G06Q20/383

SYSTEM AND METHOD FOR SECURE ANONYMOUS PAYMENT PROCESSING OF VIRTUAL ASSETS OR SERVICES
20220058734 · 2022-02-24 ·

A method for secure anonymous payment processing of Services or Virtual Assets. Initially, a Buyer selects an offered Service or Virtual Asset from a Web Site or via a Mobile Application. The Buyer is then challenged to provide a Secondary Factor Authentication to verify the Buyer's identity via a software application such as Google Authenticator, or via a hardware solution such as Yubico or Symantec. Once the Buyer is authenticated, the system allows for the input of the public cryptocurrency addresses. Sellers are similarly authenticated and can add public cryptocurrency addresses, schedules and pricing structures to build offers for sale. The system allows for anonymous order matches between Buyers and Sellers and when a Buyer decides to purchase, the system builds a transaction, comprised of the Buyer and Seller Account Tokens, the dollar amount required to satisfy the Service, or type and quantity of Virtual Assets, including any source and target address information, in the case of a cryptocurrency currency transaction. The System instructs the entity holding the payment, such as a Bank or Debit Card processor, to move the amount of funds required to satisfy the transaction in full plus any fees due to the exchange. The System then notifies the Seller that the Buyer has initiated a transaction and the funds are known-good. The Seller then satisfies the Service or provides the transfer of Virtual Assets as outlined in the transaction. Once the System verifies that the Service or transfer of Virtual Assets is complete, the System instructs the banking entity to move the funds into the Seller's account. In the case of Virtual Assets, the System verifies the movement of the cryptocurrency amount via the publicly available records of the Virtual Asset's Blockchain in real time or via a replicated copy. The transaction is then marked complete, and both parties are satisfied with no chance of fraud occurring on the part of the Buyer or the Seller. If the Service is not performed, or the Virtual Asset is not transferred completely, then the Buyer is refunded in full (when no service was completed or no cryptocurrency asset was transferred at all), or both parties are credited partially (in the case where a calculatable percentage of the service was completed or a percentage of the cryptocurrency asset was transferred) in the proper proportion.

METHOD AND APPARATUS TO PROVIDE SECURING PURCHASE TRANSACTIONS OVER A COMPUTER NETWORK
20170300981 · 2017-10-19 · ·

A method and structure for providing secure credit facility transactions for purchasing goods and services over a computer network such as the Internet that stores user's privileged information and other transactional data on the user's own computer. The method includes encryption of all information before or during its storage to the user's hard drive. The method and system includes the ability for the user to complete electronic commerce (e-commerce) transactions without revealing certain of the encrypted information, such as credit card numbers, to the merchant. The method and system creates and controls sub-accounts on a single credit facility, such as a credit card, with unique user reporting and corresponding password identifiers. The method and system sets and control sub-accounts spending amounts and replenishment periods. The method enables the user to create and control recurring debit accounts on a single credit facility, such as a credit card, over varying transactional periods.

SYSTEMS AND METHODS FOR CREATING SUBTOKENS USING PRIMARY TOKENS
20170337549 · 2017-11-23 ·

According to one embodiment of the invention, a subtoken corresponding to a primary token is generated. The primary token corresponds to a credential. The credential may be, for example, a primary account number (PAN) corresponding to a payment account. The subtoken may be a temporary, one-time use subtoken based on a primary token associated with the credential that allows a user to conduct a transaction from his or her account, while still providing security for the user's sensitive data. The subtoken may contain a header and an obfuscated portion. The header of the subtoken routes the subtoken to the entity issuing the subtoken for translation into the primary token. The obfuscated portion acts as a pointer to the primary token and data associated with the primary token. A same check digit may be included in the subtoken, the primary token, and the credential, in order to ensure that the transaction is not improperly denied.

DEIDENTIFIED ACCESS OF DATA
20170302630 · 2017-10-19 ·

Generally, embodiments of the invention are directed to methods, computer readable medium, servers, and systems for deidentified access of data. The deidentified access is permitted with the use of an identifier that uniquely indicates an outcome, the coding of the identifier obscures unaided human interpretation of the outcome, and the identifier uniquely identifies data for remediating performance associated with future outcomes.

