Feeds:
Posts
Comments

Archive for the ‘IP Valuation Models – Pricing Intangible Assets’ Category

Clarivate Analytics – a Powerhouse in IP assets and in Pharmaceuticals Informercials

Curator and Reporter: Aviva Lev-Ari, PhD, RN

We addressed in the past in several articles the emergence of Clarivate in its new life post Reuters years which ended by a SPAC IPO in 2019. This articles included:

  • Clarivate Analytics expanded IP data leadership by new acquisition of the leading provider of intellectual property case law and analytics Darts-ip

https://pharmaceuticalintelligence.com/2019/12/02/clarivate-analytics-expanded-ip-data-leadership-by-new-acquisition-of-the-leading-provider-of-intellectual-property-case-law-and-analytics-darts-ip/

  • Innovation and Patent Activity during COVID-19 from Clarivate – Survey Results Published

https://pharmaceuticalintelligence.com/2020/06/30/innovation-and-patent-activity-during-covid-19-from-clarivate-survey-result-published/

  • Chasing change: Innovation and patent activity during COVID-19

https://pharmaceuticalintelligence.com/2020/07/02/chasing-change-innovation-and-patent-activity-during-covid-19/

  • Potential Use of LPBI IP as Value Price Driver by Potential Acquirer: Assumptions per Asset Class

 https://pharmaceuticalintelligence.com/2019-vista/potential-use-of-lpbi-ip-as-value-price-driver-by-potential-acquirer-assumptions-per-asset-class/

  • AI Acquisitions by Big Tech Firms Are Happening at a Blistering Pace: 2019 Recent Data by CBI Insights

https://pharmaceuticalintelligence.com/2019/12/11/ai-acquisitions-by-big-tech-firms-are-happening-at-a-blistering-pace-2019-recent-data-by-cbiinsights/

  • WHAT ARE LPBI Group’s NEEDS in June 2019 – Aviva’s BOLD VISION on June 11, 2019

https://pharmaceuticalintelligence.com/2019-vista/what-are-lpbi-groups-needs-in-june-2019-avivas-bold-vision-on-june-11-2019/

  • Opportunities Map for LPBI Group’s three Intellectual Property Asset Classes of Digital Published Products in the Acquisition Arena

https://pharmaceuticalintelligence.com/2019-vista/opportunities-map-in-the-acquisition-arena/

  • Multiple Major Scientific Journals Will Fully Adopt Open Access Under Plan S

https://pharmaceuticalintelligence.com/2020/09/10/multiple-major-scientific-journals-will-fully-adopt-open-access-under-plan-s/

 

In this curation I wish to showcase Clarivate as a result of a successful SPAC as presented in Financial Times article

The Spac sponsor bonanza

 

https://www.ft.com/content/9b481c63-f9b4-4226-a639-238f9fae4dfc

Few have replicated Mr Klein’s success, which he achieved after using a Spac to take the data company Clarivate Analytics public in 2019

Please use the sharing tools found via the share button at the top or side of articles. Copying articles to share with others is a breach of FT.com T&Cs and Copyright Policy. Email licensing@ft.com to buy additional rights. Subscribers may share up to 10 or 20 articles per month using the gift article service. More information can be found here.
https://www.ft.com/content/9b481c63-f9b4-4226-a639-238f9fae4dfc

That moment in June in which Mr Klein and his partners cashed in more than $60m came after the stock had doubled to more than $20, in part thanks to a deal to buy the intellectual property management and technology company CPA Global. Onex and Barings, the two private equity firms that owned Clarivate before it went public via Mr Klein’s Spac, also sold stock at the same time.

Please use the sharing tools found via the share button at the top or side of articles. Copying articles to share with others is a breach of FT.com T&Cs and Copyright Policy. Email licensing@ft.com to buy additional rights. Subscribers may share up to 10 or 20 articles per month using the gift article service. More information can be found here.
https://www.ft.com/content/9b481c63-f9b4-4226-a639-238f9fae4dfc

Clarivate’s share price has since risen to $27.69, so the value of Mr Klein’s remaining stake has continued to swell and his investor group still holds shares worth $395m. The group also has separate warrants on top further augmenting their potential profit.

See Figure 

SPAC IPO, 11/2018, $10/share

–>>> Merger, 3/2019, $10/share

–>>>Clarivate PLC, 11/2020, $27/share

… asymmetry of Spac mathematics: the risk in Spacs falls most heavily on outside shareholders even as the return on investment for sponsors looks very promising indeed.

SOURCE

https://www.ft.com/content/9b481c63-f9b4-4226-a639-238f9fae4dfc

 

It worth exploring the synergies embedded in a potential acquisition of LPBI Groups Portfolio of IP Assets by Clarivate Analytics, a publishing company that has the infrastructure needed for promotion of LPBI Group’s content in Pharmaceutical Media, Medicine, Life Sciences and Health care and for Monetization of this content.

Portfolio of IP Assets

 

Read Full Post »

From the journal Nature: NFT, Patents, and Intellectual Property: Potential Design

Reporter: Stephen J. Williams, Ph.D.

 

From the journal Nature

Source: https://www.nature.com/articles/s41598-022-05920-6

Patents and intellectual property assets as non-fungible tokens; key technologies and challenges

Scientific Reports volume 12, Article number: 2178 (2022)

Abstract

With the explosive development of decentralized finance, we witness a phenomenal growth in tokenization of all kinds of assets, including equity, funds, debt, and real estate. By taking advantage of blockchain technology, digital assets are broadly grouped into fungible and non-fungible tokens (NFT). Here non-fungible tokens refer to those with unique and non-substitutable properties. NFT has widely attracted attention, and its protocols, standards, and applications are developing exponentially. It has been successfully applied to digital fantasy artwork, games, collectibles, etc. However, there is a lack of research in utilizing NFT in issues such as Intellectual Property. Applying for a patent and trademark is not only a time-consuming and lengthy process but also costly. NFT has considerable potential in the intellectual property domain. It can promote transparency and liquidity and open the market to innovators who aim to commercialize their inventions efficiently. The main objective of this paper is to examine the requirements of presenting intellectual property assets, specifically patents, as NFTs. Hence, we offer a layered conceptual NFT-based patent framework. Furthermore, a series of open challenges about NFT-based patents and the possible future directions are highlighted. The proposed framework provides fundamental elements and guidance for businesses in taking advantage of NFTs in real-world problems such as grant patents, funding, biotechnology, and so forth.

Introduction

Distributed ledger technologies (DLTs) such as blockchain are emerging technologies posing a threat to existing business models. Traditionally, most companies used centralized authorities in various aspects of their business, such as financial operations and setting up a trust with their counterparts. By the emergence of blockchain, centralized organizations can be substituted with a decentralized group of resources and actors. The blockchain mechanism was introduced in Bitcoin white paper in 2008, which lets users generate transactions and spend their money without the intervention of banks1. Ethereum, which is a second generation of blockchain, was introduced in 2014, allowing developers to run smart contracts on a distributed ledger. With smart contracts, developers and businesses can create financial applications that use cryptocurrencies and other forms of tokens for applications such as decentralized finance (DeFi), crowdfunding, decentralized exchanges, data records keeping, etc.2. Recent advances in distributed ledger technology have developed concepts that lead to cost reduction and the simplification of value exchange. Nowadays, by leveraging the advantages of blockchain and taking into account the governance issues, digital assets could be represented as tokens that existed in the blockchain network, which facilitates their transmission and traceability, increases their transparency, and improves their security3.

In the landscape of blockchain technology, there could be defined two types of tokens, including fungible tokens, in which all the tokens have equal value and non-fungible tokens (NFTs) that feature unique characteristics and are not interchangeable. Actually, non-fungible tokens are digital assets with a unique identifier that is stored on a blockchain4. NFT was initially suggested in Ethereum Improvement Proposals (EIP)-7215, and it was later expanded in EIP-11556. NFTs became one of the most widespread applications of blockchain technology that reached worldwide attention in early 2021. They can be digital representations of real-world objects. NFTs are tradable rights of digital assets (pictures, music, films, and virtual creations) where ownership is recorded in blockchain smart contracts7.

In particular, fungibility is the ability to exchange one with another of the same kind as an essential currency feature. The non-fungible token is unique and therefore cannot be substituted8. Recently, blockchain enthusiasts have indicated significant interest in various types of NFTs. They enthusiastically participate in NFT-related games or trades. CryptoPunks9, as one of the first NFTs on Ethereum, has developed almost 10,000 collectible punks and helped popularize the ERC-721 Standard. With the gamification of the breeding mechanics, CryptoKitties10 officially placed NFTs at the forefront of the market in 2017. CryptoKitties is an early blockchain game that enables users to buy, sell, collect, and digital breed cats. Another example is NBA Top Shot11, an NFT trading platform for digital short films buying and selling NBA events.

NFTs are developing remarkably and have provided many applications such as artist royalties, in-game assets, educational certificates, etc. However, it is a relatively new concept, and many areas of application need to be explored. Intellectual Property, including patent, trademark, and copyright, is an important area where NFTs can be applied usefully and solve existing problems.

Although NFTs have had many applications so far, it rarely has been used to solve real-world problems. In fact, an NFT is an exciting concept about Intellectual Property (IP). Applying for a patent and trademark is a time-consuming and lengthy process, but it is also costly. That is, registering a copyright or trademark may take months, while securing a patent can take years. On the contrary, with the help of unique features of NFT technology, it is possible to accelerate this process with considerable confidence and assurance about protecting the ownership of an IP. NFTs can offer IP protection while an applicant waits for the government to grant his/her more formal protection. It is cause for excitement that people who believe NFTs and Blockchain would make buying and selling patents easier, offering new opportunities for companies, universities, and inventors to make money off their innovations12. Patent holders will benefit from such innovation. It would give them the ability to ‘tokenize’ their patents. Because every transaction would be logged on a blockchain, it will be much easier to trace patent ownership changes. However, NFT would also facilitate the revenue generation of patents by democratizing patent licensing via NFT. NFTs support the intellectual property market by embedding automatic royalty collecting methods inside inventors’ works, providing them with financial benefits anytime their innovation is licensed. For example, each inventor’s patent would be minted as an NFT, and these NFTs would be joined together to form a commercial IP portfolio and minted as a compounded NFT. Each investor would automatically get their fair share of royalties whenever the licensing revenue is generated without tracking them down.

The authors in13, an overview of NFTs’ applications in different aspects such as gambling, games, and collectibles has been discussed. In addition4, provides a prototype for an event-tracking application based on Ethereum smart contract, and NFT as a solution for art and real estate auction systems is described in14. However, these studies have not discussed existing standards or a generalized architecture, enabling NFTs to be applied in diverse applications. For example, the authors in15 provide two general design patterns for creating and trading NFTs and discuss existing token standards for NFT. However, the proposed designs are limited to Ethereum, and other blockchains are not considered16. Moreover, different technologies for each step of the proposed procedure are not discussed. In8, the authors provide a conceptual framework for token designing and managing and discuss five views: token view, wallet view, transaction view, user interface view, and protocol view. However, no research provides a generalized conceptual framework for generating, recording, and tracing NFT based-IP, in blockchain network.

