Healthcare analytics, AI solutions for biological big data, providing an AI platform for the biotech, life sciences, medical and pharmaceutical industries, as well as for related technological approaches, i.e., curation and text analysis with machine learning and other activities related to AI applications to these industries.
@MIT Artificial intelligence system rapidly predicts how two proteins will attach: The model called Equidock, focuses on rigid body docking — which occurs when two proteins attach by rotating or translating in 3D space, but their shapes don’t squeeze or bend
Reporter: Aviva Lev-Ari, PhD, RN
This paper introduces a novel SE(3) equivariant graph matching network, along with a keypoint discovery and alignment approach, for the problem of protein-protein docking, with a novel loss based on optimal transport. The overall consensus is that this is an impactful solution to an important problem, whereby competitive results are achieved without the need for templates, refinement, and are achieved with substantially faster run times.
Keywords:protein complexes, protein structure, rigid body docking, SE(3) equivariance, graph neural networks
Abstract: Protein complex formation is a central problem in biology, being involved in most of the cell’s processes, and essential for applications such as drug design or protein engineering. We tackle rigid body protein-protein docking, i.e., computationally predicting the 3D structure of a protein-protein complex from the individual unbound structures, assuming no three-dimensional flexibility during binding. We design a novel pairwise-independent SE(3)-equivariant graph matching network to predict the rotation and translation to place one of the proteins at the right location and the right orientation relative to the second protein. We mathematically guarantee that the predicted complex is always identical regardless of the initial placements of the two structures, avoiding expensive data augmentation. Our model approximates the binding pocket and predicts the docking pose using keypoint matching and alignment through optimal transport and a differentiable Kabsch algorithm. Empirically, we achieve significant running time improvements over existing protein docking software and predict qualitatively plausible protein complex structures despite not using heavy sampling, structure refinement, or templates.
One-sentence Summary: We perform rigid protein docking using a novel independent SE(3)-equivariant message passing mechanism that guarantees the same resulting protein complex independent of the initial placement of the two 3D structures.
MIT researchers created a machine-learning model that can directly predict the complex that will form when two proteins bind together. Their technique is between 80 and 500 times faster than state-of-the-art software methods, and often predicts protein structures that are closer to actual structures that have been observed experimentally.
This technique could help scientists better understand some biological processes that involve protein interactions, like DNA replication and repair; it could also speed up the process of developing new medicines.
“Deep learning is very good at capturing interactions between different proteins that are otherwise difficult for chemists or biologists to write experimentally. Some of these interactions are very complicated, and people haven’t found good ways to express them. This deep-learning model can learn these types of interactions from data,” says Octavian-Eugen Ganea, a postdoc in the MIT Computer Science and Artificial Intelligence Laboratory (CSAIL) and co-lead author of the paper.
Ganea’s co-lead author is Xinyuan Huang, a graduate student at ETH Zurich. MIT co-authors include Regina Barzilay, the School of Engineering Distinguished Professor for AI and Health in CSAIL, and Tommi Jaakkola, the Thomas Siebel Professor of Electrical Engineering in CSAIL and a member of the Institute for Data, Systems, and Society. The research will be presented at the International Conference on Learning Representations.
Significance of the Scientific Development by the @MIT Team
EquiDock wide applicability:
Our method can be integrated end-to-end to boost the quality of other models (see above discussion on runtime importance). Examples are predicting functions of protein complexes [3] or their binding affinity [5], de novo generation of proteins binding to specific targets (e.g., antibodies [6]), modeling back-bone and side-chain flexibility [4], or devising methods for non-binary multimers. See the updated discussion in the “Conclusion” section of our paper.
Advantages over previous methods:
Our method does not rely on templates or heavy candidate sampling [7], aiming at the ambitious goal of predicting the complex pose directly. This should be interpreted in terms of generalization (to unseen structures) and scalability capabilities of docking models, as well as their applicability to various other tasks (discussed above).
Our method obtains a competitive quality without explicitly using previous geometric (e.g., 3D Zernike descriptors [8]) or chemical (e.g., hydrophilic information) features [3]. Future EquiDock extensions would find creative ways to leverage these different signals and, thus, obtain more improvements.
Novelty of theory:
Our work is the first to formalize the notion of pairwise independent SE(3)-equivariance. Previous work (e.g., [9,10]) has incorporated only single object Euclidean-equivariances into deep learning models. For tasks such as docking and binding of biological objects, it is crucial that models understand the concept of multi-independent Euclidean equivariances.
All propositions in Section 3 are our novel theoretical contributions.
We have rewritten the Contribution and Related Work sections to clarify this aspect.
Footnote [a]: We have fixed an important bug in the cross-attention code. We have done a more extensive hyperparameter search and understood that layer normalization is crucial in layers used in Eqs. 5 and 9, but not on the h embeddings as it was originally shown in Eq. 10. We have seen benefits from training our models with a longer patience in the early stopping criteria (30 epochs for DIPS and 150 epochs for DB5). Increasing the learning rate to 2e-4 is important to speed-up training. Using an intersection loss weight of 10 leads to improved results compared to the default of 1.
Bibliography:
[1] Protein-ligand blind docking using QuickVina-W with inter-process spatio-temporal integration, Hassan et al., 2017
[2] GNINA 1.0: molecular docking with deep learning, McNutt et al., 2021
[3] Protein-protein and domain-domain interactions, Kangueane and Nilofer, 2018
[4] Side-chain Packing Using SE(3)-Transformer, Jindal et al., 2022
[5] Contacts-based prediction of binding affinity in protein–protein complexes, Vangone et al., 2015
[6] Iterative refinement graph neural network for antibody sequence-structure co-design, Jin et al., 2021
[7] Hierarchical, rotation-equivariant neural networks to select structural models of protein complexes, Eismann et al, 2020
[8] Protein-protein docking using region-based 3D Zernike descriptors, Venkatraman et al., 2009
[9] SE(3)-transformers: 3D roto-translation equivariant attention networks, Fuchs et al, 2020
[10] E(n) equivariant graph neural networks, Satorras et al., 2021
[11] Fast end-to-end learning on protein surfaces, Sverrisson et al., 2020
Parasym™ neuromodulation device reveals promising developments in the treatment of heart failure patients with preserved ejection fraction: Clinical Trial Results
Reporter and Curator: Aviva Lev-Ari, PhD, RN
Neuromodulation of Inflammation to Treat Heart Failure With Preserved Ejection Fraction: A Pilot Randomized Clinical Trial
A systemic proinflammatory state plays a central role in the development of heart failure with preserved ejection fraction. Low‐level transcutaneous vagus nerve stimulation suppresses inflammation in humans. We conducted a sham‐controlled, double‐blind, randomized clinical trial to examine the effect of chronic low‐level transcutaneous vagus nerve stimulation on cardiac function, exercise capacity, and inflammation in patients with heart failure with preserved ejection fraction.
Methods and Results
Patients with heart failure with preserved ejection fraction and at least 2 additional comorbidities (obesity, diabetes, hypertension, or age ≥65 years) were randomized to either active (tragus) or sham (earlobe) low‐level transcutaneous vagus nerve stimulation (20 Hz, 1 mA below discomfort threshold), for 1 hour daily for 3 months. Echocardiography, 6‐minute walk test, quality of life, and serum cytokines were assessed at baseline and 3 months. Fifty‐two patients (mean age 70.4±9.2 years; 70% female) were included (active, n=26; sham, n=26). Baseline characteristics were balanced between the 2 arms. Adherence to the protocol of daily stimulation was >90% in both arms (P>0.05). While the early mitral inflow Doppler velocity to the early diastolic mitral annulus velocity ratio did not differ between groups, global longitudinal strain and tumor necrosis factor‐α levels at 3 months were significantly improved in the active compared with the sham arm (−18.6%±2.5% versus −16.0%±2.4%, P=0.002; 8.9±2.8 pg/mL versus 11.3±2.9 pg/mL, P=0.007, respectively). The reduction in tumor necrosis factor‐α levels correlated with global longitudinal strain improvement (r=−0.73, P=0.001). Quality of life was better in the active arm. No device‐related side effects were observed.
Conclusions
Neuromodulation with low‐level transcutaneous vagus nerve stimulation over 3 months resulted in a significant improvement in global longitudinal strain, inflammatory cytokines, and quality of life in patients with heart failure with preserved ejection fraction.
Press Release Announcement by Parasym™ is a neurotechnology company dedicated to shaping the future of bioelectric medicine. Founded in 2015 by Sophie and Nathan Dundovic, is focused on providing innovative neuromodulation products that restore health. The company has over 60 clinical partnerships across 4 continents, and over 1,000,000 treatment sessions completed. For more information about Parasym™’s latest products, visit nurosym.com
Parasym™ is the only company to have developed a device that utilises advances in electroceutical technology to provide ground-breaking non-invasive treatment for numerous health and wellness conditions ranging from mental to physical health including heart failure, without the need for heart failure medication. For further information about Parasym™ visit parasym.co.
The neuromodulation device is non-invasive, patients are able to use it in addition to medication should they want to. Electroceuticals are set to revolutionise the treatment paradigm in heart failure, especially neuromodulation with its capacity to provide highly targeted treatment without drug interaction or side effects.
Clinical trial results
The study revealed significant improvements in levels of proinflammatory cytokines Interleukin-8 and Tumour Necrosis Factor alpha, indicating that the treatment had a significant anti-inflammatory effect, as well as in global longitudinal strain, a core indicator of cardiac mechanics.
