Some examples of the method, system, and non-transitory computer-readable medium described above may further include monitoring the entity for compliance with the rules. In some examples of the method, system, and non-transitory computer-readable medium described above, said plurality of rules includes rules preventing objects unauthorized by the owner from being placed in the assigned volume of three-dimensional space.
In some examples of the method, system, and non-transitory computer-readable medium described above, the ownership is transferable. In some examples of the method, system, and non-transitory computer-readable medium described above, the ownership of the three-dimensional space is related to ownership of an associated physical space. In some examples of the method, system, and non-transitory computer-readable medium described above, said volume of three-dimensional space includes at least one selected from the group of a person, an animal, a physical location, and an inanimate object.
In some examples of the method, system, and non-transitory computer-readable medium described above, each object has an owner. In some examples of the method, system, and non-transitory computer-readable medium described above, the owner of the object receives economic compensation in response to a request for the object.
In some examples of the method, system, and non-transitory computer-readable medium described above, the verifying permission includes determining if the owner of the object has licensed the object to a different entity. In some examples of the method, system, and non-transitory computer-readable medium described above, the verify permission step includes contacting a third-party enforcement system.