Blockchains (smart contracts, distributed ledgers) and rights management broadly construed are the themes of today's Spotlight Patents. Assigned to PricewaterhouseCoopers, the first of today's patents addresses techniques for a cryptoconomy solution for administration and governance in a distributed system. Assigned to Coinplug (KR), the second patent addresses techniques for providing an authentication service by using a decentralized identity (DID) application of a first user device, a mobile device.
11,010,729, "Cryptoconomy solution for administration and governance in a distributed system," assigned to PricewaterhouseCoopers LLP
A computer-implemented process, system, and computer readable medium are provided for administration and governance of fiat and cryptocurrency funds in a distributed computer system. In one example, a process includes, at an electronic device with one or more processors and memory, accessing a list of a plurality of participant nodes, which may include a fund administrator receiving a list of participants or nodes. The method further includes transferring crypto-currency (e.g., that is pegged to U.S. dollars, local currency, or the like) to one or more of the participant nodes. Each of the participant nodes may include an interface portal (e.g., a web-portal) for viewing transferred crypto-currency and for transacting (e.g., bidding, soliciting, etc.) with other participant nodes of the list of participant nodes with the crypto-currency.
11,012,233, "Method for providing authentication service by using decentralized identity and server using the same," assigned to Coinplug, Inc. (KR).
A method for providing an authentication service by using a decentralized identity (DID) application of a first user device, a mobile device, is provided. The method includes steps of: (a) if a signature verification value is transmitted from a service provider server in response to a DID service requested by a second user device, a DID authentication server transmitting the signature verification value to the DID application so that the DID application transmits a user signature and a user DID to the DID authentication server, and (b) verifying the user signature by using a user public key and transmitting signature verification result information to the service provider server, or transmitting the user signature and the user DID to the service provider server, to allow the service provider server to verify the user signature by using the user public key, to thereby provide the DID service to the second user device.