New patents are issued by the USPTO on Tuesdays. Today's Spotlight Patents continue our theme of blockchain (distributed ledger, smart contracts) and digital rights management broadly construed. Assigned to Broadbridge Financial Solutions, the first of today's patents addresses techniques for database-centered computer network systems and computer-implemented methods for cryptographically-secured distributed data management based on entropy and having a supervisory node. Assigned to X-Prime, the second patent addresses techniques for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency.
10,333,910, "Database-centered computer network systems and computer-implemented methods for cryptographically-secured distributed data management based on entropy and having a supervisory node," assigned to Broadridge Financial Solutions, Inc.
In some embodiments, the present invention provides for an exemplary computer system which includes at least the following components: a network of externally owned presence (EOP) member nodes, including a supervisory EOP member node is configured to generate at least one personalized cryptographic private key for each peer EOP member node; a distributed database, storing a plurality of persistent data objects; and a plurality of self-contained self-executing software containers (SESCs); where each SESC includes an independently executable software code which is at least configured to: apply entropy to generate a state hash representative of a current state of a persistent data object, perform a data action with the persistent data object; and determine that a particular EOP member node has a permission to cause the SESC to perform the data action with the persistent data object based.
10,333,696, "Systems and methods for implementing an efficient, scalable homomorphic transformation of encrypted data with minimal data expansion and improved processing efficiency," assigned to X-Prime, Inc.
Partially homomorphic encryption systems may be transformed into fully homomorphic encryption systems. Input plaintext data are transformed into modified plaintext data using a prime number operation and the modified plaintext data is then encrypted using any number of conventional encryption schemes. Desired computations on the encrypted data are transformed into homomorphic operations, based on the nature of the encryption format, and the homomorphic operations are applied to yield manipulated encrypted data. The manipulated encrypted data may be decrypted and the decrypted plaintext data may be modified into final, output plaintext data using a similar prime number operation as applied during encryption.