Patent classifications
G06Q20/383
Method and system for risk scoring anonymized transactions
A method for risk scoring a blockchain transaction includes: storing blockchain data associated with a blockchain, the data including a plurality of blocks, each block including a block header and transaction values, each transaction value including a sending address, recipient address, and transaction amount; receiving a new transaction value related to a proposed blockchain transaction and a node identifier associated with a node included in a blockchain network associated with the blockchain, the new transaction value including a user address, transacting address, and blockchain amount; identifying transaction values in the blockchain where the sending address or recipient address is associated with a transacting cryptographic key pair also associated with the transacting address; determining a risk score for the proposed blockchain transaction based on at least the data included in each of the identified transaction values and the new transaction value; and transmitting the determined risk score.
Systems and methods for calculating consensus data on a decentralized peer-to-peer network using distributed ledger
The present disclosure relates to methods and systems for calculating consensus data on a decentralized P2P network using a distributed ledger. Embodiments of the present disclosure provide for calculating, by a network node, data values corresponding to market rates associated with the network node, and sharing the data values with other network nodes. The data values from all network nodes are aggregated and a rule set applied to the aggregated data to determine and outlying values. Any network node that submitted an outlying value is designated as an outlier node. Consensus data is calculated based on data values that exclude data values from the outlier network nodes.
Methods and systems for anonymizing and providing access to transaction data
A computer-implemented method for providing presentable transaction data of a product to a user may include obtaining preliminary transaction data of one or more purchasers other than the user; generating itemized transaction data based on the preliminary transaction data; obtaining one or more translation codes from one or more transaction entities; generating standardized transaction data based on the itemized transaction data and the one or more translation codes; retrieving identification data from the standardized transaction data; generating anonymized transaction data based on the standardized transaction data by withholding the identification data; generating presentable transaction data based on the anonymized transaction data; and transmitting, to a device associated with the user, the presentable transaction data.
Digital asset exchange system and related methods
A system is provided as a computer server platform and application programming software installed in primary devices of users for exchanging and trading digital asset securely and anonymously between two users of the system. The digital asset is registered under a device account of a primary device of a user with the system using a unique device account name. The system respects “privacy by design” in GDPR by using device account based-on anonymized data instead of personal account based-on personal data of prior art to ensure the system does not collect, store and process users' personal data in the course of device accounts' set-up and transactions of digital assets.
Commerce systems having integrated electronic delivery features
A method includes conveying a cryptocurrency transaction to a peer-to-peer network, wherein said cryptocurrency transaction having encoded therein an email address and to convey goods or services embodied in an electronic form to the email address in response to receipt of said cryptocurrency transaction on said peer-to-peer network. The conveying of goods or services includes transmitting over the Internet in conformance with an email protocol. The goods or services includes event admission tickets, music recordings, video, text, game content, live event broadcast, software, encryption keys or passwords.
METHOD AND SYSTEM FOR MAINTAINING PRIVACY AND COMPLIANCE IN THE USE OF ACCOUNT REISSUANCE DATA
A method for linking payment accounts includes: storing a plurality of account profiles, each profile including data related to a payment account including an account number and account data; encrypting the account number included in each account profile using a method of encryption to obtain an encrypted account number; receiving account linkage data, the data including a plurality of encrypted account identifiers, each identifier being indicated as being linked to another identifier, and each identifier being encrypted using the method of encryption; matching each of the encrypted account identifiers to an encrypted account number; and updating one or more account profiles to indicate a link to another account profile where the encrypted account number included in the profile being updated matches an encrypted account identifier that is indicated as being linked to an encrypted account identifier that matches the encrypted account number included in the other profile.
SYSTEM AND METHOD USING ZERO KNOWLEDGE PROOFS FOR ALERT SHARING
Securely sharing proof of knowledge of information without revealing the information, for example to allow an institution to prove it has knowledge regarding an alert. Code or software may be generated (at a first computer system which takes as input one or more details regarding an entity and returns a value based on a match to one or more actual details regarding the entity. A name may be generated for the code based on information describing the entity, and the code may be published to a blockchain, along with at least one key corresponding to the code. For each name an entry may be creating in an index, converting the name to a blockchain address. A proof based on the code may be generated at a second computer system, which, if verified, results in the first institution and the second institution sharing information regarding the entity.
SYSTEMS AND METHODS FOR MANAGING CRYPTOCURRENCY
A system for managing and using digital financial assets, such as cryptocurrency uses multiple independent devices that mutually cooperate to control cryptocurrency assets in a secure manner. Each of these devices may store a unique private key associated with the cryptocurrency assets, which may be configured such that a certain minimum number of these private keys are required to transfer the cryptocurrency assets. The use of multiple private keys spread across multiple distinct devices may reduce the likelihood of loss stemming from a hardware failure or reduce the likelihood of an attacker successfully gaining access to the cryptocurrency assets. In addition, selection of the devices to be used for storing these private keys, as well as how many private keys are required to authorize a transaction, may be tailored to balance a user's preferences for reliability of access versus security and for third-party custody versus self-custody.
Method and system for anonymous sending of physical items with possibility of responding
The present invention relates to a method and a system that enable a sender to send one or more physical items to a recipient in an anonymous way, allowing the recipient to respond to the sender after receiving the one or more physical items. No data related to the sender and the recipient are retained in the system.
SECURE DIGITAL SAFE DEPOSIT BOXES AND METHODS OF USE
Systems and methods for secure digital safe deposit boxes are disclosed. In one embodiment, a method for using a secure digital safe deposit box may include: (1) receiving permission from a customer to access internal and third party financial or confidential information for the customer; (2) retrieving the internal financial or confidential information for the customer; (3) receiving account information accounts held with a third party that holds financial or confidential information; (4) jointly authenticating the customer with the third party; (5) receiving the third party financial or confidential information for the customer from the third party; (6) receiving permission to share at least some of the internal or third party financial or confidential information for the customer with an external party; and (7) sharing the internal or third party financial or confidential information for the customer with the external party in accordance with the permission.