Blockchain Fintech – Ruslan Ardashev, Sloane Brakeville, Nitin Gaur, Gautham Pamu, International Business Machines Corp

Abstract for “Concomitance between an asset and an identity block of a Blockchain”

A blockchain of transactions can be referenced for different purposes and may later be accessed by interested parties to verify ledger integrity. One example operation could be one of several: creating an initial identification representing an asset and its owner in a Blockchain, identifying an identity bloc associated with that initial identifier and identifying an asset transfer from the owner to a Blockchain entity.

Background for “Concomitance between an asset and an identity block of a Blockchain”

“Various issues exist with blockchain applications including an inability to address various provisions such as know-your-customer and anti-money-laundering (KYC/AML), and other regulatory compliance measures, due to the inability of associating identity with transactions. Existing authentication and authorization systems can make it difficult to submit transactions on behalf end users.

One example embodiment could include one or more of the following: creating an initial identification representing an asset and an owners entity of the asset in blockchain, identifying an ID block associated with that initial identifier and identifying an asset transfer from the owner entity into a Blockchain entity.

“Another example embodiment could include an apparatus that has a processor capable of performing one or more of creating an initial identifier representing the asset and the owner entity of it in a Blockchain, identifying an identity block associated to the initial identifier and identifying an asset transfer from the owner entity into a Blockchain entity.”

“Another example embodiment could include a non-transitory computer-readable storage medium that stores instructions that, when executed, causes a processor one or more to create an initial identifier representing the asset and the owner entity of it in a Blockchain, identify an identity block associated to the initial identifier and identify an asset transfer from the owner entity into a Blockchain entity.”

It will be apparent that the components of the instant invention, as shown in the figures, can be placed in many different ways. The following description of the embodiments, including at least one, of a method and apparatus, non-transitory computing readable medium, and system, as illustrated in the attached figures is not intended limit the scope or claim, but it is representative of select embodiments.

“The instant features and structures or characteristics described in this specification can be combined in any way that suits the purposes of one or more embodiments. The usage of phrases like “example embodiments”, “some embodiments”, or similar language throughout this specification indicates that an embodiment could include a specific feature, structure, or characteristic related to the embodiment. The phrases “example embodiments”, “in some embodiments?”, “in other embodiments?”, or any other similar language throughout this specification don’t necessarily refer to the same group. Furthermore, the features, structures, and characteristics described in this specification may be combined in any way that suits the needs of one or more embodiments.

“In addition, the term’message’ may be used in the description of embodiments. While the term?message? may have been used to describe embodiments, the application can be applied to any type of network data such as packet, frame, or datagram. The term “message” can also be used. The term “message” can also refer to packet, frame, or datagram. While certain types of signals and messages may be shown in certain embodiments, they are not limited by a particular type of message and the application does not limit itself to that type of signaling.

“Example embodiments allow for identity management and association through transaction block linking to an identification block. A reference link, or transferable block, can be added to a new transaction bloc. One example is that each participant in a network can create an identity origin block to facilitate a transaction. The concomitance between an identity block and an asset block on a Blockchain network will allow for the identification information to be encapsulated in a transaction when the asset is transferred to another party. The new identity origin block can then be linked to the dematerialized asset as the ownership changes. If the initial/genesis block was created on a blockchain network, it will be attached with a KYC identity. This block is immutable, has reference data that includes KYC identity and may or not be visible by network participants. Only the identity data should be made public in the case of an audit or investigation of a transaction, or when the asset is traded or changed of ownership. After a consensus is reached, the reference block can be added as reference data or appended to the newly created blocks (i.e. a configurable option). The transaction is committed when the identity block for the new owner is added. Every asset transfer transaction includes a new block transaction, which is written to the blockchain, and more specifically the identity bloc.

“FIG. 1A shows an example embodiment of an asset certification network and ownership network. Referring to FIG. FIG. 1A shows that the network 100 has four participants: 102,104,106, and 108 in a group 101. Each participant is assigned an asset 112,114 116 and 118. Each participant has an asset 112,114, 116 and 118. The assets are linked to participants during creation. They also contain a certificate identifying the assets as being associated to a specific participant. The multi-party/individual party authentication and authorization system includes unlinked entities tied to a genesis block of a blockchain during asset creation.”

