G06Q20/38215

Performing authenticated actions without internet connectivity

Disclosed are various embodiments for performing authenticated actions when Internet connectivity is not available. An application executed in a first computing device determines that an authenticated action is requested to be performed. The application determines that Internet connectivity is unavailable to the first computing device. The application initiates the authenticated action using a communication channel that connects the first computing device to a second computing device. The Internet is inaccessible through the communication channel.

Encapsulation of payment accounts with tokenization

A method for encapsulating transaction instrument information in a transaction includes storing, in association with a first transaction and by a processor of the primary transaction processor server, transaction data associated with a transaction instrument for a first transaction. The primary transaction processor server transmits the transaction data to a payment network processor, and receives an authorization package in response that includes a cryptograph and a first network token. The primary transaction processor server generates a second token that includes a changeable alpha-numeric string associated with the transaction instrument used in the first transaction, and transmits the second token to a merchant device. The second token indicates that a transaction associated with the second token is either i) a customer-initiated transaction or ii) a merchant-initiated transaction. The secondary transaction processor may approve or reject a transaction using the second token without a cryptogram.

IDENTITY AND LICENSE VERIFICATION SYSTEM FOR WORKING WITH HIGHLY SENSITIVE DATA

The system has a unique identifier (2) stored in client's hardware (1). Via a transfer environment (3) using a higher layer protocol (4), the unique identifier (2) is coupled to a server (5), where, in an evaluation module (6), it is connected to a substitution and calculation module (7). A w polynomial system (8) stored in the persistent memory (9) of the server (5) is also connected to the substitution and calculation module (7), the output of which is a calculated key (10). At the same time, the client's hardware (1) stores a local key (11) which is via the transfer environment (3) using the higher layer protocol (4) connected to a key comparison module (12) to which the calculated key (10) is also connected. The key comparison module (12) is through its positive output (13) and negative output (14) connected via the transfer environment (3) using the higher layer protocol (4) to a response processing module (15) which is stored in the client's hardware (1). The system, at high security levels, provides the required response speed even for a large number of users and/or licenses without significantly increasing the space/memory requirements of computing resources.

TOKEN MANAGEMENT SYSTEM AND METHOD
20220376914 · 2022-11-24 ·

A method is disclosed. The method includes transmitting, to a token service computer, a request message comprising a token requestor identifier associated with the token requestor and a service provider computer identifier associated with the service provider computer. The method also includes receiving a response message comprising the token and/or a cryptogram, generating an authorization request message comprising the token and the cryptogram, and transmitting the authorization request message to a processing computer in communication with a token service computer.

USING UNIQUE IMAGE OR PHOTO TO SECURE DATA FOR MOBILE PAYMENT APPLICATIONS AND NETWORKS
20220376899 · 2022-11-24 ·

An image or photo on a smart device is reduced to its base binary format and transmitted to a secured server during a negotiation with a client. The binary data received is separated into an encrypted Public Key and an encrypted Private Key on the secured server. The encrypted public key is sent back to the smart device as encrypted data. The public key encrypted data incorporates the PSI and financial data into a dynamic blockchain string and transmits the encrypted dynamic blockchain data back to the secured server via secured web services for decryption. The encrypted private key residing on the secured server decrypts the incoming encrypted personal sensitive information, executes the transaction and transmits the transaction data to multiple secured databases located across multiple encrypted servers located on multiple secured server farms.

DIGITAL ASSET MANAGEMENT
20220374888 · 2022-11-24 · ·

Methods and systems for digital asset management are discussed herein. Physical assets, such as a seat or group of seats in a venue (e.g., sports stadium, concert hall, movie theater, etc.) or a housing unit or group of housing units (e.g., apartment, condominium, hotel room, etc.) may be tokenized and associated with a minted non-fungible token (NFT). The NFT may be entered into a distributed ledger such that, when the asset is involved in a transaction (e.g., rented, purchased, etc.), a record of the transaction is securely and permanently entered into the distributed ledger. By utilizing the NFT and the distributed ledger during the transaction of the asset, all participants involved can be assured that proper and secure compensation is being provided for use of the asset.

Cryptocurrency payment and refund processing on a transaction terminal

A transaction terminal provides processing for payment using a cryptocurrency during a transaction being conducted at the transaction terminal. The transaction terminal further provides processing for a refund transaction utilizing cryptocurrency.

Post-paid process and system for multipurpose disconnected terminals
11507949 · 2022-11-22 ·

This post-paid process and system for disconnected terminals solves the problem of a disconnected terminal being able to perform post-paid operations securely, using an electronic device of the user to communicate with a central server which creates a token with a temporal validity that serves to activate a compound of the disconnected terminal and, optionally, additional hardware. All operations performed in the terminal are locked to make it impossible to alter the data and signed with a cryptographic key before using the client device as transportation for the operations block to be processed in the central server and charged.

Dampening token allocations based on non-organic subscriber behaviors
11593721 · 2023-02-28 · ·

Described processes include: determining portions of instances of a cryptographic token to be allocated to record providers, like providers of an asset indicated by a record, wherein: the portions are determined based on network effects associated with the records the record provider supplied on performance of a computer-implemented network in which both record providers and record consumers participate, patterns indicative of inorganic consumption may be determined from one or more of interactions of individual consumers, interactions of collections of consumers, or consumer interactions in the aggregate for a given provider or record; and the effects on network performance are adjusted responsive to designation of one or more entities as exhibiting inauthentic behavior; and appending to a distributed ledger, records indicating the respective portions, and adjustments, are allocated to record providers.

Method and system for decentralized transaction management in project resourcing
11507923 · 2022-11-22 · ·

A method and system for decentralized transaction management in project resourcing is provided that ensures transparent and decentralized tracking of data across all stakeholders. It also provides ease of compliance for organizations on one hand, and ease of monitoring for the administrators on the other. Multiple beneficiaries and benefactors are registered with a primary administrator. Each beneficiary has a list of projects listed. A benefactor identifies a project which he wants to resource. The benefactor virtually transfers a unit of resource to a secondary administrator, for the identified project and receives credit points in exchange of the units of resource. The benefactor approves transfers of credit points to the identified project of a beneficiary. The beneficiary redeems the required credit points with the resource units. The secondary administrator will also validate the resources received by the beneficiary in exchange for the credit points.