Methods and apparatus for enabling transaction relating to digital assets
First Claim
Patent Images
1. A computer-implemented method for facilitating a transaction relating to security in a network, comprising:
- providing a lockbox process in the network for mediating the transaction;
receiving a security title object from a first party with the lockbox process, the security title object including security title data identifying the security and defining access rights corresponding to the security, and at least one redemption method for redeeming the security title object;
receiving a second title object from a second party with the lockbox process, the second title object including second title data defining access rights corresponding to the second title object;
upon successful execution of the at least one redemption method, transferring the security title object to the second party and the second title object to the first party.
1 Assignment
0 Petitions
Accused Products
Abstract
Methods and apparatus are described which enable transactions in electronic networks relating to digital assets, e.g., digital goods or services, through the use of title objects. A title object may have a number of elements and attributes which identify one or more digital assets and define access rights to the corresponding digital asset(s).
-
Citations
25 Claims
-
1. A computer-implemented method for facilitating a transaction relating to security in a network, comprising:
-
providing a lockbox process in the network for mediating the transaction;
receiving a security title object from a first party with the lockbox process, the security title object including security title data identifying the security and defining access rights corresponding to the security, and at least one redemption method for redeeming the security title object;
receiving a second title object from a second party with the lockbox process, the second title object including second title data defining access rights corresponding to the second title object;
upon successful execution of the at least one redemption method, transferring the security title object to the second party and the second title object to the first party. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18)
-
- 19. At least one computer-readable medium having data structures and computer program instructions stored therein representing a security title object, the data structures identifying an underlying security and defining access rights to the security title object, the data structures further being operable to verify that only a single instance of the security title object exists, the computer program instructions representing at least one redemption method relating to the underlying security and being operable when executed by a computer to facilitate a transaction in a network relating to the underlying security.
Specification