“FIG. “FIG. Referring to FIG. Referring to FIG. 1B, a network 150 comprises the participant 108 who transfers asset #1 122 from participant 104 in a transaction 132. The transaction 132 is updated to the identity/genesis block on blockchain. All transactions and owners are traceable. Participant 102 receives the asset #1124 in a second transaction. The asset #1124 now belongs to participant102. However, the provenance also includes records of participant108 and participant104 who owned the asset #1124. All ownership information has been committed to the blockchain.

“Concomitance between an identity block and an asset block on blockchain networks provides identity management, association with transaction blocks, and identity management. This process links the identity block to information such as a reference or transferable block that can be attached to a new transaction bloc. This happens when an asset’s ownership changes (e.g. Stocks, Mortgages or financial instruments). Each network participant can maintain their own authentication system and authorization system. This allows them to create an identity origin block upon first transaction or transfer of assets to another party. Concomitance between the asset and identity blocks will allow for the identification information to be encapsulated in the transaction. With an ownership change, the new ID origin block is linked with the transferred dematerialized asset. This will protect the integrity of transactions and isolate systems among participants. It also facilitates compliance for audits. Each network participant can maintain their own authentication, authorization and create an identity origin bloc for a first transaction.

Each network participant will have their own authorization and authentication system. This includes user registrations, policy servers and the linking of transactions to transactions submitted on the blockchain network. The identity (KYC), which is attached to the initial/genesis blocks, is created on the Blockchain network. If the identity is not already on the block, it is added to the new asset. This block is permanent and contains reference data. It may include KYC-specific data. However, this data may not be visible to network participants and may be revealed only in the case of an audit or investigation of the transaction.

“A reference block is added to the new block when the asset is traded, or a change in ownership is initiated. It can be either reference data, or an append to the newly created block (i.e. a configurable option). After a consensus is reached and a transaction has been committed to the blockchain, the ID block of the new owner will be added to the committed block. If necessary, or if the identity of the new owner is not visible to any network participant, these steps can be repeated. As long as transactions are being traded, this process can continue. While an identity might not initially be stored on blockchain networks, there are now mechanisms to keep an individual network participant’s authentication system(s), and include the ID block in KYC/AML related to the assets and transactions.

“FIG. 2A shows a flow diagram 200 for a blockchain-based asset logging and transfer configuration, according to examples. FIG. FIG. 2A shows how the asset is created. This may include chain code, or other data to identify the asset 212. The owner is identified 214. If the asset is not owned by the owner, the identity is checked at 222. If the identity is verified, the 226 identity block is added to the blockchain. The identity block is created 224 if the identity doesn’t exist. The reference ID block 216, if the ownership is determined to be 214, is attached. To determine if there have been any changes, the ownership is identified 218. If the answer is yes, the reference ID is added to the block of blockchain transactions 219; if not, the ownership is attempted at being identified 214.

“Certain industry sectors, such as healthcare, financial services, and insurance, may have a problem with identity. They might also need to be able to protect their personal financial and medical records with a digital signature. A user scans their identity document and then signs it. A mobile app can generate a private or public key to seal the record. This is encrypted and hashed, and then sent to the blockchain network’s communicating nodes. You can enable aliases on blockchain in a distributed fashion and transfer aliases between users. Examples of the current application include unique IDs for customers, invoice numbers, and reference numbers. An identity address on the blockchain can be used to store sensitive documents.

A mobile identity can be used to create a public and private key, and then store it on the Blockchain. Content creators can stamp their work with a digital signature to verify various attributes such as copyright and financial applications. This can then be attached to document storage systems. With user identity signatures, health care records and insurance records can also be protected on the blockchain. Global agencies and regulation might require digital signature standard X.509 time stamping, RFC3161 electronic identification and trust services, eIDAS EU (EU) national strategy to secure trusted identities in cyberspace (NSTIC (US), and similar.”

