G06Q20/389

Systems, methods, and devices for generating and trading environmental credits
11694258 · 2023-07-04 · ·

Systems and methods of the present disclosure may collect data associated with a user activity. The data may be transmitted from an app running on a computing device with a user account authenticated by the computer-based system. The system may calculate a carbon footprint of the user activity based on the data associated with the user activity. An amount of carbon credits may be assigned to a user account authenticated with the computer-based system based on the calculated carbon footprint of the user activity. A transaction may be written to a blockchain retiring the amount of carbon credits in response to a request to offset a carbon footprint.

User management system for computing support

A computing support system is configured to programmatically manage support access to a computing system via a support technician console across multiple levels of support access. The system receives a request to authenticate a user requesting support for the computing system, issues one or more authentication challenges to the user to authenticate the identity of the user, receives one or more corresponding authentication challenge responses from the user based on the authentication challenge, and verifies a level of authentication based on the authentication challenge response, the level of authentication being selected from multiple levels of authentication. The system also determines a level of support access to the computing system based on the verified level of authentication and the identity of the user and programmatically enforces limits on the support access to the computing system via the support technician console based on the determined level of support access.

Dynamic Question Presentation in Computer-Based Authentication Processes

Methods, systems, and apparatuses are described herein for improving computer authentication processes by dynamically adjusting questions presented during authentication. A request for access to an account may be received. A first authentication question may be generated based on a first transaction of a plurality of transactions associated with an account. Based on whether a response to the first authentication question is correct or not, a second or third transaction of the plurality of transactions may be selected, and a second authentication question might be generated based on the selected transaction. It may be determined whether to provide access to the account based on a response to the second authentication question.

Split Up a Single Transaction Into Many Transactions Based on Category Spend
20230005012 · 2023-01-05 ·

Aspects described herein may relate to techniques for segmenting one transaction into multiple sub-transactions. A user may wish to purchase multiple items. The overall purchase request may be segmented into multiple sub-transactions based on a transaction category of each item. Transaction categories may be based on merchant category codes (MCCs). Each sub-transaction may include one or more items related to the same transaction category. Each sub-transaction may be underwritten and approved separately by the merchant and/or a financial institution (e.g., a credit card company). Financial information related to each different transaction category may be determined based on the sub-transactions. Reward offers may be provided in a more robust manner based on the different transaction categories determined during the purchase process.

Distributed Ledgers with Ledger Entries Containing Redactable Payloads

The ability to write illegal information or rights holder information into an immutable public ledger is problematic for society. Similarly, the inability to selectively cause funds transfers to be undone currently gives rise to significant abuses. In various embodiments, a processor, can be configured to obtain a ledger entry associated with a distributed ledger. The ledger entry can comprise an assertion authentication value and a reference. Data can be requested based on the reference. When the data is not available, an assertion can be obtained. a result can be generated and then compared. when the result and the assertion authentication value match, a challenge can be computed using a cryptographic system, wherein the challenge is based on the ledger entry. A block that incorporates the ledger entry can be broadcast to securely add the block to the distributed ledger.

SYSTEMS AND METHODS FOR CREATING A CUSTOMIZED WATCH FACE AND RETRIEVING THE WATCH FACE TO BE DISPLAYED
20230004125 · 2023-01-05 ·

Systems and methods to create a customized watch face and retrieve the watch face to be displayed are disclosed. Exemplary implementations may effectuate presentation of a selection interface; receive a mint request to mint the watch face in accordance with a watch face design; effectuate a transfer of consideration from a user wallet to an administrative wallet; mint the watch face; transfer a non-fungible token to the user wallet; receive a display request to display the watch face on a watch screen; determine whether the user wallet holds a non-fungible token associated with the watch face; responsive to the user wallet holding the non-fungible token, facilitate display of the watch face on the watch screen; responsive to the user wallet not holding the non-fungible token, take no action to facilitate display of the watch face on the watch screen; and/or perform other operations.

ELECTRONIC MANAGEMENT OF SUPPLY CHAIN FACTORING WITH SHARED STATE STORAGE IN A DISTRIBUTED LEDGER

Supply chain factoring utilizing shared state information stored in a distributed ledger includes the selection of an electronic supply chain document associated with an order for goods by a purchaser of the goods and the minting of a cryptographic token on behalf of a seller of the goods. the token encapsulating a purchase price for the order and associated order terms. A location is reserved in the ledger into which the token is uploaded. Subsequently, factoring terms are published at the reserved location by a factoring agency supporting the factorization of the purchase price. The seller then validates an ascension to the factoring terms in the reserved location. Finally, the reserved location is annotated to indicate satisfaction of the factoring terms upon the purchase price being paid to the factoring agency and a fraction of the purchase price being paid by the factoring agency to the seller of goods.

SYSTEM AND METHOD FOR META-TRANSACTIONAL INTEROPERABILITY OF DECENTRALIZED COMPUTING NETWORKS
20230004423 · 2023-01-05 ·

A system and its methods are described for implementing meta-transactional interactions across one or more decentralized computing networks (“blockchains”) with a managed (“custodial”) wallet, satisfying an important need of lowering the barrier of entry for interacting with smart contracts across multiple blockchain networks. First, the method of encoding and storing a transactional request created by a user's managed account, representing an intention to broadcast the invocation of a specific function of a specific smart contract on one or more peer nodes of a specific blockchain. Then, calculating a cost for processing the encoded transaction within the specific blockchain via analysis including the value and type of cryptocurrency, complexity of transaction, historical trend of transaction fees, and analyses to eliminate the chance of loss due to insufficient transaction fees. Next, obtaining a payment from the user for the transfer of the amount to successfully process their queued transaction. Then, confirming the payment was received in its correct and sufficient form resulting in a transfer of cryptocurrency from a reserve to the user's managed account. Subsequently, determining the transfer is completed and a sufficient balance exists for the execution of the queued transaction. Finally, dequeuing and executing the stored transaction on a specific blockchain by the system on behalf of the managed account, where transaction fees are paid by the managed account and unspent fees are accrued in the balances of the managed wallet.

Method and system for authentication of coupons via blockchain
11544731 · 2023-01-03 · ·

A method for authentication of coupons using a blockchain includes: storing transaction data for a payment transaction, wherein the transaction data includes at least a transaction amount; receiving an identification value; receiving a block included in a blockchain, wherein the block includes at least a block header and a plurality of transaction values, each transaction value including at least a coupon identifier and coupon data; executing a query on the received block to identify a specific transaction value of the plurality of transaction values where the included coupon identifier corresponds to the received identification value; and executing a query on the memory to update at least the transaction amount included in the stored transaction data based on the coupon data included in the identified specific transaction value.

Protocol flow for proposing a transaction

A method and system are provided to support a decentralized distributed ledger in which transactions are recorded by parties to the transactions without the use of a blockchain. A distributed ledger system provides a protocol framework that supports the development of protocol flows. A protocol flow is computer code that controls the performance of a transaction by the party or parties to the transaction. Protocol flows can be developed for different types of transactions. The distributed ledger system allows transactions to be proposed, accepted, and notarized by a notary and stored without the use of a blockchain ledger. The distributed ledger system can avoid the expense of the computational and storage resources needed to redundantly verify a transaction and store evidence on the many nodes of a blockchain distributed ledger.