Blockchains (smart contracts, distributed ledgers) and rights management broadly construed are the themes of today's Spotlight Applications. Assigned to Jiangsu Aowei Holdings (CN), the first application discloses techniques for transaction-based electronic contract forensics. Assigned to the Royal Bank of Canada, the second application discloses techniques for an electronic identity brokerage.
20220045863, "Transaction mode-based electronic contract forensics method and system," assigned to Jiangsu Aowei Holdings Co., Ltd. (CN)
The present application provides a transaction-based electronic contract forensics method and system: when a user wants to perform forensics for an electronic contract in a blockchain digital deposit platform, initiating, by a present electronic contract platform, a forensics request for the electronic contract; obtaining, by the blockchain digital deposit platform, the forensics request and querying deposit information; obtaining a transaction hash value of the deposit information after the deposit information is queried; querying a deposit transaction corresponding to the deposit platform; obtaining a digest; decrypting the digest, to obtain a storage index table; verifying validity of a private-key signature of the deposit transaction; downloading transaction data of the deposit transaction according to a data index; decrypting the transaction data; and verifying validity, legitimacy, and integrity of the decrypted transaction data. A data source of electronic contract forensics is ensured by querying the deposit information and the corresponding deposit transaction, and credibility of electronic contract forensics is ensured by verifying the validity, the legitimacy, and the integrity of the transaction data, thereby achieving an electronic contract forensics process.
20220045861, "System and method for an electronic identity brokerage," assigned to the Royal Bank of Canada (CA).
A computer implemented system for electronic verification of credentials including at least one processor and data storage is described in various embodiments. The system includes cryptographic mechanisms and electronic communication between one or more computing systems that in concert, provide verification of a prover's credentials in accordance to logical conditions of a verifier's policy without providing additional information to a verifier entity.