| CPC H04L 9/50 (2022.05) [H04L 9/0825 (2013.01); H04L 9/3239 (2013.01); H04B 13/02 (2013.01)] | 18 Claims |

|
1. A computer-implemented method executed by data processing hardware of a first entity that causes the data processing hardware to perform operations comprising:
generating a first asset token, the first asset token representing control, by the first entity, of a portion of a physical communication asset, the first asset token comprising:
an unencrypted identity of the first entity; and
an unencrypted location of the physical communication asset;
publishing, to a distributed ledger, ownership of the first asset token;
receiving, from a second entity, a request to control the portion of the physical communication asset represented by the first asset token; and
in response to receiving the request:
removing the first asset token from circulation on the distributed ledger;
generating a second asset token, the second asset token representing control, by the second entity, of the portion of the physical communication asset, the second asset token comprising:
the unencrypted identity of the first entity;
an unencrypted identity of the second entity;
the unencrypted location of the physical communication asset;
contractual information encrypted by a data encryption key, the contractual information associated with transferring control of the portion of the physical communication asset from the first entity to the second entity; and
the data encryption key encrypted by a public key associated with the second entity;
publishing, to the distributed ledger, ownership of the second asset token; and
transferring, using the distributed ledger, ownership of the second asset token to the second entity.
|