G06Q20/38215

AGENTS AND SYSTEMS FOR RIGHT?S MANAGEMENT
20220114266 · 2022-04-14 ·

An information system is provided that enables stakeholders to define a secure data object that sets permissions, rules, and rights for an asset. The secure data object may be communicated to entities, such as computer hosts or hardware agents, and the entities are enable to act within the permissions, rules, and rights to conduct transactions and gather information as agents of the stakeholders. The secure data object may be received into a hardware agent attached to an asset, and the agent may have sufficient permission to monitor environmental conditions, adjust pricing, consummate a transaction, or communicate a report.

CHAIN OF AUTHENTICATION USING PUBLIC KEY INFRASTRUCTURE
20220116231 · 2022-04-14 ·

A method for sequential authentication based on chain of authentication using public key infrastructure (PKI) is provided. The method includes generating, by a user, a first private key and a first public key corresponding to each other; generating, by an n.sup.th service provider, an n.sup.th private key and an n.sup.th public key corresponding to each other; transmitting, from the user to the n.sup.th service provider, a level n key; verifying, by the n.sup.th service provider, the level n key; generating, by the n.sup.th service provider, a level (n+1) key by concatenating the level n key and the n.sup.th public key signed with the n.sup.th private key; and transmitting, by the n.sup.th service provider, the level (n+1) key to the user, where n is a natural number, and when n=1, the level 1 key is the first public key signed with the first private key.

SYSTEMS AND METHODS FOR GENERATING, SECURING, AND MAINTAINING EMOJI SEQUENCE DIGITAL TOKENS

Accordingly, systems and methods for purchasing, securing, and maintaining emoji sequences is presented herein. In one or more examples, an enterprise or user can generate or purchase an emoji sequence, which can include a sequence of emojis that can be used to uniquely identify an enterprise. Once the emoji sequence has been acquired, in one or more examples, the emoji sequence can have a digital token associated with it, wherein the digital token can be derived from the emoji sequence string, in a manner that is unique and deterministic.

System and method for unified multi-channel messaging with block-based datastore

Aspects of the present disclosure involve systems, methods, devices, and the like for communicating with a unified messaging center using multi-channel messaging with block-based datastore. In one embodiment, a system is introduced that can provide a unified experience and capability for messaging with one or more entities across platforms. The messaging capability includes the ability to provide user interaction using a single architecture with data store in a centralized form. In one embodiment, the data store includes the use of blockchain technology wherein each interaction with the user and across platforms is recorded and stored on a cryptographed block.

METHOD AND DEVICE FOR CONTROLLING A CRYPTOCURRENCY
20220092561 · 2022-03-24 ·

A method for controlling a cryptocurrency based on a bonding curve predefined for a rate of the cryptocurrency. In the method, in a commercial transaction involving the cryptocurrency, a shift of the curve to be applied is calculated based on a previous course of the rate. The curve is integrated and the rate for the commercial transaction is set based on the curve and on a predefined bid-ask spread. The course is updated. Effects of the commercial transaction on the rate are established and taken into account.

SMART CARD WITH REVERSE PAYMENT TECHNOLOGY
20220108287 · 2022-04-07 ·

Apparatus and methods are provided for a smart card which enables users to securely complete online transactions without entering any sensitive transaction information into a third-party system. The smart card may include a microprocessor and wireless interface. The wireless interface may provide wireless communication capabilities and the ability to initiate online payments based on information captured by the touch-sensitive screen. The wireless interface may receive communications from a merchant or issuer bank requesting payment. The microprocessor may be configured to download contact names and associated contact phone numbers from a cloud computing account. The user may select a contact name. The microprocessor may be configured to resolve a contact bank account and contact smart card associated with a contact phone number. The microprocessor may be configured to send a payment request to the contact bank account and contact smart card.

METHOD OF AUTHENTICATING A CUSTOMER, METHOD OF CARRYING OUT A PAYMENT TRANSACTION AND PAYMENT SYSTEM IMPLEMENTING THE SPECIFIED METHODS
20220101286 · 2022-03-31 ·

The invention relates to the field of technical infrastructures that ensure the implementation of financial transactions between economic entities, in particular to payment systems that provide ease of use and confidential data security.

The present invention is the method of authenticating a customer, the method of carrying out a payment transaction comprising said authentication method, and the payment system implementing the specified methods, which ensure the achievement of a technical effect consisting in expanding the functionality of the payment system and reducing its vulnerability, in particular, by making it possible to conduct a payment transaction in a contactless way, on condition that the reference value of the customer authentication data is stored exclusively on the customer's device, as well as by combining the advantages of online and offline customer authentication procedures.

Methods for User Authentication using Non-Fungible Digital Assets
20220101316 · 2022-03-31 ·

The present disclosure involves a method for grouping non-fungible digital tokens. The method includes generating a first transaction on a blockchain having an output of a fungible digital token, with the fungible digital token having a first transaction hash identifier. The method further includes assigning the first transaction hash identifier associated with the fungible digital token with a cryptographic public key, and generating a second transaction on the blockchain having an output of a non-fungible digital token and an input. The fungible digital token is spent as the input into the second transaction, with the non-fungible digital token comprising a second transaction hash identifier and a group identifier associated with the first transaction hash identifier.

PAYMENT TOKEN
20220101317 · 2022-03-31 ·

Examples implementations relate to payment tokens. An example includes a customer computer creating a first data buffer, with a set of customer-specified parameters, signing the first data buffer with a customer private key, associating a customer public key to the signed first data buffer to create a first data record that is communicated to a service provider. The service provider computer creates a second data buffer with a set of service provider-specified parameters, signs the second data buffer with a first private key of the service provider, associates a first public key of the service provider to the signed second data buffer to create a second data record, combines the first and second data records, signs the combined data record with a second private key of the service provider, and associates a second public key of the service provider to the combined data record.

Blockring service, system, and method thereof
11288663 · 2022-03-29 ·

A blockring service system may include a processor and memory, wherein the processor is configured to: receive a blockring request from the at least one user node; parse the request to derive blockring parameters; generate a blockring having a plurality of blocks connected by bonds based on the blockring parameters; and send the blockring to the at least one user node for distribution.