Smart contracts are a cryptographic blockchain used to digitally sign sensitive data and decentralize trust. This can be used to create smart contracts, escrow services tokenization authentication and other services. Blockchain protocols may be used to support payment and corporate remittance. These protocols can be used to transfer money across international borders as well as identity sidechains to the enterprise blockchain.

“FIG. 2B is a diagram showing a blockchain-based system procedure diagram for tracking assets according to specific embodiments. Referring to FIG. FIG. 2B shows that the system configuration 250 has a first asset owner/owner 260. This could be any participant in the blockchain configuration. An owner can create an entity 262 or log it in the blockchain 270 using an identity block 264. The identity block 266 may be updated by the blockchain to reflect the new asset and any asset transfers. The asset is then logged, and the asset is transferred 268 (or to a new owner/new device 280). To identify the transfer, the identity block must be updated 272, and the blockchain 274 will update it.

“FIG. 3A shows a flow diagram for an example method to track asset ownership in accordance with example embodiments. The method 300, in this example, includes one or more of creating an original identifier that represents an asset and an owner entity for the asset in a Blockchain 312. This method could also include identifying the identity block associated to the initial identifier 314, as well as identifying the asset transfer from the owner entity into a blockchain entity. 316 The method could also include the storage of the initial identifier within a genesis block on the blockchain and the storage of the identity block in that block. This method could also include identifying an additional asset transfer from the blockchain entity into a new entity. The initial identifier could be a KYC compatible identifier. It may also be linked to a new block that identifies the asset transfer in blockchain. An initial identifier is added to a new transaction bloc used to identify the asset-transfer in the blockchain.

“FIG. 3B is a flow diagram showing an example of a method for tracking asset ownership in accordance with example embodiments. Referring to FIG. Referring to FIG. This embodiment requires verification of provenance. However, it is possible to verify the identity block by each participant at different times. The asset could be kept in quarantine until verification is completed. After verification is complete, the verification can be confirmed and the asset may then be sent.

The above embodiments can be implemented in hardware, in computer programs executed by a processor or in firmware. A computer program can be embedded on a computer-readable medium such as a storage media. A computer program could, for example, reside in random access memory. ), flash memory or read-only memory (??ROM?). ), erasable, programmable read only memory (?EPROM) ), Electrically erasable, programmable read only memory (?EEPROM) Registers, registers, hard drive, a removable disc, a compact disk read only memory (?CDROM?),?EEPROM? ), or any other storage medium that is known to the art.

“An example storage medium could be connected to the processor so that the processor can read and write to the storage medium. Alternativly, the storage medium could be integrated with the processor. The application-specific integrated circuit (?ASIC?) may house the processor and storage medium. Alternativly, the storage medium and processor may be located as separate components. FIG. FIG. 4 shows an example of a network element 400 that could be used in or integrated into any of the components described above.

“As illustrated at FIG. “As illustrated in FIG. The software code of the application can be written in a language that is understood by processor 420 and stored on a computer-readable medium such as a memory. A computer readable media may be non-transitory and contain tangible hardware components such as memory that can store software. A software module 430 could be another separate entity that forms part of the network entity 400. It may contain software instructions that can be executed by processor 420 to perform one or more functions. The network entity 400 may include the components mentioned above, as well as a transmitter-receiver pair that can receive and transmit communications signals (not illustrated).

“An exemplary embodiment of at most one of a system and method has been shown in the accompanying drawings and described in detail in the foregoing description. However, it is clear that the application is not limited by the disclosed embodiments. It is also capable of many rearrangements, modifications and substitutions as defined and claimed in the following claims. The system can perform the functions shown in the figures by any combination of one or more modules or components. It may also be implemented in a distributed architecture that includes a transmitter, receiver, or a pair of them. One or more modules may perform all or part the functionality of individual modules. The functionality described in this document can be performed at different times and with respect to various events, whether internal or external to the components or modules. Information can also be sent between modules using at least one of the following: the Internet, the Internet Protocol network, a voice network or an Internet Protocol network. A wireless device, wired device, and/or multiple protocols are all possible. The messages that are sent and received by any module may be sent directly or via one or more modules.

