G06Q20/38215

Digital identity management device

An identity management device and system. The device comprises a processor operably coupled to a memory, a display, and a communication interface. The device can have stored thereupon instructions that, when executed by processor, cause the processor to implement a user device interface configured to receive, from user device through the communication interface and store in the memory, at least one identification record comprising visually depictable identification data and a user interface configured to update the display to depict the visually depictable identification data. The identification record can comprise authentication data. Authentication data can be displayed on the device or securely transmitted.

Systems and methods for creating dynamic sessions for mobile application integration

Systems and methods for mobile application integration are described. These may include receiving a payment request a mobile application, sending a payment application detection request, receiving a detection response, and sending a customized user interface to the mobile device. The customized user interfaces are determined by whether an associated payment application is present on the mobile device and whether the mobile device is authenticated with the payment processing platform. These techniques can allow for a better user experience when interacting with the payment processing platform.

Cryptoasset custodial system with proof-of-stake blockchain support

Methods and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving, in a cryptoasset custodial system, a request to authorize a staking operation associated with a blockchain, wherein the staking operation is associated with a private key of an asymmetric cryptographic key pair, the private key is usable to control ownership of a cryptoasset recorded in the blockchain, and the private key is securely held in the custodial system; performing, in response to the request, a portion of the proof-of-stake protocol in a hardware security module using logic designed for the protocol, wherein the logic in the hardware security module is configured to authorize the staking operation by digitally signing an associated staking transaction; and sending the digitally signed staking transaction to another computer to effect the staking operation on behalf of the user.

Systems and methods for provisioning cryptographic digital assets for blockchain-secured retail products
11295318 · 2022-04-05 · ·

Presented are cryptographic digital assets for retail products, methods for making/using such cryptographic digital assets, and computing systems for generating, intermingling, and exchanging blockchain-protected products. A method for provisioning cryptographic digital assets associated with retail product transfers includes broadcasting notifications of a future transaction of a retail product, and receiving, over a distributed computing network from the computing devices of multiple users, requests to participate in the transaction. A select number of users is added to a virtual line associated with the retail product transaction; from the virtual line, a first user is selected to receive the retail product and a second user is selected to receive a cryptographic digital asset containing a digital retail product and a unique digital asset code. The cryptographic digital asset is transferred to the second user's digital wallet, and the unique digital asset code is recorded on a record block of a blockchain ledger.

APPARATUS AND METHODS TO DEFINE AND USE BEARER TOKENS, CERTIFIED TOKENS AND APPLICATIONS USING BEARER TOKENS AND CERTIFIED TOKENS
20220114584 · 2022-04-14 ·

Methods, apparatus and techniques are disclosed to define and use bearer token records to transfer a crypto asset from a sending account and where a secret is required to be provided as a proof of possession of the bearer token to complete the transfer to a receiving account. Certified bearer tokens are locked for later transfer to a defined receiving account at generation. Lockable bearer tokens are lockable after generation via a second secret. Bearer token records may be expired to revert the crypto asset to the sending account if not completed using the secret. Bearer token records are implementable on a blockchain. Bearer tokens of small denomination crypto assets are useful for various transactions such a streaming or other online services. A computing device provides a change purse from which to pay using bearer tokens. Various user interfaces and uses are presented.

SYSTEM AND METHOD FOR REAL TIME PROCESSING OF AUTOMATIC MICRO-PAYMENTS FOR PATENTS
20220114565 · 2022-04-14 ·

The present invention is related to automatic micro-payments of patent royalties that are processed in real time. The present invention allows for unlimited partial payment transactions, or “micro-payments” to be processed immediately at any time. These micro-payment transactions can also be processed through any method that is preferred and agreed to by both the payor and the payee, such as credit card transactions or payment through commodities that are of an equivalent value. The present invention also allows for these real time dividends to be used for other types of transactions not limited to patents and patent royalty payments, such as the disbursement of company equity to other parties that provide value to the company.

Systems, methods, and computer program products for authenticating devices

Disclosed are non-limiting methods for authenticating devices, comprising receiving a request for a device authentication identifier, transmitting a device authentication request message via a frame embedded in a webpage of a merchant website, the device authentication request message comprising challenge data associated with a challenge, receiving a device authentication response message via the frame embedded in the webpage of the merchant website based on the device authentication request message, the device authentication response message comprising challenge response data associated with a challenge response, transmitting the device authentication identifier message based on the device authentication response message, receiving a transaction request message for a transaction, comprising the device authentication identifier and transaction data associated with the transaction, determining the device score based on the device authentication identifier, and generating, an authorization request message based on the transaction data and the device score. Systems and computer program products are also disclosed.

Generating barcodes utilizing cryptographic techniques

Various embodiments are generally directed to secure generation of barcodes using cryptographic techniques. A processor of a contactless card may generate a cryptogram based on a cryptographic algorithm and a diversified key stored in a memory of the contactless card. The processor may receive an encrypted authorization token based on verification of the cryptogram by a server. The processor may generate a barcode utilizing the encrypted authorization token.

CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
20220114542 · 2022-04-14 ·

A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes receiving, by an n.sup.th party, an (n−1).sup.th modified public key from an (n−1).sup.th party; generating, by the n.sup.th party, an n.sup.th private key and an n.sup.th public key corresponding to each other; generating, by the n.sup.th party, an n.sup.th modified public key by concatenating the (n−1).sup.th modified public key and the n.sup.th public key signed with the n.sup.th private key; and transmitting, by the n.sup.th party, the n.sup.th modified public key, where n is a natural number greater than 1, and when n=2, the first modified public key is the first public key signed with the first private key.

CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
20220116227 · 2022-04-14 ·

A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes abutting a first wearable device belonging to a first party with a second wearable device belonging to a second party; transmitting, by the first wearable device, authentication information of the first party; verifying the authentication information of the first party; transmitting, by the second wearable device, authentication information of the second party; verifying the authentication information of the second party; authorizing electronic transaction in response to successfully verifying both the authentication information of the first party and the authentication information of the second party. Each of the authentication information of the first party and the authentication information of the second party includes information configured for authentication based on a public key infrastructure (PKI) certificate.