You are on page 1of 18

US 2017.

0193619A1
(19) United States
(12) Patent Application Publication (10) Pub. No.: US 2017/0193619 A1
Rollins et al. (43) Pub. Date: Jul. 6, 2017
(54) SYSTEMAND METHOD OF FACILITATING Publication Classification
INTELLECTUAL PROPERTY
TRANSACTIONS (51) Int. Cl.
G06O 50/18 (2006.01)
(71) Applicant: Camelot UK Bidco Limited, London (52) U.S. Cl.
(GB) CPC .................................. G06O 50/184 (2013.01)

(72) Inventors: Jason E. Rollins, San Francisco, CA


(US); Penelope L. Peng, San Diego, (57) ABSTRACT
CA (US)
(73) Assignee: Camelot UK Bidco Limited, London A system and method is provided for the facilitation of
(GB) secure intellectual property transactions. The system may
(21) Appl. No.: 15/007,641 receive intellectual property information from system users.
The system may match system users based on the provided
(22) Filed: Jan. 27, 2016 intellectual property information to facilitate the initiation of
Related U.S. Application Data an intellectual property transaction. The system may further
provide a secure audit trail of all activity that occurs sur
(60) Provisional application No. 62/273.732, filed on Dec. rounding the intellectual property transaction, thereby
31, 2015. increasing levels of trust between the involved parties.

- 8

Processors Processors 32

Storage evices 4 Strage Devices 34

Pintake Engine 102 Continication Engine

s:
Blockchain
Database 194

Egie
aforation Scoring
Engine 03
intellectual Property
Division Engine to
Hashing Engine 120

IP Database i s 8:ock88h
SC Estabase 152
Patent Application Publication Jul. 6, 2017. Sheet 1 of 4 US 2017/O193619 A1

o(?s)uaosiea
Patent Application Publication Jul. 6, 2017. Sheet 2 of 4 US 2017/O193619 A1

First Party Second Party


2 -
Receive P information Receive P information
anxxxxxxxxxxarxxxxxxxxxarxxxxxxxxarxxxxxxxxxarxxxx

Araiyae is inferration Analyze P formation


23
crococcacciy
6
Secre Hashing Secure Hashing

Matching Operation

210
Contract 3ilding Operation

212
Approval Operation

Public Hashing

FG, 2
Patent Application Publication Jul. 6, 2017. Sheet 3 of 4 US 2017/O193619 A1

EAR AA PRAE GER C E R

| First Party iP First Party Si6.


rofile Genesis Block

Second Party P Second Party


fg: Geresis sick

Private ashed
303 Coaboratio Cabcation
Cata Bock

Ongoing
30 Collaboration Cabcation
Data Block 2

30s Ongoing
Coa oratic
Private Hashed
(Ciabciatio Coastratin
Data Block Biosk in

F.G. 3
Patent Application Publication Jul. 6, 2017. Sheet 4 of 4 US 2017/O193619 A1

4. O

Receive fransaction formation

Transaction information Approva

Secure Hashing

Public Hashing

FG. A.
US 2017/O 193619 A1 Jul. 6, 2017

SYSTEMAND METHOD OF FACILITATING operation on the first data block to create a first hashed
INTELLECTUAL PROPERTY block, and publish the first hashed block to a private ledger.
TRANSACTIONS 0008. These and other objects, features, and characteris
tics of the system and/or method disclosed herein, as well as
RELATED APPLICATIONS the methods of operation and functions of the related ele
0001. This application claims the benefit of priority under ments of structure and the combination of parts and econo
35 U.S.C. S 119(e) to U.S. Provisional Application No. mies of manufacture, will become more apparent upon
62/273.732, filed Dec. 31, 2015, which is incorporated consideration of the following description and the appended
herein by reference in its entirety. claims with reference to the accompanying drawings, all of
which form a part of this specification, wherein like refer
FIELD OF THE INVENTION ence numerals designate corresponding parts in the various
figures. It is to be expressly understood, however, that the
0002 The invention relates to a system and method of drawings are for the purpose of illustration and description
facilitating secure intellectual property transactions. only and are not intended as a definition of the limits of the
invention. As used in the specification and in the claims, the
BACKGROUND OF THE INVENTION singular form of “a”, “an', and “the include plural referents
0003 Cooperation between various parties to research unless the context clearly dictates otherwise.
and development, including inventors, developers, research BRIEF DESCRIPTION OF THE DRAWINGS
ers, Scientists, investors, corporations, and others may per
mit each party to realize significant value over working 0009 FIG. 1 illustrates an exemplary system for facili
alone. Multi-party engagements may prove to have even tating secure intellectual property transactions.
greater value than bilateral engagements. Intellectual prop 0010 FIG. 2 depicts a process of facilitating a secure
erty transactions may provide great value to all parties intellectual property transaction.
involved. 0011 FIG.3 depicts a schematic demonstrating the use of
0004 Hurdles and transaction costs to such cooperation public and private ledgers consistent with the present dis
may exist, however. For example, merely identifying poten closure.
tial partners with which to collaborate and/or cooperate may 0012 FIG. 4 depicts a process of updating a secured
be difficult in an environment where many parties seek to transactions log consistent with the present disclosure.
keep their activities private. Furthermore, creating trust
between parties, where intellectual property of great value DETAILED DESCRIPTION OF THE
may be contested may be difficult. The global system of INVENTION
patent offices and registries, which includes over 150 dif 0013 The invention relates generally to a system and
ferent entities may not alleviate these difficulties, as global method of facilitating intellectual property transactions. The
ownership rights may be difficult to understand because system may match parties to a potential transaction and
there is no single entity with the ability to verify global
ownership rights. facilitate the transaction by providing trust and enforcing
0005. These and other drawbacks exist to current systems contracts between the parties.
of intellectual property development collaboration. 0014 Aspects of the present invention include an inte
grated system that may serve as a virtual IP exchange,
SUMMARY OF THE INVENTION investor matching, and verified ledger service. The system
may index and match intellectual property parties, such as
0006. The invention addressing these and other draw researchers, developers, intellectual property owners, poten
backs relates generally to a system and method of facilitat tial investors, and/or licensees of intellectual property. The
ing intellectual property transactions. Implementations of system may catalog and track all communication and related
the disclosure provide means for facilitating intellectual transactions and contracts using cryptographically verified
property transactions between various parties, such as inves blockchain ledger technology.
tors, inventors, developers, and others. 0015. In one implementation, a neutral third party may
0007 Implementations of the invention may include a host a system that leverages advanced machine learning
system for managing intellectual property. The system may algorithms to match new inventions and research with
include a computer system comprising one or more physical potential investors hoping to commercialize the research.
processors programmed by computer program instructions Similarly, the system may help to manage the complex
that, when executed, cause the computer system to act. The relationship of large corporations in collaboration, such as
instructions may cause the computer system to receive several large pharmaceutical companies collaborating on
intellectual property information from a first party, analyze new drug development. The system may assist the parties in
the intellectual property information and store the analysis in negotiating contract terms. The system may then track all
an intellectual property database, receive intellectual prop related communication, contracts, revenue, intellectual
erty criteria from a second party, determine a match between property asset management events, and transfers through a
the first party and the second party based on a match verified blockchain electronic ledger. As well, the neutral
between the stored analysis and the intellectual property third party may hold the ledger party keys for collateral and
criteria, record a transaction between the first party and the safekeeping as part of Smart contract enforcement. Block
second party, the transaction including at least one contract chain Smart contract research and development collabora
term, in a first data block of an intellectual property data tion auditing and resulting intellectual property escrow may
base, receive, from the first party and the second party, enable parties who may not fully know or trust each other to
approval of the first data block, perform a secure hashing engage in research and development collaboration with a
US 2017/O 193619 A1 Jul. 6, 2017

