Patent classifications
G06Q20/3825
AGREEMENTS ON THE BLOCKCHAIN
A computer-implemented method of recording an agreement between a requesting party and a confirming party on a blockchain, wherein the method is performed by the requesting party and comprises: generating a request transaction, wherein the request transaction comprises an input signed by the requesting party, and at least a first output comprising a cryptographic puzzle based on a first data item known to both the requesting and confirming parties, wherein the first data item represents the agreement; and causing the request transaction to be transmitted to one or more blockchain nodes.
CUSTOM TRANSACTION SCRIPTS
A computer-implemented method of accepting blockchain transactions, wherein the method is performed by a blockchain node of a blockchain network and comprises: generating a first transaction comprising a first output, the first output comprising a first output script; causing the first transaction to be published on the blockchain; receiving a second transaction comprising a second output, the second output comprising a second output script; and accepting the second transaction based on one or more conditions being met, wherein a first condition of said one or more conditions is that the second output script corresponds to the first output script.
STORING AND RETRIEVING DATA ASSOCIATED WITH AN ASSET
Some embodiments of the present disclosure relate to a computer implemented method of storing data associated with an asset on a blockchain. Other embodiments relate to a computer implemented method of retrieving data associated with an asset that is stored on a blockchain. The methods are performed on a blockchain node of a blockchain network.
Method and system for offline data transfer via machine-readable code
A method for offline transmission of blockchain details includes: storing, in a computing device, a first private key and a currency amount; receiving a first destination address associated with a blockchain network and a transaction amount; generating a second private key; generating a second destination address associated with the blockchain network using the second private key; generating a blockchain transaction including at least the first destination address, the transaction amount, the second destination address, and a remainder amount based on at least the currency amount and the transaction amount; signing the generated blockchain transaction using the first private key; executing a query to replace the first private key with the second private key, wherein replacement of the first private key includes deletion of the first private key from the computing device; and transmitting the generated blockchain transaction.
Data storage and management and methods of thereof
Described herein are various methods of sharing data across multiple computers. The method of sharing data permits the pruning of data from the shared data.
Signature verification using blockchain
A package management system to initiate a transaction in a blockchain system. The transaction comprises an indication of the signature for the software package and is to be stored in a blockchain. The package management system distributes the software package to a computing device with an indication of a location of the signature in the blockchain.
Systems and methods for facilitating network voice authentication
Systems and methods are provided for facilitating voice authentication of a user in connection with a network transaction. One exemplary method includes receiving an authentication request for a transaction, initiated at a voice interactive device, from a merchant plug-in (MPI) associated with a merchant involved in the transaction, where the authentication request includes a pre-authentication indicator based on voice authentication of a user by the voice interactive device or by a voice authentication service. The method also includes generating a risk score for the transaction based at least in part on the pre-authentication indicator, transmitting the risk score with the authentication request for the transaction to an access controller server (ACS) associated with an issuer of an account to which the transaction is directed, and returning a result response to the MPI where the result response indicates permission to proceed in the transaction based on authentication of the user.
Computer-implemented method for performing a restricted transaction
The present disclosure is related to a field of payment transactions using a card that discloses a computer-implemented method and a system for restricting a transaction while using a payment card. A card processing server may receive card details, a transaction amount, a flag, and signature data of the payment card from a remote terminal upon initiating a transaction using the payment card. Further, the card processing server validates the payment card based on the card details and the signature data of the payment card and thereafter determines a value associated with the flag upon successful validation. The value associated with the flag indicates one of two conditions, e.g., a true condition and a false condition. Based on the condition indicated by the flag, the card processing server performs one of a first action and a second action related to either processing or declining the transaction.
Contactless payment relay attack protection
A method for contactless payment relay attack protection includes receiving an online authorization request including a cryptogram, a measured processing time, and a reference processing time from a terminal. The cryptogram is verified, and a determination is performed as to whether the measured processing time exceeds the reference processing time. An online authorization response authorizing or declining a monetary transaction is transmitted, based on the determination. An artificial intelligence transaction analysis can be performed based on past and current conditions (e.g., battery level, operating system, open applications) of a payment device such as a mobile phone, past and current conditions of a terminal, and/or a monetary amount. The online authorization response can be based on the artificial intelligence transaction analysis.
COMPUTER-IMPLEMENTED METHOD FOR DETERMINING A MERCHANT LOCATION USING A VIRTUAL CARD, IN REAL-TIME
The present disclosure is related to a computer-implemented method, card processing server, and non-transitory computer readable medium for determining a merchant location using a virtual card, in real-time. A card processing server may receive test transaction data from an acquirer bank of a merchant when a test transaction is initiated through a virtual card provided to the merchant. The card processing server may detect a record of the test transaction in a transaction database, in real-time, using one or more attributes of the virtual card stored in the card processing server and may retrieve signature data from the test transaction data upon detecting the record of the test transaction. Finally, the card processing server determines a transaction source data location of the merchant at which the test transaction was initiated and a registered name of the merchant based on the signature data.