Frequently Asked Questions

Quick Answers

🔔 Find frequently asked questions answers, tips, and troubleshooting instructions based on our most viewed topics.

About Copyright Law

Copyright is a type of intellectual property that protects original works of authorship as soon as an author fixes the work in a tangible form of expression. In copyright law, there are a lot of different types of works, including paintings, photographs, illustrations, musical compositions, sound recordings, computer programs, books, poems, blog posts, movies, architectural works, plays, and so much more!

Copyright is originality and fixation

Original Works
Works are original when they are independently created by a human author and have a minimal degree of creativity. Independent creation simply means that you create it yourself, without copying. The U.S. Supreme Court has said that, to be creative, a work must have a “spark” and “modicum” of creativity. There are some things, however, that are not creative, like: titles, names, short phrases, and slogans; familiar symbols or designs; mere variations of typographic ornamentation, lettering, or coloring; and mere listings of ingredients or contents. And always keep in mind that copyright protects expression, and never ideas, procedures, methods, systems, processes, concepts, principles, or discoveries.
Fixed Works
A work is fixed when it is captured (either by or under the authority of an author) in a sufficiently permanent medium such that the work can be perceived, reproduced, or communicated for more than a short time. For example, a work is fixed when you write it down or record it.
Everyone is a copyright owner. Once you create an original work and fix it, like taking a photograph, writing a poem or blog, or recording a new song, you are the author and the owner.

Companies, organizations, and other people besides the work’s creator can also be copyright owners. Copyright law allows ownership through “works made for hire,” which establishes that works created by an employee within the scope of employment are owned by the employer. The work made for hire doctrine also applies to certain independent contractor relationships, for certain types of commissioned works.

Copyright ownership can also come from contracts like assignments or from other types of transfers like wills and bequests.

Based on Bern Convention copyright owners has the following exclusive rights:

  • Reproduce the work in copies or phonorecords.
  • Prepare derivative works based upon the work.
  • Distribute copies or phonorecords of the work to the public by sale or other transfer of ownership or by rental, lease, or lending.
  • Perform the work publicly if it is a literary, musical, dramatic, or choreographic work; a pantomime; or a motion picture or other audiovisual work.
  • Display the work publicly if it is a literary, musical, dramatic, or choreographic work; a pantomime; or a pictorial, graphic, or sculptural work. This right also applies to the individual images of a motion picture or other audiovisual work.
  • Perform the work publicly by means of a digital audio transmission if the work is a sound recording.

Copyright also provides the owner of copyright the right to authorize others to exercise these exclusive rights, subject to certain statutory limitations.

The length of copyright protection depends on when a work was created.

For the 179 countries that have signed the international copyright treaty The Berne Convention , the minimum length of copyright is 50 years after the author’s death, but some countries, like the UK and the USA, can actually allow even longer.

The United Kingdom gives creators more than 50 years for some types of work. Details as shown below:

  • Music and Sound recordings : 70 years from the date it was originally published
  • Written, dramatic, musical and artistic works : 70 years from the death of the author
  • Films : 70 years from the death of the director, screenplay author and composer
  • Broadcasts : 50 years from the date of original broadcast
  • AI (Artificial Intelligence) generated work : Copyright protection for computer-generated works without a human author is 50 years.
  • Databases : 15 years from when the database is made or, if the database is published during this time, 15 years from publication
  • Layout of published editions of written, dramatic or musical works : 25 years from the date it was originally published

Under the U.S. law, works created on or after January 1, 1978, have a copyright term of life of the author plus seventy years after the author’s death. If the work is a joint work, the term lasts for seventy years after the last surviving author’s death. For works made for hire and anonymous or pseudonymous works, copyright protection is 95 years from publication or 120 years from creation, whichever is shorter. Works created before 1978 have a different timeframe. Learn more about copyright duration, based on the U.S. Copyrigth Office.

Which countries partecipate to the Bern Convention?

Copyright protection is global, across 179 countries, including  the following (click here for a full up-to-date list).

