G06Q20/38215

METHOD AND APPARATUS FOR AUTHENTICATING AND PROCESSING SECURE TRANSACTIONS USING A MOBILE DEVICE
20210117976 · 2021-04-22 ·

A method and apparatus for processing secure transactions of a requested service at a merchant point of sale (POS) using a customer mobile device and a virtual payment gateway (VPG) server, the method comprising an authentication and a transaction. The activation establishes a mobile device transport key (mTK) at the mobile device and a server, and assigns a mobile application identifier (MAID) to a mobile application of the mobile device. The transaction is based on generating a mobile device transport session key (msTK) derived from a server generated session ID and the mobile device transport key (mTK) generated during activation. The transaction of the requested service is initiated by the customer mobile device and is processed without storing confidential data such as financial account data or financial account identification data at the POS and/or the customer mobile.

System and method for two-click validation

A method to enable transactions comprising transmitting, by a vendor server, a request message to the e-commerce system for a token. Receiving a token in response to the request message. Generating an offer message including a mailto hyperlink, wherein the offer message is an email message including a mailto hyperlink is configured to generate an email reply message include the token. Transmitting the offer message to an email address associated with the customer. Receiving a response message from the e-commerce system, the response message including transaction details that confirm the token was validated by the e-commerce system. Transmitting a payment processing request message to a payment processor, wherein the payment processing request is based on the transaction details. Receiving a notification from the payment processor, that payment processing has been completed. Transmitting an email message to the email address of the customer, that payment has been processed.

Identification and verification for provisioning mobile application

Embodiments are directed to the generation of a token associated with a status. The status of the token may affect how the token is treated and the types of restrictions placed on the token. The status of the token may indicate that the token is generated based on verification of secure user data. Alternatively, the status of the token may indicate that the token is generated based on insufficient user data and, as such, restrictions may be imposed on the token. The token requestor may be a mobile application, such as a merchant mobile application provisioned on a user device. In response to a token request from the merchant, the token provider issues tokens with varying status based on a confidence level. The status of the token may be indicated in terms of token assurance level.

BLOCKCHAIN-BASED NODE MANAGEMENT METHODS AND APPARATUSES
20210158347 · 2021-05-27 · ·

Systems and methods for blockchain-based node management. In an aspect, a system receives, by an existing node of a blockchain, a target transaction, wherein the target transaction comprises a certificate of a new node and a unique identifier of the new node; verifies the target transaction by the target transaction passing consensus verification of the blockchain; and after the target transaction passes consensus verification of the blockchain to verify the blockchain, records, in a node identity table that is used to record a certificate of a blockchain node and a unique identifier that is of the blockchain node and that corresponds to the certificate, the unique identifier and the certificate of the new node.

Additive for solid rocket motor having perchlorate oxidizer
11023884 · 2021-06-01 · ·

A method for enhanced validation of an entity associated with a COF token includes: storing at least transaction data, a token requester identifier (TRJD), and a COF token identifier; receiving payment credentials, wherein the payment credentials include at least a COF-specific payment token; generating a transaction message, wherein the transaction message is formatted based on one or more standards and includes at least a plurality of data elements including at least a first data element configured to store the COF-specific payment token, a second data element configured to store the COF token identifier, a third data element configured to store the TRID, and one or more additional data elements configured to store the transaction data; and electronically transmitting the generated transaction message to a financial institution via a payment network.

Cryptographically assured zero-knowledge cloud service for composable atomic transactions

A trusted network based service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The request includes one or more inputs to perform a transaction. Based upon the request, selecting one or more computational resources from a set of a plurality of computational resources using zero-knowledge verifiable computing. In response to receiving authorization from each of the computational resources that they are capable of performing the zero-knowledge verifiable computing transactions to carry out at least a portion of the request, executing the program using zero-knowledge verifiable computing to carry out the request using a zero-knowledge protocol to ensure privacy of the first user device and the second user device. Sending to the first user device and the second user device an output of the request.

System to enable contactless access to a transaction terminal using a process data network

Systems, computer program products, and methods are described herein for a system to enable contactless access to a transaction terminal using a process data network. The present invention is configured to electronically receive from a transfer terminal, an indication that a user is accessing the transaction terminal using a user device; retrieve, from the user device, a unique identifier associated with the user device; compare the unique identifier with a block chain of authentication information associated with the user to determine whether the unique identifier meets a condition associated with the block chain authentication information; receive an indication that the unique identifier meets the condition of the block chain thereby validating user identity; and allow the user to access the transaction terminal based on at least receiving the indication that the unique identifier meets the condition of the block chain.

Cryptographically assured zero-knowledge cloud services for elemental transactions

A trusted network based service running on a server, for example as a cloud server, includes receiving a request from a first user device and a second user device. The request includes one or more inputs to perform a stateless transaction based on combinational logic. An output of the combinational logic is a function of only the one or more inputs. Based upon the request, a program is selected from a set of a plurality of programs using zero-knowledge verifiable computing to carry out the transaction. The program is executed using zero-knowledge verifiable computing. The execution of the program out the transaction based on combinational logic with the one or more inputs using a zero-knowledge protocol to ensure privacy of the first user device and the second user device. The output of the combinational logic along with proof from the zero-knowledge protocol that the combinational logic was executed without alteration.

COMPUTER-IMPLEMENTED SYSTEM AND METHOD SUITABLE FOR INCREASING THE SECURITY OF INSTANT OFF-LINE BLOCKCHAIN TRANSACTIONS
20210150522 · 2021-05-20 ·

This specification describes a system and method that enables bitcoin signed transactions to be accepted as a payment for goods and services instantly and off-line, without the need to wait for confirmation that the transaction is included in a valid block, or even for confirmation that a transaction has been received by the network. Building on the concept of a one-time signature implemented within bitcoin script, this method involves a payer providing the payee with a special compensation key at the point-of-sale which can be used to claim a time-locked deposit output when combined with a ‘revealed’ private key, if (and only if) a double-spend is perpetrated by the payee. The validity of this compensation key is guaranteed via a novel type of zero-knowledge -proof, which is highly efficient: the proof can be generated in ˜5 milliseconds and can be verified in −30 milliseconds. The use of this system in a retail setting would allow vendors to accept instant ciyptocurrency payments off-line for high value items without aggregated risk of loss, and without the need to trust a third party service.

METHOD AND DEVICE FOR IMPLEMENTING PASSWORD-FREE EMV CONTACT TRANSACTION
20210166217 · 2021-06-03 ·

A method for implementing a password-free EMV contact transaction. The method comprises: when a terminal receives transaction information, same selects an application and performs a password-free function setting; initializes the selected current application, performs an offline data validation and processes a limitation; determines, on the basis of the password-free function setting, whether the selected current application requires a cardholder to verify a PIN; if yes, then when correct PIN information inputted by the cardholder is received, performs terminal risk management, a behavior analysis, online processing, and transaction termination processing; if not, then performs terminal risk management and a behavior analysis; determines, on the basis of the password-free function setting, whether to perform online processing and performs transaction termination processing; the password-free function setting performed comprising: when an optional kernel configuration flag in an application parameter corresponding to the current application acquired is set and the transaction amount in the transaction information is greater than a password-free IC card transaction limitation amount, the current application is configured so that the need for the cardholder to verify a PIN is obviated. The present invention implements the effect of allowing password-free small-amount transactions and obviates the need to upgrade IC cards.