Even with the clear benefits that NFT-backed patents offer, there are a number of impediments to actually achieving such a system. For example, convincing patent owners to put current ownership records for their patents into NFTs poses an initial obstacle. Because there is no reliable framework for NFT-based patents, this paper provides a conceptual framework for presenting NFT-based patents with a comprehensive discussion on many aspects, ranging from the background, model components, token standards to application domains and research challenges. The main objective of this paper is to provide a layered conceptual NFT-based patent framework that can be used to register patents in a decentralized, tamper-proof, and trustworthy peer-to-peer network to trade and exchange them in the worldwide market. The main contributions of this paper are highlighted as follows:

  • Providing a comprehensive overview on tokenization of IP assets to create unique digital tokens.
  • Discussing the components of a distributed and trustworthy framework for minting NFT-based patents.
  • Highlighting a series of open challenges of NFT-based patents and enlightening the possible future trends.

The rest of the paper is structured as follows: “Background” section describes the Background of NFTs, Non-Fungible Token Standards. The NFT-based patent framework is described in “NFT-based patent framework” section. The Discussion and challenges are presented in “Discussion” section. Lastly, conclusions are given in “Conclusion” section.

Background

Colored Coins could be considered the first steps toward NFTs designed on the top of the Bitcoin network. Bitcoins are fungible, but it is possible to mark them to be distinguishable from the other bitcoins. These marked coins have special properties representing real-world assets like cars and stocks, and owners can prove their ownership of physical assets through the colored coins. By utilizing Colored Coins, users can transfer their marked coins’ ownership like a usual transaction and benefit from Bitcoin’s decentralized network17. Colored Coins had limited functionality due to the Bitcoin script limitations. Pepe is a green frog meme originated by Matt Furie that; users define tokens for Pepes and trade them through the Counterparty platform. Then, the tokens that were created by the picture of Pepes are decided if they are rare enough. Rare Pepe allows users to preserve scarcity, manage the ownership, and transfer their purchased Pepes.

In 2017, Larva Labs developed the first Ethereum-based NFT named CryptoPunks. It contains 10,000 unique human-like characters generated randomly. The official ownership of each character is stored in the Ethereum smart contract, and owners would trade characters. CryptoPunks project inspired CryptoKitties project. CryptoKitties attracts attention to NFT, and it is a pioneer in blockchain games and NFTs that launched in late 2017. CryptoKitties is a blockchain-based virtual game, and users collect and trade characters with unique features that shape kitties. This game was developed in Ethereum smart contract, and it pioneered the ERC-721 token, which was the first standard token in the Ethereum blockchain for NFTs. After the 2017 hype in NFTs, many projects started in this context. Due to increased attention to NFTs’ use-cases and growing market cap, different blockchains like EOS, Algorand, and Tezos started to support NFTs, and various marketplaces like SuperRare and Rarible, and OpenSea are developed to help users to trade NFTs. As mentioned, in general, assets are categorized into two main classes, fungible and non-fungible assets. Fungible assets are the ones that another similar asset can replace. Fungible items could have two main characteristics: replicability and divisibility.

Currency is a fungible item because a ten-dollar bill can be exchanged for another ten-dollar bill or divided into ten one-dollar bills. Despite fungible items, non-fungible items are unique and distinguishable. They cannot be divided or exchanged by another identical item. The first tweet on Twitter is a non-fungible item with mentioned characteristics. Another tweet cannot replace it, and it is unique and not divisible. NFT is a non-fungible cryptographic asset that is declared in a standard token format and has a unique set of attributes. Due to transparency, proof of ownership, and traceable transactions in the blockchain network, NFTs are created using blockchain technology.

Blockchain-based NFTs help enthusiasts create NFTs in the standard token format in blockchain, transfer the ownership of their NFTs to a buyer, assure uniqueness of NFTs, and manage NFTs completely. In addition, there are semi-fungible tokens that have characteristics of both fungible and non-fungible tokens. Semi-fungible tokens are fungible in the same class or specific time and non-fungible in other classes or different times. A plane ticket can be considered a semi-fungible token because a charter ticket can be exchanged by another charter ticket but cannot be exchanged by a first-class ticket. The concept of semi-fungible tokens plays the main role in blockchain-based games and reduces NFTs overhead. In Fig. 1, we illustrate fungible, non-fungible, and semi-fungible tokens. The main properties of NFTs are described as follows15:

figure 1
Figure 1

Ownership: Because of the blockchain layer, the owner of NFT can easily prove the right of possession by his/her keys. Other nodes can verify the user’s ownership publicly.

  • Transferable: Users can freely transfer owned NFTs ownership to others on dedicated markets.
  • Transparency: By using blockchain, all transactions are transparent, and every node in the network can confirm and trace the trades.
  • Fraud Prevention: Fraud is one of the key problems in trading assets; hence, using NFTs ensures buyers buy a non-counterfeit item.
  • Immutability: Metadata, token ID, and history of transactions of NFTs are recorded in a distributed ledger, and it is impossible to change the information of the purchased NFTs.

Non-fungible standards

Ethereum blockchain was pioneered in implementing NFTs. ERC-721 token was the first standard token accepted in the Ethereum network. With the increase in popularity of the NFTs, developers started developing and enhancing NFTs standards in different blockchains like EOS, Algorand, and Tezos. This section provides a review of implemented NFTs standards on the mentioned blockchains.

Ethereum

ERC-721 was the first Standard for NFTs developed in Ethereum, a free and open-source standard. ERC-721 is an interface that a smart contract should implement to have the ability to transfer and manage NFTs. Each ERC-721 token has unique properties and a different Token Id. ERC-721 tokens include the owner’s information, a list of approved addresses, a transfer function that implements transferring tokens from owner to buyer, and other useful functions5.

In ERC-721, smart contracts can group tokens with the same configuration, and each token has different properties, so ERC-721 does not support fungible tokens. However, ERC-1155 is another standard on Ethereum developed by Enjin and has richer functionalities than ERC-721 that supports fungible, non-fungible, and semi-fungible tokens. In ERC-1155, IDs define the class of assets. So different IDs have a different class of assets, and each ID may contain different assets of the same class. Using ERC-1155, a user can transfer different types of tokens in a single transaction and mix multiple fungible and non-fungible types of tokens in a single smart contract6. ERC-721 and ERC-1155 both support operators in which the owner can let the operator originate transferring of the token.

EOSIO

EOSIO is an open-source blockchain platform released in 2018 and claims to eliminate transaction fees and increase transaction throughput. EOSIO differs from Ethereum in the wallet creation algorithm and procedure of handling transactions. dGood is a free standard developed in the EOS blockchain for assets, and it focuses on large-scale use cases. It supports a hierarchical naming structure in smart contracts. Each contract has a unique symbol and a list of categories, and each category contains a list of token names. Therefore, a single contract in dGoods could contain many tokens, which causes efficiency in transferring a group of tokens. Using this hierarchy, dGoods supports fungible, non-fungible, and semi-fungible tokens. It also supports batch transferring, where the owner can transfer many tokens in one operation18.

Algorand

Algorand is a new high-performance public blockchain launched in 2019. It provides scalability while maintaining security and decentralization. It supports smart contracts and tokens for representing assets19. Algorand defines Algorand Standard Assets (ASA) concept to create and manage assets in the Algorand blockchain. Using ASA, users are able to define fungible and non-fungible tokens. In Algorand, users can create NFTs or FTs without writing smart contracts, and they should run just a single transaction in the Algorand blockchain. Each transaction contains some mutable and immutable properties20.

Each account in Algorand can create up to 1000 assets, and for every asset, an account creates or receives, the minimum balance of the account increases by 0.1 Algos. Also, Algorand supports fractional NFTs by splitting an NFT into a group of divided FTs or NFTs, and each part can be exchanged dependently21. Algorand uses a Clawback Address that operates like an operator in ERC-1155, and it is allowed to transfer tokens of an owner who has permitted the operator.

Tezos

Tezos is another decentralized open-source blockchain. Tezos supports the meta-consensus concept. In addition to using a consensus protocol on the ledger’s state like Bitcoin and Ethereum, It also attempts to reach a consensus about how nodes and the protocol should change or upgrade22. FA2 (TZIP-12) is a standard for a unified token contract interface in the Tezos blockchain. FA2 supports different token types like fungible, non-fungible, and fractionalized NFT contracts. In Tezos, tokens are identified with a token contract address and token ID pair. Also, Tezos supports batch token transferring, which reduces the cost of transferring multiple tokens.

Flow

Flow was developed by Dapper Labs to remove the scalability limitation of the Ethereum blockchain. Flow is a fast and decentralized blockchain that focuses on games and digital collectibles. It improves throughput and scalability without sharding due to its architecture. Flow supports smart contracts using Cadence, which is a resource-oriented programming language. NFTs can be described as a resource with a unique id in Cadence. Resources have important rules for ownership management; that is, resources have just one owner and cannot be copied or lost. These features assure the NFT owner. NFTs’ metadata, including images and documents, can be stored off-chain or on-chain in Flow. In addition, Flow defines a Collection concept, in which each collection is an NFT resource that can include a list of resources. It is a dictionary that the key is resource id, and the value is corresponding NFT.

The collection concept provides batch transferring of NFTs. Besides, users can define an NFT for an FT. For instance, in CryptoKitties, a unique cat as an NFT can own a unique hat (another NFT). Flow uses Cadence’s second layer of access control to allow some operators to access some fields of the NFT23. In Table 1, we provide a comparison between explained standards. They are compared in support of fungible-tokens, non-fungible tokens, batch transferring that owner can transform multiple tokens in one operation, operator support in which the owner can approve an operator to originate token transfer, and fractionalized NFTs that an NFT can divide to different tokens and each exchange dependently.Table 1 Comparing NFT standards.

Full size table

NFT-based patent framework

In this section, we propose a framework for presenting NFT-based patents. We describe details of the proposed distributed and trustworthy framework for minting NFT-based patents, as shown in Fig. 2. The proposed framework includes five main layers: Storage Layer, Authentication Layer, Verification Layer, Blockchain Layer, and Application Layer. Details of each layer and the general concepts are presented as follows.

figure 2
Figure 2

Storage layer

The continuous rise of the data in blockchain technology is moving various information systems towards the use of decentralized storage networks. Decentralized storage networks were created to provide more benefits to the technological world24. Some of the benefits of using decentralized storage systems are explained: (1) Cost savings are achieved by making optimal use of current storage. (2) Multiple copies are kept on various nodes, avoiding bottlenecks on central servers and speeding up downloads. This foundation layer implicitly provides the infrastructure required for the storage. The items on NFT platforms have unique characteristics that must be included for identification.

Non-fungible token metadata provides information that describes a particular token ID. NFT metadata is either represented on the On-chain or Off-chain. On-chain means direct incorporation of the metadata into the NFT’s smart contract, which represents the tokens. On the other hand, off-chain storage means hosting the metadata separately25.

Blockchains provide decentralization but are expensive for data storage and never allow data to be removed. For example, because of the Ethereum blockchain’s current storage limits and high maintenance costs, many projects’ metadata is maintained off-chain. Developers utilize the ERC721 Standard, which features a method known as tokenURI. This method is implemented to let applications know the location of the metadata for a specific item. Currently, there are three solutions for off-chain storage, including InterPlanetary File System (IPFS), Pinata, and Filecoin.