“A?system’ is something that anyone skilled in the art can appreciate. A?system’ could be described as a personal computer or server, a console or a console, a console or a personal digital assistant (PDA), cell phone, tablet computing device or smartphone, or any combination of these devices. The functions described above are referred to as being performed by a “system”. This is not meant to limit the scope or limitations of the present application, but it is intended to illustrate one of many possible embodiments. Methods, systems, and apparatuses described herein can be implemented in both localized and distributed forms compatible with computing technology.

“It is important to note that not all system features are described here in modules. This is in order to emphasize their independence in implementation. A module could be implemented in a hardware circuit that includes custom very large scale integration (VLSI), gate arrays, off the shelf semiconductors like logic chips, transistors, and other discrete components. You can also implement a module in programmable hardware devices like field programmable gate arrangements, programmable array logics, programmable logic units, and the like.

“A module can also be implemented in software to allow execution by different types of processors. A unit of executable code can, for example, contain one or more physical blocks or logical blocks that include computer instructions. These instructions may be organized in a number of ways, such as object, procedure, function. The executables of an identified unit of executable code do not have to be physically located together. They may contain different instructions that are stored in different locations and, when combined logically, form the module. Modules can also be stored on computer-readable media, such as a hard drive, flash device or random access memory (RAM), tape or any other medium that stores data.

A module of executable software could contain one or more instructions and can be distributed across multiple code segments, between different programs, or across multiple memory devices. Similar to operational data, it can be identified and illustrated in modules. It may also be organized into any type of data structure and in any form. Operational data can be collected in one data set or distributed across multiple locations, including different storage devices. They may also exist at least partially as electronic signals within a system or network.

It will be clear that components of the invention, as shown in the figures, can be placed and designed in many different ways. The detailed descriptions of the embodiments are not meant to limit the scope or claim of the application. They only represent a few embodiments of that application.

“One with ordinary skill in art will quickly understand that the steps described above can be performed in a different order and/or with hardware elements that are not disclosed. Although the preferred embodiments have been described, it is obvious to those skilled in the art that there are many modifications, variations and other constructions.

“Preferred embodiments of this application have been described. However, it is to understand that these embodiments are only illustrative and the scope is to be determined solely by the appended Claims when considered with all equivalents and modifications (e.g. protocols, hardware devices etc.). thereto.”

Summary for “Concomitance between an asset and an identity block of a Blockchain”

“Various issues exist with blockchain applications including an inability to address various provisions such as know-your-customer and anti-money-laundering (KYC/AML), and other regulatory compliance measures, due to the inability of associating identity with transactions. Existing authentication and authorization systems can make it difficult to submit transactions on behalf end users.

One example embodiment could include one or more of the following: creating an initial identification representing an asset and an owners entity of the asset in blockchain, identifying an ID block associated with that initial identifier and identifying an asset transfer from the owner entity into a Blockchain entity.

“Another example embodiment could include an apparatus that has a processor capable of performing one or more of creating an initial identifier representing the asset and the owner entity of it in a Blockchain, identifying an identity block associated to the initial identifier and identifying an asset transfer from the owner entity into a Blockchain entity.”

“Another example embodiment could include a non-transitory computer-readable storage medium that stores instructions that, when executed, causes a processor one or more to create an initial identifier representing the asset and the owner entity of it in a Blockchain, identify an identity block associated to the initial identifier and identify an asset transfer from the owner entity into a Blockchain entity.”

It will be apparent that the components of the instant invention, as shown in the figures, can be placed in many different ways. The following description of the embodiments, including at least one, of a method and apparatus, non-transitory computing readable medium, and system, as illustrated in the attached figures is not intended limit the scope or claim, but it is representative of select embodiments.

“The instant features and structures or characteristics described in this specification can be combined in any way that suits the purposes of one or more embodiments. The usage of phrases like “example embodiments”, “some embodiments”, or similar language throughout this specification indicates that an embodiment could include a specific feature, structure, or characteristic related to the embodiment. The phrases “example embodiments”, “in some embodiments?”, “in other embodiments?”, or any other similar language throughout this specification don’t necessarily refer to the same group. Furthermore, the features, structures, and characteristics described in this specification may be combined in any way that suits the needs of one or more embodiments.

