G06Q20/382

Physical Item Control
20230022234 · 2023-01-26 · ·

The present invention relates to systems and methods for physical item control. The invention further relates to a technological coordination layer protocol for representation of a physical item on a blockchain by a physically backed token minted when the physical item is transferred by its owner or possessor to a guardian user of the protocol. The guardian user delivers the item to a physical location when the physically backed token is burned. While the physical item is in the possession of the guardian user, the condition of the physical item is verified through on-chain audits. The protocol can provide tokens to compensate guardian users.

Split Secret Cryptography Based Security in IoT Implemented Payment Transactions or Credentials

The invention provides methods, systems and computer program products for securely provisioning an internet-of-things (IoT) device for implementing an electronic payment transaction. The invention comprises (i) retrieving a first credential element from the client device, and a second credential element from a router, (ii) generating payment credential data by applying split secret cryptography based reconstruction to the first credential element and the second credential element, (iii) retrieving a unique identifier associated with the IoT device, (iv) generating a combined data element comprising the payment credential data and the unique identifier associated with the loT device, (v) applying split secret cryptography based splitting to the combined data element to generate a first verifiable secure element and a second verifiable secure element, (vi) storing the first verifiable secure element and the retrieved unique identifier within the router, and (vii) storing the second verifiable secure element within the IoT device.

SYSTEM AND METHOD FOR DETECTING APPLIANCE TAMPERING
20230029114 · 2023-01-26 ·

An appliance includes an external communication port, such as an RJ45 port, and a wireless communication module in wireless communication with a remote server through an external network. A controller is configured to detect port activity at the external communication port, e.g., by detecting a plug-in or data transfer, transmit a notification of the port activity to the remote server using the wireless communication module, receive an activity assessment, e.g., such as an activity approval or disapproval, from the remote server, and adjust at least one operating parameter of the appliance in response to the activity assessment.

Hardware and token based user authentication

Systems and methods for data visualization are disclosed. An example method includes: obtaining, via a user device, first user biometric data from a user; comparing the first user biometric data with first stored user biometric data. The first stored user biometric data are stored in a hardware secure element of the user device. The method further includes: determining that the first user biometric data matches the first stored user biometric data; and in response to the determining, transmitting a payment token to a merchant device. The payment token is configured to enable a payment to be made from a payment account associated with the user to a merchant associated with the merchant device.

TOKENIZED CONTROL OF PERSONAL DATA
20230230067 · 2023-07-20 ·

A device and method for managing personal data. A request for an identifier (ID) token corresponding to a user is received from a virtual wallet. The ID token is generated and transmitted to the virtual wallet, where the ID token is then presented to a third-party entity by a device of the user. A request for the personal data corresponding to the ID token is received from the third-party entity. A trustworthiness score is determined that corresponds to the third-party entity based at least in part on an analysis of entity data corresponding to the third-party entity. The trustworthiness score and received request are transmitted to the virtual wallet and passed on to the user device. An indication of acceptance of the request and encrypted personal data associated with the generated ID token are received from the virtual wallet and transmitted to the third-party entity for processing.

Blockchain-based data verification method, apparatus, and electronic device
11562375 · 2023-01-24 · ·

The present application provides blockchain-based anti-counterfeiting methods, apparatuses, and systems. One method includes: obtaining an anti-counterfeiting verification request submitted by a user for a product; initiating anti-counterfeiting verification of the product in response to the anti-counterfeiting verification request, wherein the anti-counterfeiting verification comprises integrity verification of anti-counterfeiting information generated by a plurality of anti-counterfeiting participants on a blockchain, wherein the anti-counterfeiting information comprises a plurality of types of anti-counterfeiting identification information corresponding to the product; and returning an anti-counterfeiting verification result for the product to the user.

SYSTEMS AND METHODS FOR PROVIDING REAL-TIME WARNINGS TO MERCHANTS FOR DATA BREACHES

The disclosed embodiments provide systems and methods for providing real-time warnings to merchants for data breaches. For example, the system may include one or more memory devices storing instructions and one or more processors configured to perform operations consistent with this disclosure. The operations may include collecting and storing transaction authorization requests from one or more merchants. The transaction authorization requests may include a virtual account number associated with an account, the virtual account number being previously bound to a merchant and reusable only for the bound merchant. The operations may further include detecting an event at the bound merchant based on, for example, a transaction authorization request having a mismatch between a transacting merchant and the bound merchant. The operations my further include communicating notification of the event through a communication interface with the bound merchant.

System and method for maintaining a distributed ledger

A method of maintaining a distributed ledger at a client node includes: storing a distributed ledger defining a plurality of records each containing a set of values; storing (i) a local voting weight corresponding to the client node, and (ii) respective remote voting weights for a plurality of remote client nodes; obtaining a proposed update to a record of the distributed ledger; generating a local vote to apply or discard the proposed update and transmitting the local vote to the remote client nodes; receiving remote votes to apply or discard the proposed update from the remote client nodes; determining whether to permit the proposed update based on (i) the local vote and the local voting weight, and (ii) the remote votes and the corresponding remote voting weights; and according to the determination, applying the proposed update to the distributed ledger or discarding the proposed update.

OFFLINE COIN PROTOCOL
20230230071 · 2023-07-20 ·

Methods, apparatus and systems for verifying coin ownership are disclosed. In an embodiment, a coin service provider identifies an online session initiated by a wallet application and a next coin to verify, receives information associated with the next coin from a wallet application, determines that ownership of the next coin was transferred out of the wallet application since the last time coins in the wallet application were verified and that ownership of the next coin has not been updated in a coin data store. The coin service provider then transmits a prompt to the user device for the user to confirm that a transaction involving the next coin completed successfully, receives a confirmation message from the user device, confirms that the next coin was received by a recipient, and next updates ownership information of the next coin in the coin data store.

Blaze non-browser based application for purchasing digital products
11704642 · 2023-07-18 · ·

A method and system for conducting an online payment transaction through a point of sale device. The method includes receiving input from a user selecting an item for purchase through the point of sale device; calculating a total purchase amount for the item in response to a request from the user to purchase the item; and sending payment authorization for the total purchase amount from the point of sale device to a payment entity, in which the payment authorization is sent to the payment entity via a mobile communication device of the user. The method further includes receiving a result of the payment authorization from the payment entity through the mobile communication device; and completing the payment transaction based on the result of the payment authorization.