Patent classifications
G06Q20/3676
UNIVERSAL SECURE REGISTRY
A computer system for authenticating a user involved in a transaction and a method thereof is provided. The computer system comprises a communications interface configured to receive identification information including information specific to a mobile electronic device and information specific to a user account, and a one-time authentication code. One or more processors are configured to retrieve account information, and to use the retrieved account information to validate the received identification information and one-time authentication code. The one-time authentication code is generated by the mobile electronic device responsive to successful authentication of at least one of biometric information of the user and a user input comprising a PIN or other secret information known to the user. The biometric information is captured by a biometric sensor, and the user input is received by a user interface.
Processing Transactions
A method for maintaining a multicurrency card for use with a processing scheme for processing transactions, the multicurrency card being associated with a plurality of currencies, each of the plurality of currencies being associated with a respective wallet capable of representing funds in its respective currency, the processing scheme being configured so as to preferentially debit, for a transaction, the wallet associated with the currency of the transaction, the method comprising the step of: inhibiting the crediting of the balance of a subset of the wallets associated with the plurality of currencies such that the balance for each of said subset of wallets is less than or equal to a predetermined amount irrespective of the currency of credit credited to the multicurrency card.
USING COGNITIVE COMPUTING TO PROVIDE TARGETED OFFERS FOR PREFERRED PRODUCTS TO A USER VIA A MOBILE DEVICE
Techniques are disclosed utilizing cognitive computing to improve commercial communications from vendors to users. A user's financial account(s) and location may be monitored to determine when a user is within a threshold distance of a vendor. If the user is within the threshold distance the methods and systems disclosed may determine which targeted commercial communications to transmit to the user based upon a shopping profile for the user. The shopping profile may include a dataset indicative of the shopping habits of the user.
SYSTEM AND METHOD FOR TRACKING FUNDS FROM A PLURALITY OF FUNDING SOURCES
The present disclosure relates generally to a system that tracks the funding source of an amount of funds as the funds are transferred between various accounts or balances of various components of the system.
System and method of multi-round token distribution using a blockchain network
A computer-implemented method to initiate a token transfer process for transferring respective first quantities of tokens between a plurality of pairs of sender nodes and respective recipient nodes using a blockchain. The method includes: determining a number of transaction rounds in the token transfer process; generating a set (TT) of indirect token transactions based on the respective first quantities of tokens and the number of transaction rounds, wherein execution of all of the indirect token transactions in the set results in net transfer of the respective quantities of tokens from the sender nodes to their respective recipient nodes and wherein the set of indirect token transactions includes randomized pairings of the sender nodes and recipient nodes in which each may be an input node or an output node for a particular indirect token transaction; and for each of the sender and recipient nodes, transmitting a subset of the set of indirect token transactions to that node, the subset including those transactions for which that node is either the input node or the output node.
USER INTERFACES FOR ACCOUNT STATEMENT ASSIGNMENT
There are provided systems and methods for user interfaces for account statement assignment. A user may engage in transactions over a time period, such as purchases of goods, services, or other items using a physical payment card associated with an online transaction processor. A statement may be issued at the completion of the time period, where the statement may include account information requiring a payment by the user, such as a statement balance. The user may request for another user to provide a payment for all or a portion of the balance using one or more user interfaces of a peer-to-peer payment and social networking platform. Thereafter, a request may be provided to the other user, which may request the payment. The other user may process the payment, which may be used to provide funds directly to the statement balance.
Constructing a distributed ledger transaction on a cold hardware wallet
In a general aspect, a distributed ledger transaction is generated on a cold hardware wallet. Generating the distributed ledger transaction includes receiving, at the cold hardware wallet, ledger information from a network-connected device via a private module-to-device communication link. The ledger information may include account information for the distributed ledger transaction, and a timestamp identifying when the account information was received by the network-connected device from a public network. The cold hardware wallet may generate a message based on the account information, identify a private key stored in the cold hardware wallet, generate a digital signature based on the message and the private key, and generate the distributed ledger transaction based on the message and the digital signature. The cold hardware wallet may send the distributed ledger transaction to the network-connected device via the private module-to-device communication link for forwarding to the public network for settlement.
SMART CONTRACT OF A BLOCKCHAIN FOR MANAGEMENT OF CRYPTOCURRENCIES
There is provided a processor(s) executing a blockchain smart contract, for: managing a primary reserve of primary tokens and a secondary reserve of secondary tokens, receiving a transaction request, obtaining an external price of the primary token, compute an updated value of the primary reserve according to the external price, in response to the updated total value of primary reserve being unequal to an initial staked value of the primary reserve, adjust primary and secondary dynamic reserve weights, wherein a total value computed by a function of the primary reserve after being increased or decreased by a target amount of primary tokens and using the adjusted primary and secondary dynamic reserve weights, is equal to the initial staked value of the primary reserve, and the total value of the primary reserve is maintained at a predefined ratio to a total value of the secondary reserve, and executing the transaction request.
APPARATUSES AND METHODS FOR GENERATING USER CONNECTIONS
Apparatuses, methods, and computer program products are provided for generating user connections. An example method includes receiving first user account parameters associated with a first user and determining a financial deficiency of the first user account based on the first user account parameters. The method further includes receiving second user account parameters associated with a second user and determining a fulfillment opportunity of the second user account based on the second user account parameters. In response to the determined fulfillment opportunity, the method includes generating a fulfillment action from a second account of the second user to a first account of the first user in satisfaction of the financial deficiency.
OFFLINE VALUE TRANSFER USING ASYMMETRIC CRYPTOGRAPHY
Tokenized assets with associated value are transferred from a designated server to a mobile device. The associated value is removed from the designated server. The tokenized assets are transferred to a first trusted electronic device. The first trusted electronic device is associated with the mobile device. At least a portion of the tokenized assets are transferred to a second trusted electronic device such that the portion of the tokenized assets are only stored on the second trusted electronic device after the transfer. The second electronic device is associated with a second mobile device. The transfer occurs at a time when both the mobile device and the electronic device are offline.