sense of security and protection in the rare case the collabo their secrets will be maintained. They cannot afford a
ration results in conflict. Further, blockchain technology significant legal battle, but desire a system that will rigor
may enable anonymity in collaboration, asset management, ously verify the details of their intellectual property should
and transactions. a dispute later arise.
0016. In some implementations, the system may serve to 0023 These and other examples exist of potential intel
facilitate secure bilateral and multilateral intellectual prop lectual property parties to transactions that may seek a
erty transactions. Under typical business conditions, it may system for identifying and facilitating secure transactions
be difficult for potential intellectual property parties to an with other intellectual property parties. Implementations of
intellectual property transaction to develop trust for one the present disclosure provide several aspects of a compre
another. Intellectual property parties, as used herein, may hensive secure intellectual property transaction system.
refer to any two or more entities, individuals, corporations, 0024. In some implementations, aspects of the present
etc., that may wish to engage in secure transactions involv disclosure provide systems and processes for matching two
ing intellectual property, including patents, copyrights, or more intellectual property parties. For example, inventors
trademarks, trade secrets, and any other forms of intellectual seeking investors for a partnership, R&D teams seeking
property. other teams for collaborative purposes, and investors seek
0017 For example, two competing corporations, such as ing opportunities to invest their funds may each use the
pharmaceutical corporations, who have traditionally been system to find a prospective intellectual property partner. In
rivals, may decide to experiment with a collaborative effort Some implementations, parties may seek more than one
to pursue a new and risky market segment. They each are match in the hopes of facilitating a multilateral deal. Sys
investing Substantial Sums of money in the partnership and tems consistent with the present disclosure may receive
bring established intellectual property assets with them. The information from participating parties and analyze that
corporations may not fully trust each other and may desire information to facilitate the matching aspects of the system.
a neutral third party partner and system to manage the risk Analyzed information may be sorted and codified to develop
associated with this new venture. an intellectual property profile of participating parties.
0018. In another example, several leading university 0025 FIG. 1 illustrates a system 100 for facilitating and
research labs may wish to collaborate on a multi-year, large securing intellectual property transactions. System 100 may
scale research project. Each university team may bring include a private side computer system 101 and a public side
Substantial expertise to the partnership and may wish to computer server 180.
ensure that any original research coming out of the project 0026. Private side computer system 101 and public side
is validated as associated with one lab or another. In the past, computer system 180 may be any computing device con
these labs may have been disappointed when relying on the figurable to run Software. For example, these computer
academic honor system to share credit for Scientific break systems may comprise, without limitation, a server (e.g.,
throughs. The university teams may desire a system that can having one or more server blades, processors, etc.), a
accurately verify each party's contribution. gaming console, a handheld gaming device, a personal
0019. In still another example, a scientist may have computer (e.g., a desktop computer, a laptop computer, etc.),
promising results from a novel new experiment in her lab. a Smartphone, a tablet computing device, and/or other device
She may wish to exploit the commercial potential to her that can be programmed to receive intellectual property
research and determine if there is investment interest from a information and. In some implementations, private side
commercial partner. She may work at a small college that computer system 101 may be configured for location in
does not have a reputation for licensing intellectual property, proximity to or even as a component of public side computer
and thus needs help getting her work noticed by potentially system 180. That is, private side computer system 101 and
interested investors. public side computer system 180 may be, in fact, the same
0020. In yet another example, a major Japanese electron computer system. Some implementations may include more
ics manufacturer may hope to Substantially expand into than one of each private side computer system 101 and
innovative new technologies that push the boundaries of public side computer system 180. A person of skill in the art
consumer technology. The manufacturer may have a long will recognize that various features and functions of the
view and wish to invest in promising, early experiments disclosed intellectual property transaction system may be
being performed in labs. While they are aware of the big performed at different locations without departing from this
players, they seek a tool or service that can help them find disclosure. Although specific examples of an intellectual
interesting new technologies coming from a wide range of property transaction system 100 are provided herein, the
universities and laboratories. disclosure and the invention are not thusly limited.
0021. In another example, an investment analyst may be 0027 Private side computer system 101 may include one
looking for the next big technology for his client to investin. or more processors 112 (also interchangeably referred to
He may be willing to take a risk for a potentially large herein as processors 112, processor(s) 112, or processor 112
reward and may require a system to help focus on promising for convenience), one or more storage devices 114 (which
new technologies, patents, and/or research that his client may an intellectual property intake engine 102, a matching
might purchase and then license to others. engine 104, a contract engine 106, a risk assessment engine
0022. In still another example, a startup technology com 107, an information scoring engine 109, an intellectual
pany may be developing new technologies in a rapidly property division engine 110, and a hashing engine 120),
developing area of technology. They may wish to get the full and/or other components. Processors 112 may be pro
value for their developing intellectual property, which may grammed by one or more computer program instructions.
be in the form of trade secrets or in the early stages of For example, processors 112 may be programmed by
patenting. In negotiations with potential investors they must instructions included in intellectual property intake engine
disclose their trade secrets but still desire reassurance that 102, a matching engine 104, a contract engine 106, and a
US 2017/O 193619 A1 Jul. 6, 2017

hashing engine 120, as well as other components and/or further include information about proprietary data, propri
other instructions. As used herein, for convenience, the etary designs, trade secrets, and other non-patent intellectual
various engines may be described as performing an opera property information.
tion, when, in fact, the various instructions of these engines 0034 Intellectual property information may additionally
program the processors 112 (and therefore private side include expectation information about intellectual property
computer system 101) to perform the operation. returns that a party is expecting as a result of a potential
0028 Intake engine 102 may include instructions that collaboration. For example, such expectation information
program private side computer system 101. The instructions may include information about licensing, multi-party intel
of intake engine 102 may include, without limitation, lectual property ownership and percentages of intellectual
instructions for performing intake and analysis of intellec property right ownership, royalty and/or revenue expecta
tual property information, and/or other instructions that tions (both absolute and percentage based), rights in future,
program computer system 101 to perform various opera derivative patent filings.
tions, each of which are described in greater detail herein. 0035 Intellectual property information may further
Intake engine 102 may cause processor 112 to intake and include information about existing R&D funding, e.g. from
analyze intellectual property information provided by users grants and/or investors. Such information may be derived
of the system. from a party's Volunteering the information and/or from
0029 Intellectual property information may include, for public sources, such as SEC filings, and academic and
example research and development information about intel Government Public Funding Disclosures.
lectual property parties, mergers and acquisitions informa 0036 Intellectual property information may further
tion, financial market indicators, grant funding data, Scien include information about proprietary data that a party owns
tific papers and reports, technical drawings and and/or has access to.
specifications all to inform recommendations of matches 0037 Intellectual property information may include
between intellectual property parties. information about a party's intellectual property assets (i.e.,
0030 Intellectual property information may include, for patent holdings), capabilities (e.g., as understood from sci
example, research and development focus areas of partici entific papers), resources (e.g., access to funding and/or
pating intellectual property parties. Intellectual property capital), and/or needs and desires (i.e., what they are seeking
information may include, for example, information about in collaboration).
patents in a party's R&D focus area, such as historical patent 0038 Intake engine 102 may be programmed to receive
application filing information, patent strength information, intellectual property criteria from system users. Intellectual
technical terms and formulas obtained from a party's patents property criteria may include characteristics that an intel
and patent applications obtained via text mining, informa lectual property party is seeking in a potential transaction
tion about the classifications of patents and patent applica partner. For example, a technology start-up may be seeking
tions of a party, and any combination thereof. Intellectual a well-funded partner that is willing to take risks. Providers
property information may further include any of the above of capital may seek riskier, higher upside or stabler, lower
described patent information falling outside of a party's upside investments, depending on their investment goals.
R&D focus area. Intellectual property criteria may specify any or all of the
0031 Intellectual property information may further above described aspects of intellectual property information
include published scientific papers and reports in a party's as sought-after characteristics in an intellectual property
R&D focus area or areas. Scientific papers and reports may partner.
be scored, for example, by strength metrics (e.g., based on 0039 Intake engine 102 may be programmed to receive
citation numbers), new technical terms, and/or formulas. intellectual property information and intellectual property
0032. Intellectual property information may further criteria from system users, i.e., intellectual property parties,
include measures of historic ability to successfully collabo as soon as they begin using the system. An intellectual
rate in R&D ventures. Such ability may be measured, for property party may begin inputting intellectual property
example, by past patents of party showing joint filing and/or information, which may be used to build an intellectual
assignee ownership with other parties which it does not property profile, prior to any matching with potential intel
legally own, litigation and/or opposition relating to collabo lectual property partners. The inputted intellectual property
ration, past Scientific articles showing joint publication information may therefore serve to assist in matching with
and/or assignee ownership with other parties which it does potential intellectual property partners.
not legally own, and abandoned past R&D collaboration 004.0 Intake engine 102 may be programmed to classify
agreements. Legal proceedings with respect to and aban and/or score any or all received intellectual property infor
donments of collaboration agreements may negatively mation. Information may be classified by technological area,
impact metrics related to intellectual property information. by score, and/or by type of intellectual property (e.g.,
Historic ability to successfully collaborate in R&D ventures proprietary data VS patents and patent applications). Intake
may further be obtained from interactions with the IP engine 102 may employ information scoring engine 109,
transaction facilitation system described herein. discussed in greater detail below, to score received intellec
0033 Intellectual property information may additionally tual property information.
include contribution information about intellectual property 0041 Intake engine 102 may be programmed to deter
that a party is proposing to contribute to a potential collabo mine an intellectual property profile of each intellectual
ration. Such contribution information may include, for property party, based on their intellectual property informa
example, information about patents to be included in a tion and their intellectual property criteria. Intellectual prop
collaboration, including the patents involved, the method of erty information may include, for example, information
contribution, e.g., licensing, transfer to a multi-party about a party's assets and capabilities, and a party's tech
research entity, and others. Contribution information may nological focus area. Further information aspects of a party's
US 2017/O 193619 A1 Jul. 6, 2017