IPFS

InterPlanetary File System (IPFS) is a peer-to-peer hypermedia protocol for decentralized media content storage. Because of the high cost of storing media files related to NFTS on Blockchain, IPFS can be the most affordable and efficient solution. IPFS combines multiple technologies inspired by Gita and BitTorrent, such as Block Exchange System, Distributed Hash Tables (DHT), and Version Control System26. On a peer-to-peer network, DHT is used to coordinate and maintain metadata.

In other words, the hash values must be mapped to the objects they represent. An IPFS generates a hash value that starts with the prefix {Q}_{m} and acts as a reference to a specific item when storing an object like a file. Objects larger than 256 KB are divided into smaller blocks up to 256 KB. Then a hash tree is used to interconnect all the blocks that are a part of the same object. IPFS uses Kamdelia DHT. The Block Exchange System, or BitSwap, is a BitTorrent-inspired system that is used to exchange blocks. It is possible to use asymmetric encryption to prevent unauthorized access to stored content on IPFS27.

Pinata

Pinata is a popular platform for managing and uploading files on IPFS. It provides secure and verifiable files for NFTs. Most data is stored off-chain by most NFTs, where a URL of the data is pointed to the NFT on the blockchain. The main problem here is that some information in the URL can change.

This indicates that an NFT supposed to describe a certain patent can be changed without anyone knowing. This defeats the purpose of the NFT in the first place. This is where Pinata comes in handy. Pinata uses the IPFS to create content-addressable hashes of data, also known as Content-Identifiers (CIDs). These CIDs serve as both a way of retrieving data and a means to ensure data validity. Those looking to retrieve data simply ask the IPFS network for the data associated with a certain CID, and if any node on the network contains that data, it will be returned to the requester. The data is automatically rehashed on the requester’s computer when the requester retrieves it to make sure that the data matches back up with the original CID they asked for. This process ensures the data that’s received is exactly what was asked for; if a malicious node attempts to send fake data, the resulting CID on the requester’s end will be different, alerting the requester that they’re receiving incorrect data28.

Filecoin

Another decentralized storage network is Filecoin. It is built on top of IPFS and is designed to store the most important data, such as media files. Truffle Suite has also launched NFT Development Template with Filecoin Box. NFT.Storage (Free Decentralized Storage for NFTs)29 allows users to easily and securely store their NFT content and metadata using IPFS and Filecoin. NFT.Storage is a service backed by Protocol Labs and Pinata specifically for storing NFT data. Through content addressing and decentralized storage, NFT.Storage allows developers to protect their NFT assets and associated metadata, ensuring that all NFTs follow best practices to stay accessible for the long term. NFT.Storage makes it completely frictionless to mint NFTs following best practices through resilient persistence on IPFS and Filecoin. NFT.Storage allows developers to quickly, safely, and for free store NFT data on decentralized networks. Anyone can leverage the power of IPFS and Filecoin to ensure the persistence of their NFTs. The details of this system are stated as follows30:

Content addressing

Once users upload data on NFT.Storage, They receive a CID, which is an IPFS hash of the content. CIDs are the data’s unique fingerprints, universal addresses that can be used to refer to it regardless of how or where it is stored. Using CIDs to reference NFT data avoids problems such as weak links and “rug pulls” since CIDs are generated from the content itself.

Provable storage

NFT.Storage uses Filecoin for long-term decentralized data storage. Filecoin uses cryptographic proofs to assure the NFT data’s durability and persistence over time.

Resilient retrieval

This data stored via IPFS and Filecoin can be fetched directly in the browser via any public IPFS.

Authentication Layer

The second layer is the authentication layer, which we briefly highlight its functions in this section. The Decentralized Identity (DID) approach assists users in collecting credentials from a variety of issuers, such as the government, educational institutions, or employers, and saving them in a digital wallet. The verifier then uses these credentials to verify a person’s validity by using a blockchain-based ledger to follow the “identity and access management (IAM)” process. Therefore, DID allows users to be in control of their identity. A lack of NFT verifiability also causes intellectual property and copyright infringements; of course, the chain of custody may be traced back to the creator’s public address to check whether a similar patent is filed using that address. However, there is no quick and foolproof way to check an NFTs creator’s legitimacy. Without such verification built into the NFT, an NFT proves ownership only over that NFT itself and nothing more.

Self-sovereign identity (SSI)31 is a solution to this problem. SSI is a new series of standards that will guide a new identity architecture for the Internet. With a focus on privacy, security interoperability, SSI applications use public-key cryptography with public blockchains to generate persistent identities for people with private and selective information disclosure. Blockchain technology offers a solution to establish trust and transparency and provide a secure and publicly verifiable KYC (Know Your Customer). The blockchain architecture allows you to collect information from various service providers into a single cryptographically secure and unchanging database that does not need a third party to verify the authenticity of the information.

The proposed platform generates patents-related smart contracts acting as a program that runs on the blockchain to receive and send transactions. They are unalterable privately identifying clients with a thorough KYC process. After KYC approval, then mint an NFT on the blockchain as a certificate of verification32. This article uses a decentralized authentication solution at this layer for authentication. This solution has been used for various applications in the field of the blockchain (exp: smart city, Internet of Things, etc.3334, but we use it here for the proposed framework (patent as NFTs). Details of this solution will be presented in the following.

Decentralized authentication

This section presents the authentication layer similar35 to build validated communication in a secure and decentralized manner via blockchain technology. As shown in Fig. 3, the authentication protocol comprises two processes, including registration and login.

figure 3
Figure 3
Registration

In the registration process of a suggested authentication protocol, we first initialize a user’s public key as their identity key (UserName). Then, we upload this identity key on a blockchain, in which transactions can be verified later by other users. Finally, the user generates an identity transaction.

Login

After registration, a user logs in to the system. The login process is described as follows:

  • 1. The user commits identity information and imports their secret key into the service application to log in.
  • 2. A user who needs to log in sends a login request to the network’s service provider.
  • 3. The service provider analyzes the login request, extracts the hash, queries the blockchain, and obtains identity information from an identity list (identity transactions).
  • 4. The service provider responds with an authentication request when the above process is completed. A timestamp (to avoid a replay attack), the user’s UserName, and a signature are all included in the authentication request.
  • 5. The user creates a signature with five parameters: timestamp, UserName, and PK, as well as the UserName and PK of the service provider. The user authentication credential is used as the signature.
  • 6. The service provider verifies the received information, and if the received information is valid, the authentication succeeds; otherwise, the authentication fails, and the user’s login is denied.

The World Intellectual Property Organization (WIPO) and multiple target patent offices in various nations or regions should assess a patent application, resulting in inefficiency, high costs, and uncertainty. This study presented a conceptual NFT-based patent framework for issuing, validating, and sharing patent certificates. The platform aims to support counterfeit protection as well as secure access and management of certificates according to the needs of learners, companies, education institutions, and certification authorities.

Here, the certification authority (CA) is used to authenticate patent offices. The procedure will first validate a patent if it is provided with a digital certificate that meets the X.509 standard. Certificate authorities are introduced into the system to authenticate both the nodes and clients connected to the blockchain network.

Verification layer

In permissioned blockchains, just identified nodes can read and write in the distributed ledger. Nodes can act in different roles and have various permissions. Therefore, a distributed system can be designed to be the identified nodes for patent granting offices. Here the system is described conceptually at a high level. Figure 4 illustrates the sequence diagram of this layer. This layer includes four levels as below:

figure 4
Figure 4

Digitalization

For a patent to publish as an NFT in the blockchain, it must have a digitalized format. This level is the “filling step” in traditional patent registering. An application could be designed in the application layer to allow users to enter different patent information online.

Recording

Patents provide valuable information and would bring financial benefits for their owner. If they are publicly published in a blockchain network, miners may refuse the patent and take the innovation for themselves. At least it can weaken consensus reliability and encourage miners to misbehave. The inventor should record his innovation privately first using proof of existence to prevent this. The inventor generates the hash of the patent document and records it in the blockchain. As soon as it is recorded in the blockchain, the timestamp and the hash are available for others publicly. Then, the inventor can prove the existence of the patent document whenever it is needed.

Furthermore, using methods like Decision Thinking36, an inventor can record each phase of patent development separately. In each stage, a user generates the hash of the finished part and publishes the hash regarding the last part’s hash. Finally, they have a coupled series of hashes that indicate patent development, and they can prove the existence of each phase using the original related documents. This level should be done to prevent others from abusing the patent and taking it for themselves. The inventor can make sure that their patent document is recorded confidentially and immutably37.

Different hash algorithms exist with different architecture, time complexity, and security considerations. Hash functions should satisfy two main requirements: Pre-Image Resistance: This means that it should be computationally hard to find the input of a hash function while the output and the hash algorithm are known publicly. Collision Resistance: This means that it is computationally hard to find two arbitrary inputs, x, and y, that have the same hash output. These requirements are vital for recording patents. First, the hash function should be Pre-Image Resistance to make it impossible for others to calculate the patent documentation. Otherwise, everybody can read the patent, even before its official publication. Second, the hash function should satisfy Collision Resistance to preclude users from changing their document after recording. Otherwise, users can upload another document, and after a while, they can replace it with another one.

There are various hash algorithms, and MD and SHA families are the most useful algorithms. According to38, Collisions have been found for MD2, MD4, MD5, SHA-0, and SHA-1 hash functions. Hence, they cannot be a good choice for recording patents. SHA2 hash algorithm is secure, and no collision has been found. Although SHA2 is noticeably slower than prior hash algorithms, the recording phase is not highly time-sensitive. So, it is a better choice and provides excellent security for users.

Validating

In this phase, the inventors first create NFT for their patents and publish it to the miners/validators. Miners are some identified nodes that validate NFTs to record in the blockchain. Due to the specialization of the patent validation, miners cannot be inexpert public persons. In addition, patent offices are not too many to make the network fully decentralized. Therefore, the miners can be related specialist persons that are certified by the patent offices. They should receive a digital certificate from patent offices that show their eligibility to referee a patent.

Digital certificate

Digital certificates are digital credentials used to verify networked entities’ online identities. They usually include a public key as well as the owner’s identification. They are issued by Certification Authorities (CAs), who must verify the certificate holder’s identity. Certificates contain cryptographic keys for signing, encryption, and decryption. X.509 is a standard that defines the format of public-key certificates and is signed by a certificate authority. X.509 standard has multiple fields, and its structure is shown in Fig. 5. Version: This field indicated the version of the X.509 standard. X.509 contains multiple versions, and each version has a different structure. According to the CA, validators can choose their desired version. Serial Number: It is used to distinguish a certificate from other certificates. Thus, each certificate has a unique serial number. Signature Algorithm Identifier: This field indicates the cryptographic encryption algorithm used by a certificate authority. Issuer Name: This field indicates the issuer’s name, which is generally certificate authority. Validity Period: Each certificate is valid for a defined period, defined as the Validity Period. This limited period partly protects certificates against exposing CA’s private key. Subject Name: Name of the requester. In our proposed framework, it is the validator’s name. Subject Public Key Info: Shows the CA’s or organization’s public key that issued the certificate. These fields are identical among all versions of the X.509 standard39.

figure 5
Figure 5

Certificate authority

A Certificate Authority (CA) issues digital certificates. CAs encrypt the certificate with their private key, which is not public, and others can decrypt the certificates containing the CA’s public key.

