New patents are issued by the USPTO on Tuesdays. Today's Spotlight Patents continue our theme of blockchains (smart contracts, distributed ledgers) and rights management broadly construed. Assigned to Advanced New Technologies (Alibaba?), the first patent addresses techniques for blockchain-based copyright distribution. Assigned to Intensity Analytics Corporation, the second patent addresses techniques for independent user effort-based validation.
10,872,170, "Blockchain-based copyright distribution," assigned to Advanced New Technologies Co., Ltd (Alibaba?).
This disclosure relates to blockchain-based copyright distribution. In one aspect, a method includes receiving, by a node device of a blockchain network, a target transaction including design data of a target work and an identity of a target copyright user corresponding to the target work. Design similarity comparison logic and copyright distribution logic are executed. The design data of the target work is compared with the design data of the existing work stored in the first smart contract to obtain a target similarity between the target work and the existing work. A copyright for the target work is distributed between the target copyright user and a copyright user corresponding to the existing work based on the target similarity. Copyright distribution data that specifies distribution of the copyright between the target copyright user and the copyright user corresponding to the existing work is stored in the first smart contract.
10,872,336, "System and method for independent user effort-based validation," assigned to Intensity Analytics Corporation.
A method of authenticating a user based on user effort, the method includes receiving a registration from a user device with a user effort-based identity authorization token and a first user effort, submitting the first effort to the effort validation server, receiving an effort analysis from the effort validation server, issuing a credential to the user device based on the effort analysis, receiving an access request from the user device, the access request including the credential and a second effort, providing the second effort to the validation server, receiving a validation response from the validation server, and granting access to the user device as a function of the validation response.