New patents are issued by the USPTO on Tuesdays. Today's Spotlight Patents continue our theme of blockchains (smart contracts, distributed ledgers) and rights management broadly construed. assigned to IBM, the first of today's patents addresses techniques for anonymous consent and data sharing on a blockchain. Assigned to Forcepoint, the second patent addresses techniques for privacy protection during insider threat monitoring.
10,735,202, "Anonymous consent and data sharing on a blockchain," assigned to IBM.
Abstract
An example operation may include one or more of storing a user profile in a blockchain by an authorized member of the blockchain, receiving a request by another authorized member of the blockchain to access the user profile, identifying the request for the user profile is from the another authorized member of the blockchain, creating a signed message that includes consent to share the user profile with the another authorized member of the blockchain, and transmitting the signed message to the another authorized member of the blockchain, and wherein an exchange of the user profile between the blockchain members is performed without revealing blockchain member identities of the authorized member of the blockchain and the another authorized member of the blockchain to any of the blockchain members.
10,733,323, "Privacy protection during insider threat monitoring," assigned to Forcepoint, LLC
Abstract
A method, system and computer-usable medium are disclosed for performing a privacy operation, comprising: monitoring user behavior via an Input/output collector, the Input/output collector capturing user/device interactions between a user and a device; determining whether the user/device interactions include sensitive personal information; obfuscating the sensitive personal information, the obfuscating preventing viewing of the sensitive personal information; storing obfuscated sensitive personal information within an obfuscated sensitive personal information repository; and, allowing access to the obfuscated sensitive personal information stored within the obfuscated sensitive personal information repository only when an administrator is authorized to access the obfuscated sensitive personal information so as to provide conditional sensitive personal information access.