G06Q20/383

METHOD FOR DIRECTLY TRANSMITTING ELECTRONIC COIN DATASETS BETWEEN TERMINALS, PAYMENT SYSTEM, PROTECTION SYSTEM AND MONITORING ENTITY
20230091509 · 2023-03-23 ·

The invention relates to a payment system and a method for directly transmitting electronic coin datasets between terminals, wherein a monitoring entity registers anonymous masked electronic coin datasets. The method has the following steps in a first terminal; receiving an electronic coin dataset, said at least one electronic coin dataset having a monetary value and a concealment value; masking a modified electronic coin dataset or the received electronic coin dataset by applying a one-way function to the electronic coin dataset in order to obtain a masked electronic coin dataset; linking the masked electronic coin dataset to a pseudonym in order to obtain a pseudonymized masked electronic coin dataset, and transmitting the pseudonymized masked electronic coin dataset to the monitoring entity.

Proxy checkout and payment transaction services
11488155 · 2022-11-01 · ·

A method for using proxy checkout services is discussed. The method includes accessing transaction details of a potential transaction for an item or a first service at a merchant, the potential transaction initiated by a user at a user device at a first location. The method includes responsive to a determination, based on merchant characteristics or user characteristics, that use of proxy services is permitted, initiating proxy services for performing the potential transaction at different user locations. The method includes determining, based on selection criteria, a particular proxy service from the proxy services for initiating a proxy transaction based on the potential transaction using one of different user locations. The method includes causing a user interface of the user device to render a user-selectable option for performing the proxy transaction instead of the potential transaction.

METHODS FOR CONDUCTING ELECTRONIC PAYMENT TRANSACTIONS WITH SCANNABLE CODES
20230087051 · 2023-03-23 ·

One embodiment of the invention provides for making electronic payments by scanning a merchant 2D code located near the point of sale with the customer's cell phone and transmitting the code or data embodied by the code to a payment center where the merchant's account can be credited and the customer's account debited without transmitting account information over the airwaves. In another embodiment of the invention, both parties transmit the same randomly generated 2D code or data embodied by the code to the payment center where they are matched to each other and to the buyer and seller to process the transaction. In a further embodiment of the invention, an inked tattoo or barcode marking is employed as a password to authorize access to smartphone applications for example, to make an electronic payment over a threshold amount.

System and method for link-initiated verification and validation of users
11610193 · 2023-03-21 · ·

A system and method for a dynamic-link verification process between an electronic device and a transaction or event. The first step is engagement by a mobile electronic device with an initiator that is linked with a specific verification event that triggers a text message to auto-populate on a mobile electronic device. The message comprising metadata about the user and the event or transaction. The second step is for the electronic device to send the auto-populated message to a message gateway thus initiating the verification of the user. The message gateway works with a management service and one or more databases to verify the identify and other aspects of the user based on instructions provided by the event host. Approval or denial of the transaction or request to gain entry is sent to the mobile device and the event host.

Modular automated transaction machine

A modular ATM can include a cabinet module and a head module. The cabinet module can include an outer housing, a chest positioned in the outer housing to store notes of value, a transport mechanism to move the notes of value out of the chest, a base receiving section, and a first electrical connector forming an electrical connection to the transport mechanism. The head module can be removably engageable with the cabinet module and include a computing device, at least one user-interface device controlled by the computing device, a main structure supporting the at least one user-interface device and the computing device, a rear shroud connected to the main structure, a base supporting the main structure and the rear shroud, and a second electrical connector mounted in the base and forming an electrical connection to the computing device.

SYSTEM AND COMPUTER-IMPLEMENTED METHOD FOR DEPERSONALIZING DATA BEING SWITCHED BETWEEN JURISDICTIONS IN A PAYMENTS SYSTEMS

A system and computer-implemented method for depersonalizing financial transaction data being switched by a switching service (e.g., an interchange network) between an acquirer and an issuer located in different countries. The acquirer's host sends a personalized transaction to a depersonalization service via an independent communications channel. The service depersonalizes the transaction and sends it back to the acquirer's host, and also sends a reverse depersonalization dictionary to the issuer's host. The acquirer's host sends the depersonalized transaction to the acquirer's interface, which sends it via the switching service to the issuer's interface, which sends it to the issuer's host. The issuer's host uses the dictionary to repersonalize the transaction, processes the repersonalized transaction, and sends a response code to the acquirer's host. The service and the acquirer's interface may independently calculate a hash value, and the acquirer's interface may send the depersonalized transaction only if the values match.

BIOMETRIC TRANSACTION SYSTEM
20230130755 · 2023-04-27 · ·

Disclosed is a system for enrolling a user for control of entry to a venue, concert, festival, or event. The system includes a computer configured to execute an application program that, when executed, is configured to: receive a user attribute; create an anonymous client reference (ACR) associated with the user attribute; and receive a biometric template. The biometric template has been determined from an input of a biometric. The enrolling system is further configured to create an association between the biometric template and the ACR, such that on dependence on the bound ACR and biometric template, subsequent single-factor authentication is enabled to control entry to the venue, concert, festival, or event in dependence on the created association.

Methods and system for serving targeted advertisements to a consumer device

A method for auditing an advertisement impression in which a first advertisement was presented in conjunction with first media content is disclosed. The method generally comprises transmitting to a plurality of second computing devices a plurality of randomly generated first cryptographic proofs; receiving, a first message from a second computing device indicating that the first advertisement was presented in conjunction with the first media content; and evaluating the first targeting model for the first advertisement based on the at least one media content classifier.

Systems and methods for anonymous cryptocurrency transactions
11475444 · 2022-10-18 · ·

Systems and methods for anonymous cryptocurrency transactions are disclosed. A method may include: receiving, from the electronic device associated with a sender of a cryptocurrency transaction, a zero-knowledge statement comprising a shuffled and anonymized list of participants comprising the sender, a receiver of the cryptocurrency transaction, and a plurality of decoy participants, a transfer amount, and a remaining balance, and a secret witness, wherein each participant is associated with an index; generating one-out-of-many proofs for the sender and the receiver based on their associated indices; generating a Basic Zether proof for the transfer amount and the remaining balance; conducting many-out-of-many proofs with parameters chosen for an anonymous payment setting; and constructing a zero-knowledge proof for the zero-knowledge statement. The sender sends an ordered list of the participants and the zero-knowledge proof to a verifier using the FiatShamir transform, and the verifier verifies the zero-knowledge proof.

System and methods for zero-step customer proximity detection using mobile device low emissions beacons
11636463 · 2023-04-25 · ·

A system and methods for zero-step customer proximity detection using mobile device low emissions beacons, which uses a customer mobile device, a single or plurality of BLUETOOTH™ low-emissions (BTLE) beacons, a network, a server, and an application that may operate separately on a mobile device and the single or plurality of BLUETOOTH™ low-emissions (BTLE) beacons, which allows businesses to detect known customers that come within a specified proximity of any connected BTLE beacons, and provide interactions with them on a zero-step and socially distanced basis, track their proximity to other customers and staff using similar applications, manage table assignments, offer deals or provide incentives to enter or patronize a business establishment.