intellectual property profile may further include the outputs example, information past transactions, e.g., mergers and
of risk assessment engine 107 and information scoring acquisitions, divestitures, IPOs, private equity investments,
engine 109. Criteria aspects of a party's intellectual property etc.
profile may include, as described above, information about 0049 Matching engine 104 may use various public and
a party's intellectual property needs, such as resources for private information sources to perform the above described
funding, or technologies to invest in. predictions and projections, including, for example, mea
0042. Matching engine 104 may include instructions for Sures of stock performance, measures of global patent fee
programming processor 112. The instructions of matching payments per patent per portfolio, measures of R&D fund
engine 104 may include, without limitation, instructions for ing budgets, measures of R&D licensing revenues (e.g., as
matching intellectual property parties with other intellectual determined from United States SEC Filings and global
property parties. As used herein, intellectual property parties equivalent regulatory documents), measures of patents used
may be any entities that engage with the system and provide as loan collateral (e.g., as determined by available patent
intellectual property information. The instructions of match assignment information.)
ing engine 104 may include, without limitation, instructions 0050. Matching engine 104 may employ any and all of
for updating a profile database, and/or other instructions that the above described metrics and information to perform
program private side computer system 101 to perform party matching. Party matching may, for example, match
various operations, each of which are described in greater investors to promising trending valuation technologies
detail herein. developed by intellectual property parties best identified for
0043. Matching engine 104 may match intellectual prop Success based on machine learning techniques as described
erty parties based on the intellectual property profiles of the above.
involved parties, e.g., by intellectual property information 0051. In some implementations, matching engine 104
disclosed by each party, including, for example, assets, may use intellectual property criteria inputted by a party to
capabilities, and needs. For example, a party with high levels perform matching. Matching thus performed may be more
of assets and capabilities in a particular technological area manually controlled, as a system user may actively seek
may be matched with a party with high levels of resources specific characteristics in a partner, rather than permitting
in that technological area. matching engine 104 to perform the matching based on
0044) Matching engine 104 may use supervised machine machine learned matching models. In some implementa
learning via a naive Bayesian classifier based rules-engine to tions, matching engine 104 may use a hybrid matching
continuously learn and improve over time the optimal inclu model, permitting users to specify some intellectual property
sion and/or weightings of the above mentioned attributes criteria to match on a manual basis while using machine
and/or other characteristics of the parties to predict Success learning models to match other aspects.
ful R&D collaboration among parties. Matching engine 104 0.052 Contract engine 106 may include instructions for
may use an R&D collaboration learning set. The R&D programming processor 112. The instructions of contract
collaboration learning set may include, for example, suc engine 106 may include, without limitation, instructions for
cessful and unsuccessful past R&D collaboration used in the preparing, executing, and enforcing Smart contracts between
system as well as publicly available multiparty filed patents, intellectual property parties. The instructions of contract
published journals, and transfer of IP assets from global engine 106 may include, without limitation, instructions for
patent office patent publications, grants, register, and legal updating a profile database, and/or other instructions that
status information. program private side computer system 101 to perform
0.045 Measures of successful/unsuccessful R&D col various operations, each of which are described in greater
laboration may include some or all of annual patent fee detail herein.
payments, global patent filing breadth, litigation records, 0053 Contract engine 106 may program processor 112 to
citations, derivative patent applications (e.g., continuation, build electronically enforceable contracts. In some imple
divisional, and/or continuation-in-part), licensing informa mentations, contract engine 106 may suggest to involved
tion mergers and acquisition activity, and investment activ intellectual property parties contract terms based on assess
ity. ments of intellectual property information and risks. For
0046) Matching engine 104 may use regression based example, the system may recommend and draft Smart con
analysis to continuously learn and improve over time the tract terms such that investors taking on more risk would be
optimal and/or weightings of the above mentioned attributes entitled to higher rewards resulting from the R&D invest
and/or other characteristics of the parties to predict Success ment.
ful R&D collaboration among parties. 0054 Contract engine 106 may be configured to suggest
0047. Matching engine 104 may further predict potential and enforce terms of an intellectual property contract. Con
results of multiparty R&D collaborations, including, for tract engine 106 may be configured to suggest terms for
example, projected annual patent fee payments, projections multiple intellectual property parties, and may thus signifi
of global patent filing breadth, length of projected IP pro cantly reduce the time and expense otherwise required in the
tection, projections of potential deal valuations for different negotiation of Such a contract.
types of eventual deals (M&A, divestiture, or etc.) and 0055 Contract engine 106 may be configured to develop
related timelines. a contracting model through machine learning techniques,
0048 Matching engine 104 may use various public and Suggest contract terms based on the contracting model,
private information to perform matching. Public information electronically enforce contract terms, and revise and update
may include all types of publically available information. the contracting model based on contracting results of parties
Private information may include information entered by within the system.
parties, as well as information collected by the system over 0056 Contract engine 106 may be configured to develop
time. Such public and private information may include, for a contracting model. Contract engine 106 may user machine
US 2017/O 193619 A1 Jul. 6, 2017