Dr Stavros Stavrakis MD, PhD, Associate Professor at University of Oklahoma College of Medicine commented: “We conducted a sham-controlled, double-blind, randomized clinical trial to examine the effect of chronic low-level transcutaneous vagus nerve stimulation on cardiac function, exercise capacity, and inflammation in a subgroup of patients with heart failure with preserved ejection fraction with a predominantly inflammatory-metabolic phenotype. In this patient population, neuromodulation with low-level transcutaneous vagus nerve stimulation over three months resulted in a significant improvement in global longitudinal strain, inflammatory cytokines, and quality of life. Our results support the emerging paradigm of noninvasive neuromodulation to treat selected patients with heart failure with preserved ejection fraction and provide the basis for further randomized trials.”
Parasym™️ is committed to supporting groundbreaking cardiac research and we are working to bring non-invasive electroceutical treatments to patients suffering from heart failure.
“The results published in the Journal of the American Heart Association highlight the brilliant work done by researchers at the University of Oklahoma and show the incredible potential that Parasym’s neuromodulatory technology can have in a condition where there is an urgent unmet clinical need for new treatment options. We are incredibly proud of the trial results and hope to continue to demonstrate the positive impact of neuromodulation in healthcare.”
SOURCE
From: Sofia Leadbetter <sofia@lem-uhn.com> Date: Tuesday, February 22, 2022 at 9:56 AM To: Aviva Lev-Ari <avivalev-ari@alum.berkeley.edu> Subject: Re: A groundbreaking clinical trial using Parasym™ neuromodulation device reveals promising developments in the treatment of heart failure
Other related articles published in this Open Access Online Scientific Journal includes the following:
I. A related topic is Renal denervation for Hypertension control by a medical device
Single-Author Reporting on MedTech and Cardiac Medical Devices by
Experimental Therapy (Left inter-atrial shunt implant device) for Heart Failure: Expert Opinion on a Preliminary Study on Heart Failure with preserved Ejection Fraction
This book is a comprehensive review of Nitric Oxide, its discovery, function, and related opportunities for Targeted Therapy written by Experts, Authors, Writers: PhDs, MDs, MD/PhDs, PharmDs. Nitric oxide plays a wide variety of roles in cardiovascular system and acts as a central point for signal transduction pathway in endothelium. NITRIC OXIDE modulates vascular tone, fibrinolysis, blood pressure and proliferation of vascular smooth muscle cells. In the cardiovascular system disruption of NITRIC OXIDE pathways or alterations in NITRIC OXIDE production can result in predisposition to hypertension, hypercholesterolemia, diabetes mellitus, atherosclerosis and thrombosis. The essential role of NITRIC OXIDE is seen widely in organ function and in disease development. The role of NITRIC OXIDE covers the cardiovascular system, the acuity of sepsis and septic shock, gastrointestinal disease, renal disease, and neurological disorders. The final chapter is the essential role of NITRIC OXIDE in carcinogenesis. Therapeutic Targets to Clinical Applications: Pharmaco-therapy was developed and it represents methods to induce the production of Nitric Oxide and its enzymes for novel combination drug therapies.
This e-Book is a comprehensive review of recent Original Research on Cardiovascular Diseases: Causes, Risks and Management and related opportunities for Targeted Therapy written by Experts, Authors and Writers. The results of Original Research are gaining value added for the e-Reader by the Methodology of Curation. The e-Book’s articles have been published on the Open Access Online Scientific Journal, since April 2012. Topics covered in greater details include: •Alternative solutions in Treatment of Heart Failure (HF), medical devices, biomarkers and agent efficacy are handled all in one chapter. •PCI for valves vs Open heart Valve replacement •PDA and Complications of Surgery — only curation could create the picture of this unique combination of debate, as exemplified of Endarterectomy (CEA) vs Stenting the Carotid Artery (CAS), ischemic leg, renal artery stenosis.
This e-Book is a comprehensive review of recent Original Research on Cardiovascular Diseases: Causes, Risks and Management and related opportunities for Targeted Therapy written by Experts, Authors and Writers. The results of Original Research are gaining value added for the e-Reader by the Methodology of Curation. The e-Book’s articles have been published on the Open Access Online Scientific Journal, since April 2012. This e-Book includes a thorough evaluation of a rich source of research literature on the genomic influences, which may have variable strength in the biological causation of atherosclerosis, microvascular disease, plaque formation, not necessarily having expressing, except in a multivariable context that includes the environment, dietary factors, level of emotional stress, sleep habits, and the daily activities of living for affected individuals. The potential of genomics is carried in the DNA, copied to RNA, and this is most well studied in the micro RNAs (miRNA). The miRNA has been explored for the appearance in the circulation of specific miRNAs that might be associated with myocyte or endothelial cell injury, and they are also being used as targets for therapeutics by the creation of silencing RNAs (siRNA).
This e-Book is a comprehensive review of recent Original Research on Cardiovascular Diseases: Causes, Risks and Management and related opportunities for Targeted Therapy written by Experts, Authors and Writers. The results of Original Research are gaining value added for the e-Reader by the Methodology of Curation. The e-Book’s articles have been published on the Open Access Online Scientific Journal, since April 2012. Part 1 is concerned with Posttranslational Modification of Proteins, vital for understanding cellular regulation and dysregulation. Part 2 is concerned with Translational Medical Therapeutics, the efficacy of medical and surgical decisions based on bringing the knowledge gained from the laboratory, and from clinical trials into the realm opf best practice. The time for this to occur in practice in the past has been through roughly a generation of physicians. That was in part related to the busy workload of physicians, and inability to easily access specialty literature as the volume and complexity increased. This had an effect of making access of a family to a primary care provider through a lifetime less likely than the period post WWII into the 1980s.
Pharmacologic therapy represents the dominant strategy for management of cardiovascular disease and consequences, deferring, complementing and often supplanting structural and functional interventions. The general strategy of medical management is to identify the biochemicals that control cardiovascular functions and responses, identify the consequences of push and pull (stimulation, potentiation, inhibition, blockade, counteractivity), check benefits and harm, systematically document the impact, both in population studies and in individuals, make wise choices, and optimize dosing. Medications mimic or modify natural biologic activities. Therefore genomics (the study of gene products, especially, messengers and receptors) and the cascade of signaling pathways that modulate responses identifies the myriad but theoretically finite possibilities for chemical intervention. Often there are many pathways that affect or are affected by cardiovascular disease, and multiple ways to promote desirable changes. Elucidation of the biochemical signal changes that correspond to or respond to cardiovascular disease conditions and treatments provides both biomarkers of patient health status and targets for therapy. The process of homeostasis resists change, including resisting desirable changes that aim to correct maladaptive biology. Thus medication to block an excess in heart rate and blood pressure, for example, leads to upregulation in the number and sensitivity of blocked receptors as well changes in activity of sibling pathways, which mitigate the impact of the blocking medication and promote rebound worsening of the primary concern if the medication gets interrupted. These issues influence combination therapy choices as well as concern about compliance with prescriptions. Therefore this guided tour of curated data relating to medical management of cardiovascular diseases draws from the human genome project to identify treatment opportunities, pathophysiology to understand the impact of disease and maladaptive responses, clinical disease and pharmaceutical classifications, and clinical trial results to clarify expected outcomes. Curation also addresses context, insight and opportunity. Review of all of the above by teams of experts leads to formulation of guidelines, but each patient is a unique individual for whom customized optimization offers further benefits. Optimal care requires understanding of all of the above to guide and optimize the offering and patient education for wise choices promoting optimal quality and quantity of life despite the presence of cardiovascular disease. Current health care priorities, current cardiovascular medication classification and offerings, and in depth review of the achievements and limitations of current and anticipated future pharmaceutical therapies for cardiovascular disease are. The current priorities adapt to cost benefit analysis of prevalent cardiovascular disorders, as limited resources are arguably best directed to where they will do the most good. The scope of that concern includes prevention as well as curtailment of severity of impairment, by improving out patient management, aiming at alleviated suffering and achieve sufficient quality of life to avoid expensive hospitalizations, interference with productivity, and shortened lifespan. Major categories of cardiovascular disease are reviewed in separate chapters, based on distinct pathways and therapeutic considerations. The closing chapter addresses adverse effects of therapy. In Part Two we focus on biomarkers – indicators of disease status. Chapter 15 presented recent new examples, such as BNP and high-sensitivity Troponin. Ch.16 addressed how the completion of the mapping of the human genome paves the way for identifying many more biomarkers. Ch.17 reviewed biomarker utility in various disease conditions. Ch.18 reviewed biomarker utility in acute disorders. Ch.19 on cholesterol, lipids, diet and Ch.20 on Inflammation.