Albania
Algeria
Andorra
Antigua and Barbuda
Argentina
Armenia
Australia
Austria
Azerbaijan
Bahamas
Bahrain
Bangladesh
Barbados
Belarus
Belgium
Belize
Benin
Bhutan
Bolivia (Plurinational State of)
Bosnia and Herzegovina
Botswana
Brazil
Brunei Darussalam
Bulgaria
Burkina Faso
Burundi
Cabo Verde
Cameroon
Canada
Central African Republic
Chad
Chile
China
Colombia
Comoros
Congo
Cook Islands
Costa Rica
Côte d’Ivoire
Croatia
Cuba
Cyprus
Czech Republic
Democratic People’s Republic of Korea
Democratic Republic of the Congo
Denmark
Djibouti
Dominica
Dominican Republic
Ecuador
Egypt
El Salvador
Equatorial Guinea
Estonia
Fiji
Finland
France
Gabon
Gambia
Georgia
Germany
Ghana
Greece
Grenada
Guatemala
Guinea
Guinea-Bissau
Guyana
Haiti
Holy See
Honduras
Hungary
Iceland
India
Indonesia
Ireland (ROI)
Israel
Italy
Jamaica
Japan
Jordan
Kazakhstan
Kenya
Kuwait
Kyrgyzstan
Lao People’s Democratic Republic
Latvia
Lebanon
Lesotho
Liberia
Libya
Liechtenstein
Lithuania
Luxembourg
Madagascar
Malawi
Malaysia
Mali
Malta
Mauritania
Mauritius
Mexico
Micronesia (Federated States of)
Monaco
Mongolia
Montenegro
Morocco
Mozambique
Namibia
Nepal
Netherlands
New Zealand
Nicaragua
Niger
Nigeria
Niue
Norway
Oman
Pakistan
Panama
Paraguay
Peru
Philippines
Poland
Portugal
Qatar
Republic of Korea
Republic of Moldova
Romania
Russian Federation
Rwanda
Saint Kitts and Nevis
Saint Lucia
Saint Vincent and the Grenadines
Samoa
Sao Tome and Principe
Saudi Arabia
Senegal
Serbia
Singapore
Slovakia
Slovenia
South Africa
Spain
Sri Lanka
Sudan
Suriname
Swaziland
Sweden
Switzerland
Syrian Arab Republic
Tajikistan
Thailand
The former Yugoslav Republic of Macedonia
Togo
Tonga
Trinidad and Tobago
Tunisia
Turkey
Turkmenistan
Tuvalu
Ukraine
United Arab Emirates
United Kingdom
United Republic of Tanzania
United States of America
Uruguay
Uzbekistan
Vanuatu
Venezuela (Bolivarian Republic of)
Vietnam
Yemen
Zambia
Zimbabwe

When can I use works that are not mine?
Agreements, Exceptions, and Limitations

It is important to know that we are all also copyright users. When we read books, watch movies, listen to music, or use videogames or software, we are using copyright-protected works.

So, even if you are not the owner of a work, you still may be able to use it. In addition to buying or licensing works (or some other way of seeking permission to use the work), you can also use one of the Copyright Act’s exceptions and limitations, or rely on works in the public domain.

The Copyright Act’s exceptions and limitations found in sections 107-122 include fair use, the “first sale doctrine,” some reproductions by libraries and archives, certain performances and displays, broadcast programming transmissions by cable and satellite, to name a few. Interested in more information on fair use? Take a look at our Fair Use Index. The complete list of exemptions to copyright protection can be found in chapter 1 of Title 17 of the United States Code.

You can also use works that are in the public domain. Works in the public domain are those that are never protected by copyright (like facts or discoveries) or works whose term of protection has ended either because it expired or the owner did not satisfy a previously required formality. Currently, all pre-1926 U.S. works are in the public domain because copyright protection has expired for those works.
Copyright exists automatically in an original work of authorship once it is fixed, but a copyright owner can take steps to enhance the protections. The most important step is registering the work. Registering a work is not mandatory, but is necessary to enforce the exclusive rights of copyright through litigation. Timely registration also allows copyright owners to seek certain types of monetary damages and attorney fees if there is a lawsuit, and also provide a presumption that information on the registration certificate is correct.

Copyright registration also provides value to the public overall. It facilitates the licensing marketplace by allowing people to find copyright ownership information, and it provides the public with notice that someone is claiming copyright protection. It also provides a record of this nation’s creativity.
What about other intellectual property rights?
Patent and trademark are other types of intellectual property that may cover works and are considered separately from copyright eligibility. For example, patents, which are granted by the government, protect certain inventions or discoveries, designs for articles of manufacture, and plant varietals. Trademark law, on the other hand, protects words, names, symbols, or devices used in trade with goods or services to indicate the source of the goods and to distinguish them from the goods or services of others.
What if there is change in ownership?
The Copyright Depository, like Copyright Zone, also records documents related to Copyright.
This is known as Recordation, and means that the Office reviews and accepts documents, and keeps a record of, the documents people provide.

