How the system works

From registration to settlement

CopyrightChains creates an immutable record of your work with cryptographic fingerprinting, monitors usage across all platforms automatically, applies configurable licensing and enforcement policies, and settles payments instantly based on recorded ownership splits.

The Complete Workflow

01

Registration

Create immutable ownership record

02

Detection

Monitor usage across platforms

03

Licensing

Apply enforcement policies

04

Settlement

Instant automated payments

Registration and provenance

Submit metadata, contributor list with ownership percentages, and audio asset
System generates cryptographic fingerprint and assigns globally unique ID
Immutable ledger records fingerprint, splits, identities, and timestamp
Any ownership changes create new versioned record preserving complete chain of title
Usage detection works even when metadata stripped or filename changed
Full registration technical details

The registration workflow begins when a rights holder submits a work to the platform. Required inputs include descriptive metadata such as title, release date, and genre; a complete list of contributors with their legal identities and ownership percentages; and the audio asset itself. The system processes these inputs by generating a cryptographic fingerprint from the audio file and assigning a globally unique identifier to the work. This identifier links the fingerprint, the rights splits, the timestamp of registration, and the verified identities of all stakeholders into a single record.

The record is written to an immutable ledger, meaning that once created, it cannot be altered or deleted. Any subsequent changes to ownership or splits require the creation of a new versioned record that references the original, preserving a complete chain of title. This approach eliminates ambiguity about who owned what at any point in time and provides a verifiable foundation for licensing, enforcement, and settlement processes. The content fingerprint ensures that usage can be detected even when metadata tags are stripped, filenames are changed, or works are distributed through informal channels.

Monitoring and detection

Automated agents scan platforms continuously using audio fingerprinting
Detection analyzes acoustic properties, not just metadata or titles
System classifies usage as recognized (licensed) or unrecognized
Recognized usage: licensed platforms with existing agreements
Unrecognized usage: unlicensed services, UGC, informal distribution
Monitoring technical architecture

Automated monitoring agents scan a wide range of platforms continuously for matches to registered works. Detection is based on audio fingerprinting technology that analyzes the acoustic properties of the audio signal rather than relying solely on titles, artist names, or other metadata that can be easily modified or omitted. When a match is identified, the system retrieves the corresponding registration record and determines whether the usage occurred through a known, legitimate channel or represents an unrecognized use.

The distinction between recognized and unrecognized uses is central to the system's operation. Recognized uses include streams on licensed platforms where formal agreements already exist between the rights holder and the service. Unrecognized uses include uploads to services without prior licensing arrangements, appearances in user-generated content, or circulation through informal distribution channels. This classification drives the subsequent licensing and enforcement logic.

Licensing and enforcement logic

Licensed usage

Logged and routed to settlement automatically. No manual intervention required.

Auto-licensing eligible

System initiates licensing offer or applies predefined terms for background music, sync, partnerships.

Non-compliant usage

Triggers escalation: rights holder notification, platform enforcement, or legal action prep.

Policy configuration

Templates and guardrails ensure compliance with licensing rules and platform terms.

Policy configuration and enforcement workflows

For each detected use, the system applies a configurable policy that determines the appropriate response. If the use is already covered by an existing license, the event is logged and routed into settlement. The system records the platform, the type of use, the timestamp, and any associated metadata required for royalty calculation. No manual intervention is required, and the rights holder gains visibility into the usage without needing to parse platform-specific reports.

If the detected use is eligible for standard licensing under the rights holder's preferences, the system initiates an automated licensing offer or applies predefined terms. This workflow is particularly relevant for background music services, synchronization opportunities, and platform partnerships where blanket or template licenses are appropriate. The system can present licensing options, accept payments, and record the agreement on the ledger without requiring the rights holder to negotiate each transaction individually.

If the use is non-compliant or represents a high-risk scenario such as commercial exploitation without authorization, the system triggers escalation. Depending on configuration, this can involve notifying the rights holder, initiating platform-level enforcement procedures, or preparing documentation for legal action. The immutable usage record and provenance data serve as evidence in these processes, reducing the burden of proof and shortening the time required to achieve resolution.

Rights holders and investors configure policy within regulatory boundaries. The system provides templates and guardrails to ensure that automated licensing and enforcement actions comply with applicable laws, including mechanical licensing rules, compulsory license provisions, and platform terms of service.

Settlement and reporting

Automated settlement: aggregates usage, applies splits, executes payments
Micro-transaction batching reduces overhead for high-volume, low-value uses
Multi-currency and cross-border settlement with compliance built-in
Complete audit trail: detection, licensing, payment recorded on ledger
Portfolio dashboards aggregate usage, revenue, enforcement across all works
Exportable data integrates with accounting and audit systems
Settlement architecture and reporting capabilities

Payable events convert into cash flows through an automated settlement process that aggregates usage data, applies ownership splits, and executes payments. Where necessary, the system batches micro-transactions to reduce overhead, particularly for high-volume, low-value uses such as individual streams on subscription services. Splits are applied automatically based on the ownership percentages recorded at registration, ensuring that every contributor receives their share without manual distribution or approval steps.

The platform supports multi-currency and cross-border settlement where relevant, handling currency conversion and compliance with payment regulations in different jurisdictions. Settlement records are written to the ledger alongside usage and licensing events, creating a complete audit trail from detection through payment.

Rights holders and investors access performance data through portfolio-wide dashboards that aggregate usage, revenue, and enforcement activity across all registered works. Work-level histories combine usage events, licensing decisions, and payments in a single chronological view, allowing users to understand how a particular work generates income and where issues arise. Data is exportable in standard formats for integration with accounting systems, financial reporting, and audit processes. This reporting surface supports both operational management and strategic decision-making, including portfolio optimization, pricing negotiations with platforms, and valuation for financing or sale transactions.

Ready to put the system to work?

Start protecting your works with automated monitoring, licensing, and instant settlement.

AI and fraud protection

Understand how the system defends against AI-generated content, deepfakes, and fraudulent claims

AI detection systems
Fraud prevention
Deepfake countermeasures
Explore protection

Start registration now

Begin protecting your works with automated monitoring and instant settlement in minutes

Quick setup process
Immediate monitoring
Automated settlement
Get started free