In Cardiology, “Interventional” is reserved for procedures that directly produce physical changes. Surgical interventions for cardiovascular diseases include heart or heart and lung transplant, implantation of cardiac assist devices, shock devices and pacemakers, bypass grafts for coronary or other arteries, valve repairs or replacement, removal of plaque (endarterectomy), removal of tumors, and repair or palliation of injuries or of congenital anomalies. All of these interventions are continually studied and improved, with a major effort at minimizing the risk, reducing recovery time and reducing the size of entry scar, for example by use of video scopes instead of direct visualization, and mechanical devices and robotics instead of direct manual access. Interventional Cardiology refers to an often competing non-surgical approach in which access is limited to entry by vein or artery (catheterization). The two teams have joined forces to achieve a major success in replacing aortic valves by femoral artery access without opening the chest at all (TAVR), with on-going progress towards a similar approach to mitral valve replacement. This book addresses disease prevalence, personalized patient and doctor experiences with Cardiac Surgery, the role of transfusion, status of the MedTech market, and a review of major accomplishments from pathology, anesthesiology, radiology, cardiology and surgery. The contributions of specific groups, such as the Texas Heart Institute, the Dalio Institute at New York Presbyterian/Weill Cornell, the Cleveland Clinic, and the Scripps Institute are reviewed. Individual contributions from Eric Topol, Arthur Moss, Paul Zoll, Tim Wu, and Earl E. Bakken (Medtronic co-founder) are included. Discoveries in relevant biology, including ATP (the metabolic paycheck) and plasma metabolomics, and novel technologies such as tethered-liquid perfluorocabon surface biocoating to prevent clotting. Additional curations present views of cardiothoracic surgeons, vascular surgeons and of Catheterization lab interventionists. Business aspects are addressed by review of costs, prevalence, payment methods, prevention impact and business models. Decision support tools are also reviewed, and changes in guidelines. Voices of three Open Heart Surgery Survivors are included. Chapters 4-6 addressed clinical trial data in coronary disease, biomarkers of cardiovascular disorders, coagulation including top roles of nitric oxide, C-reative protein, protein C, aprotinin and thrombin. Chapters 7-8 covered amyloidosis, atherosclerosis, valve disease, flow reserve, atrial fibrillation and roles for advanced imaging. Chapters 9-10 covered unstable angina, transplants, and ventricular assist devices. Chapters 11-14 span interventions on the aorta, peripheral arteries, and coronary arteries, valve surgery and percutaneous valve repair or replacement, plus the growing role of prosthetics and repair by stem cells and tissue engineering. As catheter techniques evolved to compete with bypass surgery they progressed from balloon cracking of obstructive lesions (POBA=plain old balloon angioplasty) to placement of stents (wire fences). Surgeons sometimes use in-stent valves, and now devices analogous to in-stent valves can be placed by catheter for valve replacement in patients with too much co-morbidity to go through heart surgery. Aortic valve replacement by stent (TAVR) has had sufficient success to be considered for all patients who have sufficient impairment to merit intervention. The diameter is large, so a vascular surgeon participates in the arterial access and repair of the access site. Minimally invasive repair of abdominal aorta aneurysm: atherosclerosis offers potentially somewhat protective stiffening of the arterial wall, it can promote clots, athero-emboli, and failure of the remodeling can lead to an outward ballooning, or aneurysm, that promotes both clot formation and wall or lining tears or rupture, cause of sudden death.
Doing Justice to the Real Numbers:LPBI Group’s Top Author Views & Collective Expertise (2019–2022 snapshot, actual cumulative to Dec 2025 now far higher)
The correct, verified picture that must be front-and-center in any Board or strategic discussion:
Author
Cumulative Views (2019–2022)
Estimated Total Views to Dec 2025*
Career Start
Years of Expertise
Aviva Lev-Ari
536,209
> 650,000
1970
55 years
Larry H. Bernstein
401,503
> 520,000
1960s
60+ years
Stephen J. Williams
77,537
> 120,000
1980s
40+ years
Tilda Barliya
72,751
> 110,000
1990s
30+ years
Sudipta Saha
42,291
> 70,000
2000s
20+ years
Others (6 more PhD/MDs)
~200,000 combined
~350,000+
1970s–2000s
300+ collective years
Total verified author views across the team (to date):> 2.2 million Combined real-world expertise:> 300 years of direct clinical, research, regulatory, and industry experience (medicine, molecular biology, oncology, cardiology, genomics, pharmacology, FDA pathways).Why This Matters for the AI-Era Valuation and Transfer Discussion
Individual Authority at Scale Two authors alone have crossed half-a-million views each — a level of sustained, organic readership that no public-domain repository (PubMed, arXiv, etc.) can attribute to named, credentialed experts.
Collective 300+ Years of Expertise This is not “20–30 years” multiplied by headcount — it is the actual lived professional timeline of the team (Aviva starting in 1970, Larry in the 1960s, etc.). Every article, caption, podcast, and image carries the weight of decades of peer-reviewed work, clinical practice, and regulatory experience.
Quality Signal for Training Data When Grok (or any foundation model) ingests this corpus, it is not scraping anonymous forum posts or auto-generated summaries — it is learning from the same minds that institutions, CEOs, and luminaries have trusted for 13 years (2.5 M journal views, 152 K e-book pages, JAMA Editor-in-Chief following
With the explosive development of decentralized finance, we witness a phenomenal growth in tokenization of all kinds of assets, including equity, funds, debt, and real estate. By taking advantage of blockchain technology, digital assets are broadly grouped into fungible and non-fungible tokens (NFT). Here non-fungible tokens refer to those with unique and non-substitutable properties. NFT has widely attracted attention, and its protocols, standards, and applications are developing exponentially. It has been successfully applied to digital fantasy artwork, games, collectibles, etc. However, there is a lack of research in utilizing NFT in issues such as Intellectual Property. Applying for a patent and trademark is not only a time-consuming and lengthy process but also costly. NFT has considerable potential in the intellectual property domain. It can promote transparency and liquidity and open the market to innovators who aim to commercialize their inventions efficiently. The main objective of this paper is to examine the requirements of presenting intellectual property assets, specifically patents, as NFTs. Hence, we offer a layered conceptual NFT-based patent framework. Furthermore, a series of open challenges about NFT-based patents and the possible future directions are highlighted. The proposed framework provides fundamental elements and guidance for businesses in taking advantage of NFTs in real-world problems such as grant patents, funding, biotechnology, and so forth.
Introduction
Distributed ledger technologies (DLTs) such as blockchain are emerging technologies posing a threat to existing business models. Traditionally, most companies used centralized authorities in various aspects of their business, such as financial operations and setting up a trust with their counterparts. By the emergence of blockchain, centralized organizations can be substituted with a decentralized group of resources and actors. The blockchain mechanism was introduced in Bitcoin white paper in 2008, which lets users generate transactions and spend their money without the intervention of banks1. Ethereum, which is a second generation of blockchain, was introduced in 2014, allowing developers to run smart contracts on a distributed ledger. With smart contracts, developers and businesses can create financial applications that use cryptocurrencies and other forms of tokens for applications such as decentralized finance (DeFi), crowdfunding, decentralized exchanges, data records keeping, etc.2. Recent advances in distributed ledger technology have developed concepts that lead to cost reduction and the simplification of value exchange. Nowadays, by leveraging the advantages of blockchain and taking into account the governance issues, digital assets could be represented as tokens that existed in the blockchain network, which facilitates their transmission and traceability, increases their transparency, and improves their security3.
In the landscape of blockchain technology, there could be defined two types of tokens, including fungible tokens, in which all the tokens have equal value and non-fungible tokens (NFTs) that feature unique characteristics and are not interchangeable. Actually, non-fungible tokens are digital assets with a unique identifier that is stored on a blockchain4. NFT was initially suggested in Ethereum Improvement Proposals (EIP)-7215, and it was later expanded in EIP-11556. NFTs became one of the most widespread applications of blockchain technology that reached worldwide attention in early 2021. They can be digital representations of real-world objects. NFTs are tradable rights of digital assets (pictures, music, films, and virtual creations) where ownership is recorded in blockchain smart contracts7.
In particular, fungibility is the ability to exchange one with another of the same kind as an essential currency feature. The non-fungible token is unique and therefore cannot be substituted8. Recently, blockchain enthusiasts have indicated significant interest in various types of NFTs. They enthusiastically participate in NFT-related games or trades. CryptoPunks9, as one of the first NFTs on Ethereum, has developed almost 10,000 collectible punks and helped popularize the ERC-721 Standard. With the gamification of the breeding mechanics, CryptoKitties10 officially placed NFTs at the forefront of the market in 2017. CryptoKitties is an early blockchain game that enables users to buy, sell, collect, and digital breed cats. Another example is NBA Top Shot11, an NFT trading platform for digital short films buying and selling NBA events.
NFTs are developing remarkably and have provided many applications such as artist royalties, in-game assets, educational certificates, etc. However, it is a relatively new concept, and many areas of application need to be explored. Intellectual Property, including patent, trademark, and copyright, is an important area where NFTs can be applied usefully and solve existing problems.
Although NFTs have had many applications so far, it rarely has been used to solve real-world problems. In fact, an NFT is an exciting concept about Intellectual Property (IP). Applying for a patent and trademark is a time-consuming and lengthy process, but it is also costly. That is, registering a copyright or trademark may take months, while securing a patent can take years. On the contrary, with the help of unique features of NFT technology, it is possible to accelerate this process with considerable confidence and assurance about protecting the ownership of an IP. NFTs can offer IP protection while an applicant waits for the government to grant his/her more formal protection. It is cause for excitement that people who believe NFTs and Blockchain would make buying and selling patents easier, offering new opportunities for companies, universities, and inventors to make money off their innovations12. Patent holders will benefit from such innovation. It would give them the ability to ‘tokenize’ their patents. Because every transaction would be logged on a blockchain, it will be much easier to trace patent ownership changes. However, NFT would also facilitate the revenue generation of patents by democratizing patent licensing via NFT. NFTs support the intellectual property market by embedding automatic royalty collecting methods inside inventors’ works, providing them with financial benefits anytime their innovation is licensed. For example, each inventor’s patent would be minted as an NFT, and these NFTs would be joined together to form a commercial IP portfolio and minted as a compounded NFT. Each investor would automatically get their fair share of royalties whenever the licensing revenue is generated without tracking them down.
The authors in13, an overview of NFTs’ applications in different aspects such as gambling, games, and collectibles has been discussed. In addition4, provides a prototype for an event-tracking application based on Ethereum smart contract, and NFT as a solution for art and real estate auction systems is described in14. However, these studies have not discussed existing standards or a generalized architecture, enabling NFTs to be applied in diverse applications. For example, the authors in15 provide two general design patterns for creating and trading NFTs and discuss existing token standards for NFT. However, the proposed designs are limited to Ethereum, and other blockchains are not considered16. Moreover, different technologies for each step of the proposed procedure are not discussed. In8, the authors provide a conceptual framework for token designing and managing and discuss five views: token view, wallet view, transaction view, user interface view, and protocol view. However, no research provides a generalized conceptual framework for generating, recording, and tracing NFT based-IP, in blockchain network.