“In addition, the term’message’ may be used in the description of embodiments. While the term?message? may have been used to describe embodiments, the application can be applied to any type of network data such as packet, frame, or datagram. The term “message” can also be used. The term “message” can also refer to packet, frame, or datagram. While certain types of signals and messages may be shown in certain embodiments, they are not limited by a particular type of message and the application does not limit itself to that type of signaling.

“Example embodiments allow for identity management and association through transaction block linking to an identification block. A reference link, or transferable block, can be added to a new transaction bloc. One example is that each participant in a network can create an identity origin block to facilitate a transaction. The concomitance between an identity block and an asset block on a Blockchain network will allow for the identification information to be encapsulated in a transaction when the asset is transferred to another party. The new identity origin block can then be linked to the dematerialized asset as the ownership changes. If the initial/genesis block was created on a blockchain network, it will be attached with a KYC identity. This block is immutable, has reference data that includes KYC identity and may or not be visible by network participants. Only the identity data should be made public in the case of an audit or investigation of a transaction, or when the asset is traded or changed of ownership. After a consensus is reached, the reference block can be added as reference data or appended to the newly created blocks (i.e. a configurable option). The transaction is committed when the identity block for the new owner is added. Every asset transfer transaction includes a new block transaction, which is written to the blockchain, and more specifically the identity bloc.

“FIG. 1A shows an example embodiment of an asset certification network and ownership network. Referring to FIG. FIG. 1A shows that the network 100 has four participants: 102,104,106, and 108 in a group 101. Each participant is assigned an asset 112,114 116 and 118. Each participant has an asset 112,114, 116 and 118. The assets are linked to participants during creation. They also contain a certificate identifying the assets as being associated to a specific participant. The multi-party/individual party authentication and authorization system includes unlinked entities tied to a genesis block of a blockchain during asset creation.”

“FIG. “FIG. Referring to FIG. Referring to FIG. 1B, a network 150 comprises the participant 108 who transfers asset #1 122 from participant 104 in a transaction 132. The transaction 132 is updated to the identity/genesis block on blockchain. All transactions and owners are traceable. Participant 102 receives the asset #1124 in a second transaction. The asset #1124 now belongs to participant102. However, the provenance also includes records of participant108 and participant104 who owned the asset #1124. All ownership information has been committed to the blockchain.

“Concomitance between an identity block and an asset block on blockchain networks provides identity management, association with transaction blocks, and identity management. This process links the identity block to information such as a reference or transferable block that can be attached to a new transaction bloc. This happens when an asset’s ownership changes (e.g. Stocks, Mortgages or financial instruments). Each network participant can maintain their own authentication system and authorization system. This allows them to create an identity origin block upon first transaction or transfer of assets to another party. Concomitance between the asset and identity blocks will allow for the identification information to be encapsulated in the transaction. With an ownership change, the new ID origin block is linked with the transferred dematerialized asset. This will protect the integrity of transactions and isolate systems among participants. It also facilitates compliance for audits. Each network participant can maintain their own authentication, authorization and create an identity origin bloc for a first transaction.

Each network participant will have their own authorization and authentication system. This includes user registrations, policy servers and the linking of transactions to transactions submitted on the blockchain network. The identity (KYC), which is attached to the initial/genesis blocks, is created on the Blockchain network. If the identity is not already on the block, it is added to the new asset. This block is permanent and contains reference data. It may include KYC-specific data. However, this data may not be visible to network participants and may be revealed only in the case of an audit or investigation of the transaction.

“A reference block is added to the new block when the asset is traded, or a change in ownership is initiated. It can be either reference data, or an append to the newly created block (i.e. a configurable option). After a consensus is reached and a transaction has been committed to the blockchain, the ID block of the new owner will be added to the committed block. If necessary, or if the identity of the new owner is not visible to any network participant, these steps can be repeated. As long as transactions are being traded, this process can continue. While an identity might not initially be stored on blockchain networks, there are now mechanisms to keep an individual network participant’s authentication system(s), and include the ID block in KYC/AML related to the assets and transactions.