learning techniques to develop contract building models that be configured to consider jurisdiction specific laws when
may then be applied to a potential transaction to produce determining Suggested contract terms. Because different
Suggested contract terms. Contract building models may be jurisdictions may interpret contract terms differently, con
built from Stored contract data. Contract data may include tract engine 106 may thus Suggest different contract terms
publicly available contract data, e.g., through patent assign depending on a jurisdiction in which the contract is intended
ment databases, and privately compiled contract data, e.g., to be enforced. In some implementations, contract engine
data collected by the system over time as well as proprietary 106 may be configured to alert users to contract terms that
data compiled by various firms and integrated into the may conflict with the laws other jurisdictions. For example,
system. Contract data may include information about parties where intellectual property parties are contracting to license
involved in intellectual property transactions, information an import restricted technology, contract engine 106 may
about contract terms, information about assets subject to the identify countries to which import is restricted and Suggest
intellectual property terms, and information about results of contract terms accordingly. Contract engine 106 may be
the intellectual property transaction or contract. Information configured to alert authorities to situations where intellectual
about the parties involved may include all of the types of property parties manually override safeguards against pro
information discussed herein with respect to intellectual hibited technology uses.
property parties. Information about the assets may include 0060 Contract engine 106 may be configured to facilitate
all of the types of information discussed herein with respect the enforcement of contract terms. For example, in some
to intellectual property assets and their values. Information implementations, contract engine 106 may be configured to
about contract terms may include information about licen notify involved intellectual property parties that contractual
Sure terms, royalty rates, fees, costs, warranties, breach obligations, such as royalty payments, are due.
penalties, contract length, and any other relevant contract 0061. In some implementations, contract engine 106 may
terms. Information about results may include information provide automatic enforcement of contractual obligations.
about resulting patents, resulting products, length of col
laboration, information about financial Success after the For example, contract engine 106 may permit parties to
transaction, and any other additional resulting information. provide proof that a contract term has been met, for example,
Information about results may further include information by adding funds transfer records to data to be recorded to the
regarding whether contract terms were kept, whether con private ledger. Upon fulfillment of contract terms, e.g., via
tracts were breached, and whether there was subsequent the presentation of deliverable items, contract engine 106
litigation. may automatically trigger the enforcement of other contract
0057 Contract engine 106 may use contract data history terms, e.g., the payment of escrowed funds.
to build a contracting model, including correlations between 0062. In some implementations, contract engine 106 may
contract terms of Successful intellectual property transac manage IP assets held in escrow. For example, parties to a
tions (as measured by results discussed above) as well as contract within the system may agree to escrow various IP
correlations between contract terms and characteristics of assets during the terms of a deal. These assets may include,
the involved intellectual property parties. for example, Software code, laboratory data, design infor
0058 Contract engine 106 may be configured to suggest mation, etc. Contract engine 106 may be configured to
contract terms of an intellectual property contract between automatically enforce escrow terms and decide to release
one or more parties. For example, contract engine 106 may escrowed items upon the fulfillment of various conditions.
be configured to suggest terms of an intellectual property 0063 Contract engine 106 may be configured to alert
license, e.g., limitations, warranties, rates, length of the intellectual property parties to potential contractual prob
license, based on terms from previous contracts that led to lems, such as contract breach or other failure to meet
Successful outcomes. Thus, contract engine 106 may suggest contractual obligations by one or more involved intellectual
a royalty rate based on determined information about the property party. In some implementations, contract engine
value of the intellectual property and the financial condition 106 may access legal databases, including jurisdiction spe
of the involved intellectual property parties. The Suggested cific legal databases, in making Such alerts and warnings.
royalty rate may take into account previous royalty rates 0064 Contract engine 106 may be configured to assist in
between comparable intellectual property parties, and may the enforcement of contract terms by traversing the private/
place more weight on previous royalty rates from Successful public ledger audit trail. For example, where an involved
intellectual property contracts. Thus, a start-up company intellectual property party disputes an aspect of an intellec
with little experience in negotiating intellectual property tual property transaction, contract engine 106 may be used
transactions, may use contract engine 106 to develop initial to Verify original contract terms and/or data. Such verifica
contract terms from which to negotiate. In some implemen tion may involve contract engine 106 operating to display a
tations, contract engine 106 may be configured to determine verified correspondence between hashed blocks of the pri
and suggest contract terms that create the largest total value vate ledger and public ledgers and un-hashed contract terms
between two or more intellectual property parties. and data. That is, contract engine 106 may return to the
0059. In some implementations, contract engine 106 may original un-hashed contract terms and data requiring verifi
access legal databases when Suggesting contract terms. Such cation and employ hashing engine 120 to perform a hashing
legal databases may be jurisdiction specific. For example, operation on them. The results of the hashing operation may
contract law may vary between countries and between be compared to the private ledger and/or the public ledger to
different jurisdictions in the same country (i.e., different U.S. verify the original data. In some implementations, Verifica
states enforce contracts differently). In some implementa tion may involve contract engine 106 operating to reverse a
tions, contract engine 106 may be configured to suggest hash function. That is, contract engine 106 may employ
contract terms stating a law meant to be applied to the hashing engine 120 to undo a hashed block to reproduce the
contract. In some implementations, contract engine 106 may contract terms and data that were used to produce the hashed
US 2017/O 193619 A1 Jul. 6, 2017

block. Contract engine 106 may be configured to unhash all existing patents that may be part of a proposed collaboration.
of or a portion of the public ledge and/or the private ledger Such risks may include, for example, time to patent grant
to verify the underlying data. associated with a technology area. Technology areas with
0065 Contract engine 106 may be configured to update greater times to grant may indicate greater risk. Lag times
the contracting model based on contracting results. In some may be normalized to eliminate office delays and examiner
implementations, contract engine 106 may frequently update delays unrelated to specific technology areas. Intellectual
a contracting model based on the results of intellectual property risk assessment may take into account derivative
property transactions facilitated by and recorded within the patent filings. For example, technological areas with fewer
intellectual property transaction facilitation system derivative patent filings may indicate a risk that a technology
described herein. area will not lead to further innovation. Intellectual property
0066 Risk assessment engine 107 may include instruc risks may include patent application to grant ratios, which
tions for programming processor 112. The instructions of may indicate a difficulty in obtaining patent grants. Intel
risk assessment engine 107 may include, without limitation, lectual property risks may include examiner search report
instructions for assessing various risk related aspects of a quality in the technology area. Intellectual property risks
potential IP collaboration. The instructions of risk assess may include overall levels, as well as increasing and
ment engine 107 may include, without limitation, instruc decreasing rates of patent filing activity in a technological
tions for updating a profile database, and/or other instruc area. High levels of activity, as well as increasing or decreas
tions that program private side computer system 101 to ing rates may indicate higher levels of risk. Intellectual
perform various operations, each of which are described in property risks may include patent classification breadth. For
greater detail herein. example, R&D technologies that span fewer than normal
0067. Risk assessment engine 107 may determine risk ized patent classifications may have more risk because claim
scores for all parties to potential intellectual property trans coverage may be narrower and/or because Such applications
actions. For example, an inventor seeking investment funds may be less innovative than technologies that cover more
may wish to understand the risks associated with a potential broad patent classifications. Intellectual property risks may
investor, Such as that investor running out of funds. In include the number of independent claims in patents and
another example, an investor may wish to understand risks patent applications, as patents with a higher number of
associated with a certain technical field. independent claims may have a higher tendency towards
0068 Risk assessment engine 107 may assess collabora patent strength. Intellectual property risks may include for
tion risk based on macro risk factors, such as R&D tech ward patent citations. R&D technologies with fewer than
nology focus areas and micro risk factors, such as specific normal citations, including, but not limited to, decreasing
parties to a potential collaboration. Risk assessment engine over time, may be a risk to the investor.
107 may base risk factor calculations on publicly available 0073 Research risks may include risks and assessments
data, Such as financial information as well as private data, related to common research forums, such as journal publi
Such as an intellectual property profile, as described above. cation activity, journal citation activity, and reputational
0069. Risk assessment engine 107 may use a “random information about academic and government institutions
forest, e.g., ensemble rules/regression based machine learn involved in the research areas that are subjects of potential
ing, to determine and continuously learn and improve over transactions.
time the optimal inclusion and/or weightings of the macro 0074 Commercialization risks may include risks related
and micro risk factors and/or other characteristics of the to commercialization of technologies. Commercialization
parties to determine risk scores for intellectual property risks may include, for example, market valuation and size
parties. metrics. Such metrics may include regression based analysis
0070 Risk assessment engine 107 may use macro risk based on at least stock valuations, patent maintenance fee
factors such as R&D collaboration behavior risk, intellectual payments, R&D funding, R&D licensing revenue, deal
property protection risk, research risk, commercialization valuations (venture capital, private equity, M&A, divesti
risk, financial risk, and litigation risk. Each of the risk tures, IPOs, subsidiary activity, etc.). Regression based
factors discussed herein may be normalized by comparison analysis including Such factors may be performed based on
to peer group, sector, and/or overall R&D technology risk. machine learning techniques that compare these factors to
0071 R&D collaboration behavior risk may include past collaborational outcomes. Commercialization risks may
R&D Collaboration behavior recorded by the secure trans include, for example, geographic breadth of patent filings, as
action system by all R&D multiparty contracts collaborating narrower filings may indicate increased risk, and global fee
in the same or adjacent specific technology area. Technolo payment activity, as failure to maintain fee payments may
gies may be defined, e.g., by text-mining technology phrases indicate increased risks. Commercialization risks may fur
in journal and/or patent documents and/or classifications ther include ratios of Small/medium enterprise to larger
clusters. Adjacent technologies may be identified by nearest enterprise involvement in the technology area, as this ration
neighbors clustering of patent classification(s) clusters that may indicate different risks according to the lifecycle of the
define a technology in global patent databases of documents technology. That is, in early stages of a technology lifecycle,
and/or nearest neighbors of text phrases in global patent it may be desirable to have a higher ratio, indicating the
databases of documents that define a technology. In R&D involvement of fewer large enterprises, whereas, at a mature
Technology areas where R&D collaboration in the system stage of a technology lifecycle, a lower ration may be
has been demonstrated to be more difficult, for example, a preferred. Commercialization risks may further include
higher risk may associated. measures of patent transfer activity, Venture capital to pri
0072 Intellectual property protection risks may include vate equity activity, M&A activity, and licensing activity,
risks related to obtaining legal intellectual property protec each of which may represent different levels of risk depend
tions in a given technology area as well as risks related to ing on timing of the activity with respect to a technology
US 2017/O 193619 A1 Jul. 6, 2017