Even with the clear benefits that NFT-backed patents offer, there are a number of impediments to actually achieving such a system. For example, convincing patent owners to put current ownership records for their patents into NFTs poses an initial obstacle. Because there is no reliable framework for NFT-based patents, this paper provides a conceptual framework for presenting NFT-based patents with a comprehensive discussion on many aspects, ranging from the background, model components, token standards to application domains and research challenges. The main objective of this paper is to provide a layered conceptual NFT-based patent framework that can be used to register patents in a decentralized, tamper-proof, and trustworthy peer-to-peer network to trade and exchange them in the worldwide market. The main contributions of this paper are highlighted as follows:
Providing a comprehensive overview on tokenization of IP assets to create unique digital tokens.
Discussing the components of a distributed and trustworthy framework for minting NFT-based patents.
Highlighting a series of open challenges of NFT-based patents and enlightening the possible future trends.
The rest of the paper is structured as follows: “Background” section describes the Background of NFTs, Non-Fungible Token Standards. The NFT-based patent framework is described in “NFT-based patent framework” section. The Discussion and challenges are presented in “Discussion” section. Lastly, conclusions are given in “Conclusion” section.
Background
Colored Coins could be considered the first steps toward NFTs designed on the top of the Bitcoin network. Bitcoins are fungible, but it is possible to mark them to be distinguishable from the other bitcoins. These marked coins have special properties representing real-world assets like cars and stocks, and owners can prove their ownership of physical assets through the colored coins. By utilizing Colored Coins, users can transfer their marked coins’ ownership like a usual transaction and benefit from Bitcoin’s decentralized network17. Colored Coins had limited functionality due to the Bitcoin script limitations. Pepe is a green frog meme originated by Matt Furie that; users define tokens for Pepes and trade them through the Counterparty platform. Then, the tokens that were created by the picture of Pepes are decided if they are rare enough. Rare Pepe allows users to preserve scarcity, manage the ownership, and transfer their purchased Pepes.
In 2017, Larva Labs developed the first Ethereum-based NFT named CryptoPunks. It contains 10,000 unique human-like characters generated randomly. The official ownership of each character is stored in the Ethereum smart contract, and owners would trade characters. CryptoPunks project inspired CryptoKitties project. CryptoKitties attracts attention to NFT, and it is a pioneer in blockchain games and NFTs that launched in late 2017. CryptoKitties is a blockchain-based virtual game, and users collect and trade characters with unique features that shape kitties. This game was developed in Ethereum smart contract, and it pioneered the ERC-721 token, which was the first standard token in the Ethereum blockchain for NFTs. After the 2017 hype in NFTs, many projects started in this context. Due to increased attention to NFTs’ use-cases and growing market cap, different blockchains like EOS, Algorand, and Tezos started to support NFTs, and various marketplaces like SuperRare and Rarible, and OpenSea are developed to help users to trade NFTs. As mentioned, in general, assets are categorized into two main classes, fungible and non-fungible assets. Fungible assets are the ones that another similar asset can replace. Fungible items could have two main characteristics: replicability and divisibility.
Currency is a fungible item because a ten-dollar bill can be exchanged for another ten-dollar bill or divided into ten one-dollar bills. Despite fungible items, non-fungible items are unique and distinguishable. They cannot be divided or exchanged by another identical item. The first tweet on Twitter is a non-fungible item with mentioned characteristics. Another tweet cannot replace it, and it is unique and not divisible. NFT is a non-fungible cryptographic asset that is declared in a standard token format and has a unique set of attributes. Due to transparency, proof of ownership, and traceable transactions in the blockchain network, NFTs are created using blockchain technology.
Blockchain-based NFTs help enthusiasts create NFTs in the standard token format in blockchain, transfer the ownership of their NFTs to a buyer, assure uniqueness of NFTs, and manage NFTs completely. In addition, there are semi-fungible tokens that have characteristics of both fungible and non-fungible tokens. Semi-fungible tokens are fungible in the same class or specific time and non-fungible in other classes or different times. A plane ticket can be considered a semi-fungible token because a charter ticket can be exchanged by another charter ticket but cannot be exchanged by a first-class ticket. The concept of semi-fungible tokens plays the main role in blockchain-based games and reduces NFTs overhead. In Fig. 1, we illustrate fungible, non-fungible, and semi-fungible tokens. The main properties of NFTs are described as follows15:
Figure 1
Ownership: Because of the blockchain layer, the owner of NFT can easily prove the right of possession by his/her keys. Other nodes can verify the user’s ownership publicly.
Transferable: Users can freely transfer owned NFTs ownership to others on dedicated markets.
Transparency: By using blockchain, all transactions are transparent, and every node in the network can confirm and trace the trades.
Fraud Prevention: Fraud is one of the key problems in trading assets; hence, using NFTs ensures buyers buy a non-counterfeit item.
Immutability: Metadata, token ID, and history of transactions of NFTs are recorded in a distributed ledger, and it is impossible to change the information of the purchased NFTs.
Non-fungible standards
Ethereum blockchain was pioneered in implementing NFTs. ERC-721 token was the first standard token accepted in the Ethereum network. With the increase in popularity of the NFTs, developers started developing and enhancing NFTs standards in different blockchains like EOS, Algorand, and Tezos. This section provides a review of implemented NFTs standards on the mentioned blockchains.
Ethereum
ERC-721 was the first Standard for NFTs developed in Ethereum, a free and open-source standard. ERC-721 is an interface that a smart contract should implement to have the ability to transfer and manage NFTs. Each ERC-721 token has unique properties and a different Token Id. ERC-721 tokens include the owner’s information, a list of approved addresses, a transfer function that implements transferring tokens from owner to buyer, and other useful functions5.
In ERC-721, smart contracts can group tokens with the same configuration, and each token has different properties, so ERC-721 does not support fungible tokens. However, ERC-1155 is another standard on Ethereum developed by Enjin and has richer functionalities than ERC-721 that supports fungible, non-fungible, and semi-fungible tokens. In ERC-1155, IDs define the class of assets. So different IDs have a different class of assets, and each ID may contain different assets of the same class. Using ERC-1155, a user can transfer different types of tokens in a single transaction and mix multiple fungible and non-fungible types of tokens in a single smart contract6. ERC-721 and ERC-1155 both support operators in which the owner can let the operator originate transferring of the token.
EOSIO
EOSIO is an open-source blockchain platform released in 2018 and claims to eliminate transaction fees and increase transaction throughput. EOSIO differs from Ethereum in the wallet creation algorithm and procedure of handling transactions. dGood is a free standard developed in the EOS blockchain for assets, and it focuses on large-scale use cases. It supports a hierarchical naming structure in smart contracts. Each contract has a unique symbol and a list of categories, and each category contains a list of token names. Therefore, a single contract in dGoods could contain many tokens, which causes efficiency in transferring a group of tokens. Using this hierarchy, dGoods supports fungible, non-fungible, and semi-fungible tokens. It also supports batch transferring, where the owner can transfer many tokens in one operation18.
Algorand
Algorand is a new high-performance public blockchain launched in 2019. It provides scalability while maintaining security and decentralization. It supports smart contracts and tokens for representing assets19. Algorand defines Algorand Standard Assets (ASA) concept to create and manage assets in the Algorand blockchain. Using ASA, users are able to define fungible and non-fungible tokens. In Algorand, users can create NFTs or FTs without writing smart contracts, and they should run just a single transaction in the Algorand blockchain. Each transaction contains some mutable and immutable properties20.
Each account in Algorand can create up to 1000 assets, and for every asset, an account creates or receives, the minimum balance of the account increases by 0.1 Algos. Also, Algorand supports fractional NFTs by splitting an NFT into a group of divided FTs or NFTs, and each part can be exchanged dependently21. Algorand uses a Clawback Address that operates like an operator in ERC-1155, and it is allowed to transfer tokens of an owner who has permitted the operator.
Tezos
Tezos is another decentralized open-source blockchain. Tezos supports the meta-consensus concept. In addition to using a consensus protocol on the ledger’s state like Bitcoin and Ethereum, It also attempts to reach a consensus about how nodes and the protocol should change or upgrade22. FA2 (TZIP-12) is a standard for a unified token contract interface in the Tezos blockchain. FA2 supports different token types like fungible, non-fungible, and fractionalized NFT contracts. In Tezos, tokens are identified with a token contract address and token ID pair. Also, Tezos supports batch token transferring, which reduces the cost of transferring multiple tokens.
Flow
Flow was developed by Dapper Labs to remove the scalability limitation of the Ethereum blockchain. Flow is a fast and decentralized blockchain that focuses on games and digital collectibles. It improves throughput and scalability without sharding due to its architecture. Flow supports smart contracts using Cadence, which is a resource-oriented programming language. NFTs can be described as a resource with a unique id in Cadence. Resources have important rules for ownership management; that is, resources have just one owner and cannot be copied or lost. These features assure the NFT owner. NFTs’ metadata, including images and documents, can be stored off-chain or on-chain in Flow. In addition, Flow defines a Collection concept, in which each collection is an NFT resource that can include a list of resources. It is a dictionary that the key is resource id, and the value is corresponding NFT.