Here, the patent office creates a certificate for requested patent referees. The patent office writes the information of the validator in their certificate and encrypts it with the patent offices’ private key. The validator can use the certificate to assure others about their eligibility. Other nodes can check the requesting node’s information by decrypting the certificate using the public key of the patent office. Therefore, persons can join the network’s miners/validators using their credentials. In this phase, miners perform Formal Examinations, Prior Art Research, and Substantive Examinations and vote to grant or refuse the patent.

Miners perform a consensus about the patent and record the patent in the blockchain. After that, the NFT is recorded in the blockchain with corresponding comments in granting or needing reformations. If the miners detect the NFT as a malicious request, they do not record it in the blockchain.

Blockchain layer

This layer plays as a middleware between the Verification Layer and Application Layer in the patents as NFTs architecture. The main purpose of the blockchain layer in the proposed architecture is to provide IP management. We find that transitioning to a blockchain-based patent as a NFTs records system enables many previously suggested improvements to current patent systems in a flexible, scalable, and transparent manner.

On the other hand, we can use multiple blockchain platforms, including Ethereum, EOS, Flow, and Tezos. Blockchain Systems can be mainly classified into two major types: Permissionless (public) and Permissioned (private) Blockchains based on their consensus mechanism. In a public blockchain, any node can participate in the peer-to-peer network, where the blockchain is fully decentralized. A node can leave the network without any consent from the other nodes in the network.

Bitcoin is one of the most popular examples that fall under the public and permissionless blockchain. Proof of Work (POW), Proof-of-Stake (POS), and directed acyclic graph (DAG) are some examples of consensus algorithms in permissionless blockchains. Bitcoin and Ethereum, two famous and trustable blockchain networks, use the PoW consensus mechanism. Blockchain platforms like Cardano and EOS adopt the PoS consensus40.

Nodes require specific access or permission to get network authentication in a private blockchain. Hyperledger is among the most popular private blockchains, which allow only permissioned members to join the network after authentication. This provides security to a group of entities that do not completely trust one another but wants to achieve a common objective such as exchanging information. All entities of a permissioned blockchain network can use Byzantine-fault-tolerant (BFT) consensus. The Fabric has a membership identity service that manages user IDs and verifies network participants.

Therefore, members are aware of each other’s identity while maintaining privacy and secrecy because they are unaware of each other’s activities41. Due to their more secure nature, private blockchains have sparked a large interest in banking and financial organizations, believing that these platforms can disrupt current centralized systems. Hyperledger, Quorum, Corda, EOS are some examples of permissioned blockchains42.

Reaching consensus in a distributed environment is a challenge. Blockchain is a decentralized network with no central node to observe and check all transactions. Thus, there is a need to design protocols that indicate all transactions are valid. So, the consensus algorithms are considered as the core of each blockchain43. In distributed systems, the consensus has become a problem in which all network members (nodes) agree on accept or reject of a block. When all network members accept the new block, it can append to the previous block.

As mentioned, the main concern in the blockchains is how to reach consensus among network members. A wide range of consensus algorithms has been designed in which each of them has its own pros and cons42. Blockchain consensus algorithms are mainly classified into three groups shown in Table 2. As the first group, proof-based consensus algorithms require the nodes joining the verifying network to demonstrate their qualification to do the appending task. The second group is voting-based consensus that requires validators in the network to share their results of validating a new block or transaction before making the final decision. The third group is DAG-based consensus, a new class of consensus algorithms. These algorithms allow several different blocks to be published and recorded simultaneously on the network.Table 2 Consensus algorithms in blockchain networks.

Full size table

The proposed patent as the NFTs platform that builds blockchain intellectual property empowers the entire patent ecosystem. It is a solution that removes barriers by addressing fundamental issues within the traditional patent ecosystem. Blockchain can efficiently handle patents and trademarks by effectively reducing approval wait time and other required resources. The user entities involved in Intellectual Property management are Creators, Patent Consumers, and Copyright Managing Entities. Users with ownership of the original data are the patent creators, e.g., inventors, writers, and researchers. Patent Consumers are the users who are willing to consume the content and support the creator’s work. On the other hand, Users responsible for protecting the creators’ Intellectual Property are the copyright management entities, e.g., lawyers. The patents as NFTs solution for IP management in blockchain layer works by implementing the following steps62:

Creators sign up to the platform

Creators need to sign up on the blockchain platform to patent their creative work. The identity information will be required while signing up.

Creators upload IP on the blockchain network

Now, add an intellectual property for which the patent application is required. The creator will upload the information related to IP and the data on the blockchain network. Blockchain ensures traceability and auditability to prevent data from duplicity and manipulation. The patent becomes visible to all network members once it is uploaded to the blockchain.

Consumers generate request to use the content

Consumers who want to access the content must first register on the blockchain network. After Signing up, consumers can ask creators to grant access to the patented content. Before the patent owner authorizes the request, a Smart Contract is created to allow customers to access information such as the owner’s data. Furthermore, consumers are required to pay fees in either fiat money or unique tokens in order to use the creator’s original information. When the creator approves the request, an NDA (Non-Disclosure Agreement) is produced and signed by both parties. Blockchain manages the agreement and guarantees that all parties agree to the terms and conditions filed.

Patent management entities leverage blockchain to protect copyrights and solve related disputes

Blockchain assists the patent management entities in resolving a variety of disputes that may include: sharing confidential information, establishing proof of authorship, transferring IP rights, and making defensive publications, etc. Suppose a person used an Invention from a patent for his company without the inventor’s consent. The inventor can report it to the patent office and claim that he is the owner of that invention.

Application layer

The patent Platform Global Marketplace technology would allow many enterprises, governments, universities, and Small and medium-sized enterprises (SMEs) worldwide to tokenize patents as NFTs to create an infrastructure for storing patent records on a blockchain-based network and developing a decentralized marketplace in which patent holders would easily sell or otherwise monetize their patents. The NFTs-based patent can use smart contracts to determine a set price for a license or purchase.

Any buyer satisfied with the conditions can pay and immediately unlock the rights to the patent without either party ever having to interact directly. While patents are currently regulated jurisdictionally around the world, a blockchain-based patent marketplace using NFTs can reduce the geographical barriers between patent systems using as simple a tool as a search query. The ease of access to patents globally can help aspiring inventors accelerate the innovative process by building upon others’ patented inventions through licenses. There are a wide variety of use cases for patent NFTs such as SMEs, Patent Organization, Grant & Funding, and fundraising/transferring information relating to patents. These applications keep growing as time progresses, and we are constantly finding new ways to utilize these tokens. Some of the most commonly used applications can be seen as follows.

SMEs

The aim is to move intellectual property assets onto a digital, centralized, and secure blockchain network, enabling easier commercialization of patents, especially for small or medium enterprises (SMEs). Smart contracts can be attached to NFTs so terms of use and ownership can be outlined and agreed upon without incurring as many legal fees as traditional IP transfers. This is believed to help SMEs secure funding, as they could more easily leverage the previously undisclosed value of their patent portfolios63.

Transfer ownership of patents

NFTs can be used to transfer ownership of patents. The blockchain can be used to keep track of patent owners, and tokens would include self-executing contracts that transfer the legal rights associated with patents when the tokens are transferred. A partnership between IBM and IPwe has spearheaded the use of NFTs to secure patent ownership. These two companies have teamed together to build the infrastructure for an NFT-based patent marketplace.

Discussion

There are exciting proposals in the legal and economic literature that suggest seemingly straightforward solutions to many of the issues plaguing current patent systems. However, most solutions would constitute major administrative disruptions and place significant and continuous financial burdens on patent offices or their users. An NFT-based patents system not only makes many of these ideas administratively feasible but can also be examined in a step-wise, scalable, and very public manner.

Furthermore, NFT-based patents may facilitate reliable information sharing among offices and patentees worldwide, reducing the burden on examiners and perhaps even accelerating harmonization efforts. NFT-based patents also have additional transparency and archival attributes baked in. A patent should be a privilege bestowed on those who take resource-intensive risks to explore the frontier of technological capabilities. As a reward for their achievements, full transparency of these rewards is much public interest. It is a society that pays for administrative and economic inefficiencies that exist in today’s systems. NFT-based patents can enhance this transparency. From an organizational perspective, an NFT-based patent can remove current bottlenecks in patent processes by making these processes more efficient, rapid, and convenient for applicants without compromising the quality of granted patents.

The proposed framework encounters some challenges that should be solved to reach a developed patent verification platform. First, technical problems are discussed. The consensus method that is used in the verification layer is not addressed in detail. Due to the permissioned structure of miners in the NFT-based patents, consensus algorithms like PBFT, Federated Consensus, and Round Robin Consensus are designed for permissioned blockchains can be applied. Also, miners/validators spend some time validating the patents; hence a protocol should be designed to profit them. Some challenges like proving the miners’ time and effort, the price that inventors should pay to miners, and other economic trade-offs should be considered.

Different NFT standards were discussed. If various patent services use NFT standards, there will be some cross-platform problems. For instance, transferring an NFT from Ethereum blockchain (ERC-721 token) to EOS blockchain is not a forward and straight work and needs some considerations. Also, people usually trade NFTs in marketplaces such as Rarible and OpenSea. These marketplaces are centralized and may prompt some challenges because of their centralized nature. Besides, there exist some other types of challenges. For example, the novelty of NFT-based patents and blockchain services.

Blockchain-based patent service has not been tested before. The patent registration procedure and concepts of the Patent as NFT system may be ambiguous for people who still prefer conventional centralized patent systems over decentralized ones. It should be noted that there are some problems in the mining part. Miners should receive certificates from the accepted organizations. Determining these organizations and how they accept referees as validators need more consideration. Some types of inventions in some countries are prohibited, and inventors cannot register them. In NFT-based patents, inventors can register their patents publicly, and maybe some collisions occur between inventors and the government. There exist some misunderstandings about NFT’s ownership rights. It is not clear that when a person buys an NFT, which rights are given to them exactly; for instance, they have property rights or have moral rights, too.

Conclusion

Blockchain technology provides strong timestamping, the potential for smart contracts, proof-of-existence. It enables creating a transparent, distributed, cost-effective, and resilient environment that is open to all and where each transaction is auditable. On the other hand, blockchain is a definite boon to the IP industry, benefitting patent owners. When blockchain technology’s intrinsic characteristics are applied to the IP domain, it helps copyrights. This paper provided a conceptual framework for presenting an NFT-based patent with a comprehensive discussion of many aspects: background, model components, token standards to application areas, and research challenges. The proposed framework includes five main layers: Storage Layer, Authentication Layer, Verification Layer, Blockchain Layer, and Application. The primary purpose of this patent framework was to provide an NFT-based concept that could be used to patent a decentralized, anti-tamper, and reliable network for trade and exchange around the world. Finally, we addressed several open challenges to NFT-based inventions.