“FIG. 2A shows a flow diagram 200 for a blockchain-based asset logging and transfer configuration, according to examples. FIG. FIG. 2A shows how the asset is created. This may include chain code, or other data to identify the asset 212. The owner is identified 214. If the asset is not owned by the owner, the identity is checked at 222. If the identity is verified, the 226 identity block is added to the blockchain. The identity block is created 224 if the identity doesn’t exist. The reference ID block 216, if the ownership is determined to be 214, is attached. To determine if there have been any changes, the ownership is identified 218. If the answer is yes, the reference ID is added to the block of blockchain transactions 219; if not, the ownership is attempted at being identified 214.

“Certain industry sectors, such as healthcare, financial services, and insurance, may have a problem with identity. They might also need to be able to protect their personal financial and medical records with a digital signature. A user scans their identity document and then signs it. A mobile app can generate a private or public key to seal the record. This is encrypted and hashed, and then sent to the blockchain network’s communicating nodes. You can enable aliases on blockchain in a distributed fashion and transfer aliases between users. Examples of the current application include unique IDs for customers, invoice numbers, and reference numbers. An identity address on the blockchain can be used to store sensitive documents.

A mobile identity can be used to create a public and private key, and then store it on the Blockchain. Content creators can stamp their work with a digital signature to verify various attributes such as copyright and financial applications. This can then be attached to document storage systems. With user identity signatures, health care records and insurance records can also be protected on the blockchain. Global agencies and regulation might require digital signature standard X.509 time stamping, RFC3161 electronic identification and trust services, eIDAS EU (EU) national strategy to secure trusted identities in cyberspace (NSTIC (US), and similar.”

Smart contracts are a cryptographic blockchain used to digitally sign sensitive data and decentralize trust. This can be used to create smart contracts, escrow services tokenization authentication and other services. Blockchain protocols may be used to support payment and corporate remittance. These protocols can be used to transfer money across international borders as well as identity sidechains to the enterprise blockchain.

“FIG. 2B is a diagram showing a blockchain-based system procedure diagram for tracking assets according to specific embodiments. Referring to FIG. FIG. 2B shows that the system configuration 250 has a first asset owner/owner 260. This could be any participant in the blockchain configuration. An owner can create an entity 262 or log it in the blockchain 270 using an identity block 264. The identity block 266 may be updated by the blockchain to reflect the new asset and any asset transfers. The asset is then logged, and the asset is transferred 268 (or to a new owner/new device 280). To identify the transfer, the identity block must be updated 272, and the blockchain 274 will update it.

“FIG. 3A shows a flow diagram for an example method to track asset ownership in accordance with example embodiments. The method 300, in this example, includes one or more of creating an original identifier that represents an asset and an owner entity for the asset in a Blockchain 312. This method could also include identifying the identity block associated to the initial identifier 314, as well as identifying the asset transfer from the owner entity into a blockchain entity. 316 The method could also include the storage of the initial identifier within a genesis block on the blockchain and the storage of the identity block in that block. This method could also include identifying an additional asset transfer from the blockchain entity into a new entity. The initial identifier could be a KYC compatible identifier. It may also be linked to a new block that identifies the asset transfer in blockchain. An initial identifier is added to a new transaction bloc used to identify the asset-transfer in the blockchain.

“FIG. 3B is a flow diagram showing an example of a method for tracking asset ownership in accordance with example embodiments. Referring to FIG. Referring to FIG. This embodiment requires verification of provenance. However, it is possible to verify the identity block by each participant at different times. The asset could be kept in quarantine until verification is completed. After verification is complete, the verification can be confirmed and the asset may then be sent.

The above embodiments can be implemented in hardware, in computer programs executed by a processor or in firmware. A computer program can be embedded on a computer-readable medium such as a storage media. A computer program could, for example, reside in random access memory. ), flash memory or read-only memory (??ROM?). ), erasable, programmable read only memory (?EPROM) ), Electrically erasable, programmable read only memory (?EEPROM) Registers, registers, hard drive, a removable disc, a compact disk read only memory (?CDROM?),?EEPROM? ), or any other storage medium that is known to the art.

