New pending patent applications are published by the USPTO on Thursdays. This week's Spotlight Applications continue our theme of blockchains (distributed ledgers, smart contracts) and rights management broadly construed. Assigned to AT&T, the first application discloses techniques for scalable and secure content delivery. Assigned to ICON Clinical (IE), the second application discloses techniques for the management of confidential document distribution and security.
20200081999, "System and process for scalable and secure content delivery," assigned to AT&T.
Aspects of the subject disclosure may include, for example, segmenting a file to obtain a set of segments, wherein the file can be regenerated according to a recombination of the set of segments. At least some segments are transported to a targeted group of users including a first group of users and a second group of users, via unlicensed frequency spectrum and according to a peer-to-peer file sharing process. A segmentation record identifying the set of segments is provided to the targeted group of users. A progress of a delivery of the set of segments is monitored according to the segmentation record. The progress of the delivery is #analyzed to identify a deficiency in delivery of a particular segment of the set of segments. Responsive to the deficiency, the particular segment is provided to the first group of users via a licensed frequency spectrum. Other embodiments are disclosed.
20200082106, "Management of confidential document distribution and security," assigned to Icon Clinical Research Limited (IE)
A method of managing distribution of a document and access to its contents with security in a network having nodes is described. The nodes may have digital processors for remote communication over a wide area network and local data stores. The exemplary method includes a node sending a document in encrypted format and including a payload, and control data including destination data, access control data, and signature data, and a document destination list. The sending node may only send the document to nodes on the destination list. A node may receive the document, decrypt at least some of the document, and process the document according to the control data by extracting the control data and managing document payload access and document storage and user access according to the control data.