References

  1. Nakamoto, S. Bitcoin: A peer-to-peer electronic cash system. Decent. Bus. Rev. 21260, https://bitcoin.org/bitcoin.pdf (2008).
  2. Buterin, V. A next-generation smart contract and decentralized application platform. White Pap. 3 (2014).
  3. Nofer, M., Gomber, P., Hinz, O. & Schiereck, D. Business & infomation system engineering. Blockchain 59, 183–187 (2017).Google Scholar 
  4. Regner, F., Urbach, N. & Schweizer, A. NFTs in practice—non-fungible tokens as core component of a blockchain-based event ticketing application. https://www.researchgate.net/publication/336057493_NFTs_in_Practice_-_Non-Fungible_Tokens_as_Core_Component_of_a_Blockchain-based_Event_Ticketing_Application (2019).
  5. Entriken, W., Shirley, D., Evans, J. & Sachs, N. EIP 721: ERC-721 non-fungible token standard. Ethereum Improv. Propos.https://eips.ethereum.org/EIPS/eip-721 (2018).
  6. Radomski, W. et al. Eip 1155: Erc-1155 multi token standard. In Ethereum, Standard (2018).
  7. Dowling, M. Is non-fungible token pricing driven by cryptocurrencies? Finance Res. Lett. 44, 102097. https://doi.org/10.1016/j.frl.2021.102097 (2021).
  8. Lesavre, L., Varin, P. & Yaga, D. Blockchain Networks: Token Design and Management Overview. (National Institute of Standards and Technology, 2020).
  9. Larva-Labs. About Cryptopunks, Retrieved 13 May, 2021, from https://www.larvalabs.com/cryptopunks (2021).
  10. Cryptokitties. About Cryptokitties, Retrieved 28 May, 2021, from https://www.cryptokitties.co/ (2021).
  11. nbatopshot. About Nba top shot, Retrieved 4 April, 2021, from https://nbatopshot.com/terms (2021).
  12. Fairfield, J. Tokenized: The law of non-fungible tokens and unique digital property. Indiana Law J. forthcoming (2021).
  13. Chevet, S. Blockchain technology and non-fungible tokens: Reshaping value chains in creative industries. Available at SSRN 3212662 (2018).
  14. Bal, M. & Ner, C. NFTracer: a Non-Fungible token tracking proof-of-concept using Hyperledger Fabric. arXiv preprint arXiv:1905.04795 (2019).
  15. Wang, Q., Li, R., Wang, Q. & Chen, S. Non-fungible token (NFT): Overview, evaluation, opportunities and challenges. arXiv preprint arXiv:2105.07447 (2021).
  16. Qu, Q., Nurgaliev, I., Muzammal, M., Jensen, C. S. & Fan, J. On spatio-temporal blockchain query processing. Future Gener. Comput. Syst. 98: 208–218 (2019).Article Google Scholar 
  17. Rosenfeld, M. Overview of colored coins. White paper, bitcoil. co. il 41, 94 (2012).
  18. Obsidian-Labs. dGoods Standard, Retrieved 29 April, 2021, from https://docs.eosstudio.io/contracts/dgoods/standard.html. (2021).
  19. Algorand. Algorand Core Technology Innovation, Retrieved 10 March, 2021, from https://www.algorand.com/technology/core-blockchain-innovation. (2021).
  20. Weathersby, J. Building NFTs on Algorand, Retrieved 15 April, 2021, from https://developer.algorand.org/articles/building-nfts-on-algorand/. (2021).
  21. Algorand. How Algorand Democratizes the Access to the NFT Market with Fractional NFTs, Retrieved 7 April, 2021, from https://www.algorand.com/resources/blog/algorand-nft-market-fractional-nfts. (2021).
  22. Tezos. Welcome to the Tezos Developer Documentation, Retrieved 16 May, 2021, from https://tezos.gitlab.io. (2021).
  23. flowdocs. Non-Fungible Tokens, Retrieved 20 May, 2021, from https://docs.onflow.org/cadence/tutorial/04-non-fungible-tokens/. (2021).
  24. Benisi, N. Z., Aminian, M. & Javadi, B. Blockchain-based decentralized storage networks: A survey. J. Netw. Comput. Appl. 162, 102656 (2020).Article Google Scholar 
  25. NFTReview. On-chain vs. Off-chain Metadata (2021).
  26. Benet, J. Ipfs-content addressed, versioned, p2p file system. arXiv preprint arXiv:1407.3561 (2014).
  27. Nizamuddin, N., Salah, K., Azad, M. A., Arshad, J. & Rehman, M. Decentralized document version control using ethereum blockchain and IPFS. Comput. Electr. Eng. 76, 183–197 (2019).Article Google Scholar 
  28. Tut, K. Who Is Responsible for NFT Data? (2020).
  29. nft.storage. Free Storage for NFTs, Retrieved 16 May, 2021, from https://nft.storage/. (2021).
  30. Psaras, Y. & Dias, D. in 2020 50th Annual IEEE-IFIP International Conference on Dependable Systems and Networks-Supplemental Volume (DSN-S). 80–80 (IEEE).
  31. Tanner, J. & Roelofs, C. NFTs and the need for Self-Sovereign Identity (2021).
  32. Martens, D., Tuyll van Serooskerken, A. V. & Steenhagen, M. Exploring the potential of blockchain for KYC. J. Digit. Bank. 2, 123–131 (2017).Google Scholar 
  33. Hammi, M. T., Bellot, P. & Serhrouchni, A. In 2018 IEEE Wireless Communications and Networking Conference (WCNC). 1–6 (IEEE).
  34. Khalid, U. et al. A decentralized lightweight blockchain-based authentication mechanism for IoT systems. Cluster Comput. 1–21 (2020).
  35. Zhong, Y. et al. Distributed blockchain-based authentication and authorization protocol for smart grid. Wirel. Commun. Mobile Comput. (2021).
  36. Schönhals, A., Hepp, T. & Gipp, B. In Proceedings of the 1st Workshop on Cryptocurrencies and Blockchains for Distributed Systems. 105–110.
  37. Verma, S. & Prajapati, G. A Survey of Cryptographic Hash Algorithms and Issues. International Journal of Computer Security & Source Code Analysis (IJCSSCA) 1, 17–20, (2015).
  38. Verma, S. & Prajapati, G. A survey of cryptographic hash algorithms and issues. Int. J. Comput. Secur. Source Code Anal. (IJCSSCA) 1 (2015).
  39. SDK, I. X.509 Certificates (1996).
  40. Helliar, C. V., Crawford, L., Rocca, L., Teodori, C. & Veneziani, M. Permissionless and permissioned blockchain diffusion. Int. J. Inf. Manag. 54, 102136 (2020).Article Google Scholar 
  41. Frizzo-Barker, J. et al. Blockchain as a disruptive technology for business: A systematic review. Int. J. Inf. Manag. 51, 102029 (2020).Article Google Scholar 
  42. Bamakan, S. M. H., Motavali, A. & Bondarti, A. B. A survey of blockchain consensus algorithms performance evaluation criteria. Expert Syst. Appl. 154, 113385 (2020).Article Google Scholar 
  43. Bamakan, S. M. H., Bondarti, A. B., Bondarti, P. B. & Qu, Q. Blockchain technology forecasting by patent analytics and text mining. Blockchain Res. Appl. 100019 (2021).
  44. Castro, M. & Liskov, B. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. (TOCS) 20, 398–461 (2002).Article Google Scholar 
  45. Muratov, F., Lebedev, A., Iushkevich, N., Nasrulin, B. & Takemiya, M. YAC: BFT consensus algorithm for blockchain. arXiv preprint arXiv:1809.00554 (2018).
  46. Bessani, A., Sousa, J. & Alchieri, E. E. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 355–362 (IEEE).
  47. Todd, P. Ripple protocol consensus algorithm review. May 11th (2015).
  48. Ongaro, D. & Ousterhout, J. In 2014 {USENIX} Annual Technical Conference ({USENIX}{ATC} 14). 305–319.
  49. Larimer, D. Delegated proof-of-stake (dpos). Bitshare whitepaper, Reterived March 31, 2019, from http://docs.bitshares.org/bitshares/dpos.html (2014).
  50. Turner, B. (October, 2007).
  51. De Angelis, S. et al. PBFT vs proof-of-authority: Applying the CAP theorem to permissioned blockchain (2018).
  52. King, S. & Nadal, S. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. self-published paper, August 19 (2012).
  53. Hyperledger. PoET 1.0 Specification (2017).
  54. Buntinx, J. What Is Proof-of-Weight? Reterived March 31, 2019, from https://nulltx.com/what-is-proof-of-weight/# (2018).
  55. P4Titan. A Peer-to-Peer Crypto-Currency with Proof-of-Burn. Reterived March 10, 2019, from https://github.com/slimcoin-project/slimcoin-project.github.io/raw/master/whitepaperSLM.pdf (2014).
  56. Dziembowski, S., Faust, S., Kolmogorov, V. & Pietrzak, K. In Annual Cryptology Conference. 585–605 (Springer).
  57. Bentov, I., Lee, C., Mizrahi, A. & Rosenfeld, M. Proof of Activity: Extending Bitcoin’s Proof of Work via Proof of Stake. IACR Cryptology ePrint Archive 2014, 452 (2014).Google Scholar 
  58. NEM, T. Nem technical referencehttps://nem.io/wpcontent/themes/nem/files/NEM_techRef.pdf (2018).
  59. Bramas, Q. The Stability and the Security of the Tangle (2018).
  60. Baird, L. The swirlds hashgraph consensus algorithm: Fair, fast, byzantine fault tolerance. In Swirlds Tech Reports SWIRLDS-TR-2016–01, Tech. Rep (2016).
  61. LeMahieu, C. Nano: A feeless distributed cryptocurrency network. Nano [Online resource]. https://nano.org/en/whitepaper (date of access: 24.03. 2018) 16, 17 (2018).
  62. Casino, F., Dasaklis, T. K. & Patsakis, C. A systematic literature review of blockchain-based applications: Current status, classification and open issues. Telematics Inform. 36, 55–81 (2019).Article Google Scholar 
  63. bigredawesomedodo. Helping Small Businesses Survive and Grow With Marketing, Retrieved 3 June, 2021, from https://bigredawesomedodo.com/nft/. (2020).

Download references

Acknowledgements

This work has been partially supported by CAS President’s International Fellowship Initiative, China [grant number 2021VTB0002, 2021] and National Natural Science Foundation of China (No. 61902385).

Author information

Affiliations

  1. Department of Industrial Management, Yazd University, Yazd City, IranSeyed Mojtaba Hosseini Bamakan
  2. Department of Electrical and Computer Engineering, Isfahan University of Technology, Isfahan City, IranNasim Nezhadsistani
  3. School of Electrical and Computer Engineering, University of Tehran, Tehran City, IranOmid Bodaghi
  4. Shenzhen Institutes of Advanced Technology, Chinese Academy of Sciences, Shenzhen, 518055, ChinaSeyed Mojtaba Hosseini Bamakan & Qiang Qu
  5. Huawei Blockchain Lab, Huawei Cloud Tech Co., Ltd., Shenzhen, ChinaQiang Qu

Contributions

NFT: Redefined Format of IP Assets

The collaboration between National Center for Advancing Translational Sciences (NCATS) at NIH and BurstIQ

2.0 LPBI is a Very Unique Organization 

 

Read Full Post »

Old Industrial Revolution Paradigm of Education Needs to End: How Scientific Curation Can Transform Education

Curator: Stephen J. Williams, PhD.