lifecycle. Commercialization risks may include utility model Subclass(es) in patent classification or broader corpus of
to patent application filing ratios in the technology area, documents of multiple adjacent technologies), and/or out of
utility model to patent application transfer rate, patent filing all R&D technologies (regardless of sector, as defined by all
abandonment rate, and/or technology obsoletion rate. High R&D journals and/or patent classifications(s) and/or a full
obsoletion rate technologies, such as, for example, certain corpus of text in patent documents). Intellectual property
smartphone technologies, become obsolete prior to their full scoring engine 109 may score a patent portfolio based on
possible IP protection term (i.e. 20 years). Technologies one or more of patent filing geographic breadth, patent
having a higher than normalized “obsoletion rate” and/or examiner search reports, patent grant rate, patent grant lag,
patent filing process abandonment rate may be a greater risk derivative applications, citations, utility model vs. regular
to the investor as they may have less time to recover their filings ratio, fee payments, classification breadth, indepen
investment. Obsoletion rates and abandonment rates may be dent claims, forward citations, loan collateral, transfers,
measured, for example, by patent filing applications that litigation risks, and potential markets. Each of these factors
have started the filing process, but are abandoned before may be weighted based on system information and machine
grant, the time at which patent maintenance fee payments learning comparisons with previously scored and evaluated
are discontinued, and legal status events indicating a reduc portfolios.
tion of designated states in a WIPO and/or Regional Patent 0080 Intellectual property division engine 110 may
Filing procedure (EP, ARIPO, etc.). include instructions for programming processor 112. The
0075 Financial risks may include finance related risks to instructions of intellectual property division engine 110 may
any party of a potential intellectual property transaction. For include, without limitation, instructions for determining
example, financial risks may include normalized loan col rights in a combined intellectual property portfolio to indi
lateral rates, bankruptcy filing rates, and stock market fore vidual contributors of the portfolio. The instructions of
casts. Higher than normal loan collateral rates and bank intellectual property division engine 110 may include, with
ruptcy rates may indicate a technology field under greater out limitation, instructions for updating a profile database,
financial stress. Technology areas experiencing Stock market and/or other instructions that program private side computer
declines may also indicate greater degrees of risk. system 101 to perform various operations, each of which are
0076 Litigation risks may include rates and success of described in greater detail herein.
patent litigation actions in a particular technology area, as I0081 Intellectual property division engine 110 may
well as trends in these factors. Litigation risks may further determine rights, or Suggest a determination of rights, based
include rates of patent invalidation in a particular technology on initial contributions of intellectual property parties to a
area, as well as trends in this factor. proposed intellectual property transaction. For example,
0077 Micro risk factors may include all of the risk intellectual property division engine 110 may determine a
factors described at the macro level, but applied particularly Suggested allocation of rights based on investment, intellec
to an individual intellectual property party, rather than a tual property scores determined by scoring engine 109,
technology field as a whole. Micro risk factors may include devoted human resources, proprietary data, and research
additional risk factors. For example, these factors may papers contributed by each party to a transaction. During an
include R&D collaboration behavior risk, intellectual prop agreed upon collaboration, intellectual property division
erty portfolio risk, research risk, commercialization risk, engine 110 may modify a suggested determination of rights
executive management effectiveness risk, technology/R&D based on party contributions to the collaborative project.
strategy management effectiveness risk, financial risk, and Monitoring of party contributions may be based on, for
litigation risk. example, keystroke logging, document check-in, etc.
0078 Intellectual property scoring engine 109 may I0082 Hashing engine 120 may include instructions for
include instructions for programming processor 112. The programming processor 112. The instructions of hashing
instructions of patent assessment module may include, with engine 120 may include, without limitation, instructions for
out limitation, instructions for assessing the intellectual creating a chain of hashed blocks (block chain). The instruc
property and patent portfolio strength of an intellectual tions of hashing engine 120 may include, without limitation,
property party. The instructions of intellectual property instructions for updating a profile database, and/or other
scoring engine 109 may include, without limitation, instruc instructions that program private side computer system 101
tions for updating a profile database, and/or other instruc to perform various operations, each of which are described
tions that program private side computer system 101 to in greater detail herein.
perform various operations, each of which are described in I0083. A block chain may be a chain of securely hashed
greater detail herein. Intellectual property scoring engine blocks. Hashing a block of the chain may involve using a
109 may program processor 112 to scan and score intellec cryptographic hash function on a data block to produce a
tual property information collected by intellectual property hashed block. A chain may be formed by including most
intake engine 102. recently hashed block with the data block when the newest
0079 Intellectual property scoring engine 109, may hashed block is created. A Suitable cryptographic hash
assess patent and patent applications of an intellectual function may be a function Such that the original data block
property party. For example, intellectual property scoring cannot be reconstructed from the hashed block. However,
engine 109 may score patents and patent applications based the hashed block may be used to verify that the data block
on patent strength, age, disruptive patent actions, and other has not been altered or otherwise tampered with. A data
factors. Parameters associated with patent scoring may be block that has been altered will provide a different hash
normalized per R&D research group (same R&D technol value when Subject to the same cryptographic hash function
ogy), R&D research peer group (same and adjacent R&D as the original data block. Comparison of hashed blocks can
technologies), R&D sector (broader level of R&D technolo demonstrate whether or not the underlying data has been
gies, as defined by the journal classification system and/or altered. Because each data block may include all or a portion
US 2017/O 193619 A1 Jul. 6, 2017

