Blockchains (smart contracts, distributed ledgers) and rights management broadly construed are the themes of today's Spotlight Applications. Assigned to Flexa, the first application discloses techniques for the assignment of conditional access rights to assignable tokens based on an interaction. Assigned to 707 (HK), the second application discloses techniques for computer-implemented methods for evidencing the existence of a digital document, anonymously evidencing the existence of a digital document, and verifying the data integrity of a digital document.
20220076331, "Assignment of conditional access rights to assignable tokens based on an interaction," assigned to Flexa Network Inc.
Abstract
A method includes initiating, by a first computing device, an interaction with a second computing device. The first computing device includes a first digital asset unit and the second computing device includes a second digital asset unit. The first digital asset unit stores assignable tokens. The method further includes determining to assign conditional access rights to an amount of the assignable tokens to the second digital asset unit where the conditional access rights are in accordance with a set of conditions. The assignment of conditional access rights is a self-enforcing smart contract embedded in an assignable token distributed ledger technology. The method further includes locking the amount of the assignable tokens stored in the first digital asset unit and providing the conditional access rights to the amount of the assignable tokens to second digital asset unit. The second digital asset unit does not store the amount of the assignable tokens.
20220078008, "Computer-implemented methods for evidencing the existence of a digital document, anonymously evidencing the existence of a digital document, and verifying the data integrity of a digital document," assigned to 707 Limited (HK).
Abstract
Improved computer-implemented methods for evidencing the existence of a digital document, anonymously evidencing the existence of a digital document, database management for systems for evidencing the existence of a digital document, and verifying the data integrity of a digital document provide increased reliability, security and enhance trust from users and third parties.