G06Q20/383

SYSTEMS AND METHODS FOR SECURING AND GENERATING REAL-TIME PRODUCT DATA STREAMS TO ENABLE LOW-LATENCY TRANSACTIONS
20220237673 · 2022-07-28 ·

The present disclosure includes systems and methods for generating real-time high-frequency product data stream to enable low-latency transactions based on inventory data available from one or more third-party seller platform servers executing a platform that lists a plurality of products. The systems and methods of the present disclosure provide sanitized real-time high-frequency product data stream that is actionable and can be shared with third-party market participants. The system and methods can secure the system that facilitates low-latency transactions using firewalls and access control rules that compartmentalizes access to information using multiple data layers for the sub-systems.

Method and system for double anonymization of data

A method for double anonymization of data includes: receiving, by a first computing system, a plurality of first data sets, each including a set identifier and personally identifiable information; anonymizing, by the first computing system, each of the first data sets, by hashing the set identifier included in each first data set to obtain a hashed identifier and deidentifying the personally identifiable information; transmitting, by the first computing system, the plurality of anonymized first data sets to a second computing system, wherein the second computing system is distinct and separate from the first computing system; anonymizing, by the second computing system, each of the anonymized first data sets, by hashing the hashed identifier to obtain a double-hashed identifier; and storing, in the second computing system or a third separate and distinct computing system, the plurality of double anonymized first data.

Systems and methods for using a transaction identifier to protect sensitive credentials

Embodiments of the invention are directed to systems and methods of securely transmitting account credentials, such as a token. A user device and application can initially select an account, and then obtain a transaction identifier associated with the account. The user device can provide the transaction identifier to a resource provider, which can then directly exchange the transaction identifier for the account credentials.

Secure digital safe deposit boxes and methods of use

Systems and methods for secure digital safe deposit boxes are disclosed. In one embodiment, a method for using a secure digital safe deposit box may include: (1) receiving permission from a customer to access internal and third party financial or confidential information for the customer; (2) retrieving the internal financial or confidential information for the customer; (3) receiving account information accounts held with a third party that holds financial or confidential information; (4) jointly authenticating the customer with the third party; (5) receiving the third party financial or confidential information for the customer from the third party; (6) receiving permission to share at least some of the internal or third party financial or confidential information for the customer with an external party; and (7) sharing the internal or third party financial or confidential information for the customer with the external party in accordance with the permission.

Methods and system for serving targeted advertisements to a consumer device

A method for auditing an advertisement impression in which a first advertisement was presented in conjunction with first media content is disclosed. The method generally comprises transmitting to a plurality of second computing devices a plurality of randomly generated first cryptographic proofs; receiving, a first message from a second computing device indicating that the first advertisement was presented in conjunction with the first media content; and evaluating the first targeting model for the first advertisement based on the at least one media content classifier.

Electronic trade processing system and method

In one implementation, a computer-implemented method, executed on a computing device and configured to effectuate a trading platform, includes: maintaining an omnibus (multi-client) cryptocurrency trading wallet for a plurality of clients; and maintaining a segregated (individual-client) cryptocurrency transfer wallet for each of the plurality of clients, thus defining a plurality of segregated (individual-client) cryptocurrency transfer wallets.

SYSTEMS AND METHODS FOR EFFECTIVELY ANONYMIZING CONSUMER TRANSACTION DATA
20220230164 · 2022-07-21 ·

Systems and methods are described for anonymizing personal information of consumers in a manner that protects against de-anonymization by a third party. In an embodiment, a system includes a data anonymizing subsystem and a payment transaction subsystem. A data preparation engine of the data anonymizing subsystem receives, from the payment transaction subsystem, consumer transaction data comprising personal information of a plurality of consumers and item identifiers, prepares the consumer transaction data and transmits the prepared consumer transaction data to an anonymization engine which receives and anonymizes the prepared consumer transaction data. In particular, the anonymization engine groups consumers associated with the prepared consumer transaction data into a plurality of consumer groups, quantifies a similarity between the plurality of consumer groups, combines the plurality of consumer groups, and discards all the consumer groups that contain less than a threshold number of consumers. A reporting engine then transmits the anonymized consumer transaction data to a third party device for consumer transaction analysis.

SYSTEM AND METHOD FOR MATCHING PATRONS, SERVERS, AND RESTAURANTS WITHIN THE FOOD SERVICE INDUSTRY
20220230122 · 2022-07-21 · ·

A system and method of combining table management software and customer experience skills by generating profiles of patrons, servers, and restaurants by using machine learning algorithms on and location data in those profiles to build more intimate relationships between patrons, food service establishments, and food service professionals. Trait matching provides optimized matchmaking between patrons and servers who share certain commonalities or affinities while also balancing the table management operations. Machine learning algorithms may be used to identify patterns of commonality that would not otherwise be recognized. This system allows patrons to choose servers at an establishment over a plurality of electronic devices by using the cluster analysis results. It provides servers more lateral work experience between participating restaurants, and restaurants more power to operate smoothly and build highly cohesive teams.

SYSTEMS AND METHODS FOR TRANSACTION PRIVACY SHIELD
20220230168 · 2022-07-21 ·

A financial institution computing system includes a network circuit exchanging information over a network, a customer database storing financial information for a plurality of users, and a privacy shield circuit. The privacy shield circuit receives, over the network via the network circuit, a privacy shield request from an authorized user of a financial account via a user computing device. The privacy shield circuit generates a user alias for the authorized user of the financial account. The privacy shield circuit associates the user alias with the financial account in the customer database for use in conjunction with a subsequent transaction. Use of the user alias in conjunction with the subsequent transaction includes using the user alias for at least one of an authentication procedure and providing requested information to a merchant. The privacy shield circuit transmits the user alias to the user computing device over the network via the network circuit.

DIGITAL ASSET EXCHANGE SYSTEM AND RELATED METHODS
20210406865 · 2021-12-30 · ·

A system is provided as a computer server platform and application programming software installed in primary devices of users for exchanging and trading digital asset securely and anonymously between two users of the system. The digital asset is registered under a device account of a primary device of a user with the system using a unique device account name. The system respects “privacy by design” in GDPR by using device account based-on anonymized data instead of personal account based-on personal data of prior art to ensure the system does not collect, store and process users' personal data in the course of device accounts' set-up and transactions of digital assets.