Patent classifications
G06Q20/3674
Offline value transfer using asymmetric cryptography
Tokenized assets with associated value are transferred from a designated server to a mobile device. The associated value is removed from the designated server. The tokenized assets are transferred to a first trusted electronic device. The first trusted electronic device is associated with the mobile device. At least a portion of the tokenized assets are transferred to a second trusted electronic device such that the portion of the tokenized assets are only stored on the second trusted electronic device after the transfer. The second electronic device is associated with a second mobile device. The transfer occurs at a time when both the mobile device and the electronic device are offline.
CREATION OF RESTRICTED MOBILE ACCOUNTS
A user device may detect an age associated with a first user account meets or exceeds an age threshold. If so, the user device may present a conversion option to enable conversion of a restricted mobile payment account to a new primary mobile payment account. The user device may then communicate with a payment service to verify an identity of a user of the user device. The user device may then receive a communication indicating successful creation of the new primary mobile payment account.
Systems and Methods for Maintenance of NFT Assets
Systems and devices to account for automated conditional payments from within an NFT platform to maintain resources including (but not limited to) computer systems and/or sources of data relied upon by the platform are disclosed. One embodiment is a system that includes a paying module and a bounty hunting module. The paying module generates an agreement, the agreement including terms of the performance of service. The bounty hunting module performs steps for ensuring the service is performed. The bounty hunting module obtains publicly verifiable evidence related to the performance of service. The bounty hunting module generates an assertion including the publicly verifiable evidence and a reference to a public key. The bounty hunting module posts the assertion to an immutable ledger entry. The bounty hunting module obtains payment based on validity of the assertion, wherein the assertion is valid when the assertion is determined to be true.
METHODS, APPARATUSES, AND SYSTEMS FOR USER ACCOUNT-AFFILIATED PAYMENT AND BILLING, CONSOLIDATED DIGITAL BILLER-PAYMENT WALLETS
Described are systems, apparatuses, methods, and computer program products for low-input initiation of user account-affiliated transactions. An example apparatus can comprise a processor and a memory storing program code configured to cause the apparatus to store payor information, authentication information, and account information associated with a payor; store payee information associated with payees; receive, from a payee device or a payor device, a request to initiate a payment, the request comprising information about a payor and payee as well as a payment amount; determine, based at least upon the information about the payor and payee, and the stored information, whether the payment is to a pre-approved payee or merchant with which payor has a pre-existing account; and, in an instance in which the determination is in the affirmative, initiate the payment by providing at least payor and payee information and payment amount a payment processor.
AUTONOMOUS EXCHANGE VIA ENTRUSTED LEDGER DIGITAL SIGNATURE MANAGEMENT AND ADMINISTRATION
A signature is a unique identifier that is created by the signor or signatory for the purpose of acknowledging or otherwise providing acceptance of a transaction such as signing a check, contract or other transactional vehicle. The system and method disclosed herein provides for the authenticating and tracking of each signature within a digital environment such as a blockchain by applying a unique identifier to each signature. The identifier created for the signature is then attached to the vehicle being signed such as a document or a contract, which is then also assigned an identifier to enable the permanent association of the signature and the vehicle that was signed. These unique identifiers ensure that the signature and the associated vehicle or correspondence being signed cannot be copied, separated or otherwise used more than a single time during a single signing event.
Method and System for Transferring a Product
The invention relates to a method and system for transferring a product having an identifiable chip with unique identifier information relating to a digital asset accessible in a network. The method comprises the steps of: associating a cryptographic token with the unique identifier information of the identifiable chip; storing the cryptographic token via the network in a wallet as the digital as-set; transferring the digital asset comprises blocking the cryptographic token until an authentication signal is received associated with the unique identifier in-formation of the identifiable chip.
Systems, methods, and program products for depositing, holding and/or distributing collateral as a token in the form of digital assets on an underlying blockchain
The present invention relates to a method, system, and program product for depositing, holding and/or distributing collateral in the form of a stable value token for a security token, the tokens being on the same underlying blockchain. Furthermore, the present invention relates to methods, systems, and program products for lending digital assets, such as crypto currency and other related products.
SYSTEMS AND METHODS ASSOCIATED WITH NETWORK-BASED INTERACTIONS
Systems and methods are provided for altering images associated with accounts, for use with digital wallets. One example computer-method includes receiving a request for an image associated with an account, informing an issuer of the account of the request, and receiving, from the issuer, an image and a base configuration ID for the account. The method also includes retrieving a base configuration profile for the account, creating a new configuration profile for the account, and returning, to the issuer, a new configuration ID for the new configuration profile. The method further includes receiving, from the issuer, in response to the new configuration ID, a token for the account, linking the token to the new configuration profile based on the new configuration ID, and pushing the image to an electronic device associated with the account thereby permitting the electronic device to display the image when the account is selected.
Multiple Format Crypto Currency System and Method
A cryptocurrency system that allows multiple different forms of coins to be handled by a single system, and using a single distributed ledger, where each operation iterates through the mathematical operations for each of the different forms of coins.
Cryptographic currency for securities settlement
The present disclosure is directed to security settlement in financial markets and cryptographic currencies. Particular portions of the present disclosure are directed to a cryptographic currency protocol and to a cryptographic currency that includes a positional item. The cryptographic currency protocol supports a virtual wallet that, in various embodiments, is a security and cash account for storing and managing the cryptographic currency. Opening a transaction via the virtual wallet to transfer the cryptographic currency is a strong guarantee of the availability of funds in the virtual wallet because, e.g., funds are not transacted unless the commit phase is successful.