at one of the plurality of evolutionary stages; and instructing or requesting the transfer of a second cryptographic token to the token holder, the second cryptographic token having at least one attribute that is at least partially derived from the evolutionary stage of the digital asset at the time of the request.

    CRYPTOGRAPHIC DIGITAL ASSET ARCHITECTURE WITH SELECTIVELY-LOCKABLE DYNAMIC EVOLUTION

    公开(公告)号:US20230342767A1

    公开(公告)日:2023-10-26

    申请号:US18305308

    申请日:2023-04-21

    Applicant: NIKE, Inc.

    CPC classification number: G06Q20/389 G06Q20/3672 G06Q20/3825

    Abstract: A method of selectively locking a cryptographic digital asset includes instructing or requesting the creation or minting of a plurality of cryptographic tokens via a first common digital contract registered to a distributed ledger. Each cryptographic token is a digital asset that includes at least one attribute that is operative to evolve or change through a plurality of evolutionary stages. The plurality of cryptographic tokens are then instructed to be transferred to a plurality of token holders. The method further includes receiving a request from a token holder to selectively lock their digital asset at one of the plurality of evolutionary stages; and instructing or requesting the transfer of a second cryptographic token to the token holder, the second cryptographic token having at least one attribute that is at least partially derived from the evolutionary stage of the digital asset at the time of the request.

Patent Agency Ranking