Smart contracts (blockchains, distributed ledgers) and rights management broadly construed are the themes of today's Spotlight Applications. Assigned to Strong Force, the first application discloses techniques for integrated gaming engines and smart contracts. Assigned to Bank of America, the second application addresses techniques for non-fungible token custody chains for multi-component hardware devices.
20230173395, “Systems and methods with integrated gaming engines and smart contracts,” assigned to Strong Force Tx Portfolio 2018, LLC.
Systems and methods for integrating a gaming engine and a smart contract system in a platform are provided. The gaming engine is programmed with a software development environment and an architecture that provides a set of gaming engine services with predefined tools for digital content developers to create a set of game engine generated environments. The smart contract system programmed with smart contract services associated with transactions that are based on electronically verifiable conditions. The integration platform is programmed with an execution framework that is common to the gaming engine and to the smart contract system to integrate the smart contract services with at least one of the gaming engine and the set of game engine generated environments.
20230179422, “Non-fungible token custody chain for multi-component hardware devices,” assigned to Bank of America.
A comprehensive system for chain-of-custody for hardware devices and their components. Specifically, as the components, assemblies and the hardware device are manufactured and/or assembled, non-fungible tokens (NFTs) are generated for each component, assembly and the overall hardware device that indicate that the component, assembly or hardware device is in a certified/verified good state (i.e., have not been tampered with). The NFTs are generated using measured authenticity characteristics (e.g., electro-magnetic, heat, weight, dimensions and the like) of a corresponding component, assembly or hardware device as at least a portion of the input to the hash algorithm. The NFTs are subsequently communicated to a distributed trust computing network at which the nodes converge to verify an authenticity and certifiable state of the NFT, and blocks of data are generated within distributed ledgers that store the verified NFT.