G06Q20/383

Methods for conducting electronic payment transactions with scannable codes
11507941 · 2022-11-22 ·

One embodiment of the invention provides for making electronic payments by scanning a merchant 2D code located near the point of sale with the customer's cell phone and transmitting the code or data embodied by the code to a payment center where the merchant's account can be credited and the customer's account debited without transmitting account information over the airwaves. In another embodiment of the invention, both parties transmit the same randomly generated 2D code or data embodied by the code to the payment center where they are matched to each other and to the buyer and seller to process the transaction. In a further embodiment of the invention, an inked tattoo or barcode marking is employed as a password to authorize access to smartphone applications for example, to make an electronic payment over a threshold amount.

SYSTEM AND METHOD FOR DISTRIBUTED STORAGE OF TRANSACTIONS
20220366381 · 2022-11-17 ·

For distributed storage of transactions initiated by an account holder, an account device generates and transmits a request for notaries via a communication network to a plurality of custodian devices. The request for notaries includes an open transaction part with non-encrypted transaction data and an anonymized identifier of the account holder, enabling the custodian devices to store the open transaction part linked to the anonymized identifier. The account device receives via the communication network from the custodian devices a set of appointed notary devices. The account device transmits a notarization request via the communication network to the appointed notary devices. The notarization request includes the open transaction part and an encrypted transaction part with encrypted transaction data, enabling the notary devices to store the encrypted transaction part and the open transaction part.

Systems and Methods for Management of Token Interactions
20230055618 · 2023-02-23 · ·

Systems and techniques to report token-related events within an NFT platform are illustrated. One embodiment includes a method for facilitating use of digital wallets including initiating, in a digital wallet, a view disclosing characterizations of content on a user interface; generating, within the view, one or more partitions; wherein each partition corresponds to a content classification and a set of access rights; and moving one or more icons into a first partition of the one or more partitions; wherein each icon corresponds to a token.

METHODS AND SYSTEMS FOR SHARING A CONSENT TOKEN ASSOCIATED WITH A USER CONSENT AMONG APPLICATIONS
20230060068 · 2023-02-23 ·

Embodiments provide methods and systems for sharing a user consent associated with user consent among applications. Method performed by server system includes storing consent token associated with user in a database based upon receiving consent from the user on the first application to utilize user credential data for subsequent transactions in connection with interaction between a user device and a first application service provider. The method includes receiving a request to access the consent token associated from a second application service provider associated with a second application accessible on the user device, determining whether the second application service provider is able to access the consent token associated with the first application based on access level data set by the first application service provider of the first application for accessing the consent token and allowing access of the consent token to the second application based on the determining step.

Decentralized identification anchored by decentralized identifiers

Generating self-issued claims anchored by DIDs and using the self-issued claims as self-identification. The computing system generates one or more claims, each of which includes at least information related to (1) a DID, (2) a property of a subject entity who is an owner of the DID, and (3) a value corresponding to the property. For each of the one or more claims, the computing system generates a cryptographic signature by signing the claim with a private key associated with the corresponding DID. The cryptographic signature proves that the claim is a self-issued claim, which is issued by the owner of the corresponding DID and is about the owner of the corresponding DID. A portion of data related to the self-issued claim is then propagated onto a distributed ledger.

METHOD AND SYSTEM FOR GENERALIZED PROVENANCE SOLUTION FOR BLOCKCHAIN SUPPLY CHAIN APPLICATIONS

A method for conveying auditable information regarding provenance of a product that is cryptographically accurate while retaining complete anonymity of product and participant on a blockchain includes: receiving a product identifier; generating a digital token by applying a hashing algorithm to the product identifier; generating an entry value by applying the hashing algorithm to a combination of an event identifier and the digital token; generating a digital signature by digitally signing a data package using a private key of a cryptographic key pair, where the data package includes at least a blockchain address, the event identifier, and the digital token; and transmitting the blockchain address, the digital signature, and the entry value to a node in a blockchain network.

CRYPTOCURRENCY SYSTEM HAVING INTEGRATED ELECTRONIC DELIVERY FEATURES
20230049792 · 2023-02-16 ·

A method includes conveying a cryptocurrency transaction to a peer-to-peer network, wherein said cryptocurrency transaction having encoded therein an email address and to convey goods or services embodied in an electronic form to the email address in response to receipt of said cryptocurrency transaction on said peer-to-peer network. The conveying of goods or services includes transmitting over the Internet in conformance with an email protocol. The goods or services includes event admission tickets, music recordings, video, text, game content, live event broadcast, software, encryption keys or passwords.

Address exchange systems and methods

A product exchange system includes a controller and a memory coupled to the controller. The controller is configured to provide an interface configured to receive a request from a first user for purchase of an item; assign a unique transaction code to a transaction associated with the request, wherein a plurality of parties scans the unique transaction code during a process of the transaction; receive a notification in response to the scanning of the unique transaction code by one of a plurality of parties; and trigger an action, upon receipt of the notification, in connection with the one of the plurality of parties.

System And Techniques For Automatic Rapid Benefit Distribution

Described herein are systems and techniques for providing automatic distribution of transaction-related benefits to an account used to conduct a transaction. In certain embodiments, the system receives transaction details from a transaction processing network as transactions are conducted. The system determines an appropriate benefit provider for a transaction conducted from an account and provides a subset of transaction details to that benefit provider. The benefit provider compares the subset of transaction details to a set of limited transaction details received from a resource provider to identify the transaction and determine a benefit amount, if any, for which the transaction qualifies. The benefit provider then provides the benefit amount to the system, which then causes the transaction processing network to credit the account the benefit amount.

IN ONLINE TRANSACTIONS A PAYMENT SYSTEM OR A PAYMENT METHOD USING A CREDIT CARD THAT CAN LINK WITH A URL
20220351184 · 2022-11-03 ·

In online payment using the URL&CC, the routes of the payment request process and the user confirmation process are different and the order of these can be changed. (Payment method 1) Payment method 1 first requests payment by using the URL&CC's CCI path, and confirms the user by using the URL&CC's URL path and the user's URL PWD path. (Payment method 2) Payment method 2 confirms the user by using the URL&CC's URL path and the user's URL PWD path, and requests the payment by using the URL&CC's CCI path.