G06Q20/38215

AUTONOMOUS EXCHANGE VIA ENTRUSTED LEDGER DIGITAL SIGNATURE MANAGEMENT AND ADMINISTRATION
20220393881 · 2022-12-08 · ·

A signature is a unique identifier that is created by the signor or signatory for the purpose of acknowledging or otherwise providing acceptance of a transaction such as signing a check, contract or other transactional vehicle. The system and method disclosed herein provides for the authenticating and tracking of each signature within a digital environment such as a blockchain by applying a unique identifier to each signature. The identifier created for the signature is then attached to the vehicle being signed such as a document or a contract, which is then also assigned an identifier to enable the permanent association of the signature and the vehicle that was signed. These unique identifiers ensure that the signature and the associated vehicle or correspondence being signed cannot be copied, separated or otherwise used more than a single time during a single signing event.

MACHINE-TO MACHINE AUTHENTICATION THROUGH TRUSTED CHAIN OF OWNERSHIP

Methods and systems for direct, machine-to-machine authentication through a trusted chain of ownership are disclosed. One method includes receiving, at a first device from a second device, a request for a certificate proof. The method also includes transmitting, to the second device, and in response to the request, the certificate proof from the first device, an entry of the proof being recorded on a distributed ledger. The certificate proof is useable by the second device to authenticate the first device based on a comparison of the proof and the entry on the distributed ledger, thereby establishing trust with the first device at the second device.

Systems and methods for providing digital identity records to verify identities of users

Systems and methods are provided for verifying identities of users. One exemplary method includes generating a unique identifier (ID) for a user, generating a public/private key pair associated with the unique ID for the user, and receiving at least two images. The images include a first image associated with a physical document indicative of an identity of the user and a second image comprising an image of at least part of the user. The exemplary method further includes validating an integrity of the first image, converting at least the first image to one-way hashed data, when the integrity of the first image is valid, and transmitting the hashed data signed with the private key, the unique ID and the public key to an identification provider, whereby a digital identity record for the user is stored in a ledger data structure.

DISTRIBUTED NETWORK WITH CONSENSUS MECHANISM

An aspect of the invention relates to a distributed network comprising a plurality of network nodes. The distributed network is configured to perform a method for reaching a consensus on a sequence of values in an advantageous manner. The method performs consecutive notarization rounds. The notarization rounds comprise steps of creating value proposals to be added to the sequence, communicating the value proposals to a notarization subset of the plurality of nodes and performing a validity check of received value proposals. The notarization rounds may comprise further steps of executing individual notarization signatures on a subset of the value proposals that are valid. The notarization rounds may further comprise performing a consistency check of the value proposals and executing consistency signatures on a subset of the value proposals. The method may further comprise a finality procedure to finalize a value proposal once a predefined finality rule set has been fulfilled.

SYSTEMS AND METHODS FOR VALIDATION OF POLICIES OF A SMART CONTRACT ON A CENTRALIZED OR DISTRIBUTED DIGITAL LEDGER

Systems and methods are described for policy-validated transactions using a centralized or distributed ledger. A request to execute a transaction and a transaction signature is received from a user's computing device. The transaction signature is generated with a private key of the user's computing device. The transaction corresponds to a token associated with the user's computing device and the transaction is subject to a first policy of a set of one or more policies. The transaction signature corresponds to the request to execute the transaction is determined using a public key of the user's computing device. In response to the determination, the token associated with the user's computing device is retrieved from the centralized or distributed ledger. The transaction is executed if the token is associated with the first policy and the token is valid.

Collector Container for Non-Fungible Token (NFT) Assets

According to one exemplary implementation, a collector container includes processing hardware, an output device controlled by the processing hardware; and a memory storing a digital wallet. The collector container is configured to uniquely store a non-fungible token (NFT) in the digital wallet, the NFT certifying ownership of an NFT asset. The collector container is further configured to store the NFT asset in the memory, and to display the NFT asset using the output device.

INTERACTIVE METHOD FOR RURAL BARTER
20220383290 · 2022-12-01 ·

A new interactive method for Barter destined specifically for the rural area, which refers to a new embodiment of token unbacked by computer processing. Where the Barter becomes an operation with tokenized asset associated to marketplaces/hub, social networks, and hubs, in a platform which mixes social network elements with e-commerce, with the purpose of approximating buyers and sellers who use Barter operations and further providing a space for exchange of information, with the creation and facilitating of smart contracts. Where the tokens are used for interactions with producers and suppliers in a marketplace mixed with social media, taking into account the trustfulness generated by the feedback with the social networks.

PAYMENT CARD SECURITY
20220383308 · 2022-12-01 ·

Disclosed is a system and method for more secure card transactions. The security is generated by the use of a dynamic transaction number which is valid for only a single predetermined time interval. The transaction number is generated through a two step process. In a first step, time is used as an input to a transaction number function. The transaction number function outputs a plurality of digits. The second step uses the plurality digits for input and uses a ruleset to strip at least one digit to determine the transaction number valid for the predetermined time interval.

Electronic payment processing using adjusted interchange rate

An encrypted payment message is received from a buyer relating to a transaction with a merchant. The payment message is parsed using a first parsing algorithm to obtain merchant identifying information. The merchant identifying information is associated with at least a second parsing algorithm or at least one settlement algorithm. The payment message is parsed using the second parsing algorithm to obtain payment information for the transaction. A first settlement algorithm is applied to the payment information to determine an adjusted interchange rate. The payment information including the adjusted interchange rate is submitted to a third party settlement processor on behalf of the merchant, using a payment algorithm. A second settlement algorithm applied to the payment information determines a buyer rebate which can be submitted to the settlement processor. A transaction result is reported to at least one of the merchant or the buyer.

Document generation with dynamic watermarking

Techniques are described for generating and presenting a digital document for a transfer. A check service may generate the digital document based on provided check data. The digital document may be stored on a user device and presented to a recipient, for example through the display of the user device. The digital document may also be provided to the recipient in an email or other type of communication. The check service may generate a digital watermark to include on the digital document. The watermark may be unique to the particular document, and may be algorithmically generated based on data that is associated with the particular document, such as a serial identifier, a transaction identifier, an amount, a user identifier of the sender, etc. The digital watermark may be regenerated when the recipient presents the document for payment, to confirm document validity.