Today's Spotlight Patents continue the theme of blockchain (block chain, distributed ledger) and digital rights management broadly construed. Apparently assigned to Madisetti et al. (the inventors), the first patent addresses techniques for operating secure digital management aware applications. Assigned to Microsoft, the second of today's patents enable users to collect and share a primary data structure defining a centralized object..
9,935,772, "Methods and systems for operating secure digital management aware applications," assigned to Madisetti et al.
A system and method for servicing secure data object management aware applications using a cloud-based host environment and a local secure container. The cloud-based host environment creates a controlled digital object from a master digital object, and activates a tether associated with the controlled digital object. The tether includes an access permission, and optionally an operation permission (e.g., view, delete, store, edit, and copy) and a command (e.g., timeout, destroy). The controlled digital object is stored to an isolated storage of the secure container. The tether contents control access and manipulation of the controlled digital object. Certain conditions (e.g., timeout period reached, anomalous data access pattern detected), cause the controlled digital object to be destroyed and/or the tether to be inactivated. In accordance with applicable law, the cloud-based host environment utilizes the tether to detect, identify, and/or thwart unauthorized host environments in possession of the controlled digital object.
9,892,141, "Extensibility of collectable data structures," assigned to Microsoft.
The techniques disclosed herein enable users to collect and share a primary data structure defining a centralized object. A primary data structure can be configured to define a front face of a digital card and the centralized object can represent a person, item, or location. The primary data structure can also define attributes, e.g., characteristics or properties, related to the centralized object. The techniques disclosed herein also enable users to collect and share secondary data structures that are dependent on the primary data structure. For example, a dependent object can include an item that can be utilized by a character represented by the centralized object. A single secondary data structure can be configured to define a side of the digital card, such as the back side of a digital card. A number of secondary data structures can be acquired to create a card with any number of sides.