of the previous hashed block, a secure and verifiable chain hashing engine 120 may then create a securely hashed block.
of hashed blocks may be created. The first block in a chain As new data is incorporated into a collaborative effort, new
of hashed blocks may be referred to as a genesis block, and hashed blocks may be periodically created to form a ledger.
a chain of hashed blocks may be referred to as a ledger. The The creation of each new hashed block may require hashing
hashed blocks may be used to verify the underlying data engine 120 to receive approval from all parties.
without revealing the underlying data. I0088 Hashing engine 120 may include instructions for
0084 Hashing engine 120 may include instructions for the creation of private and public ledgers. For example, two
programming processor 112 to create a chain of hashed parties to an intellectual property transaction may have their
blocks from data collected by components of the intellectual data hashed to a ledger as described above. This ledger may
property secure transaction system 100. Hashing engine 120 be a private or a public ledger. Parties may prefer a private
may create a genesis block for each intellectual property ledger because, although data that has been run through a
party, including intellectual property information Supplied cryptographic hash function may be difficult to reconstruct,
by the intellectual property party. Hashing engine 120 may it may not be impossible. In the case of a private ledger, each
create genesis blocks for every system user after intellectual party to a transaction, as well as a neutral third party
property information is Supplied. Hashing engine 120 may facilitator may have access to the private ledger. Parties may
be configured to periodically update a party's securely prefer a publicly available ledger to prevent one party from
hashed genesis block as additional information is input by altering underlying data to produce a false version of the
the party. Thus, any or every user of the system, e.g., private ledger. A publicly available ledger, available and
intellectual property parties, may have their intellectual known to entities outside of the collaboration, may prevent
property profile securely hashed as a genesis block prior to one party to the collaboration from attempting to claim that
engaging in any intellectual property transactions. a false ledger is the actual ledger.
0085. In this fashion, each party has a verifiable and I0089 Hashing engine 120 may include instructions for
trustworthy record of their intellectual property ownership the creation of a dual ledger system, including private and
prior to engaging in any transactions. Because this verifiable public ledgers. In Such a system, transaction and collabora
record consists of a securely hashed genesis block, a party tion data may be hashed to a private ledger, available only
may be free to permit a transaction counter-party access to to parties to the transaction and selected neutral third parties.
the hashed genesis block when an intellectual property Hashing engine 120 may then, based on internal logic and/or
transaction occurs. For example, if two pharmaceutical approval of all parties, create a public ledger consisting of
companies engage in a collaborative effort, the agreement hashed portions of the private ledger. Because each block of
may stipulate that each party to the collaboration contribute the public ledger includes only a portion of each hashed
certain intellectual property information to the collaboration block of the private ledger, it may not be possible to
effort. The contributed information may be only a subset of reconstruct any underlying data. However, because the pub
the information contained in each company's intellectual lic ledger may be duplicated in many places, it may be used
property information. If the collaboration yields new dis to verify the integrity of the private ledger, and, therefore,
coveries, any claim by one of the collaboration parties that the underlying collaboration data. A public ledger may be
the discovery had been previously made may be verified stored on a computer system, Such as a server, that is
through that party's securely hashed genesis block. Because accessible to the public.
each party's genesis block represents an independently 0090 Intellectual property database 150 may be config
verifiable record of that party's intellectual property own ured to store intellectual property information and other
ership prior to collaboration, trust between the parties may information related to intellectual property parties as col
be increased. lected by intellectual property intake engine 102.
I0086. When two or more intellectual property parties 0091 Block chain database 152 may be configured to
enter into a transaction, hashing engine 120 may create a store hashed block chain data as created by hashing engine
chain of blocks to create a verifiable audit trail of all actions 120. For example, block chain database 152 may be con
related to the transaction. A first securely hashed block in the figured to store a private ledger included securely hashed
transaction block chain may include at least portions of the blocks of intellectual property information.
genesis blocks of each involved party, as well as information 0092 Public side computer system 182 may include one
related to the transaction. As the collaboration continues, or more processors 182 (also interchangeably referred to
new information and data related to the collaboration may be herein as processors 182, processor(s) 182, or processor 182
hashed into additional blocks to maintain a verifiable trail of for convenience), one or more storage devices 184 (which
information. Because altering the data underlying any point may include communications engine 192 and public block
of the ledger would require alteration of all subsequent chain database 194), and/or other components. Processors
portions of the ledger, such alteration necessarily creates a 182 may be programmed by one or more computer program
false ledger. instructions. For example, processors 182 may be pro
0087 Hashing engine 120 may include instructions to grammed by instructions included in communications
receive approval from all involved parties prior to creating engine 186, as well as other components and/or other
a hashed block from a data block. For example, where two instructions. As used herein, for convenience, the various
parties have come to an agreement to enter into a transac engines may be described as performing an operation, when,
tion, a first data block may include the hashed genesis block in fact, the various instructions of these engines program the
of each party, information detailing the terms of the trans processors 112 (and therefore public side computer system
actions, and any data that the two parties are contributing to 182) to perform the operation.
the collaboration. Prior to hashing the first data block into a 0093 Communications engine 192 may include instruc
first hashed block, hashing engine 120 may require approval tions for programming processor 182. The instructions of
of the to be hashed data from both parties. After approval, communications engine 192 may include, without limita
US 2017/O 193619 A1 Jul. 6, 2017

tion, instructions for communicating with private side com comprise floppy disks, hard disks, optical disks, tapes, or
puter system 101 and other computer systems. The instruc other storage media for storing computer-executable instruc
tions of communications engine 192 may include, without tions and/or data.
limitation, instructions for communicating with private side 0100. The various databases, e.g. intellectual property
computer system 101 and other computer systems, and/or database 150, described herein may be, include, or interface
other instructions that program public side computer system to, for example, an OracleTM relational database sold com
180 to perform various operations, each of which are mercially by Oracle Corporation. Other databases, such as
described in greater detail herein. Communications engine InformixTM, DB2 (Database 2) or other data storage, includ
192 may communicate with private side computer system ing file-based, or query formats, platforms, or resources Such
101, for example, over a network 10. Network 10 may as OLAP (On Line Analytical Processing), SQL (Structured
include any type of communications network capable of Query Language), a SAN (Storage area network), Microsoft
transmitting data between two parties, for example, the AccessTM or others may also be used, incorporated, or
Internet, a WAN, a LAN, etc. accessed. The database may comprise one or more Such
0094 Public block chain database 194 may be configured databases that reside in one or more physical devices and in
to stored hashed block chain data. For example, public block one or more physical locations. The database may store a
chain database 194 may be configured to store a public plurality of types of data and/or files and associated data or
ledger including securely hashed blocks of intellectual prop file descriptions, administrative information, or any other
erty information. data.
0095 Communications engine 192 may be configured to 0101 The various components illustrated in FIG. 1 may
receive data from private side computer system 101. For be coupled to at least one other component via a network,
example, communications engine 192 may include instruc which may include any one or more of for instance, the
tions permitting public side computer system 182 to receive Internet, an intranet, a PAN (Personal Area Network), a LAN
public ledger information from private side computer system (Local Area Network), a WAN (Wide Area Network), a SAN
101. Communications engine 192 may further include (Storage Area Network), a MAN (Metropolitan Area Net
instructions to permit access to the public ledger information work), a wireless network, a cellular communications net
from other computer systems. work, a Public Switched Telephone Network, and/or other
0096. Although illustrated in FIG. 1 as a single compo network. In FIG. 1, as well as in other drawing Figures,
nent, computer system 100 may include a plurality of different numbers of entities than those depicted may be
individual components (e.g., computer devices) each pro used. Furthermore, according to various implementations,
grammed with at least Some of the functions described the components described herein may be implemented in
herein. In this manner, Some components of private side hardware and/or software that configure hardware.
computer system 101 and public side computer system 180 0102 FIG. 2 illustrates an exemplary secured intellectual
may perform Some functions while other components may property transaction process 200 according to some imple
perform other functions, as would be appreciated. The one mentations of the present disclosure. The various processing
or more processors 112 may each include one or more operations and/or data flows depicted in FIG. 2 (and in the
physical processors that are programmed by computer pro other drawing figures) are described in greater detail herein.
gram instructions. The various instructions described herein The described operations may be accomplished using some
are exemplary only. Other configurations and numbers of or all of the system components described in detail above
instructions may be used, so long as the processor(s) 112 are and, in Some implementations, various operations may be
programmed to perform the functions described herein. performed in different sequences and various operations
may be omitted. Additional operations may be performed
0097. Furthermore, it should be appreciated that although along with some or all of the operations shown in the
the various instructions are illustrated in FIG. 1 as being depicted flow diagrams. One or more operations may be
co-located within a single processing unit, in implementa performed simultaneously. Accordingly, the operations as
tions in which processor(s) 112 includes multiple processing illustrated (and described in greater detail below) are exem
units, one or more instructions may be executed remotely plary by nature and, as such, should not be viewed as
from the other instructions. limiting.
0098. The description of the functionality provided by the 0103 Intellectual property secure transaction process 200
different instructions described herein is for illustrative may include an intellectual property reception operation
purposes, and is not intended to be limiting, as any of 202. Intellectual property reception operation may be
instructions may provide more or less functionality than is employed to receive intellectual property information from
described. For example, one or more of the instructions may an intellectual property party. Intellectual property reception
be eliminated, and some or all of its functionality may be may be performed by intellectual property intake engine
provided by other ones of the instructions. As another 102.
example, processor(s) 112 may be programmed by one or 0104 Intellectual property secure transaction process 200
more additional instructions that may perform some or all of may include an intellectual property information analysis
the functionality attributed herein to one of the instructions. operation 204. Intellectual property information analysis
0099. The various instructions described herein may be operation 204 may include the building of an intellectual
stored in a storage device 114, which may comprise random property profile by intellectual property intake engine 102.
access memory (RAM), read only memory (ROM), and/or As discussed above, an intellectual property profile of a
other memory. The storage device may store the computer party may include intellectual property information of the
program instructions (e.g., the aforementioned instructions) party, including assets, resources, capabilities, and technol
to be executed by processor 112 as well as data that may be ogy focus area, as well as risk information developed by risk
manipulated by processor 112. The storage device may assessment engine 107 and scoring information developed
US 2017/O 193619 A1 Jul. 6, 2017

