G06Q20/383

Generating reports from information within a zero-knowledge data management network

The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.

Digital security violation system

A computing system determines that a third party system has been exposed to a digital security violation. The computing system identifies a first user account of a user registered with the computing system that has a corresponding account associated with the third party system. The computing system determines that the first user account has stored a first set of user credentials for the corresponding account associated with the third party system at a storage location accessible by the computing system. The computing system launches a series of web browsers configured to access a first website associated with the third party system. The computing system executes, via a first web browser of the series of web browsers, a first automated script specific to the first website associated with the third party system. The computing system performs at least one of a plurality of remedial operations with respect to the corresponding account.

Systems and methods for making person-to-person payments via mobile client application

Systems and methods include a payer user device including a near field communication transceiver configured to facilitate communications with devices within a threshold range from the payer user device, and a digital payment application that detects one or more payee user devices, receives a selection of a payee user device, receives a tokenized identifier that provides a provider computing system information to identify an account associated with a user of the payee user device, and adds the tokenized identifier to a stored list of payees on the payer user device.

METHOD AND SYSTEM FOR MOBILE CRYPTOCURRENCY WALLET CONNECTIVITY
20230281607 · 2023-09-07 · ·

The method 10 for mobile cryptocurrency wallet connectivity can include facilitating a blockchain transaction S100 and establishing an initial connection between a mobile client and a web client S200. The system 20 for mobile cryptocurrency wallet connectivity can include a browser 110, one or more websites 120, a web client 130, a mobile application 140, and a backend server 150.

REAL-TIME INTERBANK TRANSACTIONS SYSTEMS AND METHODS

Systems, methods, and non-transitory computer-readable media for performing exchanges. One method includes receiving a request identifying a payor account and an amount of funds to transfer an account associated with a customer of the depository bank computing system, determining the request qualifies for a non-inquiry transaction (NIT) protocol, transmitting, by the depository bank computing system to an account verification service computing system over the real-time data channel, a guarantee offer including a payor account token based on the shared account status information, receiving, over the real-time data channel and from the account verification service computing system, an accepted guarantee offer, crediting an account of the customer, receiving, over the real-time data channel, a guarantee override, and reversing the transfer of funds associated with the guarantee.

RETRIEVING HIDDEN DIGITAL IDENTIFIER
20230153465 · 2023-05-18 ·

A method of providing access to securely held data is provided. A user interacts with the service provider to obtain access to a service by using a device to provide a digital identifier to the service provider, without the digital identifier being made known to the user. At a later date the user wishes to retrieve securely stored data relating to their use of the service. However, because the user does not know the digital identifier, they are unable to identify themselves to the service provider using the digital identifier. The present disclosure provides a secure method for exchanging private identifiers, which allows the user to identify themselves to the service provider in order to gain access to securely stored data relating to the user's previous use of the service. The user can do this using the device on which the digital identifier is stored, or another device.

Maintaining security in digital electronic transfers through use of a label tracking system
11658942 · 2023-05-23 · ·

Systems and method for method for increasing security in online transfers by maintaining anonymity of transferors are described herein. In an embodiment, a label tracking system receives a request to generate labels for an account of an account holder. The system generates a plurality of labels in response to the request and send the plurality of labels to an account computing device which stores a mapping of labels to identification information. The system receives an allocation request from the account computing device and stores allocations for each of the generated labels. When the system receives a request to perform a transfer between two labels, without changing any items within the account and without receiving identification information corresponding to the labels, the system updates the labels by decrementing an amount allocated to the transferor label and incrementing an amount allocated to the transferee label.

METHOD AND SYSTEM FOR PRIVATE TRANSACTION PROCESSING

A method for facilitating secure private transfers in a blockchain includes: receiving an initiate message from a device for a proposed private transfer including a private group identifier, entity identifier, and transfer amount; executing a smart contract using the initiate message as input resulting in transmitting an event message to a central authority system including the entity identifier and transfer amount; receiving a response message from the central authority system including an indication of approval or rejection of the proposed private transfer; and executing the smart contract using the response message as input resulting in (i) adding a private blockchain transaction for transfer of the transfer amount from a first blockchain wallet associated with the entity identifier to a second blockchain wallet in a private group associated with the private group identifier if the response message includes an indication of approval, or (ii) declining the proposed private transfer.

CONTROLLING TRANSMISSION OF INFORMATION THROUGH A ZERO-KNOWLEDGE DATA MANAGEMENT NETWORK

The techniques herein are directed generally to a “zero-knowledge” data management network. Users are able to share verifiable proof of data and/or identity information, and businesses are able to request, consume, and act on the data—all without a data storage server or those businesses ever seeing or having access to the raw sensitive information (where server-stored data is viewable only by the intended recipients, which may even be selected after storage). In one embodiment, source data is encrypted with a source encryption key (e.g., source public key), with a rekeying key being an encrypting combination of a source decryption key (e.g., source private key) and a recipient's public key. Without being able to decrypt the data, the storage server can use the rekeying key to re-encrypt the source data with the recipient's public key, to then be decrypted only by the corresponding recipient using its private key, accordingly.

Anonymous Payment Transactions
20220405737 · 2022-12-22 ·

Technology is disclosed for transferring money anonymously between a sender and a recipient by use of a one-time use token. The method includes generating a one-time use token account for association with a one-time use token. The method includes generating the token and providing the token to the sender device in a machine-readable and transferable format. The method includes receiving a request to charge the one-time use token account after the token has been provided to the recipient device as a form of payment for a transaction. The method includes determining that an amount of the transaction is less than an amount of funds associated with the token and that the time of the transaction is within a time period for the use of the token. The method includes facilitating a transfer to the recipient account and deducting the amount of the transaction from a sender account.