New pending patent applications are published by the USPTO on Thusdays. Both of today's Spotlight Applications continue our theme of blockchains (smart contracts, distributed ledgers) and rights management broadly construed. Assigned to Sensoriant, the first application discloses techniques for storing and retrieving user data using joint, non-correlative, irreversible and private indexical expressions. Assigned to Whitestar Communications, the second application discloses techniques for a salutation protocol to communicate using a private overlay peer to peer network.
20210034299, "Storing and retrieving user data using joint, non-correlative, irreversible and private indexical expressions," assigned to Sensoriant, Inc.
In accordance a method for storing a dataset, the dataset may be split into fragments that are distributed among different nodes of a network for storage. The fragments may then be retrieved as and when needed and re-assembled. The method allows multiple different fragments to be stored and re-assembled on demand. The dataset is initially stored in a user computing device in communication with a data storage system and a custodial entity. The fragments are stored so that no single computing entity in the storage system or the custodian ever contains or gains knowledge of all the fragments. Additionally, the user computing device that was initially in possession of the dataset and which caused the fragments to be stored in the storage system may be replaced with different user computing devices without losing the capability of storing and re-assembling the user data on demand by the replacement user computing device.
20210029126, "Systems and methods of salutation protocol to communicate using a private overlay peer to peer network," assigned to Whitestar Communications, Inc.
The systems and methods of modeling a private network communication, comprising: associating a with a digital identity of a first profile; allowing access by other profiles with digital invitation only; optionally adding another profile to the blacklist by default when a request to communicate is initiated without a digital invitation; sharing the credentials after authentication of the digital invitation; receiving an encrypted digital relationship request from a second profile for the first profile with an embedded temporal key; decrypting the temporal key and a digital identity of the requestor; sending an authenticated response from the first profile and performing one of the following: adding the second profile to a whitelist and communicating with the second profile using a secure channel if it determined that the authenticated response signal acceptance; or adding the second profile on a blacklist when the request is not desired or fails verification.