by information scoring engine 109. Intellectual property herein. Contract engine 106 may be configured to make
profiles may further include intellectual property criteria of valuation and risk assessment Suggestion to contract parties.
a party. Intellectual property profiles may be stored in Contract engine 106 may operate to record aspects of the
intellectual property database 150. transaction, including all contract terms, to intellectual prop
0105 Intellectual property secure transaction process 200 erty database 150. Contract engine 106 may use the results
may include secure hashing operation 206. Secure hashing of intellectual property division engine 110, risk assessment
operation 206 may include the creation of an intellectual engine 107, and information scoring engine 109 to deter
property party genesis block based on the intellectual prop mine contract term suggestions.
erty profile developed by intellectual property intake engine 0109 During contract building operation 210, contract
102. Each intellectual property party's genesis block may be engine 106 may use the results described above in conjunc
a block securely hashed from that party's intellectual prop tion with the machine learned contracting model to deter
erty profile. Each party's genesis block may be created prior mine and Suggest contract terms for the involved intellectual
to any transactions with other system users. Should the party property parties. Contract engine 106 may suggest and/or
enter into a transaction, the State of that party's intellectual create contract terms in a semi-autonomous fashion. That is,
property profile at the time the transaction is entered may be contract engine 106 may create terms through the guidance
preserved. In some implementations, a genesis block for of a system user. Contract engine 106 may suggest contract
each party may not be created until after a transaction has terms and system users may then adjust, modify, cancel,
been agreed upon. approve, etc., the Suggested terms. In some implementa
0106. As illustrated in FIG. 2, each of operations 202, tions, contract engine 106 may create or Suggest an initial set
204, and 206 may have analogous operations 201, 203, and of terms that parties may then negotiate over. In some
205 operating on intellectual property information of a implementations contract engine 106 may suggest contract
second intellectual property party. These operations may be terms for multi-party agreements. In some implementations,
duplicated any number of times, permitting intellectual contract engine 106 may suggest the entirety of a contract.
property secure transaction system 100 to develop intellec Contract terms suggested by contract engine 106 may serve
tual property database 150 and block chain database 152. As to significantly reduce negotiation and transaction costs
discussed above, intellectual property database 150 may between parties.
include intellectual property information from any number 0110 Intellectual property secure transaction process 200
of intellectual property parties, i.e., system users, and block may include an approval operation 212. Approval operation
chain database 152 may include securely hashed genesis 212 may operate to obtain approval of an intellectual prop
blocks of the intellectual property information of any and/or erty transaction from one or more involved intellectual
all users. Furthermore, intellectual property database 150 property parties. Hashing engine 120 may operate to per
may be updated at any time that a party enters new intel form approval operation 212 by obtaining approval of all
lectual property information that may then be included in a parties to a hashing operation to be performed. For example,
party's intellectual property profile. When new information after an intellectual property collaboration has been agreed
is entered by a party, operations 202, 204, and 206 may be to by involved parties, hashing engine 120 may obtain
performed again.
approval from the involved parties of the information to be
0107 Intellectual property secure transaction process 200 hashed, including, for example, genesis blocks of involved
may include a matching operation 208. Matching operation parties, contract terms, and intellectual property information
208 may operate to match two or more intellectual property contributions from each party. This information to be hashed
parties. Matching operation 208 may be performed by may form a data block. Once approval has been obtained, the
matching engine 104 to determine a match between a first approved data block may be securely hashed in operation
party and a second party based at least partly on intellectual 214.
property information of one party and intellectual property
criteria of the other party. In some implementations, both 0111 Intellectual property secure transaction process 200
information and criteria aspects of party intellectual profiles may include a secure hashing operation 214. Secure hashing
may be used to determine a match. As discussed above, operation 214 may be performed by hashing engine 120 on
matching engine 104 may use Supervised machine learning an approved data block. Secure hashing operation 214 may
algorithms to determine matches between parties. As dis operate to hash the approved data block and publish the
cussed above, all or a portion of a matching process may be hashed block to a private ledger. The private ledger may be
manually facilitated through matching engine 104, where accessible only to parties to the intellectual property trans
one or more of the parties involved in the matching explic action and to any neutral third parties designated by the
itly define characteristics that they seek in an intellectual involved parties. The private ledger may be stored, for
property partner. example, in block chain database 152.
0108 Intellectual property secure transaction process 200 0112 Intellectual property secure transaction process 200
may include a contract building operation 210. Contract may include a public hashing operation 216. Public hashing
building operation 210 may operate to assist intellectual operation 216 may be performed by hashing engine 120. In
property parties in the negotiation, formation, and drafting Some implementations, hashing engine 120 may seek public
of an intellectual property transaction. Contract building hashing approval from involved parties. In some implemen
operation may employ contract engine 106 to Suggest poten tations, hashing engine 120 may proceed with public hash
tial contract terms to collaboration parties. Contract engine ing operation 216 without first obtaining approval. During
106 may make Suggestions based on information scores public hashing operation 216, hashing engine 120 may
derived from information scoring engine 109, risk assess securely hash at least a portion of the private ledger to a
ment scores derived by risk assessment engine 107, and any hashed public ledger block. Hashing engine 120 may com
other intellectual property information and criteria discussed municate, via communications engine 192, with public side
US 2017/O 193619 A1 Jul. 6, 2017

computer system 180, to make the hashed public ledger tion, or similar information, to suggest hashing to intellec
block available for public scrutiny. tual property parties involved in other transactions.
0113 FIG. 3 illustrates a pattern of secure hashing to 0117 FIG. 4 depicts a process 400 of updating a private
private and public ledgers. Clear data, as illustrated in FIG. ledger with additional collaboration information. Secure
3, may be stored in intellectual property database 150, update process 400 may operate to receive and assess
private ledger information may be stored in block chain additional information, collect additional information into
database 152, and public ledger information may be stored data blocks, and securely hash the information to the col
in public block chain database 194. As illustrated in FIG. 3, laboration private ledger when approval is received.
an intellectual property profile of a first party 301 and an 0118 Secure update process 400 may include a transac
intellectual property profile of a second party 302 may be tion update reception operation 402. Transaction update
securely hashed to a first party genesis block 306 and a reception operation 402 may employ intellectual property
second party genesis block 307, respectively. When the intake engine 102 to receive and analyze newly added
parties have agreed to contractual terms and given their information. Newly added, ongoing collaboration informa
approval to hashing engine 120, initial collaboration data tion, may include new research data, test results, white
303 (including, e.g., contract information and contributed papers, technical drawings, and all other information related
intellectual property information) may be hashed together to the ongoing intellectual property collaboration. Ongoing
with all or portions of genesis blocks 306, 307 to create a collaboration information may further include financial
first private hashed collaboration block 308. Access to statements, bank records, invoices, and other documents
collaboration block 308 may be granted to both the first and showing the usage of resources in the intellectual property
second party. In some implementations, access to the respec collaboration. The newly added information may be ana
tive genesis blocks 306, 307 of first and second parties may lyzed by intellectual property intake engine 102 using vari
be limited to the corresponding party. In some implemen ous capabilities of this engine as previously described.
tations, the creation of genesis blocks 306, 307 may not be Newly added collaboration information may be codified and
required. In some implementations, all or a portion of prepared as a data block for secure hashing. Transaction
collaboration block 308 may be securely hashed and pub update reception process 402 may additionally employ con
lished as a first public hashed collaboration block 311. tract engine 106 to determine whether the intellectual prop
0114 First private hashed collaboration block 308 may erty parties are meeting their contractual obligations. For
then be used as a basis for creating a second hashed example, contract engine 106 may analyze financial State
collaboration block 309, with the inclusion of additional ments and invoices to determine whether an investor col
collaboration data 304. Additional collaboration data 304 laborator has contributed the agreed upon amount of capital.
may include test results, white papers, experimental propos 0119 Secure update process 400 may include a transac
als, designs, communications, and any other information tion approval process 404. Hashing engine 120 may be
pertinent to the collaboration. The private ledger may con employed to conduct a transaction approval process 404.
tinue in this fashion, adding additional collaboration data Once approval has been gained from all involved parties,
blocks 305 and creating additional hashed collaboration hashing engine 120 may continue with a secure hashing
blocks 310. Periodically, all or a portion of additional hashed process 406.
collaboration block 310 may be securely hashed to form an I0120 Secure update process 400 may include a secure
additional public hashed collaboration block 312. In some hashing process 406. Hashing engine 120 may conduct a
implementations, each additional collaboration block 310 secure hashing process 406, as described above, to crypto
may be hashed to form an additional public hashed collabo graphically hash the data block including the information
ration block 312. In some implementations, an additional codified by intellectual property intake engine 102 into a
collaboration block 310 may only be hashed to the public securely hashed block for publication to the private ledger
ledger periodically, for example, when a research milestone block chain.
has been reached or a certain number of blocks have been I0121 Secure update process 400 may include an optional
created, or a certain amount of time has passed. public ledger hashing process 408. Public ledger hashing
0115. In some implementations, hashing engine 120 may process 408 may be periodically performed by hashing
be configured to determine the timing for hashing to a public engine 120. Hashing engine 120 may, for example, perform
ledger based on minimum amounts of data required for public ledger hashing process upon the completion of a
verifiability. For example, where only a portion of the specified number of private ledger blocks, upon the comple
private ledger is hashed to the public ledger, it may be tion of a contractual milestone, and/or upon the passage of
required that the hashed portion of the private ledger be a specific amount of time. Hashing engine 120 may hash all
greater than a certain percentage to guarantee verifiability. or a portion of a most recent private ledger hashed block and
Hashing engine 120 may be configured to perform a private publish the result to the public ledger.
to public hashing operation when the new and unhashed 0.122 The foregoing provides discussion of several
blocks of the private ledger reach a size that would pass a exemplary implementations of a secure intellectual property
threshold in the amount of computing power required to transaction system 101. These implementations permit intel
perform the hashing operation. lectual property parties to create intellectual property pro
0116. In some implementations, hashing engine 120 may files that include information about the current status of their
be configured to determine the timing for hashing to a public intellectual property holdings, their resources, and their
ledger based on machine learning techniques. For example, needs and desires in a collaboration. The secure intellectual
hashing engine 120 may be configured to monitor and build property transaction system 101 may assist intellectual prop
an understanding of the frequency of private to public erty parties to develop relationships by facilitating a match
hashing when manually initiated by involved intellectual between intellectual property parties based on their inputted
property parties. Hashing engine 120 may use this informa intellectual property profiles and machine learning models
US 2017/O 193619 A1 Jul. 6, 2017