METHOD AND DEVICE FOR IDENTIFYING USER IDENTITY
20170302451 · 2017-10-19 ·

A method and an apparatus for identifying a user identity are disclosed. The method includes receiving, by a first platform, a first request sent by a second platform, the first request including a first identifier, the first identifier being a sequence number used for identifying the second platform and allocated to the second platform by the first platform after the second platform accesses the first platform; obtaining a second identifier corresponding to the first identifier, the second identifier being a sequence number used for identifying an identity of the second platform in the first platform; obtaining a third identifier corresponding to the first request, the third identifier being an account of a login user currently logging on to the first platform; encrypting the third identifier using the second identifier to obtain a fourth identifier; and returning the fourth identifier to the second platform. The present disclosure can enhance the security of user information, and reduce the risk of the user information being stolen due to data collection.

Method, apparatus and electronic device for blockchain transactions

A method for implementing blockchain-based transactions includes: determining a to-be-remitted amount for each of a plurality of remitters participating in a transaction and a to-be-received amount for each of a plurality of receivers participating in the transaction, wherein the plurality of remitters include one or more real remitters, the plurality of receivers include one or more real receivers, and the plurality of remitters include one or more cover-up remitters and/or the plurality of receivers include one or more cover-up receivers; generating a commitment of the to-be-remitted amount corresponding to the each remitter and a commitment of the to-be-received amount corresponding to the each receiver; and submitting the transaction to a blockchain for execution, wherein the transaction comprises blockchain account addresses of the remitters and receivers, and the commitments of the to-be-remitted amounts and the to-be-received amounts.

Blockchain system for confidential and anonymous smart contracts

Blockchain-based, smart contract platforms have great promise to remove trust and add transparency to distributed applications. However, this benefit often comes at the cost of greatly reduced privacy. Techniques for implementing a privacy-preserving smart contract is described. The system can keep accounts private while not losing functionality and with only a limited performance overhead. This is achieved by building a confidential and anonymous token on top of a cryptocurrency. Multiple complex applications can also be built using the smart contract system.

Systems, methods, and apparatuses for implementing machine learning models for smart contracts using distributed ledger technologies in a cloud based computing environment
11257073 · 2022-02-22 · ·

Systems, methods, and apparatuses for implementing machine learning models for smart contracts using distributed ledger technologies in a cloud based computing environment are described herein. For example, according to one embodiment there is a system having at least a processor and a memory therein executing within a host organization and having therein: means for operating a blockchain interface to a blockchain on behalf of a plurality of tenants of the host organization, in which each one of the plurality of tenants operate as a participating node with access to the blockchain; receiving historical data from each of the participating nodes on the blockchain; generating a new machine learning model at the host organization by inputting the historical data received from the participating nodes into a neural network of a machine learning platform operating at the host organization; receiving a consensus agreement from the plurality of participating nodes; deploying the new machine learning model to the participating nodes as a component of a smart contract to be executed in fulfillment of the smart contract transactions; receiving a transaction at the blockchain and responsively triggering the smart contract to process the transaction onto the blockchain; and executing the smart contract which includes executing the new machine learning model as part of the smart contract. Other related embodiments are disclosed.

Ring signature-based anonymous transaction
11258614 · 2022-02-22 · ·

This disclosure relates to anonymous transactions based on ring signatures. In one aspect, a method includes receiving a remittance transaction. The remittance transaction is generated by a client device of a remitter by assembling unspent assets in an account corresponding to the remitter and masked assets in an account corresponding to a masked participant. Key images are obtained from a linkable spontaneous anonymous group (LSAG) signature of the remittance transaction. Values of the key-images are based on a private key, a public key, and unspent assets of the remitter. The LSAG signature is verified. The LSAG signature is generated by the client device of the remitter based on the private key and the public key of the remitter, and a second public key of the masked participant. The remittance transaction is executed when a transaction execution condition is met.

Differential privacy for axe obfuscation

A method and a system for using differential privacy techniques to provide axe obfuscation with respect to information included in an inventory axe list of available securities is provided. The method includes: obtaining first information to be included in a first inventory axe list to be published on a particular day; retrieving second information included in a second inventory axe list that was published on the previous day and/or several previous days; obfuscating the obtained first information by applying an algorithm based on the difference between the first information and the second information; and publishing the first inventory axe list by transmitting the obfuscated first information to a plurality of intended recipients. The quality of obfuscation may be measured and controlled as a function of desired privacy level and potential cost.