Dr. Cathy N. Davidson from Duke University gives a talk entitled: Now You See It.  Why the Future of Learning Demands a Paradigm Shift

In this talk, shown below, Dr. Davidson shows how our current education system has been designed for educating students for the industrial age type careers and skills needed for success in the Industrial Age and how this educational paradigm is failing to prepare students for the challenges they will face in their future careers.

Or as Dr. Davidson summarizes

Designing education not for your past but for their future

As the video is almost an hour I will summarize some of the main points below

PLEASE WATCH VIDEO

Summary of talk

Dr. Davidson starts the talk with a thesis: that Institutions tend to preserve the problems they were created to solve.

All the current work, teaching paradigms that we use today were created for the last information age (19th century)

Our job to to remake the institutions of education work for the future not the one we inherited

Four information ages or technologies that radically changed communication

  1. advent of writing: B.C. in ancient Mesopotamia allowed us to record and transfer knowledge and ideas
  2. movable type – first seen in 10th century China
  3. steam powered press – allowed books to be mass produced and available to the middle class.  First time middle class was able to have unlimited access to literature
  4. internet- ability to publish and share ideas worldwide

Interestingly, in the early phases of each of these information ages, the same four complaints about the new technology/methodology of disseminating information was heard

  • ruins memory
  • creates a distraction
  • ruins interpersonal dialogue and authority
  • reduces complexity of thought

She gives an example of Socrates who hated writing and frequently stated that writing ruins memory, creates a distraction, and worst commits ideas to what one writes down which could not be changed or altered and so destroys ‘free thinking’.

She discusses how our educational institutions are designed for the industrial age.

The need for collaborative (group) learning AND teaching

Designing education not for your past but for the future

In other words preparing students for THEIR future not your past and the future careers that do not exist today.

In the West we were all taught to answer silently and alone.  However in Japan, education is arranged in the han or group think utilizing the best talents of each member in the group.  In Japan you are arranged in such groups at an early age.  The concept is that each member of the group contributes their unique talent and skill for the betterment of the whole group.  The goal is to demonstrate that the group worked well together.

see https://educationinjapan.wordpress.com/education-system-in-japan-general/the-han-at-work-community-spirit-begins-in-elementary-school/ for a description of “in the han”

In the 19th century in institutions had to solve a problem: how to get people out of the farm and into the factory and/or out of the shop and into the firm

Takes a lot of regulation and institutionalization to convince people that independent thought is not the best way in the corporation

keywords for an industrial age

  • timeliness
  • attention to task
  • standards, standardization
  • hierarchy
  • specialization, expertise
  • metrics (measures, management)
  • two cultures: separating curriculum into STEM versus artistic tracts or dividing the world of science and world of art

This effort led to a concept used in scientific labor management derived from this old paradigm in education, an educational system controlled and success measured using

  • grades (A,B,C,D)
  • multiple choice tests

keywords for our age

  • workflow
  • multitasking attention
  • interactive process (Prototype, Feedback)
  • data mining
  • collaboration by difference

Can using a methodology such as scientific curation affect higher education to achieve this goal of teaching students to collaborate in an interactive process using data mining to create a new workflow for any given problem?  Can a methodology of scientific curation be able to affect such changes needed in academic departments to achieve the above goal?

This will be the subject of future curations tested using real-world in class examples.

However, it is important to first discern that scientific content curation takes material from Peer reviewed sources and other expert-vetted sources.  This is unique from other types of content curation in which take from varied sources, some of which are not expert-reviewed, vetted, or possibly ‘fake news’ or highly edited materials such as altered video and audio.  In this respect, the expert acts not only as curator but as referee.  In addition, collaboration is necessary and even compulsory for the methodology of scientific content curation, portending the curator not as the sole expert but revealing the CONTENT from experts as the main focus for learning and edification.

Other article of note on this subject in this Open Access Online Scientific Journal include:

The above articles will give a good background on this NEW Conceived Methodology of Scientific Curation and its Applicability in various areas such as Medical Publishing, and as discussed below Medical Education.

To understand the new paradigm in medical communication and the impact curative networks have or will play in this arena please read the following:

Scientific Curation Fostering Expert Networks and Open Innovation: Lessons from Clive Thompson and others

This article discusses a history of medical communication and how science and medical communication initially moved from discussions from select individuals to the current open accessible and cooperative structure using Web 2.0 as a platform.

 

Read Full Post »

The Digital Age Gave Rise to New Definitions – New Benchmarks were born on the World Wide Web for the Intangible Asset of Firm’s Reputation: Pay a Premium for buying e-Reputation

Curator: Aviva Lev–Ari, PhD, RN

UPDATED on 4/4/2022

Analytics for e-Reputation based on LinkedIn 1st Degree Connections, +7,500 of LPBI Group’s Founder, 2012-2022: An Intangible Asset – Connections’ Position Seniority & Biotech / Pharma Focus

Author: Aviva Lev-Ari, PhD, RN, Founder of 1.0 LPBI, 2012-2020 & 2.0 LPBI, 2021-2025 and Data Scientist, Research Assistant III: Tianzuo George Li

https://pharmaceuticalintelligence.com/2022/04/04/analytics-for-e-reputation-based-on-linkedin-1st-degree-connections-7500-of-lpbi-groups-founder-2012-2022-an-intangible-asset-connections-position-seniority-biotech-pharma-focus/

 

UPDATED on 7/30/2021

Analysis of a corporate Stream of Innovation as reputation builder for venture valuation is presented, below

2.0 LPBI is a Very Unique Organization

Author: Aviva Lev-Ari, PhD, RN, Founder of 1.0 LPBI and 2.0 LPBI, April 2012 to Present

https://pharmaceuticalintelligence.com/2021/03/02/2-0-lpbi-is-a-very-unique-organization/

Direct reputation, feedback reputation and signaling effects are present; and shows that better sellers are always more likely to brand stretch. The comparative statics with respect to the initial reputation level, however, are not obvious. … a higher reputation firm can earn a higher direct reputation effect premium. But a higher reputation firm also has more to lose. The trade-off between using one’s reputation and protecting it can go both ways.

Luıs M B Cabral, New York University and CEPR, 2005

Part 1:   A Digital Business Defined and the Intangible Asset of Firm’s Reputation

  1.  Claiming Distinction
  2.  Recognition Bestowed
  3.  The Technology
  4.  The Sphere of Influence
  5.  The Industrial Benefactors in Potential
  6.  The Actors at Play – Experts, Authors, Writers – Life Sciences & Medicine as it applies to HEALTH CARE
  7.  1st Level Connection on LinkedIn = +7,100 and Endorsements = +1,500
  8.  The DIGITAL REPUTATION of our Venture – Twitter for the Professional and for Institutions
  9.  Growth in Twitter Followers and in Global Reach: Who are the NEW Followers? they are OUR COMPETITION   and   other Media Establishments – that is the definition of Trend Setter, Opinion Leader and Source for Emulation
  10.  Business Aspects of the Brick & Mortar World render OBSOLETE

Part 2:   Business Perspectives on Reputation

Part 3:   Economics Perspectives on Reputation

Part 1:   A Digital Business Defined and the Intangible Asset of Firm’s Reputation

This curation attempts to teach-by-example the new reality of the Intangible Asset of Firm’s Reputation when the business is 100% in the cloud, 100% electronic in nature (paperless), the customers are the Global Universe and the organization is 100% Global and 100% virtual.

A Case in Point: Intellectual Property Production Process of Health Care Digital Content using electronic Media Channels

Optimal Testimonial of e-Product Quality and Reputation for an Open Access Online Scientific Journal pharmaceuticalintelligence.com 

 1.   Claiming Distinction

Executive Summary

WHAT ARE LPBI Group’s NEEDS in June 2019: Aviva’s BOLD VISION on June 11, 2019

2.   Recognition Bestowed 

Our Books are here

  • On 8/17/2018, Dr. Lev-Ari, PhD, RN was contacted by the President elect of the Massachusetts Academy of Sciences (MAS), Prof. Katya Ravid of Boston University, School of Medicine, to join MAS in the role of Liaison to the Biotechnology and eScientific Publishing industries for the term of August 2018-July 2021. In the MAS, Dr. Lev-Ari serve as Board member, Fellow, and Advisor to the Governing Board.

http://www.maacadsci.org

MAS FELLOWS 

GOVERNING BOARD

ACTIVITIES

BUNDLED BY AMAZON.COM INTO A SIX-VOLUME SERIES FOR $515

https://lnkd.in/e6WkMgF

Sixteen Volumes ARE ON AMAZON.COM, average book length – 2,400 pages

https://lnkd.in/ekWGNqA

3.   The Technology

Curation Methodology – Digital Communication Technology to mitigate Published Information Explosion and Obsolescence in Medicine and Life Sciences

Detailed Technology Description

LPBI’s Pipeline Map: A Positioning Perspectives – An Outlook to the Future from the Present

4.   The Sphere of Influence 

LPBI Group’s Social Media Presence

JOURNAL Statistics on 2/24/2019

  • LPBI Platform is been used by GLOBAL Communities of Scientists for interactive dialogue of SCIENCE – Four case studies are presented in the link, below

Electronic Scientific AGORA: Comment Exchanges by Global Scientists on Articles published in the Open Access Journal @pharmaceuticalintelligence.com – Four Case Studies

Curator and Editor-in-Chief: Journal and BioMed e-Series, Aviva Lev-Ari, PhD, RN

https://pharmaceuticalintelligence.com/2018/04/10/electronic-scientific-agora-comment-exchanges-by-global-scientists-on-articles-published-in-the-open-access-journal-pharmaceuticalintelligence-com-four-case-studies/

5.   The Industrial Benefactors in Potential

Opportunities Map in the Acquisition Arena

Dynamic Contents for LPBI Group’s PowerPoint Presentation

Potential Use of LPBI IP as Value Price Driver by Potential Acquirer: Assumptions per Asset Class 

6.   The Actors at Play – Experts, Authors, Writers – Life Sciences & Medicine as it applies to HEALTH CARE

Founder’s Role in the Development of Venture’s Factors of Content Production – Biographical Notes by Aviva Lev-Ari, PhD, RN, LPBI Group

Top Authors by Number of eReaders Views

Top Articles by Number of e-Readers for All Days ending 2019-02-17

FIT Members Contribute to Opportunities Map

FINAL IMPROVEMENT TEAM (FIT): Definition of Active, Lapsing of Active Status, COMPs Formulas

FIT members – Who works on WHAT?

Summer 2019 Plan – Research Associates Tasks

7.   1st Level Connection on LinkedIn = +7,100 and Endorsements = +1,500

Connections First Level on LinkedIn: 500 CEOs, 200 Big Pharma Professionals, 7,000 in Total: LPBI Group Founder – Aviva Lev-Ari, PhD, RN

8.   The DIGITAL REPUTATION of our Venture – Twitter for the Professional and for Institutions

Mostly HONORED to be followed by [from an Excerpt of 117 Followers of the Twitter Account @AVIVA1950 from the List of 359 Followers] by the Number of their Followers on 2/24/2019

LPBI Group is mostly HONORED to be followed by [from an Excerpt of 136 Followers of the Twitter Account @pharma_BI from the List of 505 Followers] by the Number of their Followers on 3/20/2019

Excerpt of 136 Followers of @pharma_BI (from the List of 505 Followers) by the Number of their Followers on 3/20/2019

Excerpt of 117 Followers of @AVIVA1950 (from the List of 359 Followers) by the Number of their Followers

REACH – Two Handles on Twitter.com @AVIVA1950 @pharma_BI

9.   Growth in Twitter Followers and in Global Reach: Who are the NEW Followers: OUR COMPETITION and other Media Establishments – that is the definition of Trend Setter, Opinion Leader and Source for Emulation

@4openjournalFollows you

Follow

4open is a multi- & inter-disciplinary, online, peer-reviewed, open access journal publishing across a broad range of subjects in the STEM domain.

