G06Q20/3674

SECURE AND TRUSTWORTHY BRIDGE FOR TRANSFERRING ASSETS ACROSS NETWORKS WITH DIFFERENT DATA ARCHITECTURE

Described herein is technology for providing the secure transfer of assets between blockchain networks. A secure-execution server can be configured to execute a bridge program in a secure execution environment to interact with a first pool of warden servers to facilitate secure transfer of assets between a first blockchain network and a second blockchain network. The bridge program may include instructions that, when executed by the secure execution environment, cause the secure-execution server to perform operations that may include performing lock operations that lock first assets from a contractless blockchain network and mint second assets representing the first assets in a contracting blockchain network, where the contracting blockchain network supports smart-contracts that are unsupported on the contractless blockchain network; and performing unlock operations that unlock the first assets by transferring the first assets in the first blockchain network in response to the second assets being returned or destroyed.

PERSONAL DATA WALLET
20230015523 · 2023-01-19 ·

Methods and systems are presented for providing a secured electronic transaction processing framework that enables online service providers to process electronic transactions for users while allowing the users to retain control over their user data. The secured electronic transaction processing framework includes a data access system configured to dynamically access user data, that is stored on user devices and controlled by users, on an as-needed basis. When a service provider server receives a request for processing a transaction through a user account, the service provider serer may use the data access system to dynamically obtain user data required for processing the transaction from a wallet application of a user device. The wallet application may include data access policies that specify data access settings for different service providers. After processing the transaction using the user data, the service provider server may remove the user data.

SYSTEM AND METHOD FOR TRUE PEER-TO-PEER AUTOMATIC TELLER MACHINE TRANSACTIONS USING MOBILE DEVICE PAYMENT SYSTEMS
20230013074 · 2023-01-19 ·

A system and method for true peer-to-peer automatic teller machine transactions using mobile device payment systems, where a user may receive physical cash in exchange for digital currency from another user, without either one of them having to have a merchant account or a credit/debit card clearing system through a payment processor, comprising a smartphone with an associate peer-to-peer ATM application, blockchain datastore, GPS satellite, cellular tower, and smart wallet application.

COMPUTER-BASED SYSTEM FOR PROVISIONING NEW ACCOUNTS USING LOCATION-BASED AUTHENTICATION

A method comprises receiving, by a computing device from a customer device, a request to provision a financial account for the customer, associating, by the computing device, a mobile device with the requested financial account, and sending, by the computing device to the mobile device, authentication information for the requested financial account. The method further includes receiving the authentication information by the computing device from a financial terminal that received the authentication information from the mobile device, receiving, by the computing device, first location information of the mobile device, and provisioning, by the computing device and based on the first location information of the mobile device being within a predetermined distance of a location of the financial terminal, the requested financial account for the customer.

AUTHENTICATION CARD DEGRADATION SECURITY

A first access attempt to perform a secure transaction is received, from a first user. The secure transaction is related to an authentication card that has a physical exterior. An authentication card profile related to the authentication card of the first user is retrieved based on the first access attempt. The authentication card profile describes a set of one or more degradation characteristics, each degradation characteristic of the set of degradation characteristics describes a degradation of the physical exterior of the authentication card. A validation status of the authentication card is determined. The determination is based on the first access attempt and on the set of degradation characteristics. A security response related to the first access attempt is performed in response to the validation status.

Systems and methods for user authentication based on a genetic sequence
11700249 · 2023-07-11 ·

There is provided a system for creating a cryptographic non-fungible identity unique token (IUT), comprising code for: obtaining a private key linked to a public address of an electronic wallet, associated with a wallet address, obtaining a digital representation of a hashed genetic sequence of a user and an associated wallet address of the electronic wallet, storing in the cryptographic non-fungible IUT, an IUT identifier, the IUT identifier is an outcome of hashing a subset of the hashed digital representation and a unique password, storing the IUT in a genetic sequence record stored in a block of a blockchain dataset, wherein the genetic sequence record is associated with the IUT, the IUT is associated to the wallet address, wherein the user is authenticated by a match between a computed value of a password and the wallet address provided by the user, and the IUT identifier stored on the blockchain.

A SYSTEM FOR DIGITAL ASSET EXCHANGE, A DIGITAL WALLET AND AN ARCHITECTURE FOR EXCHANGING DIGITAL ASSETS
20230011788 · 2023-01-12 ·

A system for digital asset exchange, a digital wallet and an architecture for exchanging digital assets. The system for digital asset exchange includes an interface arranged to receive digital asset transaction requests from a user; and a gateway arranged to communicate with one or more exchanges to process the digital asset transaction requests.

System and method of performing secured transactions in a communication network
11699147 · 2023-07-11 · ·

A system and a method of data communication between a first computing device, associated with a first user, and at least one second computing device associated with a second user may include: receiving, by the first computing device, one or more data elements pertaining to details of a transaction request from the second computing device, via a voice channel; extracting said transaction request details by the first computing device; transmitting, by the first computing device, one or more authentication data elements of an electronic wallet module, comprised in the first computing device, to the second computing device, via the voice channel; and carrying out the requested transaction by the first computing device, based on the extracted transaction request details and the electronic wallet authentication data.

CONNECTED PAYMENT CARD SYSTEMS AND METHODS

Methods and systems of managing payment cards are disclosed. A financial institution computing system includes a token database storing a plurality of tokens and token information, a network interface circuit enabling the financial institution computing system to exchange information over a network; and a token management circuit. The token management circuit enables a graphical user interface on a customer device over the network that can be used to generate new token requests, re-provision token requests, and management requests. The management requests enable and disable tokens, such that transactions against a payment card account using an enabled token are completed, and transactions against the payment card account using a disabled token are denied.

Expedited virtual currency transaction system
11551207 · 2023-01-10 · ·

Expedited virtual currency transactions are provided by identifying a first user primary wallet associated with a virtual currency and including a first user primary wallet private key. First user secondary wallets are created that each include a respective first user secondary wallet private key, and a respective virtual currency transaction is performed using the first user primary wallet private key to transfer predefined amounts of the virtual currency from the first user primary wallet to each of the first user secondary wallets such that first user secondary wallets are provided with different predefined amounts of the virtual currency. Subsequently, an instruction is received to transfer a payment amount to a second user, and the second user is allocated a subset of the first user secondary wallet private keys included in respective first user secondary wallets that are associated with predefined amounts of the virtual currency that equal the payment amount.