Smart contracts, blockchains (distributed ledgers), and rights management broadly construed are the themes of today's Spotlight Patents. Assigned to Wells Fargo, the first patent addresses techniques for disparate quantum computing threat detection. Assigned to Ericsson (SE), the second patent addresses techniques for managing service access authorization using smart contracts.
11,334,667, "Systems and methods for disparate quantum computing threat detection," assigned to Wells Fargo Bank, N.A.
Abstract
Systems, methods, and computer program products are provided for disparate quantum computing (QC) detection. An example system includes QC detection data generation circuitry that generates a first set of QC detection data and generates a second set of QC detection data. The system also includes cryptographic circuitry that generates a first public cryptographic key and a first private cryptographic key via a first post-quantum cryptographic (PQC) technique and generates a second public cryptographic key and a second private cryptographic key via a second PQC technique. The cryptographic circuitry further generates encrypted first QC detection, second QC detection data, and destroys the first private cryptographic key and the second private cryptographic key. The system further includes data monitoring circuitry that monitors for the first encrypted QC detection data and the second encrypted QC detection data.
11,336,735, "Method and apparatus for managing service access authorization using smart contracts," assigned to Ericsson (SE)
Abstract
Methods and systems for authorizing the access of a service are described. A server is operative to receive a request to subscribe to a service. The server is to receive from the requestor a selected service offer from the set of service offers, where the selected service offer is cryptographically signed with the private key of the requestor and the private key of the service. The server is further to record a delegation contract into a blockchain database, where the delegation contract includes an identification of the service, an identification of the requestor, and the service offer that is cryptographically signed with the private keys of the requestor and the service. The server is to transmit, to the requestor, a confirmation that the service can be accessed based on the selected service offer; and transmit to the service the delegation contract causing the service to provide access to the requestor.