@roll_clausFollows you

Follow

Publishing Editor at 

@EDPSciences

@PubtextoPFollows you

Following

Pubtexto is an International online publishing organization that publishes Scientific literature through its different open access Journals.

@alexanderlabrieFollows you

Following

CEO 

@sphereinc

@BjoernBruecherFollows you

Following

THEODOR-BILLROTH-ACADEMY® 

(link: http://linkedin.com/in/bruecher)

linkedin.com/in/bruecher // 

(link: http://4open-sciences.org)

4open-sciences.org – Editor-in-Chief // Science Profile – 

(link: http://researchgate.net/profile/Bjoern)

researchgate.net/profile/Bjoern

@MPDexpertFollows you

Follow

translate research into life-changing Global manufactured Medical Products – drugs, devices, biotech, combination; anything requiring FDA approval#MedProdDev

@P_A_MORGONFollows you

Following

Life science expert & investor_travel, wine & golf amateur_Proud father of 2 girls_My Tweets are only mine 

@INmuneBioFollows you

Follow

INmune Bio, Inc. is developing therapies that harness patient’s #immunesystem to treat #cancer. Our focus is on #NKcells and #myeloid derived suppressor cells.

@sallyeavesFollows you

Following

Innovating #tech #education #business CEO CTO Advisor & Prof. #blockchain #AI 

@OxfordSBS

@Forbes

 #FinTech #speaker #SDGs #STEM #techforgood #sustainability

@sciencetracker2Follows you

You will hear more recent and cool scientific news here. Besides, some health and tech news. Follow us in

(link: http://facebook.com/sciencetracker2)

facebook.com/sciencetracker2

13.8K Following

24.6K Followers

Followed by Stanford Tweets, Biotech Week Boston, and 23 others you follow

@sgruenwaldFollows you

Following

MD, PhD, scientist, futurist, entrepreneur, managing director of 

(link: http://www.genautica.com)

genautica.com, co-founder 

(link: http://www.diagnomics.com)

diagnomics.com

(link: http://www.scoop.it/t/amazing-science)

scoop.it/t/amazing-scie…user

10.  Business Aspects of the Brick & Mortar World render OBSOLETE

Financial Valuation of Three Health Care Intellectual Property (IP) Content Asset Classes

Global Market Penetration Forecast for each Volume in the 16 Volume BioMed e-Series

2013-2019, On the Medical & Scientific Bookshelf in Kindle Store: eReader Behaviors: Browsing, Page Downloads and Buying e-Books – LPBI Group’s BioMed e-Series, Royalties Payment Analysis 

Part 2: BUSINESS PERSPECTIVES on Reputation

Warren Buffett on reputation: the economic value of values, integrity and corporate culture

Warren Buffett understands that reputation and integrity have economic value. Research that shows that a good reputation is worth real money — in fact, some research indicates that a good reputation might replace a line of credit at the bank. In his book Berkshire Beyond Buffett: The Enduring Value of Values, Lawrence Cunningham argues that one of Berkshire Hathaway’s greatest assets is reputation.

https://www.finn.agency/fr/warren-buffett-reputation-berkshire-hathaway

The Value of Reputation

Thomas Pfeiffer1,2,4,*, Lily Tran5, Coco Krumme5 and David G Rand1,3,* 1 Program for Evolutionary Dynamics, FAS, 2 School of Applied Sciences and Engineering, and 3 Department of Psychology, Harvard University, Cambridge MA 02138, USA 4 New Zealand Institute for Advanced Study, Massey University, Auckland 0745, New Zealand 5 MIT Media Laboratory, Cambridge MA 02139, USA

Reputation plays a central role in human societies.

Empirical and theoretical work indicates that a good reputation is valuable in that it increases one’s expected payoff in the future. Here, we explore a game that couples a repeated Prisoner’s Dilemma (PD), in which participants can earn and can benefit from a good reputation, with a market in which reputation can be bought and sold. This game allows us to investigate how the trading of reputation affects cooperation in the PD, and how participants assess the value of having a good reputation. We find that depending on how the game is set up, trading can have a positive or a negative effect on the overall frequency of cooperation. Moreover, we show that the more valuable a good reputation is in the PD, the higher the price at which it is traded in the market. Our findings have important implications for the use of reputation systems in practice.

Keywords: evolution of cooperation; reciprocal altruism; indirect reciprocity; reputation

http://decisionlab.harvard.edu/_content/research/papers/Krumme_Pfieffer_Tran_and_Rand_Value_of_Reputation.pdf

The Impact of Reputation on Market Value by Simon Cole

One of the most familiar, but least understood, intangible assets is a firm’s reputation.

Simon Cole is the founding partner of the corporate reputation and branding consultancy Reputation Dividend (www. reputationdividend.com).

http://www.reputationdividend.com/files/4713/4822/1479/Reputation_Dividend_WEC_133_Cole.pdf

Part 3:   ECONOMICS PERSPECTIVES on Reputation

The Economics of Trust and Reputation: A Primer

Luıs M B Cabral New York University and CEPR, June 2005, lecture series at the University of Zurich

lcabral@stern.nyu.edu

https://pdfs.semanticscholar.org/24e5/2f3bd22d4bfa86902e5ae07d57039480004f.pdf

Notes on the literature

Important note: The notes in this section are essentially limited to the ideas discussed in the present version of these lectures notes. They cannot therefore be considered a survey of the literature. There are dozens of articles on the economics of reputation which I do not include here. In a future version of the text, I hope to provide a more complete set of notes on the literature. The notes below follow the order with which topics are presented.

Bootstrap models. The bootstrap mechanism for trust is based on a general result known as the folk theorem (known as such because of its uncertain origins). For a fairly general statement of the theorem (and its proof) see Fudenberg and Makin (1986). One of the main areas of application of the folk theorem has been the problem of (tacit or explicit) collusion in oligopoly. This is a typical problem of trust (or lack thereof): all firms would prefer prices to be high and output to be low; but each firm, individually, has an incentive to drop price and increase output. Friedman (1971) presents one of the earliest formal applications of the folk theorem to oligopoly collusion. He considers the case when firms set prices and history is perfectly observable. Both of the extensions presented in Section 2.2 were first developed with oligopoly collusion applications in mind. The case of trust with noisy signals (2.2.1) was first developed by Green and Porter (1984). A long series of papers have been written on this topic, including the influential work by Abreu, Pearce and Stacchetti (1990). Rotemberg and Saloner (1986) proposed a model of oligopoly collusion with fluctuating market demand. In this case, the intuition presented in Section 2.2.2 implies that firms collude on a lower price during periods of higher demand. This suggests that prices are counter-cyclical in markets where firms collude. Rotemberg and Saloner (1986) present supporting evidence from the cement industry. A number of papers have built on Rotemberg and Saloner’s analysis. Kandori (1992) shows that the i.i.d. assumption simplifies the analysis but is not crucial. Harrington (19??) considers a richer demand model and looks at how prices vary along the business cycle. The basic idea of repetition as a form of ensuring seller trustworthiness is developed in Klein and Leffler (1981). See also Telser (1980) and Shapiro (1983). When considering the problem of free entry, Klein and Leffler (1981) propose advertising as a solution, whereas Shapiro (1983) suggests low intro25 ductory prices. Section ?? is based on my own research notes. The general analysis of selfreinforcing agreements when there is an outside option of the kind considered here may be found in Ray (2002). Watson (1999, 2002) also considers models where the level of trust stars at a low level and gradually increases.

Bayesian models. The seminal contributions to the study of Bayesian models of reputation are Kreps and Wilson (1982) and Milgrom and Roberts (1982). The model in Section 3.2.1 includes elements from these papers as well as from Diamond (1989). H¨olmstrom (1982/1999) makes the point that separation leads to reduced incentives to invest in reputation. The issue of reputation with separation and changing types is treated in detail in the forthcoming book by Mailath and Samuelson (2006). In Section 3.3, I presented a series of models that deal with name as carriers of reputations. The part on changing names (Section 3.3.1) reflects elements from a variety of models, though, to the best of my knowledge, no study exists that models the process of secret, costless name changes in an infinite period adverse selection context. The study of markets for names follows the work by Tadelis (1999) and Mailath and Samuelson (2001). All of these papers are based on the Bayesian updating paradigm. Kreps (1990) presents an argument for trading reputations in a bootstrap type of model. The analysis of brand stretching (Section 3.3.3) is adapted from Cabral (2000). The paper considers a more general framework where the direct reputation, feedback reputation and signalling effects are present; and shows that better sellers are always more likely to brand stretch. The comparative statics with respect to the initial reputation level, however, are not obvious. As we saw above, a higher reputation firm can earn a higher direct reputation effect premium. But a higher reputation firm also has more to lose. The trade-off between using one’s reputation and protecting it can go both ways. For other papers on brand stretching and umbrella branding see Choi (1998), Anderson (2002).