Recordation relates to three different kinds of documents: transfers of copyright ownership, other documents relating to a copyright, and notices of termination, which authors or their heirs use when terminating certain transfers or licenses.
What is KYC?

Know Your Customer (KYC) standards are designed to protect financial institutions against fraud, corruption, money laundering, and terrorist financing.

KYC involves several steps:

  • establish customer identity;
  • understand the nature of customers’ activities and qualify that the source of funds is legitimate; and
  • assess money laundering risks associated with customers.

Copyright Zone and LutinX are NOT financial Institutions and we do NOT offer any kind of financial service.

We choose to follow the KYC standards because are the only international “standard” globally recognized for identity verification.

In this way once you activate your Account you can be legally identified and activate the Copyright and Intellectual Property protections offered by us. Without legal identity verification, no online service like this one can guarantee any rights everywhere.

About Copyright Zone

CopyRight Zone acts as an independent witness, witnessing ownership of your work and the date of registration.

Why Do I Need to CopyRight Zone?
Copyright is an automatic right under international law but if your work is used without your permission, you’ll have to prove ownership of your work and the date it was created. This can be harder to do than it sounds.
For example, if you take a photo on your phone, how do you prove that the photo is yours and shot on your phone?

The Poor Man’s Copyright
The old way of doing this was to print the photo, put it in an envelope, and post it to yourself. The date stamp from the post office would be your proof-of-date and inside would be your photo. This was known as “The Poor Man’s Copyright”.
Today, this is ineffective. If you post your photo on Instagram and it’s used without your permission, you can’t send an envelope to Instagram and ask them to look inside. Additionally, once you open the envelope, it can’t be used again as evidence.

CopyRight Zone is a LutinX.com project, that acts as a digital, independent witness with the strength of the latest technology, like Blockchain, Artificial intelligence, and Machine learning.

👉 Copyright Zone is a Project of LutinX.com.
👉 LutinX.com is a global blockchain platform active in more than 20 countries with more than 150’000 users, growing day by day.
👉 Copyright Zone’ users can directly manage their works, including the privacy visibility inside the public explorer.
👉 Every work uploaded inside our system is automatically encrypted.

Yes, you can use the © copyright symbol without limitation.

Registering your work with Copyright Zone by LutinX you’ll will get you the right to use a copyright deterrent notice that you can add to your work. It will take the following format:

© Copyright 2023. YOUR NAME. All Rights Reserved.
Copyright Protected with lutinx.com
Reference Number: [your hash code]
Is the application Free?
If you use Copyright Zone as a Private person – not for business – YES, it is Free.

At the first login, we assign you 33 Blockchain transactions, that you can use for your works (music, thesis, presentations, poems, photography, articles, books, and much more).

After you verify your identity, the system will automatically grant you 67 more Blockchain transactions. In this way, you can register for Free every work – obtaining Authorship/Paternity certificates.
Can third party see my works?
Yes, BUT with Limitations applied by you.

The original files can be accessed only by you and by the people you granted the login credentials.
From the Public Explorer, a default page presents a table of your work, including Tags, keywords, the Blockchain Certificate, the link to the Timestamp archive, and the link to the Paternity Certificate.

Copyright Zone employees cannot see your work.
Yes,
we use 128 bit SSL data encryption for all data uploaded from our member area to our system.


Here you can download our SSL certificate (last update Nov 11, 2023):
LutinX.com
Copyright.zone

About Technology

What is Blockchain Technology?
Blockchain is a shared, immutable ledger that facilitates the process of recording transactions and tracking assets in a business network.

An asset can be tangible (a house, car, cash, land) or intangible (intellectual property, patents, copyrights, branding). Virtually anything of value can be tracked and traded on a blockchain network, reducing risk and cutting costs for all involved.
Why Blockchain is Important?

Business runs on information.
The faster it’s received and the more accurate it is, the better.

Blockchain is ideal for delivering that information because it provides immediate, shared, and completely transparent information stored on an immutable ledger that can be accessed only by permissioned network members.

