New pending patent applications are published by the USPTO on Thursdays. Both of today's Spotlight Applications continue the theme of blockchain (distributed ledgers, smart contracts) and rights management broadly construed. Assigned to InfoNetworks, the first application discloses techniques for verification of pseudonymous credentials for digital identities with managed access to personal data on trust networks. Assigned to Merck, the second application discloses techniques for receiving object data representing one or more discriminating characteristics of a physical object or group of physical objects.
20190333054, "System for verification of pseudonymous credentials for digital identities with managed access to personal data on trust networks," assigned to InfoNetworks LLC.
The invention advantageously provides a system for the verification a user's identity and qualifications and authentication of credentials associated with a user's digital identity on a trust network (where service providers involved in a transaction may be independent parties operating with limited trust), in which a pseudonymized transaction record may be created for that digital identity and stored in a shared ledger; identifying information for a user may be retained in a custodial escrow account for that user; and transactions may be re-correlated with identifying information for authorized third parties under established "due process" rules that are appropriate for the applicable jurisdiction(s).
20190334723, "Methods and systems for automatic object recognition and authentication," assigned to Merck (DE)
A system and a method of receiving object data representing one or more discriminating characteristics of a physical object or group of physical objects is described herein. The method includes: processing the object data by means of a machine-learning-based object recognition process to obtain discriminating data representing one or more collision resistant virtual representations of the physical object or group of physical objects; comparing at least one of the discriminating data and an original hash value derived therefrom by application of a pre-determined cryptographic hash function thereto with corresponding reference data stored in one or more data repositories with restricted access; and, if said comparison with the reference data results in a match, outputting digitally signed identification data comprising said hash value.