developed from information stored by system 101. The 5. The system of claim 1, wherein the computer system is
secure intellectual property transaction system 101 may further caused to:
further assist intellectual property parties by providing a perform a secure hashing operation on the first intellectual
means to Verifiably audit the progress of each party's property profile of the first party to create a first party
intellectual property holdings, resources, etc., throughout genesis block; and
the course of the intellectual property contract. perform a secure hashing operation on the second intel
0123. The foregoing, however, is not intended to be lectual property profile of the second party to create a
limiting, as many alternative implementations of the system second party genesis block;
providing additional benefits may further be provided. wherein the first data block includes at least a portion of
0.124. Other implementations, uses and advantages of the the first party genesis block and the second party
invention will be apparent to those skilled in the art from genesis block.
consideration of the specification and practice of the inven 6. The system of claim 1, wherein the first intellectual
tion disclosed herein. The specification should be considered property profile includes information about a patent portfo
exemplary only, and the scope of the invention is accord lio, and analyzing the first intellectual property portfolio
ingly intended to be limited only by the following claims. includes determining a patent score of the patent portfolio.
What is claimed is: 7. The system of claim 1, wherein the first intellectual
1. A system for managing intellectual property, the system property profile includes information about financial
comprising: resources of the first party, and analyzing the first intellectual
a computer system comprising one or more physical property portfolio includes determining a risk assessment
processors programmed by computer program instruc score based on the information about financial resources.
tions that, when executed, cause the computer system 8. The system of claim 1, wherein the computer system is
tO: further caused to Suggest the at least one contract term to the
receive first intellectual property information from a first first party and the second party.
party; 9. The system of claim 8, wherein the at least one contract
analyze the first intellectual property information to create term is suggested based on contract history data and risk
a first intellectual property profile; assessment scores of the first intellectual property profile
receive second intellectual property information from a and the second intellectual property profile.
second party; 10. The system of claim 8, wherein the at least one
analyze the second intellectual property information to contract term is suggested based on contract history data and
create a second intellectual property profile; intellectual property scores of the first intellectual property
determine a match between the first party and the second profile and the second intellectual property profile.
party based on a match between first intellectual prop 11. A computer implemented method of facilitating a
erty profile and the second intellectual property profile; secure intellectual property transaction, the method being
record a transaction between the first party and the second implemented in a computer system having one or more
party, the transaction including at least one contract physical processors programmed with computer program
term, in a first data block of an intellectual property instructions that, when executed by the one or more physical
database; processors, cause the computer system to perform the
receive, from the first party and the second party, approval method, the method comprising:
of the first data block; receiving, by the computer system, first intellectual prop
perform a secure hashing operation on the first data block erty information from a first party;
to create a first hashed block; analyzing, by the computer system, the first intellectual
publish the first hashed block to a private ledger. property information to create a first intellectual prop
2. The system of claim 1, wherein the computer system is erty profile;
further caused to: receiving, by the computer system, second intellectual
record results of a collaboration between the first party property information from a second party;
and the second party to a second data block, wherein analyzing, by the computer system, the second intellectual
the second block includes at least a portion of the first property information to create a second intellectual
hashed block; property profile;
receive, from the first party and the second party, approval determining, by the computer system, a match between
of the second data block; the first party and the second party based on a match
perform a secure hashing operation on the second data between first intellectual property profile and the sec
block to create a second hashed block; ond intellectual property profile;
publish the second hashed block to the private ledger. recording, by the computer system, a transaction between
3. The system of claim 2, wherein the results of the the first party and the second party, the transaction
collaboration between the first party and the second party including at least one contract term, in a first data block
include at least one of a correspondence between the first of an intellectual property database;
party and the second party, a research document, and a receiving, by the computer system, from the first party
transaction between the first party and the second party. and the second party, approval of the first data block;
4. The system of claim 1, wherein the computer system is performing, by the computer system, a secure hashing
further caused to: operation on the first data block to create a first hashed
perform a secure hashing operation on at least a portion of block;
the private ledger to create a public hashed block; publishing, by the computer system, the first hashed block
publish the public hashed block to a public ledger. to a private ledger.
US 2017/O 193619 A1 Jul. 6, 2017

12. The method of claim 11, the method further compris performing, by the computer system, a secure hashing
1ng: operation on the second intellectual property profile of
recording, by the computer system, results of a collabo the second party to create a second party genesis block;
ration between the first party and the second party to a wherein the first data block includes at least a portion of
second data block, wherein the second block includes the first party genesis block and the second party
at least a portion of the first hashed block; genesis block.
receiving, by the computer system, from the first party 16. The method of claim 11, wherein the first intellectual
and the second party, approval of the second data block; property profile includes information about a patent portfo
performing, by the computer system, a secure hashing lio, and analyzing the first intellectual property portfolio
operation on the second data block to create a second includes determining a patent score of the patent portfolio.
hashed block; and, 17. The method of claim 11, wherein the first intellectual
publishing, by the computer system, the second hashed property profile includes information about financial
block to the private ledger. resources of the first party, and analyzing the first intellectual
13. The method of claim 12, wherein the results of the property portfolio includes determining a risk assessment
collaboration between the first party and the second party score based on the information about financial resources.
include at least one of a correspondence between the first 18. The method of claim 11, further comprising Suggest
party and the second party, a research document, and a ing, by the computer system, the at least one contract term
transaction between the first party and the second party. to the first party and the second party.
14. The method of claim 11, further comprising: 19. The method of claim 18, wherein the at least one
performing, by the computer system, a secure hashing contract term is suggested based on contract history data and
operation on at least a portion of the private ledger to risk assessment scores of the first intellectual property
create a public hashed block; profile and the second intellectual property profile.
publishing, by the computer system, the public hashed
block to a public ledger. 20. The method of claim 18, wherein the at least one
15. The method of claim 11, further comprising: contract term is suggested based on contract history data and
performing, by the computer system, a secure hashing intellectual property scores of the first intellectual property
operation on the first intellectual property profile of the profile and the second intellectual property profile.
first party to create a first party genesis block; and k k k k k

You might also like