New patents are issued by the USPTO on Tuesdays. Both of today's Spotlight Patents continue the theme of blockchains (smart contracts, distributed ledgers) and rights management broadly construed. Assigned to 8eo, the first patent addresses techniques for content management across a multi-party conference system. Assigned to IBM, the second patent addresses techniques for policy enforcement via peer devices using a blockchain.
10,673,913, "Content management across a multi-party conference system by parsing a first and second user engagement stream and transmitting the parsed first and second user engagement stream to a conference engine and a data engine from a first and second receiver," assigned to 8eo, Inc.
Abstract
A system and method provides for content management for a networked communication platform, including receiving a communication connection with a user, such as via a networked connection. The method and system includes a communication platform having executable operations for facilitating a multi-party conference with a conference engine that receives both an audio/video stream from the user, as well as data relating to the user interface operations. Concurrently, the data stream and the audio/video stream are transmitted to a data engine. The facilitates an online conference with two more users, the data engine processes the feeds external from the conference itself, allowing for recordation.
10,671,733, Policy enforcement via peer devices using a blockchain," assigned to IBM.
Abstract
A blockchain of transactions may be referenced for various purposes and may be later accessed by interested parties for ledger verification or information retrieval. One example method of operation may include one or more of receiving an access request from a requesting device for access to an encryption key associated with a user device, broadcasting the request to peer nodes for approval or disapproval, storing a transaction to a blockchain indicating the approval or disapproval of the request for access to the encryption key, and providing access to the encryption key when the approval is indicated.