We continue the theme of patent applications combining blockchain (distributed ledger) and digital rights management broadly understood. Assigned to The Real McCoy, the first of today's Spotlight Applications address techniques for establishing, securing and transferring computer readable information using peer-to-peer public and private key cryptography. Assigned to Comcast, the second of today's applications addresses techniques for distributed data access control.
20170324711, "Method for establishing, securing and transferring computer readable information using peer-to-peer public and private key cryptography," assigned to The Real McCoy, LLC.
System and method for confirming and transferring information from one party to another via block chain escort, using central and decentralized databases acting as online storage providers. Files are linked to cryptographic currency structures comprised of a public and private key identification processes. Locking, unlocking, retrieving, storing, confirming and transferring files requires linked association to block chain protocol measures of crypto-currency processes. Establishing file space requires that the owner links it to a centralized or decentralized peer-to-peer cryptographic block chain protocol. This secures and locks files for subsequent confirmation and transfer. Confirmation and transfer of the file is processed with a cryptographic hash function of crypto currency block chain process. The system and method requires that the transferee obtain the file using crypto currency transfer protocol. The system and method associates a piece of information with a public key and private keys, which are accessed only by the owner.
20170322992, "Distributed data access control," assigned to Comcast.
Systems for distributed controlled access to data stored across a plurality of sources are disclosed. A plurality of content providers maintain user databases. A first distributed database contains a master identifier for each user of each content provider. Stored in relation to the master identifier are the locations of the user's data in each of the content providers. A second distributed database comprises data identifying for each of the users, entities that are authorized to access the user's data. In response to a request from an entity, the second database is queried and, based upon access rights data, user's whose data the requesting entity may view are determined. The first distributed database is queried to determine for the identified user, the location of user data. The data is retrieved and stored at a location accessible by the entity. The second distributed database is updated to record the data access.