A blockchain network can track orders, payments, accounts, production, and much more. And because members share a single view of the truth, you can see all the details of a transaction end to end, giving you greater confidence, as well as new efficiencies and opportunities.

Most importantly 100+ Governments, including Europe and USA, recognize to the Blockchain technology two legal values: 1) Timestamp; and 2) Immutable registrations.

What are the features of blockchain technology?
Blockchain technology has the following main features:

Decentralization
Decentralization in blockchain refers to transferring control and decision making from a centralized entity (individual, organization, or group) to a distributed network. Decentralized blockchain networks use transparency to reduce the need for trust among participants. These networks also deter participants from exerting authority or control over one another in ways that degrade the functionality of the network.

Immutability
Immutability means something cannot be changed or altered. No participant can tamper with a transaction once someone has recorded it to the shared ledger. If a transaction record includes an error, you must add a new transaction to reverse the mistake, and both transactions are visible to the network.

Consensus
A blockchain system establishes rules about participant consent for recording transactions. You can record new transactions only when the majority of participants in the network give their consent.
How do different industries use blockchain?
Blockchain is an emerging technology that is being adopted in innovative manner by various industries. We describe some use cases in different industries in the following subsections:

Education
LutinX Blockchain Platform impacts education and addresses challenges with tangible solutions. We resolve inefficient paper-based record-keeping processes, lack of transparency, and poor student and teacher accountability. With Blockchain, we can increase the student’s motivation to learn and perform well in class, resolving the lack of trust in merits and academic degrees, and bringing to zero falsification and fake degrees.

Media and entertainment
Companies in media and entertainment use blockchain systems to manage copyright data. Copyright verification is critical for the fair compensation of artists. It takes multiple transactions to record the sale or transfer of copyright content. Sony Music Entertainment Japan uses blockchain services to make digital rights management more efficient. They have successfully used blockchain strategy to improve productivity and reduce costs in copyright processing.

Retail
Retail companies use blockchain to track the movement of goods between suppliers and buyers. For example, Amazon retail has filed a patent for a distributed ledger technology system that will use blockchain technology to verify that all goods sold on the platform are authentic. Amazon sellers can map their global supply chains by allowing participants such as manufacturers, couriers, distributors, end users, and secondary users to add events to the ledger after registering with a certificate authority.

Energy
Energy companies use blockchain technology to create peer-to-peer energy trading platforms and streamline access to renewable energy.
For example, consider these uses:
Blockchain-based energy companies have created a trading platform for the sale of electricity between individuals. Homeowners with solar panels use this platform to sell their excess solar energy to neighbors. The process is largely automated: smart meters create transactions, and blockchain records them.
With blockchain-based crowd funding initiatives, users can sponsor and own solar panels in communities that lack energy access. Sponsors might also receive rent for these communities once the solar panels are constructed.

Finance
Traditional financial systems, like banks and stock exchanges, use blockchain services to manage online payments, accounts, and market trading. For example, Singapore Exchange Limited, an investment holding company that provides financial trading services throughout Asia, uses blockchain technology to build a more efficient interbank payment account. By adopting blockchain, they solved several challenges, including batch processing and manual reconciliation of several thousand financial transactions.

What are the key components of blockchain technology?
Blockchain architecture has the following main components:

A distributed ledger
A distributed ledger is the shared database in the blockchain network that stores the transactions, such as a shared file that everyone in the team can edit. In most shared text editors, anyone with editing rights can delete the entire file. However, distributed ledger technologies have strict rules about who can edit and how to edit. You cannot delete entries once they have been recorded.

Smart contracts
Companies use smart contracts to self-manage business contracts without the need for an assisting third party. They are programs stored on the blockchain system that run automatically when predetermined conditions are met. They run if-then checks so that transactions can be completed confidently. For example, a logistics company can have a smart contract that automatically makes payment once goods have arrived at the port.

Public key cryptography
Public key cryptography is a security feature to uniquely identify participants in the blockchain network. This mechanism generates two sets of keys for network members. One key is a public key that is common to everyone in the network. The other is a private key that is unique to every member. The private and public keys work together to unlock the data in the ledger.