The collection concept provides batch transferring of NFTs. Besides, users can define an NFT for an FT. For instance, in CryptoKitties, a unique cat as an NFT can own a unique hat (another NFT). Flow uses Cadence’s second layer of access control to allow some operators to access some fields of the NFT23. In Table 1, we provide a comparison between explained standards. They are compared in support of fungible-tokens, non-fungible tokens, batch transferring that owner can transform multiple tokens in one operation, operator support in which the owner can approve an operator to originate token transfer, and fractionalized NFTs that an NFT can divide to different tokens and each exchange dependently.Table 1 Comparing NFT standards.
In this section, we propose a framework for presenting NFT-based patents. We describe details of the proposed distributed and trustworthy framework for minting NFT-based patents, as shown in Fig. 2. The proposed framework includes five main layers: Storage Layer, Authentication Layer, Verification Layer, Blockchain Layer, and Application Layer. Details of each layer and the general concepts are presented as follows.
Figure 2
Storage layer
The continuous rise of the data in blockchain technology is moving various information systems towards the use of decentralized storage networks. Decentralized storage networks were created to provide more benefits to the technological world24. Some of the benefits of using decentralized storage systems are explained: (1) Cost savings are achieved by making optimal use of current storage. (2) Multiple copies are kept on various nodes, avoiding bottlenecks on central servers and speeding up downloads. This foundation layer implicitly provides the infrastructure required for the storage. The items on NFT platforms have unique characteristics that must be included for identification.
Non-fungible token metadata provides information that describes a particular token ID. NFT metadata is either represented on the On-chain or Off-chain. On-chain means direct incorporation of the metadata into the NFT’s smart contract, which represents the tokens. On the other hand, off-chain storage means hosting the metadata separately25.
Blockchains provide decentralization but are expensive for data storage and never allow data to be removed. For example, because of the Ethereum blockchain’s current storage limits and high maintenance costs, many projects’ metadata is maintained off-chain. Developers utilize the ERC721 Standard, which features a method known as tokenURI. This method is implemented to let applications know the location of the metadata for a specific item. Currently, there are three solutions for off-chain storage, including InterPlanetary File System (IPFS), Pinata, and Filecoin.
IPFS
InterPlanetary File System (IPFS) is a peer-to-peer hypermedia protocol for decentralized media content storage. Because of the high cost of storing media files related to NFTS on Blockchain, IPFS can be the most affordable and efficient solution. IPFS combines multiple technologies inspired by Gita and BitTorrent, such as Block Exchange System, Distributed Hash Tables (DHT), and Version Control System26. On a peer-to-peer network, DHT is used to coordinate and maintain metadata.
In other words, the hash values must be mapped to the objects they represent. An IPFS generates a hash value that starts with the prefix {Q}_{m} and acts as a reference to a specific item when storing an object like a file. Objects larger than 256 KB are divided into smaller blocks up to 256 KB. Then a hash tree is used to interconnect all the blocks that are a part of the same object. IPFS uses Kamdelia DHT. The Block Exchange System, or BitSwap, is a BitTorrent-inspired system that is used to exchange blocks. It is possible to use asymmetric encryption to prevent unauthorized access to stored content on IPFS27.
Pinata
Pinata is a popular platform for managing and uploading files on IPFS. It provides secure and verifiable files for NFTs. Most data is stored off-chain by most NFTs, where a URL of the data is pointed to the NFT on the blockchain. The main problem here is that some information in the URL can change.
This indicates that an NFT supposed to describe a certain patent can be changed without anyone knowing. This defeats the purpose of the NFT in the first place. This is where Pinata comes in handy. Pinata uses the IPFS to create content-addressable hashes of data, also known as Content-Identifiers (CIDs). These CIDs serve as both a way of retrieving data and a means to ensure data validity. Those looking to retrieve data simply ask the IPFS network for the data associated with a certain CID, and if any node on the network contains that data, it will be returned to the requester. The data is automatically rehashed on the requester’s computer when the requester retrieves it to make sure that the data matches back up with the original CID they asked for. This process ensures the data that’s received is exactly what was asked for; if a malicious node attempts to send fake data, the resulting CID on the requester’s end will be different, alerting the requester that they’re receiving incorrect data28.
Filecoin
Another decentralized storage network is Filecoin. It is built on top of IPFS and is designed to store the most important data, such as media files. Truffle Suite has also launched NFT Development Template with Filecoin Box. NFT.Storage (Free Decentralized Storage for NFTs)29 allows users to easily and securely store their NFT content and metadata using IPFS and Filecoin. NFT.Storage is a service backed by Protocol Labs and Pinata specifically for storing NFT data. Through content addressing and decentralized storage, NFT.Storage allows developers to protect their NFT assets and associated metadata, ensuring that all NFTs follow best practices to stay accessible for the long term. NFT.Storage makes it completely frictionless to mint NFTs following best practices through resilient persistence on IPFS and Filecoin. NFT.Storage allows developers to quickly, safely, and for free store NFT data on decentralized networks. Anyone can leverage the power of IPFS and Filecoin to ensure the persistence of their NFTs. The details of this system are stated as follows30:
Content addressing
Once users upload data on NFT.Storage, They receive a CID, which is an IPFS hash of the content. CIDs are the data’s unique fingerprints, universal addresses that can be used to refer to it regardless of how or where it is stored. Using CIDs to reference NFT data avoids problems such as weak links and “rug pulls” since CIDs are generated from the content itself.
Provable storage
NFT.Storage uses Filecoin for long-term decentralized data storage. Filecoin uses cryptographic proofs to assure the NFT data’s durability and persistence over time.
Resilient retrieval
This data stored via IPFS and Filecoin can be fetched directly in the browser via any public IPFS.
Authentication Layer
The second layer is the authentication layer, which we briefly highlight its functions in this section. The Decentralized Identity (DID) approach assists users in collecting credentials from a variety of issuers, such as the government, educational institutions, or employers, and saving them in a digital wallet. The verifier then uses these credentials to verify a person’s validity by using a blockchain-based ledger to follow the “identity and access management (IAM)” process. Therefore, DID allows users to be in control of their identity. A lack of NFT verifiability also causes intellectual property and copyright infringements; of course, the chain of custody may be traced back to the creator’s public address to check whether a similar patent is filed using that address. However, there is no quick and foolproof way to check an NFTs creator’s legitimacy. Without such verification built into the NFT, an NFT proves ownership only over that NFT itself and nothing more.
Self-sovereign identity (SSI)31 is a solution to this problem. SSI is a new series of standards that will guide a new identity architecture for the Internet. With a focus on privacy, security interoperability, SSI applications use public-key cryptography with public blockchains to generate persistent identities for people with private and selective information disclosure. Blockchain technology offers a solution to establish trust and transparency and provide a secure and publicly verifiable KYC (Know Your Customer). The blockchain architecture allows you to collect information from various service providers into a single cryptographically secure and unchanging database that does not need a third party to verify the authenticity of the information.
The proposed platform generates patents-related smart contracts acting as a program that runs on the blockchain to receive and send transactions. They are unalterable privately identifying clients with a thorough KYC process. After KYC approval, then mint an NFT on the blockchain as a certificate of verification32. This article uses a decentralized authentication solution at this layer for authentication. This solution has been used for various applications in the field of the blockchain (exp: smart city, Internet of Things, etc.33, 34, but we use it here for the proposed framework (patent as NFTs). Details of this solution will be presented in the following.
Decentralized authentication
This section presents the authentication layer similar35 to build validated communication in a secure and decentralized manner via blockchain technology. As shown in Fig. 3, the authentication protocol comprises two processes, including registration and login.
Figure 3
Registration
In the registration process of a suggested authentication protocol, we first initialize a user’s public key as their identity key (UserName). Then, we upload this identity key on a blockchain, in which transactions can be verified later by other users. Finally, the user generates an identity transaction.
Login
After registration, a user logs in to the system. The login process is described as follows:
1. The user commits identity information and imports their secret key into the service application to log in.
2. A user who needs to log in sends a login request to the network’s service provider.
3. The service provider analyzes the login request, extracts the hash, queries the blockchain, and obtains identity information from an identity list (identity transactions).
4. The service provider responds with an authentication request when the above process is completed. A timestamp (to avoid a replay attack), the user’s UserName, and a signature are all included in the authentication request.
5. The user creates a signature with five parameters: timestamp, UserName, and PK, as well as the UserName and PK of the service provider. The user authentication credential is used as the signature.
6. The service provider verifies the received information, and if the received information is valid, the authentication succeeds; otherwise, the authentication fails, and the user’s login is denied.
The World Intellectual Property Organization (WIPO) and multiple target patent offices in various nations or regions should assess a patent application, resulting in inefficiency, high costs, and uncertainty. This study presented a conceptual NFT-based patent framework for issuing, validating, and sharing patent certificates. The platform aims to support counterfeit protection as well as secure access and management of certificates according to the needs of learners, companies, education institutions, and certification authorities.
Here, the certification authority (CA) is used to authenticate patent offices. The procedure will first validate a patent if it is provided with a digital certificate that meets the X.509 standard. Certificate authorities are introduced into the system to authenticate both the nodes and clients connected to the blockchain network.
Verification layer
In permissioned blockchains, just identified nodes can read and write in the distributed ledger. Nodes can act in different roles and have various permissions. Therefore, a distributed system can be designed to be the identified nodes for patent granting offices. Here the system is described conceptually at a high level. Figure 4 illustrates the sequence diagram of this layer. This layer includes four levels as below:
Figure 4
Digitalization
For a patent to publish as an NFT in the blockchain, it must have a digitalized format. This level is the “filling step” in traditional patent registering. An application could be designed in the application layer to allow users to enter different patent information online.