“An example storage medium could be connected to the processor so that the processor can read and write to the storage medium. Alternativly, the storage medium could be integrated with the processor. The application-specific integrated circuit (?ASIC?) may house the processor and storage medium. Alternativly, the storage medium and processor may be located as separate components. FIG. FIG. 4 shows an example of a network element 400 that could be used in or integrated into any of the components described above.

“As illustrated at FIG. “As illustrated in FIG. The software code of the application can be written in a language that is understood by processor 420 and stored on a computer-readable medium such as a memory. A computer readable media may be non-transitory and contain tangible hardware components such as memory that can store software. A software module 430 could be another separate entity that forms part of the network entity 400. It may contain software instructions that can be executed by processor 420 to perform one or more functions. The network entity 400 may include the components mentioned above, as well as a transmitter-receiver pair that can receive and transmit communications signals (not illustrated).

“An exemplary embodiment of at most one of a system and method has been shown in the accompanying drawings and described in detail in the foregoing description. However, it is clear that the application is not limited by the disclosed embodiments. It is also capable of many rearrangements, modifications and substitutions as defined and claimed in the following claims. The system can perform the functions shown in the figures by any combination of one or more modules or components. It may also be implemented in a distributed architecture that includes a transmitter, receiver, or a pair of them. One or more modules may perform all or part the functionality of individual modules. The functionality described in this document can be performed at different times and with respect to various events, whether internal or external to the components or modules. Information can also be sent between modules using at least one of the following: the Internet, the Internet Protocol network, a voice network or an Internet Protocol network. A wireless device, wired device, and/or multiple protocols are all possible. The messages that are sent and received by any module may be sent directly or via one or more modules.

“A?system’ is something that anyone skilled in the art can appreciate. A?system’ could be described as a personal computer or server, a console or a console, a console or a personal digital assistant (PDA), cell phone, tablet computing device or smartphone, or any combination of these devices. The functions described above are referred to as being performed by a “system”. This is not meant to limit the scope or limitations of the present application, but it is intended to illustrate one of many possible embodiments. Methods, systems, and apparatuses described herein can be implemented in both localized and distributed forms compatible with computing technology.

“It is important to note that not all system features are described here in modules. This is in order to emphasize their independence in implementation. A module could be implemented in a hardware circuit that includes custom very large scale integration (VLSI), gate arrays, off the shelf semiconductors like logic chips, transistors, and other discrete components. You can also implement a module in programmable hardware devices like field programmable gate arrangements, programmable array logics, programmable logic units, and the like.

“A module can also be implemented in software to allow execution by different types of processors. A unit of executable code can, for example, contain one or more physical blocks or logical blocks that include computer instructions. These instructions may be organized in a number of ways, such as object, procedure, function. The executables of an identified unit of executable code do not have to be physically located together. They may contain different instructions that are stored in different locations and, when combined logically, form the module. Modules can also be stored on computer-readable media, such as a hard drive, flash device or random access memory (RAM), tape or any other medium that stores data.

A module of executable software could contain one or more instructions and can be distributed across multiple code segments, between different programs, or across multiple memory devices. Similar to operational data, it can be identified and illustrated in modules. It may also be organized into any type of data structure and in any form. Operational data can be collected in one data set or distributed across multiple locations, including different storage devices. They may also exist at least partially as electronic signals within a system or network.

It will be clear that components of the invention, as shown in the figures, can be placed and designed in many different ways. The detailed descriptions of the embodiments are not meant to limit the scope or claim of the application. They only represent a few embodiments of that application.

“One with ordinary skill in art will quickly understand that the steps described above can be performed in a different order and/or with hardware elements that are not disclosed. Although the preferred embodiments have been described, it is obvious to those skilled in the art that there are many modifications, variations and other constructions.

“Preferred embodiments of this application have been described. However, it is to understand that these embodiments are only illustrative and the scope is to be determined solely by the appended Claims when considered with all equivalents and modifications (e.g. protocols, hardware devices etc.). thereto.”

Click here to view the patent on Google Patents.