For example, John and Jill are two members of the network. John records a transaction that is encrypted with his private key. Jill can decrypt it with her public key. This way, Jill is confident that John made the transaction. Jill’s public key wouldn’t have worked if John’s private key had been tampered with.
How does blockchain work?
While underlying blockchain mechanisms are complex, we give a brief overview in the following steps. Blockchain software can automate most of these steps:

Step 1 – Record the transaction
A blockchain transaction shows the movement of physical or digital assets from one party to another in the blockchain network. It is recorded as a data block and can include details like these:
– Who was involved in the transaction?
– What happened during the transaction?
– When did the transaction occur?
– Where did the transaction occur?
– Why did the transaction occur?
– How much of the asset was exchanged?
– How many pre-conditions were met during the transaction?

Step 2 – Gain consensus
Most participants on the distributed blockchain network must agree that the recorded transaction is valid. Depending on the type of network, rules of agreement can vary but are typically established at the start of the network.

Step 3 – Link the blocks
Once the participants have reached a consensus, transactions on the blockchain are written into blocks equivalent to the pages of a ledger book. Along with the transactions, a cryptographic hash is also appended to the new block. The hash acts as a chain that links the blocks together. If the contents of the block are intentionally or unintentionally modified, the hash value changes, providing a way to detect data tampering.

Thus, the blocks and chains link securely, and you cannot edit them. Each additional block strengthens the verification of the previous block and therefore the entire blockchain. This is like stacking wooden blocks to make a tower. You can only stack blocks on top, and if you remove a block from the middle of the tower, the whole tower breaks.

Step 4 – Share the ledger
The system distributes the latest copy of the central ledger to all participants.
How did blockchain technology evolve?
Blockchain technology has its roots in the late 1970s when a computer scientist named Ralph Merkle patented Hash trees or Merkle trees. These trees are a computer science structure for storing data by linking blocks using cryptography. In the late 1990s, Stuart Haber and W. Scott Stornetta used Merkle trees to implement a system in which document timestamps could not be tampered with. This was the first instance in the history of blockchain.

The technology has continued to evolve over these three generations:

First generation – Bitcoin and other virtual currencies
In 2008, an anonymous individual or group of individuals known only by the name Satoshi Nakamoto outlined blockchain technology in its modern form. Satoshi’s idea of the Bitcoin blockchain used 1 MB blocks of information for Bitcoin transactions. Many of the features of Bitcoin blockchain systems remain central to blockchain technology even today.

Second generation – smart contracts
A few years after first-generation currencies emerged, developers began to consider blockchain applications beyond cryptocurrency. For instance, the inventors of Ethereum decided to use blockchain technology in asset transfer transactions. Their significant contribution was the smart contracts feature.

Third generation – the future
As companies discover and implement new applications, blockchain technology continues to evolve and grow. Companies are solving limitations of scale and computation, and potential opportunities are limitless in the ongoing blockchain revolution. In this situation LutinX.com concentrate its energies to become a global leader in the Digital Data Certification using Blockchain technology.

Registering works

👉 ZERO – If you use it for No-Business-Porpouses. And you’ll get all the Blockchain Power with 100 FREE registrations, including all the Copyright procedures with the related Autorship Certificates.

👉 49,00 €/year for Business activities. A lot of functionalities are included. 250 Registrations too.

👉 489,00 €/year for I.P. Professionals, Editors, Book Distributors, Architects… The plan includes all the most advanced services offered by Copyright Zone, with 1000 Registrations too.

The full Pricing list, with all the plan details, is available here.

Why do you charge an annual subscription?

The most important part of our copyright proof certification is that we hold a copy of your original work files and certificates, so that when a dispute arises in the future, you can show independent date stamped evidence of creation using our system.


We charge a small annual membership fee to cover ongoing costs of providing that service, such as file storage , technical and phone support, company management, server maintenance – including the blockchain infrastructure – and website upgrade and administration costs. 


This has allowed us to trade successfully since 2019 and ensures we’ll be able to operate in perpetuity, balancing future costs of holding customers’ work with future subscription revenues, enabling us to continually hold your work and certificates and support you in the future when a dispute on your work arises.


Some competitor copyright proof providers charge large one-off payments instead, for ‘lifetime storage’. This may seem good value , but that funding model leaves creators vulnerable, because without a continual stream of new customers, the provider eventually goes bankrupt and copyright evidence is lost.

Do you accept one-time-payments?
👉 No. Our Business Model is focused on offering you a long-term service because your Work is as important to you as to us.

