Patent classifications
G06Q20/383
TRANSFERABLE VALUE OR RIGHTS TOKEN
A transferable value or rights token where the value or rights can be passed from entity to entity as required in a secure fashion. The value or rights passed in the tokens is held by the users in pockets directed by means of a controller device. The tokens are anonymous but the users need to be authenticated in order to gain access to their pockets. The tokens can be stored off-line and passed between users as required at which point the final receiver can go on-line to load or verify the token.
Tokenization for Network Authorization Routing
A tokenization system that includes a tokenizer, a token and alias directory, and a network node. The tokenizer is configured to generate tokens. The token and alias directory is configured to store tokens. The network node is configured to receive user information for a user and to determine a membership for an institution associated with the user based on the user information. The network node is configured to send an authorization request to an authorization processer in response to determining that the membership for the institution associated with the receiver indicates an in-network institution and to receive an authorization approval in response to sending the authorization request. The network node is further configured to send a token request to the tokenizer, to receive a token in response to the token request, and to store the token in the token and alias directory.
Masking a primary account number between a party and a service provider
A computer implemented method for masking a primary account number between a party and a service provider. A plurality of transaction records from a database is retrieved. A masking value is generated in response to having a first hash function executed on a primary account number. The receiving, at the service provider, the masking value from the client execution environment without the primary account number; wherein the server execution environment lacks identification of the affiliation between the primary account number and the party. Upon confirming that the first hash function is identical to the second hash function, matching the masking value to the second masking value. In response to a match, querying the database for transaction history associated with the masking value. An analysis report is generated.
METHOD AND SYSTEM TO ANALYTICALLY OPTIMIZE TELEHEALTH PRACTICE-BASED BILLING PROCESSES AND REVENUE WHILE ENABLING REGULATORY COMPLIANCE
A computer-implemented system includes a treatment apparatus configured to be manipulated by a patient while performing a treatment plan and a server computing device configured to execute an artificial intelligence engine to generate the treatment plan and a billing sequence associated with the treatment plan. The server computing device receives information pertaining to the patient, generates, based on the information, the treatment plan including instructions for the patient to follow, and receives a set of billing procedures associated with the instructions. The set of billing procedures includes rules pertaining to billing codes, timing, constraints, or some combination thereof. The server computing device generates, based on the set of billing procedures, the billing sequence for at least a portion of the instructions. The billing sequence is tailored according to a certain parameter. The server computing device transmits the treatment plan and the billing sequence to a computing device.
ANONYMOUS MESSAGING IN AN INSTANT MESSAGE GROUP CONVERSATION
A message is created, by a first device associated with a first attendee, for an instant message group conversation among a plurality of attendees that includes the first attendee. At least one non-anonymous attendee and at least one anonymous attendee of the plurality of attendees are identified. The message is transmitted, by the first device to devices associated with others of the plurality of attendees. A response is received, by the first device as part of the instant message group conversation, to the message from a second device associated with the at least one anonymous attendee who is not identified, to at least one attendee of the plurality of attendees, as an author of the response.
Privacy-Preserving Decentralized Multi-Party Netting
A method for a fully distributed privacy-preserving multi-lateral netting between parties is disclosed. The method comprising collecting pending transactions between at least a part of the parties, publishing a commitment of pending transactions to a bulletin board, secretly sharing de-commitments among the parties, and publishing, by each party, its determined liquidity status, to the bulletin board. Furthermore, the method comprises upon determining a failure in the publishing of any liquidity status, performing the following MPC by determining whether all pending transactions are settable maintaining positive liquidity for each party, and upon determining a failure in the determining, for each party, whether all pending transactions are nettable determining an optimized subset of transactions that are nettable without violating liquidity requirements for each party.
Primary account number (PAN) length issuer identifier in payment account number data field of a transaction authorization request message
Transaction data is obtained relating to a current purchase transaction. An account indicator is retrieved. The transaction data is used to transform the account indicator. The transformed account indicator is encrypted to generate an encrypted account indicator.
Systems and methods for creating subtokens using primary tokens
According to one embodiment of the invention, a subtoken corresponding to a primary token is generated. The primary token corresponds to a credential. The credential may be, for example, a primary account number (PAN) corresponding to a payment account. The subtoken may be a temporary, one-time use subtoken based on a primary token associated with the credential that allows a user to conduct a transaction from his or her account, while still providing security for the user's sensitive data. The subtoken may contain a header and an obfuscated portion. The header of the subtoken routes the subtoken to the entity issuing the subtoken for translation into the primary token. The obfuscated portion acts as a pointer to the primary token and data associated with the primary token. A same check digit may be included in the subtoken, the primary token, and the credential, in order to ensure that the transaction is not improperly denied.
METHODS AND SYSTEMS FOR FACILITATING ANONYMOUS PURCHASES
In an embodiment, a merchant server receives, from a client device, an order message identifying an ordered product having a purchase price. The merchant server generates an order identifier associated with the ordered product and sends, to the client device an order-response message that includes the generated order identifier. The merchant server receives, from the client device, an order-arranged message that includes a payment-arranged message (having a payment amount, the order identifier, and a digital signature of a financial institution) and a delivery-arranged message (having delivery-plan data and a digital signature of a courier). The merchant server verifies the respective digital signatures of the financial institution and the courier, and generates and outputs transfer instructions for the ordered product based at least in part on the delivery-plan data.
Layered masking of content
Methods, systems and computer program products for layered masking of data are described. A system receives content including personally identifiable information (PII). The system redacts the content by masking the PII. The system identifies the PII in multi-layer processing, where in each layer, the system determines a respective confidence score indicating a probability that a token is PII. If the confidence score is sufficiently high, the system masks the token. Otherwise, the system provides the token to a next layer for processing. The layers can include regular expression based processing, lookup table based processing, and machine learning based processing.