DOWNLOADABLE COMPUTER FILE CONTAINING ARTWORK

Brand Owner Address Description
FUD BABIES Fud Babies 4727 Heathstead Dr. Apt E Dublin OH 43016 Downloadable computer file containing artwork relating to illustrations of babies authenticated by non-fungible tokens (NFTs); Downloadable computer file containing artwork and text relating to illustrations of babies authenticated by non-fungible tokens (NFTs); Downloadable computer file containing text relating to illustrations of babies authenticated by non-fungible tokens (NFTs); Downloadable image files containing illustrations of babies authenticated by non-fungible digital tokens (NFTs); Management of non-fungible tokens (NFTs); Downloadable multimedia file containing artwork relating to illustrations of babies authenticated by non-fungible tokens (NFTs); Downloadable multimedia file containing artwork and text relating to illustrations of babies authenticated by non-fungible tokens (NFTs); Downloadable multimedia file containing text relating to illustrations of babies authenticated by non-fungible tokens (NFTs);
 

Where the owner name is not linked, that owner no longer owns the brand

   
Technical Examples
  1. A peer-to-peer connection is established by a receiving computer with a sending computer on which a desired file is located. The sending computer encrypts the file using a track key specifically generated for this particular file transfer. Once encrypted, the encrypted file is preferably obfuscated. An application server sends a public key specific to the receiving computer to the sending computer. The sending computer encrypts the track key using the public key associated with the receiving computer, and the sending computer sends the encrypted track key and the encrypted file to the receiving computer. The receiving computer stores the received encrypted track key and the received encrypted file as a secured file on the receiving computer. When a file is transferred, associated business rules are also transferred to the receiving computer. Business rules act to restrict the extent to which a file is read, copied, or distributed.