Last 24 hours has been rich in patents. According to the U.S. Patent and Trademark Office (USPTO), two patents connected with blockchain technology solutions were received by Amazon, an e-commerce creation of Jeff Bezos, and another one now belongs to Xerox, American global company, specialized in selling solutions for print and digital documents.
What are the Amazon patents about?
The first patent is related to the theme of signature delegation. The following document describes the protective method of the digital signatures integrity with the “Merkle Tree” system arranging all the cryptographic keys.
That is a hash-based extensive structure, in the case with Amazon it decides how delegate signing authority from a central party to any of subordinates ones that are empowered to sign on its behalf.
The mechanism of the technology is outlined in the following way:
“The signature authority provides a key-distribution service that distributes blocks of cryptographic keys to authorized signing delegates. An authorized signing delegate contacts the key-distribution service and requests a block of cryptographic keys.”
The second patent is connected with the distributed data storage improvement or “techniques for extending grids”, how it is written in a patent application. As it comes from the patent abstract, the technology can solve the problem of the storage overcapacity, providing maximum accessibility, endurance and means of recovery to any blockchain-based project.
“One or more grids of redundancy coded shards, such as those stored or otherwise represented on grid encoded storage systems, are configured to be extensible. (…) A grid of shards so configured may include data shards and derived shards in one set of columns of the grid, and the null shards in another set of columns of the grid.”
What about the Xerox patent?
The new patent of Xerox, connected with blockchain technology, provides a technology that can become the way of electronic documents auditing in any sphere of life, from medicine to criminal investigations. Owing to the new mechanism, it will be possible to understand if a file has been changed or not, and it will also show the history of modifications made.
“If an invalid block is detected, the system can send an auditing alert to the network. The audit log can be strongly resistant to tampering, providing reliable evidence for use in audit compliance, investigations, and business or court record keeping.”