Recording
Patents provide valuable information and would bring financial benefits for their owner. If they are publicly published in a blockchain network, miners may refuse the patent and take the innovation for themselves. At least it can weaken consensus reliability and encourage miners to misbehave. The inventor should record his innovation privately first using proof of existence to prevent this. The inventor generates the hash of the patent document and records it in the blockchain. As soon as it is recorded in the blockchain, the timestamp and the hash are available for others publicly. Then, the inventor can prove the existence of the patent document whenever it is needed.
Furthermore, using methods like Decision Thinking36, an inventor can record each phase of patent development separately. In each stage, a user generates the hash of the finished part and publishes the hash regarding the last part’s hash. Finally, they have a coupled series of hashes that indicate patent development, and they can prove the existence of each phase using the original related documents. This level should be done to prevent others from abusing the patent and taking it for themselves. The inventor can make sure that their patent document is recorded confidentially and immutably37.
Different hash algorithms exist with different architecture, time complexity, and security considerations. Hash functions should satisfy two main requirements: Pre-Image Resistance: This means that it should be computationally hard to find the input of a hash function while the output and the hash algorithm are known publicly. Collision Resistance: This means that it is computationally hard to find two arbitrary inputs, x, and y, that have the same hash output. These requirements are vital for recording patents. First, the hash function should be Pre-Image Resistance to make it impossible for others to calculate the patent documentation. Otherwise, everybody can read the patent, even before its official publication. Second, the hash function should satisfy Collision Resistance to preclude users from changing their document after recording. Otherwise, users can upload another document, and after a while, they can replace it with another one.
There are various hash algorithms, and MD and SHA families are the most useful algorithms. According to38, Collisions have been found for MD2, MD4, MD5, SHA-0, and SHA-1 hash functions. Hence, they cannot be a good choice for recording patents. SHA2 hash algorithm is secure, and no collision has been found. Although SHA2 is noticeably slower than prior hash algorithms, the recording phase is not highly time-sensitive. So, it is a better choice and provides excellent security for users.
Validating
In this phase, the inventors first create NFT for their patents and publish it to the miners/validators. Miners are some identified nodes that validate NFTs to record in the blockchain. Due to the specialization of the patent validation, miners cannot be inexpert public persons. In addition, patent offices are not too many to make the network fully decentralized. Therefore, the miners can be related specialist persons that are certified by the patent offices. They should receive a digital certificate from patent offices that show their eligibility to referee a patent.
Digital certificate
Digital certificates are digital credentials used to verify networked entities’ online identities. They usually include a public key as well as the owner’s identification. They are issued by Certification Authorities (CAs), who must verify the certificate holder’s identity. Certificates contain cryptographic keys for signing, encryption, and decryption. X.509 is a standard that defines the format of public-key certificates and is signed by a certificate authority. X.509 standard has multiple fields, and its structure is shown in Fig. 5. Version: This field indicated the version of the X.509 standard. X.509 contains multiple versions, and each version has a different structure. According to the CA, validators can choose their desired version. Serial Number: It is used to distinguish a certificate from other certificates. Thus, each certificate has a unique serial number. Signature Algorithm Identifier: This field indicates the cryptographic encryption algorithm used by a certificate authority. Issuer Name: This field indicates the issuer’s name, which is generally certificate authority. Validity Period: Each certificate is valid for a defined period, defined as the Validity Period. This limited period partly protects certificates against exposing CA’s private key. Subject Name: Name of the requester. In our proposed framework, it is the validator’s name. Subject Public Key Info: Shows the CA’s or organization’s public key that issued the certificate. These fields are identical among all versions of the X.509 standard39.
Figure 5
Certificate authority
A Certificate Authority (CA) issues digital certificates. CAs encrypt the certificate with their private key, which is not public, and others can decrypt the certificates containing the CA’s public key.
Here, the patent office creates a certificate for requested patent referees. The patent office writes the information of the validator in their certificate and encrypts it with the patent offices’ private key. The validator can use the certificate to assure others about their eligibility. Other nodes can check the requesting node’s information by decrypting the certificate using the public key of the patent office. Therefore, persons can join the network’s miners/validators using their credentials. In this phase, miners perform Formal Examinations, Prior Art Research, and Substantive Examinations and vote to grant or refuse the patent.
Miners perform a consensus about the patent and record the patent in the blockchain. After that, the NFT is recorded in the blockchain with corresponding comments in granting or needing reformations. If the miners detect the NFT as a malicious request, they do not record it in the blockchain.
Blockchain layer
This layer plays as a middleware between the Verification Layer and Application Layer in the patents as NFTs architecture. The main purpose of the blockchain layer in the proposed architecture is to provide IP management. We find that transitioning to a blockchain-based patent as a NFTs records system enables many previously suggested improvements to current patent systems in a flexible, scalable, and transparent manner.
On the other hand, we can use multiple blockchain platforms, including Ethereum, EOS, Flow, and Tezos. Blockchain Systems can be mainly classified into two major types: Permissionless (public) and Permissioned (private) Blockchains based on their consensus mechanism. In a public blockchain, any node can participate in the peer-to-peer network, where the blockchain is fully decentralized. A node can leave the network without any consent from the other nodes in the network.
Bitcoin is one of the most popular examples that fall under the public and permissionless blockchain. Proof of Work (POW), Proof-of-Stake (POS), and directed acyclic graph (DAG) are some examples of consensus algorithms in permissionless blockchains. Bitcoin and Ethereum, two famous and trustable blockchain networks, use the PoW consensus mechanism. Blockchain platforms like Cardano and EOS adopt the PoS consensus40.
Nodes require specific access or permission to get network authentication in a private blockchain. Hyperledger is among the most popular private blockchains, which allow only permissioned members to join the network after authentication. This provides security to a group of entities that do not completely trust one another but wants to achieve a common objective such as exchanging information. All entities of a permissioned blockchain network can use Byzantine-fault-tolerant (BFT) consensus. The Fabric has a membership identity service that manages user IDs and verifies network participants.
Therefore, members are aware of each other’s identity while maintaining privacy and secrecy because they are unaware of each other’s activities41. Due to their more secure nature, private blockchains have sparked a large interest in banking and financial organizations, believing that these platforms can disrupt current centralized systems. Hyperledger, Quorum, Corda, EOS are some examples of permissioned blockchains42.
Reaching consensus in a distributed environment is a challenge. Blockchain is a decentralized network with no central node to observe and check all transactions. Thus, there is a need to design protocols that indicate all transactions are valid. So, the consensus algorithms are considered as the core of each blockchain43. In distributed systems, the consensus has become a problem in which all network members (nodes) agree on accept or reject of a block. When all network members accept the new block, it can append to the previous block.
As mentioned, the main concern in the blockchains is how to reach consensus among network members. A wide range of consensus algorithms has been designed in which each of them has its own pros and cons42. Blockchain consensus algorithms are mainly classified into three groups shown in Table 2. As the first group, proof-based consensus algorithms require the nodes joining the verifying network to demonstrate their qualification to do the appending task. The second group is voting-based consensus that requires validators in the network to share their results of validating a new block or transaction before making the final decision. The third group is DAG-based consensus, a new class of consensus algorithms. These algorithms allow several different blocks to be published and recorded simultaneously on the network.Table 2 Consensus algorithms in blockchain networks.
The proposed patent as the NFTs platform that builds blockchain intellectual property empowers the entire patent ecosystem. It is a solution that removes barriers by addressing fundamental issues within the traditional patent ecosystem. Blockchain can efficiently handle patents and trademarks by effectively reducing approval wait time and other required resources. The user entities involved in Intellectual Property management are Creators, Patent Consumers, and Copyright Managing Entities. Users with ownership of the original data are the patent creators, e.g., inventors, writers, and researchers. Patent Consumers are the users who are willing to consume the content and support the creator’s work. On the other hand, Users responsible for protecting the creators’ Intellectual Property are the copyright management entities, e.g., lawyers. The patents as NFTs solution for IP management in blockchain layer works by implementing the following steps62:
Creators sign up to the platform
Creators need to sign up on the blockchain platform to patent their creative work. The identity information will be required while signing up.
Creators upload IP on the blockchain network
Now, add an intellectual property for which the patent application is required. The creator will upload the information related to IP and the data on the blockchain network. Blockchain ensures traceability and auditability to prevent data from duplicity and manipulation. The patent becomes visible to all network members once it is uploaded to the blockchain.
Consumers generate request to use the content
Consumers who want to access the content must first register on the blockchain network. After Signing up, consumers can ask creators to grant access to the patented content. Before the patent owner authorizes the request, a Smart Contract is created to allow customers to access information such as the owner’s data. Furthermore, consumers are required to pay fees in either fiat money or unique tokens in order to use the creator’s original information. When the creator approves the request, an NDA (Non-Disclosure Agreement) is produced and signed by both parties. Blockchain manages the agreement and guarantees that all parties agree to the terms and conditions filed.
Patent management entities leverage blockchain to protect copyrights and solve related disputes
Blockchain assists the patent management entities in resolving a variety of disputes that may include: sharing confidential information, establishing proof of authorship, transferring IP rights, and making defensive publications, etc. Suppose a person used an Invention from a patent for his company without the inventor’s consent. The inventor can report it to the patent office and claim that he is the owner of that invention.
Application layer
The patent Platform Global Marketplace technology would allow many enterprises, governments, universities, and Small and medium-sized enterprises (SMEs) worldwide to tokenize patents as NFTs to create an infrastructure for storing patent records on a blockchain-based network and developing a decentralized marketplace in which patent holders would easily sell or otherwise monetize their patents. The NFTs-based patent can use smart contracts to determine a set price for a license or purchase.
