New patents are issued by the USPTO on Tuesdays. Both of today's Spotlight Patents concern aspects of blockchain (distributed ledger, smart contracts) and digital rights management broadly construed. Assigned to the Chicago Mercantile Exchange, the first patent addresses techniques for a bilateral assertion model and ledger implementation. Assigned to Cryptographic ASICs, the second patent addresses a cryptographic ASIC with self-verifying unique internal identifier.
10,404,469, "Bilateral assertion model and ledger implementation thereof," assigned to the Chicago Mercantile Exchange Inc.
A computer implemented method for implementing a real time reconciling shared data structure is disclosed. The shared data structure may be stored in a memory, and a portion of the shared data structure may be coupled with a processor. The computer implemented method may be used for interacting with the shared data structure. The method may comprise the exchange of messages, requesting to change data in the shared data structure, between selected participants, wherein some of the participants must validate requested changes to the shared data. If all participants validate the requests to change data the changes to the data are made, and if less than all participants validate the requests then the changes are not made.
10,404,463, "Cryptographic ASIC with self-verifying unique internal identifier," assigned to Blockchain ASICs LLC.
A cryptographic ASIC and method for autonomously storing a unique internal identifier into a one-time programmable memory in isolation, by a foundry or a user. When later powered on, the ASIC calculates the value of the unique internal identifier from a predetermined input and compares the calculated identifier value to the stored identifier value. A match indicates the stored value is valid, while a mismatch indicates the stored value is invalid, whether due to natural memory component aging or damage by unauthorized access attempts. The ASIC may compare the calculated identifier to another copy or copies of the stored identifier, and disregard unreliable copies of the stored identifier. The ASIC may compare multiple copies of the stored identifier in a voting scheme to determine their validity. The confirmed valid lifetime of the ASIC thus extends far beyond the useful lifetime of a single copy of the stored identifier.