Bibliography

Abreu, Dilip, David Pearce and Ennio Stacchetti (1990), “Toward a Theory of Discounted Repeated Games with Imperfect Monitoring,” Econometrica 58, 1041–1064. Andersson, Fredrik (2002), “Pooling reputations,” International Journal of Industrial Organization 20, 715–730. Bernhein, B. Douglas and Michael D. Whinston (1990), “Multimarket Contact and Collusive Behavior,” Rand Journal of Economics 21, 1–26. Cabral, Lu´ıs M B (2000), “Stretching Firm and Brand Reputation,” Rand Journal of Economics 31, 658-673. Choi, J.P. (1998), “Brand Extension and Informational Leverage,” Review of Economic Studies 65, 655–69. Diamond, Douglas W (1989), “Reputation Acquisition in Debt Markets,” Journal of Political Economy 97, 828–862. Ely, Jeffrey C., and Juuso Valim ¨ aki ¨ (2003), “Bad Reputation,” The Quarterly Journal of Economics 118, 785–814. Fishman, A., and R. Rob (2005), “Is Bigger Better? Customer Base Expansion through Word of Mouth Reputation,” forthcoming in Journal of Political Economy. Friedman, James (1971), “A Noncooperative Equilibrium for Supergames,” Review of Economic Studies 28, 1–12. Fudenberg, Drew and Eric Maskin (1986), “The Folk Theorem in Repeated Games with Discounting or with Imperfect Public Information,” Econometrica 54, 533–556. Green, Ed and Robert Porter (1984), “Noncooperative Collusion Under Imperfect Price Information,” Econometrica 52, 87–100. Holmstrom, Bengt ¨ (1999), “Managerial Incentive Problems: A Dynamic Perspective,” Review of Economic Studies 66, 169–182. (Originally (1982) in Essays in Honor of Professor Lars Wahlback.) Kandori, Michihiro (1992), “Repeated Games Played by Overlapping Generations of Players,” Review of Economic Studies 59, 81–92. Klein, B, and K Leffler (1981), “The Role of Market Forces in Assuring Contractual Performance,” Journal of Political Economy 89, 615–641. 27 Kreps, David (1990), “Corporate Culture and Economic Theory,” in J Alt and K Shepsle (Eds), Perspectives on Positive Political Economy, Cambridge: Cambridge University Press, 90–143. Kreps, David M., Paul Milgrom, John Roberts and Robert Wilson (1982), “Rational Cooperation in the Finitely Repeated Prisoners’ Dilemma,” Journal of Economic Theory 27, 245–252. Kreps, David M., and Robert Wilson (1982), “Reputation and Imperfect Information,” Journal of Economic Theory 27, 253–279. Mailath, George J, and Larry Samuelson (2001), “Who Wants a Good Reputation?,” Review of Economic Studies 68, 415–441. Mailath, George J, and Larry Samuelson (1998), “Your Reputation Is Who You’re Not, Not Who You’d Like To Be,” University of Pennsylvania and University of Wisconsin. Mailath, George J, and Larry Samuelson (2006), Repeated Games and Reputations: Long-Run Relationships, Oxford: Oxford University Press. Milgrom, Paul, and John Roberts (1982), “Predation, Reputation, and Entry Deterrence,” Journal of Economic Theory 27, 280–312. Phelan, Christopher (2001), “Public Trust and Government Betrayal,” forthcoming in Journal of Economic Theory. Ray, Debraj (2002), “The Time Structure of Self-Enforcing Agreements,” Econometrica 70, 547–582. Rotemberg, Julio, and Garth Saloner (1986), “A Supergame-Theoretic Model of Price Wars During Booms,” American Economic Review 76, 390–407. Shapiro, Carl (1983), “Premiums for High Quality Products as Rents to Reputation,” Quarterly Journal of Economics 98, 659–680. Tadelis, S. (1999), “What’s in a Name? Reputation as a Tradeable Asset,” American Economic Review 89, 548–563. Tadelis, Steven (2002), “The Market for Reputations as an Incentive Mechanism,” Journal of Political Economy 92, 854–882. Telser, L G (1980), “A Theory of Self-enforcing Agreements,” Journal of Business 53, 27–44. Tirole, Jean (1996), “A Theory of Collective Reputations (with applications to the persistence of corruption and to firm quality),” Review of Economic Studies 63, 1–22. 28 Watson, Joel (1999), “Starting Small and Renegotiation,” Journal of Economic Theory 85, 52–90. Watson, Joel (2002), “Starting Small and Commitment,” Games and Economic Behavior 38, 176–199. Wernerfelt, Birger (1988), “Umbrella Branding as a Signal of New Product Quality: An Example of Signalling by Posting a Bond,” Rand Journal of Economics 19, 458–466.

https://pdfs.semanticscholar.org/24e5/2f3bd22d4bfa86902e5ae07d57039480004f.pdf

Read Full Post »

In-House Development of an intellectual property value calculator (IP-V-Cal) for Valuation of INTANGIBLE products: Intellectual property (IP) assets of Digital Printed Products (DPP) – Online Journal(s), e-Books and a Corpus of Real Time generated eProceedings of the Top Biotech Global Conferences

Author: Aviva Lev-Ari, PhD, RN

1. All the points I made, below in my e-mail 4AM on 6/28/2019, see below – to match Intangible Assets in Document #2, 4/19/2019 in Inbox of each FIT member.

(after reading Rick’s article we received a link to and after reading the link that I provided in this e-mail)

2. We Need Amnon to enter into an Excel spread sheet as Column #1 all the Contributing Factors to valuation in that 4AM e-mail

3. Columns #2,#3,#4 will be Gail, Amnon, Rick (Business Team)

4. Columns #5,#6 will be Dr. Williams, Prof. Feldman (our Board)

5. Columns #7,#8 #9,#10 will be Dr. Pearlman, Dr. Dror Nir, Dr. Saha, Dr. Irina (Scientists Team)

7. Each Column dedicated to each of out 10 alive and well Active FIT

Will be split into two columns

6. Column #11 will be Aviva’s 

8. First column of each of the 10 FIT members will be filled by each by a number between 50 to 100, representing the subjectively perceived contributing weight of the Factor mentioned in Column 1: list of factors contributing to Venture’s valuation

9. Second column of each of the 10 FIT members will list the member’s subjective perspective on Ranking the Factors in Column #1

10. To Column #1: each Business Team member (mentioned in 3, above), needs to contribute FIVE new factors taken from your discussion on Valuation add them with your initials to Column #1

11. Aviva will bring DATA from Article Scoring System already populating a database designed to quantify the 

11.1 Valuation of the Journal

11.2 Valuation of the BioMed e-Series: each book, each series, all 16 volumes

11.3 Author’s factor in pricing 11.1 and 11.2

 

12. Valuation of 70 eProceedings 

(60 by Aviva; 10 by Dr. Williams)

needs to be tied to a growth factor in LPBI Group’s INFLUENCE on Twitter

12.1 @pharma_BI

12.2 @AVIVA1950

12.3 Gail’s Twitter account

12.4 Dr. Williams’ Twitter account

12.5 Dr. Asha’s Twitter account

12.6 Dr. Irina’s Twitter account

Factors of INFLUENCE:

– Growth in #Followers on Twitter 

– Ratio #Tweets/#Likes

– Cumulative # of Followers’ Followers

13. LinkedIn

I discovered new features and I wish to conduct a Skype training session with narrow messaging to FIT members

Please contribute your thoughts, while 

 

– Amnon is building this Excel

– Irina will be designing DropBox for this Excel that TEN FIT members need to add a number 50 to 100, Ranking the relative importance of each factor for Venture Valuation

GREAT initiative by Business Team to focus on valuation, thank you.

Thank you all FIT members, get ready yo add your subjective numbers into the Valuation Excel.

Amnon, please share with me in a Skype session the draft of this Excel, before we deplore this instrument, place it in Dropbox and announce the window of one week when we collect 2×10 data points on each of the Factors in Column #1, 

Board members and Scientists: you are welcome to contribute Factors in Valuation of the Venture in Column #1, the longer this column, the greater the granularity. 

We can then focus only on factors that scored above the Mean or any cut off point we will agree upon.

Thank you all – it is exciting to get the entire Team, developing a custom tailor methodology for DIGITAL printed products, NO OFF THE SHELF MODEL WILL FIT US. 

Current valuation models that do NOT APPLY to our venture include the following:

“Book to market value” 

– we got Intangibles, Column #1

– LPBI Group’s Tangibles are royalties for books sold. 

(all data was reviewed by Dr. Williams, for Section #13 in Document #2, for the period, 4/2012 to 4/19/2019)

“VC investment dilution models” 

– we kept 100% of ownership 

– our shareholders are 12 FIT members: 

— >>>>>> 10 are active members 

– (Scientist Team: Formula in place) (Gail included)

– (Business Team: 10% of UPSIDE) (Gail included)

— >>>>>> Past commitments outstanding:

– to Dr. Larry and 

– to Adam Sonnenberg

– (Formula in place). 

– No UPSIDE, due to idle status since 2/6/2019, Exit period launch.

Thank you again.

Aviva Lev-Ari, PhD, RN

Editor-in-Chief, BioMed e-Series

http://PharmaceuticalIntelligence.com

Director & Founder

Leaders in Pharmaceutical Business Intelligence (LPBI) Group

On Jun 28, 2019, at 3:57 AM, Amnon Danzig <amnon.danzig@gmail.com> wrote:

This is a nice article that put in place Corporate Finance practices.

However, The Business Team currently is struggling in much more earlier stages of the valuation of the Group.

We have a long way to go before we are entering the valuation scene in numeric terms.

Aviva,

I must confess that in the last two weeks we (Rick, Gail and me) invested huge amount of work to disclose the real valuation of the Group.

It is a work-in-process.

Thank you for your patience.

Amnon

Amnon Danzig

Business Strategy 

https://lnkd.in/e-zTVz4

Leaders in Pharmaceutical Business Intelligence (LPBI) Group, Israel

http://pharmaceuticalintelligence.com 

e-Mailamnon.danzig@gmail.com

(M) +972-54-6998405

 www.amnondanzig.com

SkypeID: Amnon.Danzig  LinkedIn Profile Twitter Profile

On Fri, Jun 28, 2019 at 10:30 AM Aviva Lev-Ari <AvivaLev-Ari@alum.berkeley.edu> wrote:

What is Aviva’s take on LPBI Group Valuation?

https://bothsidesofthetable.com/do-you-really-even-need-vc-72013e985fab

  • Advantages of LPBI Group:
  1. We had low barrier to entry and 
  2. We had/have Zero labor cost
  3. We are virtual, therefore, no overhead expenses 
  4. Run rate at WordPress.com Business Premium Annual Fee $200 and LinkedIn Annual Business Premium $1000
  5. Our 1st CARDINAL factor of production [The Team] is the DEAPTH and very diverse EXPERTISE residing in the Scientist Team and in the Business TEAM
  6. Leadership expressed by new timely challenge selection – Directions into new domains
  7. Team ability to swarm around new domains (new timely challenge selection), Examples: 
  • 2015-2016 – 3D BioPrinting – Book: Series E, Volume 4
  • Volume 4: Medical 3D BioPrinting – The Revolution in Medicine, Technologies for Patient-centered Medicine: From R&D in Biologics to New Medical Devices. On Amazon.com since since 12/30/2017

https://www.amazon.com/dp/B078QVDV2W

  • 2016-2017 – Drug Discovery – JV with SBH Sciences, Dr. Raphael Nir

https://pharmaceuticalintelligence.com/drugdiscovery-lpbi-group/

  • 2019-2020 – AI + ML in Medicine – Book: Series B, Volume 2

https://pharmaceuticalintelligence.com/biomed-e-books/genomics-orientations-for-personalized-medicine/volume-two-genomics-methodologies-ngs-bioinformatics-simulations-and-the-genome-ontology/

  1. Our 2nd CARDINAL factor of Leadership is the FIDELITY of a CORE team of Scientists
  2. Aviva’s ability to multitask on several levels – FIVE persons in just One woman (nee: 1950): 
  • LPBI Group’s DAILY activity on Twitter, LinkedIn, Facebook
  • IN PERSON at +60 Conferences – yielded a Corpus of eProceedings N=70 [10 by Dr. Williams 
  • Curator of new content – Journal is LIVE at 

1,639,029 eReaders 

Content

5,642

Posts

686

Categories

10,083

Tags

  • Book Editor – multiple domains of knowledge: Series A, B, D, E
  • Full functions of Editor-in-Chief: 16 Titles, content acquisition, eTOCs designer
  • Relations builder with multiple Ecosystems: Israel, US, Europe – stay tune

4/19/2019 

@pharma_Bi # Followers = 505 

6/28/2019

@pharma_Bi # Followers = 519 RatioTweets to Likes: 25,000/3,086

4/19/2019 

@AVIVA1950 # Followers = 359

6/28/2019

@AVIVA1950 # Followers = 439 RatioTweets to Likes: 11,000/5,615

How can you use all of the above for your Valuation Modeling???

Read Full Post »