Smart contracts, (blockchains, distributed ledgers) and rights management broadly construed are the themes of today's Spotlight Patents. Assigned to Capital One, the first patent addresses techniques for accessing a smart contract library that may include a number of templates of different legal contracts implementable as a smart contract between respective parties. Assigned to Wells Fargo, the second patent addresses techniques for post-quantum cryptography optimization.
11475453, “System and techniques for utilizing a smart contracts library,” assigned to Capital One.
Disclosed are techniques and an apparatus for accessing a smart contract library that may include a number of templates of different legal contracts implementable as a smart contract between respective parties. Each template may include a number of sections having different contractual terms and conditions and fillable fields for specific contract terms. Each respective section of the number of sections includes programming code operable to enforce conformance with specific section-related contractual terms and conditions of the respective section and with any specific contract terms input to a fillable field of the respective section. A first user address generated based on cryptographic keys may be associated with a contract-creating computing device in a private blockchain. The first user address may be associated with the first user in the private blockchain. A finalized smart contract may have a smart contract address generated from the first user address and a nonce value.
11477016, “Systems and methods for post-quantum cryptography optimization,” assigned to Wells Fargo Bank.
Systems, apparatuses, methods, and computer program products are disclosed for post-quantum cryptography (PQC). An example method includes receiving data, a set of data attributes about the data, and a risk profile data structure indicative of a vulnerability of the data in a PQC data environment. The example method further includes retrieving PQC cryptographic performance information associated with a set of PQC cryptographic techniques. The PQC cryptographic performance information may comprise a set of PQC cryptographic performance attributes for each PQC cryptographic technique in the set of PQC cryptographic techniques. The example method further includes generating a set of PQC encryption attributes for encrypting the data based on the set of data attributes, the risk profile data structure, and the PQC cryptographic performance information. Subsequently, the example method includes encrypting the data based on the set of PQC encryption attributes.