With one shoot payment, some companies can get immediate benefits, but if they cannot reach a minimal subscription they can only close, losing all the data stored for their clients.

LutinX.com with Copyright Zone wants to offer a high-quality service for all in the future, so we charge a small annual fee to ensure that we’re able to offer unparalleled support by phone and email and ensure our service remains reliable, up-to-date, and secure for the future.
What happen if my Subscription expires?
👉 For Private Accounts, their work will always be accessible and verifiable.

👉 For Business Accounts, their work will not be reachable anymore, and will no longer be protected. A not-renewed Business Account will be marked for removal.

We allow a short grace period of 60 days for you to reactivate and renew before your account is deleted.

Subscriptions are automatically charged each year via your original payment method.
If you cancel this renewal, your subscription to Copyright Zone will not be renewed.
If your account expires, simply log in and renew it within the grace period.
How can I pay?
👉 We accept all major credit and debit cards as well as PayPal.

👉 Non UK bank cards are charged in your own currency at your bank’s exchange rate and fees. Subscribers outside the UK pay no VAT (Value Added Tax).

👉 Payment will be automatically debited each year, unless you cancel your account.

👉 You will be notified by email each time an annual renewal payment is made.
👉 Yes, copyright law can protect the graphic design of an original artistic logo, so if any one uses your logo without your permission or copies it, you can take action.

⚠️ Please Note: It does NOT, protect a name that may be on the logo.
Can I protect a Name?

👉 No, you CAN NOT protect a name using copyright and Copyright Zone. Copyright law does not protect names or slogans, but we can protect original logos.

For a name:

  • You must instead look at trademark or setup a trading company in that name
  • Trademarks applications are filed with the UK Government
  • Government filing fees start at £170
  • Protect My Work can file trademark applications for £499 + VAT + government fees

For questions specifically about names, please contact the UK Intellectual Property Office:

Website: www.gov.uk/topic/intellectual-property/trade-marks
Email: information@ipo.gov.uk
Telephone: 0300 300 2000
Outside the UK: +44 (0)1633 814000

Can I protect my Music?
👉 Yes.

Music copyright has become a big issue in the music industry, with massive names such as Ed Sheeran and Taylor Swift finding themselves wrapped up in copyright infringement cases.

International copyright law as dictated by the Berne Convention, ensures that copyright is an automatic right, at the time the artist or artists created the music.

The first point is to note that no official registration is needed with a copyright office.

However, the second point, which is very important to understand, is to take action in any copyright claims over your sound recording or own song, you will have to be able to prove that you’re the original copyright owner of the musical work in question and prove when your song or music was created.

Learn more about Music Copyright in our “Industries” page.
Can I protect my Books?
👉 Yes.

Copyright law, when it comes time to copyright a book, like all literary intellectual property, is simple to understand, as copyright protection is an automatic right. Under the Berne Convention, there’s no need to register your book or written work with a copyright office. However, should you ever have a copyright dispute in future, you’ll need to prove that you’re the original author of your book or written work and the date it was completed.

This can be much harder to prove than it may seem. With the advent of the Internet, whilst making our lives easier on many fronts, one of the consequences of it is that copyright infringement of intellectual property has become a growing problem so it’s important to understand how copyright protection works for your books and exactly how to copyright a book, before publishing and releasing it into the public domain, especially if you plan on self publishing on somewhere like Amazon.

Learn more about Books Copyright in our “Industries” page.
Can I protect my Logos?

👉 Yes.


When first learning about copyright law and how it can affect your business, it can be confusing.

Understanding how to copyright a logo, is simple as under international copyright law, copyright is an automatic right at the moment the design of the logo is deemed finished.


You simply have to prove that you created the logo and be able to prove the date. That’s it.


HOW TO COPYRIGHT A LOGO IN 3 STEPS:
1) Use the © copyright symbol on your work
2) Ensure you can prove the date of creation
3) Register with a copyright witness service such as LutinX.com – Your Copyright Zone.


Learn more about Books Copyright in our “Industries” page.

What is a Blockchain Transaction?
A blockchain transaction, for Copyright Zone, is a single opportunity to write inside the Blockchain Network your work, including an encrypted code that will merge your identity with the object of your registration.

A blockchain transaction is NOT a money transfer, it is the creation of an Immutable data, that inside Copyright Zone is your Paternity Certificate.
Can I create NFT (Non Fungible Token)?
👉 Yes.

