IBM Issued Patent for DLT-Supported Data Sharing and Validation
Tech giant IBM has been awarded a patent for a mobile data sharing method that involves a distributed ledger.
Tech giant IBM has been awarded a patent for a mobile data sharing method that uses distributed ledger technology (DLT), according to documents published by the United States Patent and Trademark Office (USPTO) on April 23.
The product described in the filing represents a continuation of U.S. patent application filed in November 2017 entitled “Information Sharing Among Mobile Apparatus.” IBM proposes a method executed by a mobile apparatus to verify information that has been shared between two devices.
In detail, the platform can collect specific information and deliver it to nearby computing nodes, with subsequent publishing of a verified incident event on a distributed ledger. The collected data is further used to map information updates.
Objects connected within the proposed system would reportedly share event information among multiple mobile devices with a secure reliability and without providing a trusted third party. The document explains:
“Connected objects can be sensed and/or controlled remotely across existing network infrastructure, integrating connected physical objects into computer-based systems. Connected physical objects are uniquely identifiable through their embedded computing system, allowing the connected physical objects to interoperate within the existing Internet infrastructure.”
The patent is just the most recent in the long list of blockchain-related patents either filed or received by IBM in recent months. Earlier in April, IBM added a new implementation to manage data and interactions for self-driving vehicles (SDVs) to its arsenal of blockchain patents. The products appears to be a system, wherein an SDV interacts and predicts the behavior of drivers of non-autonomous vehicles nearby.
In March, Cointelegraph reported about an IBM patent for an application that aims to improve the security of permissioned blockchain networks. In the filing, IBM outlined security techniques for withstanding replay attacks while maintaining valid user permissions and privacy.