New pending patent applications are published by the USPTO on Thursdays. Today's Spotlight Applications address aspects of blockchains (smart contracts, distributed ledgers) and rights management broadly construed. Assigned to Mixonium, the first application discloses techniques for managing and sharing digital content and services. Assigned to Alibaba, the second application discloses techniques for a blockchain-based copyright protection method and apparatus, and electronic device.
20200285800, "Systems, methods, and media for managing and sharing digital content and services," assigned to Mixonium Group Holdings, Inc.
Abstract
Methods, systems, and media for creating a layout of digital assets are provided. In some embodiments, the method comprises: presenting a layout of digital assets, wherein the layout of digital assets includes a plurality of elements; receiving a selection of a digital asset from a group of available digital assets to be included in the layout of digital assets; in response to receiving the selection of the digital asset, causing a representation of the digital asset to be presented in the layout of digital assets; causing an image that represents the layout of digital assets to be created, wherein the image is associated with a Uniform Resource Locator (URL); and in response to determining that the URL has been selected, causing the image to be presented.
20200274872, "Blockchain-based copyright protection method and apparatus, and electronic device," assigned to Alibaba (CN)
Abstract
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for a blockchain-based right protection. One of the methods includes: sending, to a blockchain network, a request for verifying a right to access a digital product, the request comprising identity information associated with a target user; receiving, from the blockchain network, a response comprising a result of verifying the right to access the digital product based on the identity information associated with the target user; in response to the result being that the verifying the right to access the digital product is successful, determining identification information for tracing the target user; and embedding the identification information for tracing the target user in content associated with the digital product.
Comments