You can create your own NFT from the platform you choose. In this way you can tokenize your unique Hash Code provided by us, or directly your Paternity Certificate of your work.

Your Account

Discover the Blockchain Applications

L.Card
L.Card is a Blockchain ID integrated into a decentralized platform designed around identity. It is for companies, associations, or parties whom you work with or any business relations.

L.Card creates a public certificate (or private) that users can present to third people. It verifies both parts presented. With a QR code, you can prove your identity, your job status, the signature power you have, and more!

THE 8 KEY POINTS
IDENTITY VERIFICATION & BLOCKCHAIN SMART CONTRACT, TOGETHER

👉 L.Card offers a decentralized and secure solution that puts users back in control of their identity via a distributed trust model.
👉 It is Consent – L.Card uses Smart contracts to enable controlled data disclosure.
👉 It is Decentralized: All the documents that identify users get stored on their device backed by L.iD Technology, making it safe from mass data breaches.
👉 A universal ecosystem: Our Blockchain technology doesn’t set any geographical boundaries. So, users can use the platform across nations to verify their identity.
👉 Trusted platform: Trust score generated by the Smart Contracts can help organizations validate users’ identities in real-time. Based on a user’s trust score, it can be inspected whether it’s a suspicious account or a valid account.
👉 User-optimized: L.Card reduces costs and it is time-efficient. As you can confirm, you can also “Revoke” or “Modify” at any time the status by accessing the L.Card.
👉 It is Transparent: Everyone connected to the network can trace the transactions recorded on the blockchain.
👉 It is Easy: No special training is needed to use L.Card. You have simple to “Copy & Paste” your QR on cards, resume, or any document you would like to prove that you made it, or who you are.

And this is the Public BBadge:
L.Library
L.Library is the final evolution of the Copyrighting and Digital Data Conservatory.
With L.Library you can collect multiple files inside the blockchain network resolving trust problems for the everyday life of professionals, artists, lawyers, and any other man or woman who creates intellectual data every day.
L.Library can with an easy-to-use procedure save and “copyright” every version of your files – tracking them – and every update of your documents… like an infinity review of them.

The main element is that we are not talking about reviews but we talk about the legal archive of your intellectual property.

👉 L.Library Licence can manage archives or collections of files from two to one thousand in time, based on your subscription.
👉 L.Library Licence can accept files from 2Mb to 500Mb each, based on your subscription.
L.Links is a Blockchain application that helps you to track and manage web traffic for marketing campaigns or just your analytics. With L.Links you can create short links, with an integrated blockchain system.

Every time someone uses it you know exactly when and from where someone uses it, and more importantly you can generate immutable reports, with a legal timestamp.

L.Links works with this short domain “LRX.IS”. In 2024 we’ll add more than five new short-domains that will increase our efficency and popularity.

L.Links can be upgraded with two plugins:
  • Silver – you can customize your short-links by choosing words or a combination of letters and numbers up to 5 characters.
  • Gold – your short link can be fully customizable with 3 characters only.
L.Login
L.Login is the first APP of the LutinX world.
With L.Login everyone who manages a Blog or a website can integrate KYC login access at ZERO costs, simply activating our API.

With L.Login you can respect privacy regulations and access your online content only to identified people – that perhaps you do not even know. 

In your account panel, you can watch and study the logs, including the real name of your guests, their verified email, and even more data we managed to prove their identity. 

L.Login can let you respect AML regulations, if you sell online, or fight the HATE Internet problem if you manage a blog with potential “complicate” comments.

Using L.Login with your blog or website requires a basic addendum in your privacy policy, including LutinX.com as co-owner of these specific elements. It is important to clarify that we do not contact or use your user’s piece of information, just consider that YOU use LutinX.com and YOU access these data inside YOUR account.
L.Proof
L.Proof lets you share your Copyrighted works with third people. With this powerful blockchain application, third people are invited to verify their identity and in the moment they open your file, a blockchain event will be activated.

In this situation, you’ll have legal proof about the delivery and the identity of the people or the company that opens and views it.

L.Proof can be used from 1 to 1000 receivers, based on your subscription. The procedure is very easy. You just have to add the recipient’s email and confirm it. the LutinX platform will inform the receiver that you shared a file with him/her and if they want to open it, they should follow the same simple step to activate their account on lutinx.com.