G06Q20/383

Modular automated transaction machine

An automated transaction machine can include a user-interface device, a computing device, a battery, a head portion, a first socket-half, a first electrical rail, and a relay. The a user-interface device can be configured to receive an input from a user and transmit the input. The computing device can receive the input. The battery can selectively direct electric power to the user-interface device and the computing device, which can all be housed in the head portion. The first socket-half can be exposed on an outside surface of the head portion and direct power to the user-interface device, the computing device, and the battery. The relay can be arranged to connect the battery and the first electrical rail in a first configuration and be switched between the first configuration and the second configuration by an output signal of the first socket-half.

Retrieving hidden digital identifier

A method of providing access to securely held data is provided. A user interacts with the service provider to obtain access to a service by using a device to provide a digital identifier to the service provider, without the digital identifier being made known to the user. At a later date the user wishes to retrieve securely stored data relating to their use of the service. However, because the user does not know the digital identifier, they are unable to identify themselves to the service provider using the digital identifier. The present disclosure provides a secure method for exchanging private identifiers, which allows the user to identify themselves to the service provider in order to gain access to securely stored data relating to the user's previous use of the service. The user can do this using the device on which the digital identifier is stored, or another device.

METHOD AND APPARATUS FOR REMITTANCE SERVICE

A method and apparatus for a remittance service are disclosed. An operation method of a server providing a remittance service includes receiving, from a remitter participating in an anonymous chatroom by using a first temporary profile, a request for a remittance to a second temporary profile participating in the anonymous chatroom, verifying a remittance qualification of an account of the remitter, generating remittance transaction information for remitting an amount corresponding to the remittance request to an account of a remittee corresponding to the second temporary profile, and transmitting, to the account of the remittee a remittance notification including information on the first temporary profile as remitter information.

SYSTEMS AND METHODS FOR MANAGING CRYPTOCURRENCY

A system for managing and using digital financial assets, such as cryptocurrency uses multiple independent devices that mutually cooperate to control cryptocurrency assets in a secure manner. Each of these devices may store a unique private key associated with the cryptocurrency assets, which may be configured such that a certain minimum number of these private keys are required to transfer the cryptocurrency assets. The use of multiple private keys spread across multiple distinct devices may reduce the likelihood of loss stemming from a hardware failure or reduce the likelihood of an attacker successfully gaining access to the cryptocurrency assets. In addition, selection of the devices to be used for storing these private keys, as well as how many private keys are required to authorize a transaction, may be tailored to balance a user's preferences for reliability of access versus security and for third-party custody versus self-custody.

SYSTEMS AND METHODS FOR PRIVATE NODE-LEVEL DATA COMPUTING AND RECONCILIATION

Aspects and embodiments are directed to method and system for node based reconciliation. Various aspects also provide for real-time securities exchange while supporting cash based transactions. Additional aspects incorporate improved user interfaces for enabling single selection investment decisions for all of a clients' wealth.

Secure and anonymized digital transactions

Described herein are methods and systems for anonymizing and securing digital transactions. These methods and systems describe a server that monitors web applications executing on a user device. Responsive to the web application displaying an input element requesting personally identifiable information of a user, the server inputs encoded user data corresponding to the input element, whereby a web application server hosting the web application does not receive the personally identifiable information of the user. The server then generate an optical code representing the personally identifiable information. Responsive to receiving a request for the personally identifiable information from a shipping entity computing device that scanned the optical code, the server first verifies the shipping entity computing device and then presents the personally identifiable information for display on the shipping entity computing device.

SYSTEMS AND METHODS FOR OBSCURING CONTENT IN ELECTRONIC MESSAGES
20220398646 · 2022-12-15 ·

Some of the electronic messages transmitted post-purchase to the purchaser of a gift may include content that is of interest to the gift recipient. However, not all of the content in a message suitable for the purchaser might be suitable for a message to the gift recipient. In some embodiments, content may be obscured in a message for a given recipient. The obscuring may be implemented through at least one of: hiding, omitting, masking/obfuscating, or modifying the content presented. In some embodiments, a message is generated without having regard to the possible message recipients, and includes fields tagged to associate each field with a respective one or more recipients. For each recipient, a message is generated and transmitted in which the content that does not have a tag associated with that recipient is obscured.

MANAGEMENT OF ERASURE OR RETENTION OF USER DATA STORED IN DATA STORES

Techniques for managing erasure of data are presented. In response to receiving a request for erasure of data from a set of data stores, an erasure component can analyze a set of rules and information relating to the user account, including an account status and erasure hold status associated with the user account. The set of rules can be based on legal or contractual obligations applicable to the set of data stores, and can indicate various conditions under which data associated with a user account of a user can be eligible to be erased from the set of data stores or an associated data vault repository. The erasure component can determine eligibility for erasure of all or a portion of the set of data from the set of data stores based on the analysis results. Erasure component can determine erasure eligibility scores to pre-qualify user accounts for erasure eligibility.

Method and system for generalized provenance solution for blockchain supply chain applications

A method for conveying auditable information regarding provenance of a product that is cryptographically accurate while retaining complete anonymity of product and participant on a blockchain includes: receiving a product identifier; generating a digital token by applying a hashing algorithm to the product identifier; generating an entry value by applying the hashing algorithm to a combination of an event identifier and the digital token; generating a digital signature by digitally signing a data package using a private key of a cryptographic key pair, where the data package includes at least a blockchain address, the event identifier, and the digital token; and transmitting the blockchain address, the digital signature, and the entry value to a node in a blockchain network.

System and method using zero knowledge proofs for alert sharing
11514439 · 2022-11-29 · ·

Securely sharing proof of knowledge of information without revealing the information, for example to allow an institution to prove it has knowledge regarding an alert. Code or software may be generated (at a first computer system) which takes as input one or more details regarding an entity and returns a value based on a match to one or more actual details regarding the entity. A name may be generated for the code based on information describing the entity, and the code may be published to a blockchain, along with at least one key corresponding to the code. For each name an entry may be creating in an index, converting the name to a blockchain address. A proof based on the code may be generated at a second computer system, which, if verified, results in the first institution and the second institution sharing information regarding the entity.