G06Q20/388

SMARTGLASSES-TO-SMARTGLASSES PAYMENT SYSTEMS
20230117748 · 2023-04-20 ·

Methods for smartglasses-to-smartglasses payment systems is provided. Methods include receiving a transfer of funds initiation at a first smartglasses. The transfer of funds initiation may include an identifier, an amount and a personal identification number. Methods include transmitting the transfer of funds initiation from the first smartglasses to a second smartglasses. Methods may include receiving a notification on the second smartglasses. The notification may include a first smartglasses telephone number and the transfer of funds initiation. Methods may include transmitting a transfer of funds request from the second smartglasses to an entity. The transfer of funds request may include the first smartglasses telephone number, the transfer of funds initiation and the second smartglasses telephone number. Methods may include retrieving a first account and a second account from the entity. Methods may include transferring funds from the first account to the second account.

Method for generating target contract and terminal device
11651458 · 2023-05-16 · ·

The present specification discloses a method for generating a target contract and a terminal device. The method includes: generating, based on an operation instruction of a first user, a contract signing request to sign a contract with a second user cluster; sending the contract signing request to a second terminal device cluster corresponding to the second user cluster, for M second terminal devices in the second terminal device cluster to each generate and return, based on the joint contract signing request, a piece of first acknowledgment information that acknowledges jointly signing a contract; determining, based on M pieces of first acknowledgment information, chat information from group chat records in a same chat group as the second user cluster; generating a pending contract based on the chat information, and sending the pending contract to the second terminal device cluster, for P second terminal devices in the second terminal device cluster to each generate a piece of second acknowledgment information that acknowledges the pending contract; and determining the pending contract as a target contract based on P pieces of second acknowledgment information, and uploading the target contract to a blockchain.

Systems and methods for protecting against relay attacks

Systems, methods, and devices are disclosed for preventing relay attacks. A user device may receive (e.g., when proximate to the first access device), from an intervening device, device identification data for a first access device. A message may be received from a second access device via the intervening device. The message may include a digital signature generated based at least in part on second access device identification data. The user device may validate the message utilizing the digital signature and a public key. If the message is invalid, the user device may discard the message. If the message is valid, (e.g., unaltered), the user device may determine that the user has not confirmed an intent to interact with the second access device and may terminate an further interaction with the second access device accordingly.

METHODS OF AUTHENTICATING A USER FOR DATA EXCHANGE

A method of facilitating the exchange of data between a user having a computing device, and a remote entity, where a first connection has been established between the user and the remote entity, and where the user has associated data exchange information with an application on the computing device, the data exchange information defining properties of the data to be exchanged between the user and the remote entity. The method comprises establishing, at a server, a second connection to the computing device; enabling retrieval of a user authentication attribute associated with the data exchange information; enabling retrieval of a device authentication attribute associated with the data exchange information;

enabling authentication of the user using the user authentication attribute; and enabling authentication of the computing device using the device authentication attribute, where data may be exchanged between the computing device and the remote entity in accordance with the data exchange information following authentication of the user and the computing device.

ANONYMOUS DISTRIBUTED CONSENSUS REGARDING THE VERIFICATION OF PROTOCOLS

Techniques to perform mathematically and logically rigorous validations for decentralized applications (DApp) communicatively coupled to a distributed ledger are disclosed. A protocol for a business or enterprise process is encoded as a workflow on a labeled transition system as part of a DApp. Transitions are coded via an asynchronous Pi Calculus or other process calculi. A rules engine validates transitions using process calculi operations, or alternatively performing mathematical and logical analyses on the labeled transition system. Validations are disclosed for both development time and run time. In some embodiments, the logic behind the DApp is composed of a predetermined set of components representing processes. In one specific embodiment, the predetermined set of components is solely of an input component and an output component when composed perform a transaction where either both components received artifact representations from the other component or neither do.

Vehicle Onboard Sensors and Data for Authentication
20170357980 · 2017-12-14 ·

Systems and methods that authenticate a user to a vehicle are provided. The authentication system of the vehicle that transports the operator between different locations receives data from a sensor. The data is biometric data, device settings data or portable vehicle instrument storage data. The received data is compared to the data stored in the authentication system. Based on the comparing the use is authenticated to the vehicle and a user profile in the authentication system is identified.

SYSTEMS AND METHODS FOR MONETIZING DATA IN DECENTRALIZED MODEL BUILDING FOR MACHINE LEARNING USING A BLOCKCHAIN

Systems and methods are provided for leveraging blockchain technology in a swarm learning context, where nodes of a blockchain network that contribute data to training a machine learning model using their own local data can be rewarded. In order to conduct such data monetization in a fair and accurate manner, the systems and methods rely on various phases in which Merkle trees are used and corresponding Merkle roots are registered in a blockchain ledger. Moreover, any claims for a reward are challenged by peer nodes before the reward is distributed.

Transaction Validation Service

Concepts and technologies are disclosed herein for providing a transaction validation service. A device can receive a request to validate a transaction requested by a user device, where the transaction can be performed by an application and where the request to validate the transaction can be obtained with a first hash that is created by the user device. The first hash can include a hash of transaction data that is hashed using data stored on the user device. The device can receive an indication that the transaction has been approved, obtain a second hash of the transaction data that is hashed using the data stored on the user device, and determine, based on the first hash and the second hash, whether the transaction should be allowed or blocked.

PAYMENT METHOD AND ELECTRONIC DEVICE USING LOOP ANTENNAS
20170344999 · 2017-11-30 ·

A mobile electronic device and method are provided. The mobile electronic device includes a printed circuit board (PCB) built into a central area of the mobile electronic device and including at least one of a first loop antenna or a second loop antenna; a processor electrically connected to the at least one of the first loop antenna or the second loop antenna; a memory electrically connected to the processor, and configured to store card information related to a payment, wherein the processor is configured to determine whether the mobile electronic device is close to an external payment terminal, using the first loop antenna; and generate, if the mobile electronic device is close to the external payment terminal, a magnetic field signal including the card information, via the at least one of the first loop antenna or the second loop antenna, in response to a payment command.

Payment schemes using light identification for passengers in commercial passenger vehicle

A system for assisting a payment to a passenger on a commercial passenger vehicle is disclosed. The system is located in the commercial passenger vehicle and comprises: an onboard server configured to (1) receive, from a personal electronic device associated with a passenger, a request to process a payment along with payment credential information and (2) operate to authorize the payment; a light sourcing device in communication with the onboard server and configured to receive, from the onboard server, a verification request for the payment credential information, and display a light identification (ID); and the personal electronic device in communication with the onboard server and the light sourcing device and configured to capture an image of the light ID and obtain the verification request corresponding to the payment credential information from the captured image.