New pending patent applications are published by the USPTO on Thursdays. Both of this week's Spotlight Applications continue the theme of blockchains (distributed ledgers, smart contracts) and rights management broadly construed. Assigned to ARM (GB), the first application discloses a blockchain infrastructure for securing and/or managing electronic artifacts. Assigned to Magna Carta (CH), the second application discloses techniques for providing authentication, non-repudiation, governed access and twin resolution for data utilizing a data control signature.
20200007513, "Blockchain infrastructure for securing and/or managing electronic artifacts," assigned to ARM Limited (GB).
Abstract
Briefly, example methods, apparatuses, and/or articles of manufacture are disclosed that may be implemented, in whole or in part, to facilitate and/or support one or more operations and/or techniques for blockchain infrastructure for securing and/or managing electronic artifacts, such as implemented in connection with one or more computing and/or communication networks and/or protocols.
20200007345, "Apparatus and method for providing authentication, non-repudiation, governed access and twin resolution for data utilizing a data control signature," assigned to Magna Carta AG (CH).
Abstract
A non-transitory computer readable storage medium has instructions executed by a processor to receive an original collection of symbols. A single use coding function is applied to the original collection of symbols to form a new collection of symbols. Encryption keys associated with a user are formed. The new collection of symbols is encrypted to form a recoded encrypted symbol file stored at a network accessible memory location. A distributed ledger entry with a data control signature is formed using the single use coding function encrypted with a private key. The distributed ledger entry is written to a distributed ledger. The distributed ledger entry is accessed. The recoded encrypted symbol file is read from the network accessible memory location. The data control signature and a symmetric key are used to convert the recoded encrypted symbol file to the original collection of symbols.