G06Q20/383

SYNTHESIZING USER TRANSACTIONAL DATA FOR DE-IDENTIFYING SENSITIVE INFORMATION
20230121356 · 2023-04-20 ·

As described herein, a system, method, and computer program are provided for synthesizing user transactional data for de-identifying sensitive information. In use, transactional data of a plurality of users is identified. Additionally, the plurality of users are clustered based on the transactional data, to form groups of users having transactional data representing similar transactional behavior. Further, synthesized transactional data is generated for the users in each group by: identifying a subset of the transactional data that corresponds to the users in each group, shuffling the transactional data in the subset across the users in each group, and perturbing portions of the shuffled transactional data.

METHOD AND SYSTEM FOR ANONYMOUS CHECKOUT IN A STORE
20230123576 · 2023-04-20 · ·

Methods, systems, and apparatus, including computer programs encoded on computer storage media, for anonymous checkout in a store. One of the methods includes receiving, by a computer system of the store, information associated with a payment account of a person; sending, by the computer system to a server associated with a payment system, the received information associated with the payment account of the person; receiving, by the computer system from the server associated with the payment system, a token associated with the payment account of the person; receiving, by the computer system from a plurality of sensors, data associated with the person; extracting, by the computer system based on the received data associated with the person, a plurality of features of the person; and storing, by the computer system, the received token in correspondence with information associated with the extracted features of the person.

PSEUDONYMOUS TRANSACTIONS ON BLOCKCHAINS COMPLIANT WITH KNOW YOUR CUSTOMER REGULATIONS AND REPORTING REQUIREMENTS

A method for compliance with Know Your Customer (KYC) and other regulations includes a pseudonymous globally unique identifier stored on a blockchain that associates a pseudonymous first party address with a globally unique identifier representing the vetted identity of the owner of the address. The method also includes a trusted third party issuing a verifiable credential for a first pseudonymous party to a proposed transaction to a second pseudonymous party to the transaction.

Cross-chain communication method, device and storage medium thereof

Disclosed is a cross-chain communication method. In this method, a first edge node of a first blockchain receives a first transaction request and validates the first transaction request; on condition that the first transaction request passes the validation, the first edge node will send the first transaction request to a notary node group; the notary node group determines at least one target notary node according to a preset criterion; the at least one target notary node validates the first edge node and a second edge node of a second blockchain corresponding to the first transaction request; and on condition that both the first edge node and the second edge node pass the validation, the first edge node will set up a cross-chain communication with the second edge node depending on the first transaction request to complete a cross-chain transaction. A cross-chain communication device and a storage medium are also disclosed.

System and method for obfuscating transaction information

A computer-implemented method for anonymizing online transaction details may include performing a process to generate an identifier (ID) and reference address for a user, and receiving a request for transaction processing from an e-commerce server. The request may include first data including: information associated with a purchase of a product to be delivered to the user; the identifier; and the reference address. The method may further include: in response to the request, determining whether the ID and reference address are included in the request, and if so, obtaining the accurate address and shipping rate rules; applying, based on the first data and the accurate address, the shipping rate rules to determine accurate shipping rate cost information associated with delivering the product to the accurate address; performing an anonymizing process on the accurate information to obtain anonymous shipping rate information, and transmitting the anonymous shipping rate information to the e-commerce server.

Secure e-commerce protocol

An E-commerce protocol is provided. The E-commerce protocol has been developed as a solution to malicious attacks such as credit card fraud and stealing of various financial data, wherein the malicious attacks appeared particularly in a cyber world. With the help of the E-commerce protocol, a manipulated version of user information in an E-commerce database removes security risks of compromising on E-commerce systems. Even though a user does not have to share personal information of the user with E-commerce companies, an application also eliminates a necessity of entering the user information for each online transaction.

Anonymous peer-to-peer communication system
11625714 · 2023-04-11 · ·

An in-application content transfer system that generates receiver identifiers to categorize a given exchange between two users. One user executes the application on their mobile device and makes use of peer-to-peer communication protocols with a neighboring mobile device, regardless of whether the neighboring device is executing the subject application. The content transfer is linked to a unique identifier of the neighboring device, which is retrieved via peer-to-peer communication.

Pool generation and management for events
11468483 · 2022-10-11 · ·

Techniques for generation and management of pools for events are presented. Pool management component (PMC) generates an event associated with a recipient. Within a period of time of the event, PMC generates a pool relating to the event. Based on contact user data, transaction data relating to transactions or interactions between recipient and merchants, and affinities of the recipient to contact users or merchants, PMC determines which users to invite as candidates to contribute monetary funds to the pool and which merchants to be candidates to the pool and to present offers for products. Notification component notifies candidates of their invitation to participate in the pool. Pool component receives contributions from user candidates and offers from merchant candidates. At time of the event, notification component notifies recipient of the gift being presented to recipient via the pool, the gift comprising money, a product, or offer for a product.

SYSTEMS AND PROCESSES FOR PEER-TO-PEER FINANCIAL INSTRUMENT TRANSACTIONS
20230153904 · 2023-05-18 ·

The invention relates to systems and processes for enabling the execution of a peer-to-peer financial instrument transaction. More specifically, the invention relates to a system and processes for executing a peer-to-peer financial instrument transaction, a system and process for generating a quote in the system for executing a peer-to-peer financial instrument transaction, and a process for presenting a price level component matrix in an interface module of the system for executing a peer-to-peer financial instrument transaction.

SYSTEM AND METHOD FOR BLOCKCHAIN TOKENS FOR GAMING

A system and method for in-game tokens or specialized virtual currency which may be used for a variety of transactions, including within a plurality of games, yet for which transactions may be sufficiently controlled to avoid adverse real world effects. The system and method provide blockchain tokens for gaming, in which transactions related to such blockchain transactions are both controlled and flexible.