New patents are issued by the USPTO on Tuesdays. Today's Spotlight Patents continue the theme of blockchain (distributed ledger, smart contracts) and digital rights management broadly construed. Assigned to Symbiont.IO, the first of today's patents addresses techniques for encrypted electronic storage and confidential network transfer of private data through a trustless distributed ledger technology system. Assigned to Sensoriant, the second patent addresses techniques for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy.
10,320,843, "Methods, systems, and devices for encrypted electronic storage and confidential network transfer of private data through a trustless distributed ledger technology system," assigned to Symbiont.IO, Inc.
In some embodiments, systems, methods, and devices disclosed herein enable trusted sharing of private data and/or transactions via a distributed ledger, while maintaining data consistency properties. Some embodiments provide and utilize one or more independent and/or dependent channels. In particular, in some embodiments, one or more independent and/or dependent channels can exist on a single distributed ledger, wherein participants or nodes that are members of a particular channel can view and access the information in a given network transaction. To other participants or nodes not on the particular channel, however, only an encrypted or redacted version of the information can be viewable, thereby not disclosing the transaction information to such participants or nodes. In some embodiments, consistency properties may be preserved even in the presence of selective sharing of transaction information with proofs of validity.
10,320,781, "System and methods for sharing and trading user data and preferences between computer programs and other entities while preserving user privacy," assigned to Sensoriant, Inc.
Systems and methods are provided which allow computer programs or other entities to share user data and information so that users may be authenticated and their preferences shared among entities in networked environments and machines. Cryptographic credentials are generated for these purposes. While the credentials can be shared to provide entities with user authentication and preference data, a salient feature of the sharing technology is that the user is always in control of, and integral to, the sharing protocol. Moreover, the sharing preserves the privacy of the user's data.