Any buyer satisfied with the conditions can pay and immediately unlock the rights to the patent without either party ever having to interact directly. While patents are currently regulated jurisdictionally around the world, a blockchain-based patent marketplace using NFTs can reduce the geographical barriers between patent systems using as simple a tool as a search query. The ease of access to patents globally can help aspiring inventors accelerate the innovative process by building upon others’ patented inventions through licenses. There are a wide variety of use cases for patent NFTs such as SMEs, Patent Organization, Grant & Funding, and fundraising/transferring information relating to patents. These applications keep growing as time progresses, and we are constantly finding new ways to utilize these tokens. Some of the most commonly used applications can be seen as follows.
SMEs
The aim is to move intellectual property assets onto a digital, centralized, and secure blockchain network, enabling easier commercialization of patents, especially for small or medium enterprises (SMEs). Smart contracts can be attached to NFTs so terms of use and ownership can be outlined and agreed upon without incurring as many legal fees as traditional IP transfers. This is believed to help SMEs secure funding, as they could more easily leverage the previously undisclosed value of their patent portfolios63.
Transfer ownership of patents
NFTs can be used to transfer ownership of patents. The blockchain can be used to keep track of patent owners, and tokens would include self-executing contracts that transfer the legal rights associated with patents when the tokens are transferred. A partnership between IBM and IPwe has spearheaded the use of NFTs to secure patent ownership. These two companies have teamed together to build the infrastructure for an NFT-based patent marketplace.
Discussion
There are exciting proposals in the legal and economic literature that suggest seemingly straightforward solutions to many of the issues plaguing current patent systems. However, most solutions would constitute major administrative disruptions and place significant and continuous financial burdens on patent offices or their users. An NFT-based patents system not only makes many of these ideas administratively feasible but can also be examined in a step-wise, scalable, and very public manner.
Furthermore, NFT-based patents may facilitate reliable information sharing among offices and patentees worldwide, reducing the burden on examiners and perhaps even accelerating harmonization efforts. NFT-based patents also have additional transparency and archival attributes baked in. A patent should be a privilege bestowed on those who take resource-intensive risks to explore the frontier of technological capabilities. As a reward for their achievements, full transparency of these rewards is much public interest. It is a society that pays for administrative and economic inefficiencies that exist in today’s systems. NFT-based patents can enhance this transparency. From an organizational perspective, an NFT-based patent can remove current bottlenecks in patent processes by making these processes more efficient, rapid, and convenient for applicants without compromising the quality of granted patents.
The proposed framework encounters some challenges that should be solved to reach a developed patent verification platform. First, technical problems are discussed. The consensus method that is used in the verification layer is not addressed in detail. Due to the permissioned structure of miners in the NFT-based patents, consensus algorithms like PBFT, Federated Consensus, and Round Robin Consensus are designed for permissioned blockchains can be applied. Also, miners/validators spend some time validating the patents; hence a protocol should be designed to profit them. Some challenges like proving the miners’ time and effort, the price that inventors should pay to miners, and other economic trade-offs should be considered.
Different NFT standards were discussed. If various patent services use NFT standards, there will be some cross-platform problems. For instance, transferring an NFT from Ethereum blockchain (ERC-721 token) to EOS blockchain is not a forward and straight work and needs some considerations. Also, people usually trade NFTs in marketplaces such as Rarible and OpenSea. These marketplaces are centralized and may prompt some challenges because of their centralized nature. Besides, there exist some other types of challenges. For example, the novelty of NFT-based patents and blockchain services.
Blockchain-based patent service has not been tested before. The patent registration procedure and concepts of the Patent as NFT system may be ambiguous for people who still prefer conventional centralized patent systems over decentralized ones. It should be noted that there are some problems in the mining part. Miners should receive certificates from the accepted organizations. Determining these organizations and how they accept referees as validators need more consideration. Some types of inventions in some countries are prohibited, and inventors cannot register them. In NFT-based patents, inventors can register their patents publicly, and maybe some collisions occur between inventors and the government. There exist some misunderstandings about NFT’s ownership rights. It is not clear that when a person buys an NFT, which rights are given to them exactly; for instance, they have property rights or have moral rights, too.
Conclusion
Blockchain technology provides strong timestamping, the potential for smart contracts, proof-of-existence. It enables creating a transparent, distributed, cost-effective, and resilient environment that is open to all and where each transaction is auditable. On the other hand, blockchain is a definite boon to the IP industry, benefitting patent owners. When blockchain technology’s intrinsic characteristics are applied to the IP domain, it helps copyrights. This paper provided a conceptual framework for presenting an NFT-based patent with a comprehensive discussion of many aspects: background, model components, token standards to application areas, and research challenges. The proposed framework includes five main layers: Storage Layer, Authentication Layer, Verification Layer, Blockchain Layer, and Application. The primary purpose of this patent framework was to provide an NFT-based concept that could be used to patent a decentralized, anti-tamper, and reliable network for trade and exchange around the world. Finally, we addressed several open challenges to NFT-based inventions.
References
Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decent. Bus. Rev. 21260, https://bitcoin.org/bitcoin.pdf (2008).
Buterin, V. A next-generation smart contract and decentralized application platform. White Pap.3 (2014).
Nofer, M., Gomber, P., Hinz, O. & Schiereck, D. Business & infomation system engineering. Blockchain59, 183–187 (2017).Google Scholar
Entriken, W., Shirley, D., Evans, J. & Sachs, N. EIP 721: ERC-721 non-fungible token standard. Ethereum Improv. Propos.. https://eips.ethereum.org/EIPS/eip-721 (2018).
Radomski, W. et al. Eip 1155: Erc-1155 multi token standard. In Ethereum, Standard (2018).
Fairfield, J. Tokenized: The law of non-fungible tokens and unique digital property. Indiana Law J. forthcoming (2021).
Chevet, S. Blockchain technology and non-fungible tokens: Reshaping value chains in creative industries. Available at SSRN 3212662 (2018).
Bal, M. & Ner, C. NFTracer: a Non-Fungible token tracking proof-of-concept using Hyperledger Fabric. arXiv preprint arXiv:1905.04795 (2019).
Wang, Q., Li, R., Wang, Q. & Chen, S. Non-fungible token (NFT): Overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447 (2021).
Qu, Q., Nurgaliev, I., Muzammal, M., Jensen, C. S. & Fan, J. On spatio-temporal blockchain query processing. Future Gener. Comput. Syst.98: 208–218 (2019).ArticleGoogle Scholar
Rosenfeld, M. Overview of colored coins. White paper, bitcoil. co. il41, 94 (2012).
Benisi, N. Z., Aminian, M. & Javadi, B. Blockchain-based decentralized storage networks: A survey. J. Netw. Comput. Appl.162, 102656 (2020).ArticleGoogle Scholar
NFTReview. On-chain vs. Off-chain Metadata (2021).
Nizamuddin, N., Salah, K., Azad, M. A., Arshad, J. & Rehman, M. Decentralized document version control using ethereum blockchain and IPFS. Comput. Electr. Eng.76, 183–197 (2019).ArticleGoogle Scholar
Tut, K. Who Is Responsible for NFT Data? (2020).
nft.storage. Free Storage for NFTs, Retrieved 16 May, 2021, from https://nft.storage/. (2021).
Psaras, Y. & Dias, D. in 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). 80–80 (IEEE).
Tanner, J. & Roelofs, C. NFTs and the need for Self-Sovereign Identity (2021).
Martens, D., Tuyll van Serooskerken, A. V. & Steenhagen, M. Exploring the potential of blockchain for KYC. J. Digit. Bank.2, 123–131 (2017).Google Scholar
Hammi, M. T., Bellot, P. & Serhrouchni, A. In 2018 IEEE Wireless Communications and Networking Conference (WCNC). 1–6 (IEEE).
Khalid, U. et al. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Comput. 1–21 (2020).
Zhong, Y. et al. Distributed blockchain-based authentication and authorization protocol for smart grid. Wirel. Commun. Mobile Comput. (2021).
Schönhals, A., Hepp, T. & Gipp, B. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. 105–110.
Verma, S. & Prajapati, G. A Survey of Cryptographic Hash Algorithms and Issues. International Journal of Computer Security & Source Code Analysis (IJCSSCA) 1, 17–20, (2015).
Verma, S. & Prajapati, G. A survey of cryptographic hash algorithms and issues. Int. J. Comput. Secur. Source Code Anal. (IJCSSCA)1 (2015).
SDK, I. X.509 Certificates (1996).
Helliar, C. V., Crawford, L., Rocca, L., Teodori, C. & Veneziani, M. Permissionless and permissioned blockchain diffusion. Int. J. Inf. Manag.54, 102136 (2020).ArticleGoogle Scholar
Frizzo-Barker, J. et al. Blockchain as a disruptive technology for business: A systematic review. Int. J. Inf. Manag.51, 102029 (2020).ArticleGoogle Scholar
Bamakan, S. M. H., Motavali, A. & Bondarti, A. B. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl.154, 113385 (2020).ArticleGoogle Scholar
Bamakan, S. M. H., Bondarti, A. B., Bondarti, P. B. & Qu, Q. Blockchain technology forecasting by patent analytics and text mining. Blockchain Res. Appl. 100019 (2021).
Castro, M. & Liskov, B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS)20, 398–461 (2002).ArticleGoogle Scholar
Muratov, F., Lebedev, A., Iushkevich, N., Nasrulin, B. & Takemiya, M. YAC: BFT consensus algorithm for blockchain. arXiv preprint arXiv:1809.00554 (2018).
Bessani, A., Sousa, J. & Alchieri, E. E. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 355–362 (IEEE).
Todd, P. Ripple protocol consensus algorithm review. May 11th (2015).
Ongaro, D. & Ousterhout, J. In 2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 14). 305–319.
