G06Q20/388

METHOD AND SYSTEM FOR PAYMENT CARD VERIFICATION VIA BLOCKCHAIN
20220044235 · 2022-02-10 · ·

A method for conveyance of payment credentials through a third party data source includes: storing, in a memory of a computing device, at least a first public key and payment credentials associated with a transaction account; generating, by a generation module of the computing device, a machine-readable code encoded with at least the first public key; displaying, by a display device interfaced with the computing device, the generated machine-readable code; generating, by the generation module of the computing device, a key pair comprised of at least a private key and a second public key; encrypting, by an encryption module of the computing device, the payment credentials using the private key; and electronically transmitting, by a transmitting device of the computing device, the encrypted payment credentials to a publicly accessible data source.

Method and system of billing for charging a vehicle battery leveraging a pre-arranged payment method
20210406880 · 2021-12-30 ·

A method and system provided for a single-action with which the customer places an order and receives goods by the single action of connecting an electrical vehicle (EV) to a charging station according to the business terms associated with this invention, the affiliated organizations that purchase or support the operation of the invention participate in a business “franchise” operation whereby all affiliated organizations increase their revenues as the volume of EV charging events increases.

SMARTGLASSES-TO-SMARTGLASSES PAYMENT SYSTEMS
20220237584 · 2022-07-28 ·

Methods for smartglasses-to-smartglasses payment systems is provided. Methods include receiving a transfer of funds initiation at a first smartglasses. The transfer of funds initiation may include an identifier, an amount and a personal identification number (“PIN”). Methods include transmitting the transfer of funds initiation from the first smartglasses to a second smartglasses. Methods may include receiving a notification on the second smartglasses. The notification may include a first smartglasses telephone number and the transfer of funds initiation. Methods may include transmitting a transfer of funds request from the second smartglasses to an entity. The transfer of funds request may include the first smartglasses telephone number, the transfer of funds initiation and the second smartglasses telephone number. Methods may include retrieving a first account and a second account from the entity. Methods may include transferring funds from the first account to the second account.

Electronic trade processing system and method

In one implementation, a computer-implemented method, executed on a computing device and configured to effectuate a trading platform, includes: maintaining an omnibus (multi-client) cryptocurrency trading wallet for a plurality of clients; and maintaining a segregated (individual-client) cryptocurrency transfer wallet for each of the plurality of clients, thus defining a plurality of segregated (individual-client) cryptocurrency transfer wallets.

SYSTEMS AND METHODS RELATING TO DIGITAL IDENTITIES
20210392125 · 2021-12-16 ·

Systems and methods are provided for use in responding to attribute queries related to identifying information for a user. One exemplary method includes receiving a request for an identity code for a user associated with identifying information, where the identifying information includes multiple attributes of the user, and generating the identity code and transmitting it to a computing device associated with the user. The method then includes receiving an identity request for the user from a requesting party including the identity code and at least one query related to at least one of the multiple attributes of the user, identifying the user based on the identity code, compiling a response to the at least one query based on the identifying information of the multiple attributes of the user, and transmitting the response to the requesting party.

User-Centric, Blockchain-Based and End-to-End Secure Home IP Camera System
20210390533 · 2021-12-16 ·

A method of authenticating a client device to access a user account stored on a remote server includes creating the user account based on a blockchain address of a blockchain wallet, transmitting a login request for logging into the user account from the client device to the remote server, and transmitting a random challenge from the remote server to the client device when the remote server receives the transmitted login request. The random challenge is associated with the user account and no other user account. The method further includes signing the random challenge with the client device, the signature based on a private key of the blockchain wallet, transmitting the signed random challenge and the blockchain address to the remote server, and verifying that the signed random challenge corresponds to the transmitted random challenge with the remote server using a public key of the blockchain wallet and the random challenge.

AUTHENTICATION AND PERSONAL DATA SHARING FOR PARTNER SERVICES USING OUT-OF-BAND OPTICAL MARK RECOGNITION
20210390537 · 2021-12-16 · ·

Disclosed are methods and apparatuses for creating a verified mutually authenticated transaction between a service provider and an on-line identity for a physical client person. A dynamic optical mark may be displayed on a device screen where the physical client person is using a web service. The dynamic optical mark may be recognized via scanning the dynamic optical mark by a personal mobile device equipped with a camera. The verified mutually authenticated transaction between the service provider and the on-line identity for the physical client person may be used for sharing personal data of the physical client person by using out-of-band optical mark recognition of the dynamic optical mark. The verified mutually authenticated transaction may be initiated with a time-limited one-time password comprising a sequence of numbers encoded in the dynamic optical mark.

CONSUMER CONTROLLED PORTFOLIO CHARITABLE GIVING SYSTEM AND METHOD
20210390593 · 2021-12-16 ·

A donation facilitation system that can allow a donor, such as a customer, to challenge another entity, such as a provider, to make a provider contribution to a portfolio of multiple charities set up by the donor upon, for example, the purchase of a good or service from the provider. The provided portfolio donation facilitation system can allow the other entity such as a provider to create its own provider portfolio of multiple charities and make a provider contribution to a customer's portfolio of multiple charities when at least one component of the provider's portfolio of multiple charities matches at least one component of the customer's portfolio of charities. The provider makes the contribution to the charity or charities.

Validation Service For Account Verification
20210383378 · 2021-12-09 ·

A method and system for authorizing a secure transaction using a portable device is disclosed. The method includes an authorization process performed in real-time that includes two phases: an authentication phase and a transaction processing phase. In the authentication phase, a resource provider system may receive a cryptogram from a portable device and verify the cryptogram. Upon the resource provider system obtaining an authentication response indicator, the transaction processing phase may include the resource provider system generating and transmitting an authorization request message to a processing computer. The resource provider system may then receive an authorization response message from the processing computer including an authorization response indicator, which completes the authorization process.

CHECKOUT WITH MAC
20210377039 · 2021-12-02 ·

A system for protecting personal information uses a challenge and an encrypted copy of the challenge in the form of a message authentication code (MAC) to provide authentication among multiple parties. The challenge is received by a first party from a second party. The challenge is encrypted by the first party to form the MAC and then both the challenge and the MAC are returned to the second party. The second party authenticates the first party by confirming the challenge. The second party sends the MAC and challenge to the third party. The third party decrypts the MAC using a key shared with the first party. When the decrypted MAC matches the challenge, the first party is authenticated to the third party. The process is applicable to transaction processing to limit compromise of payment instrument details.