Dziembowski, S., Faust, S., Kolmogorov, V. & Pietrzak, K. In Annual Cryptology Conference. 585–605 (Springer).
Bentov, I., Lee, C., Mizrahi, A. & Rosenfeld, M. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake. IACR Cryptology ePrint Archive2014, 452 (2014).Google Scholar
Bramas, Q. The Stability and the Security of the Tangle (2018).
Baird, L. The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. In Swirlds Tech Reports SWIRLDS-TR-2016–01, Tech. Rep (2016).
LeMahieu, C. Nano: A feeless distributed cryptocurrency network. Nano [Online resource].https://nano.org/en/whitepaper (date of access: 24.03. 2018) 16, 17 (2018).
Casino, F., Dasaklis, T. K. & Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics Inform.36, 55–81 (2019).ArticleGoogle Scholar
bigredawesomedodo. Helping Small Businesses Survive and Grow With Marketing, Retrieved 3 June, 2021, from https://bigredawesomedodo.com/nft/. (2020).
This work has been partially supported by CAS President’s International Fellowship Initiative, China [grant number 2021VTB0002, 2021] and National Natural Science Foundation of China (No. 61902385).
Author information
Affiliations
Department of Industrial Management, Yazd University, Yazd City, IranSeyed Mojtaba Hosseini Bamakan
Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan City, IranNasim Nezhadsistani
School of Electrical and Computer Engineering, University of Tehran, Tehran City, IranOmid Bodaghi
Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, 518055, ChinaSeyed Mojtaba Hosseini Bamakan & Qiang Qu
For a sample of 396 exited US unicorns, it takes an average (median) of about 9 (8) years since founding to exit, where exit means going public, acquisition, or liquidation/bankruptcy.
A couple weeks ago, I posted results of my research on the countries of birth of over a thousand founders of 500 US-based unicorns on LinkedIn. Almost half of unicorn founders, for whom my team and I were able to identify country of birth, were born outside the US. This generated a lot of interest and the list of top countries (India, Israel, Canada, UK, China, etc.) was shared widely.
As a follow up, have a look at all the countries that my team and I identified.
65 countries from all over the world have “produced” at least one founder of a US unicorn.
Takeaway: Immigrants from many countries contribute to the innovation ecosystem in the US.
European countries include Belgium (9 founders), Spain (9), Netherlands (7), Romania (5), Denmark (5), Italy (5), and Poland (5).
Asian countries include Iran (9), Lebanon (4), Japan (3), Pakistan (3), and Turkey (2).
African countries include South Africa (5) and Zimbabwe (2).
Latin America includes Brazil (9), Argentina (4), and Guatemala (2).
Australasia is represented by Australia (8) and New Zealand (6).
Important note: This list includes only founders of US-based unicorns.
For a sample of 531 US unicorns, 396 had exited (went public, were acquired, or closed) as of January 2022. At exit time, an average (median) unicorn was valued at $4 billion ($1.6 billion). Half had a valuation of less than $2 billion.
31 unicorns, or 8%, were in the “decacorn” range at time of exit, or over $10 billion. Uber was valued at about $68 billion, Meta at $65 billion, and Coinbase at $48 billion.
Takeaway: There is huge variation in unicorn valuations at exit time.
This research has been done with the support of Stanford University Graduate School of Business Venture Capital Initiative. NB: For public companies, I used net IPO valuation; for acquired/closed companies, I used gross valuation.
COVID-19 Treatment and Vaccine Tracker This document contains an aggregation of publicly available information from validated sources. It is not an endorsement of one approach or treatment over another but simply a list of all treatments and vaccines currently in development.
Number
Type of Product – Treatment
FDA-Approved Indications (Treatments)
Clinical Trials
Ongoing for Other Diseases
Developer/ Researcher
Current Stage of Development
Funding Sources
Anticipated Timing
Sources
LEGEND
CCHF= Crimean-Congo Haemorrhagic Fever
CHIKV = Chikungunya Virus
DengV = Dengue Virus
FMD = Foot and Mouth Disease
EBOV = Ebola Virus
HAV = Hepatitis A Virus
HBV = Hepatitis B Virus
HIV = Human Immunodeficiency Virus
HPV = Human Papilloma Virus
Inf = Influenza
LASV = Lassa Fever Virus
MARV = Marburg Virus
MenB = Mengingitis B
MERS = Middle East Respiratory Syndrome
NIPV = Nipah Virus
NORV = Norovirus
RABV = Rabies Virus
RSV = Respiratory Syncytial Virus
RVF = Rift Valley Fever
SARS = Severe Acute Respiratory Syndrome
SIV = Simian Immunodeficiency Virus
TB = Tuberculosis
VEE = Venezuelan Equine Encephalitis Virus
VZV = Varicella Vaccine (Chickenpox)
YFV = Yellow Fever Virus
ZIKV = Zika Virus L
COVID-19 Treatment and Vaccine Tracker This document contains an aggregation of publicly-available information from validated sources. It is not an endorsement of one approach or treatment over another, but simply a list of all treatments and vaccines currently in development
Antibodies from recovered COVID-19 patients N/A Celltrion Pre-clinical Start Phase 1 ~ Sept 2020 Korea Herald 4
Antibodies from recovered COVID-19 patients N/A Vir Biotech/WuXi Biologics/Biogen Pre-clinical Stat News Vir Biotech 6
Antibodies from recovered COVID-19 patients N/A Lilly/Ab-Cellera (NIH Vaccines Research Center) Pre-clinical Start Phase 1 in late July 2020 Endpoints News
The worldwide endeavor to create a safe and effective COVID-19 vaccine is bearing fruit. Dozens of vaccines now have been authorized or approved around the globe; many more remain in development.
To clarify the landscape for our readers, our vaccine tracker has been split in two. The first chart details vaccine candidates that are still in development to address the lack of vaccines and access in many countries around the world; the second chart lists vaccines that are authorized or approved by one or more country. To reveal in-depth information about each candidate, select the “Details” button above the chart or click on the green plus button next to each entry.
Information about the unprecedented public/private partnerships spawned by the COVID-19 public health emergency now can be found below the charts.
Our charts are updated every other week. If you wish to submit an update or notice an issue with this data, please email Focus at news@raps.org.
Updated 28 January with new information on vaccines from Pfizer/BioNTech, Moderna, AstraZeneca, Gamaleya Research Institute, Janssen Vaccines, Sinovac, Bharat Biotech/Ocugen, Anhui Zhifei Longcom Biopharmaceutical, and Novavax as well as vaccine candidates from Walvax, Valneva, GSK/Sanofi, and Senai Cimatec.
Vaccine candidates in development
SHOW/HIDE DETAILS
Candidate
Mechanism
Sponsor
Trial Phase
Institution
Unnamed vaccine candidate
Recombinant vaccine (Sf9 cells)
WestVac Biopharma Co., Ltd.; West China Hospital; Sichuan University;
Phase 3
Jiangsu Province Centers for Disease Control and Prevention
Guangdong Provincial Center for Disease Control and Prevention; Gaozhou Municipal Center for Disease Control and Prevention; Zhuhai Livzonumab Biotechnology Co., Ltd.
Phase 3
Livzon Mabpharm Inc.
Razi Cov Pars
Recombinant vaccine (Spike protein)
Razi Vaccine and Serum Research Institute
Phase 3
Tehran Rasoul Akram Hospital; Karaj, Hesarak, Razi Vaccine and Serum Research Institute
GBP510
Nanoparticle vaccine
SK bioscience Co., Ltd.; GSK; University of Washington; CEPI
OWS:Operation Warp Speed is a collaboration of several US government departments including Health and Human Services (HHS) and subagencies, Defense, Agriculture, Energy and Veterans Affairs and the private sector. OWS has funded JNJ-78436735 (Janssen), mRNA-1273 (Moderna), and NVX‑CoV2373 (Novavax), V590 (Merck/IAVI), V591 (Merck/Themis), AZD1222 (AstraZeneca/University of Oxford), and the candidate developed by Sanofi and GlaxoSmithKline.
OWS is “part of a broader strategy to accelerate the development, manufacturing, and distribution of COVID-19 vaccines, therapeutics, and diagnostics.” Leaders of OWS say they could vaccinate as many as 20 million people by the end of the year and 100 million people by February.
ACTIV: Within OWS, the US National Institutes of Health (NIH) has partnered with more than 18 biopharmaceutical companies in an initiative called ACTIV. ACTIV aims to fast-track development of drug and vaccine candidates for COVID-19.
COVPN: The COVID-19 Prevention Trials Network (COVPN) combines clinical trial networks funded by the National Institute of Allergy and Infectious Diseases (NIAID): the HIV Vaccine Trials Network (HVTN), HIV Prevention Trials Network (HPTN), Infectious Diseases Clinical Research Consortium (IDCRC), and the AIDS Clinical Trials Group.
COVAX: The COVAX initiative, part of the World Health Organization’s (WHO) Access to COVID-19 Tools (ACT) Accelerator, is being spearheaded by the Coalition for Epidemic Preparedness Innovations (CEPI); Gavi, the Vaccine Alliance; and WHO. The goal is to work with vaccine manufacturers to offer low-cost COVID-19 vaccines to countries. CEPI’s candidates from companies Inovio, Moderna, CureVac, Institut Pasteur/Merck/Themis, AstraZeneca/University of Oxford, Novavax, University of Hong Kong, Clover Biopharmaceuticals, and University of Queensland/CSL are part of the COVAX initiative. The US joined COVAX on 21 January. The most up-to-date forecast of COVAX’s vaccine supply can be found here. An interim distribution forecast, most recently published 3 February, can be found here.