G06Q20/38215

DETERMINATION AND CORRELATION OF FLOW STATES
20210127981 · 2021-05-06 ·

A method includes receiving, from a sensor, a signal associated with a user. The method further includes determining, by a processing device, based on the signal, that the user is in a flow state.

Blockchain Cross-Chain Non-Fungible Token Exchange
20210133700 · 2021-05-06 ·

A system and corresponding method exchange a nonfungible token (NFT) via blockchain cross-chain fungible token transfers. The system comprises first and second blockchains. The first blockchain holds the NFT in a first escrow digital wallet. The NFT is available for trade by a seller and is associated with a trade value. The first blockchain monitors a balance of fungible tokens, owned by a buyer, that are transferred from a second blockchain to a second escrow digital wallet of the first blockchain. In response to detecting that the balance monitored represents the trade value, the first blockchain transfers, simultaneously, (i) the NFT from the first escrow digital wallet to a first digital wallet of the first blockchain, the first digital wallet owned by the buyer, and (ii) the balance of fungible tokens from the second escrow digital wallet to a second digital wallet of the second blockchain, the second digital wallet owned by the seller.

SYSTEMS AND METHODS FOR ISSUING AND USING DEDICATED TOKENS FOR REWARDS ACCOUNTS

Systems and methods for issuing and using dedicated tokens for rewards accounts are disclosed. In one embodiment, in a token service provider information processing apparatus comprising at least one computer processor, a method for issuing dedicated tokens for reward accounts may include: (1) receiving, from an electronic wallet, a request to provision a credit or debit-based token for a financial instrument and a dedicated reward-based token for rewards-based transactions associated with the financial instrument to an electronic wallet; (2) generating the credit or debit-based token and the dedicated reward-based token; and (3) providing the credit or debit-based token and the dedicated reward-based token to the electronic wallet and to the issuing bank.

REAL-TIME AUTHORIZATION OF INITIATED DATA EXCHANGES BASED ON TOKENIZED DATA HAVING LIMITED TEMPORAL OR GEOGRAPHIC VALIDITY

The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data based on tokenized data characterized by a limited temporal or geographic validity. For example, an apparatus may receive a first signal that includes first information identifying a first geographic position of a client device. The apparatus may also obtain a digital token representative of a pre-authorization of a data exchange between the client device and a terminal device during a corresponding temporal interval. The terminal device may, for example, be disposed within a geographic region that includes the first geographic position of the client device. The apparatus may generate and transmit a second signal that includes the digital token to the client device. In some examples, the apparatus may transmit the second signal being through a programmatic interface associated with an application program executed by the client device.

PRIVATE KEY SECURITY IN THE CLOUD
20230412398 · 2023-12-21 · ·

Techniques for providing to a user with an anonymous user signature on a message in a distributed decentralized network are presented. The techniques use a hardware security module and a certificate authority. The certificate authority: obtains a credential that includes a certificate for the user, where the certificate includes a user public key and a plurality of user attributes; receives a request for a signature on the message, where the request includes an indication of a subset of the plurality of user attributes to be revealed; accesses from the hardware security module a user secret key; and provides to the user at least the message signed by the user secret key and a zero-knowledge proof that establishes that the message is signed by the user secret key corresponding to the user public key in the credential without revealing the plurality of user attributes.

Systems and Methods for Booking Resources
20230409985 · 2023-12-21 ·

Embodiments relate to a system for booking a resource, the system being configured to receive resource data, resource record data, and offer data. The system associates an offer with a resource and a resource record to generate a booking offering, which is transmitted to a user. The system presents the resource, the resource record, the offer, and the booking offering to the user at a user-device. The system receives a selection, by the user on the user-device, of the booking offering. The system then facilitates a transfer of electronic funds from a user to a commercial partner upon selection of the booking offering, and facilitates a transfer of an electronic certificate representative of the offer from the commercial partner to the user.

VIRTUALIZATION AND SECURE PROCESSING OF DATA
20210065176 · 2021-03-04 ·

Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the 5 secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of payment transactions and other secure data processes. In various aspects and embodiments the disclosure provides secure means for the authorization of sensitive and other data processes subject to controlled access. Such processes include, for example the creation, administration, 10 authorization, virtualization, storage, and other manipulation or processing of electronic data representing characteristics of, instructions for, and information associated with consumer, business, and other payment accounts, and other forms of secure payment elements, such as payment tokens; and data useful in processing transactions using such accounts and elements. Information associated with 15 particular payment means, such as accounts or payment tokens, can be stored, for example, in a data set, usually secure, sometimes referred to as a virtual or electronic wallet, or a secure payment token.

METHOD AND SYSTEM FOR PROVISIONING ACCESS DATA TO MOBILE DEVICE
20210044974 · 2021-02-11 ·

A method and system for provisioning access data in a second application on a mobile device using a first application on the mobile device. Authentication data may be input into the first application, and an authentication code may be requested from a remote server. After the authentication code is received by the first application in the mobile device, it can pass the authentication code to a second application that initiates an access data provisioning process.

Method and apparatus for authenticating and processing secure transactions using a mobile device
10915902 · 2021-02-09 · ·

A method and apparatus for processing secure transactions of a requested service at a merchant point of sale (POS) using a customer mobile device and a virtual payment gateway (VPG) server, the method comprising an authentication and a transaction. The activation establishes a mobile device transport key (mTK) at the mobile device and a server, and assigns a mobile application identifier (MAID) to a mobile application of the mobile device. The transaction is based on generating a mobile device transport session key (msTK) derived from a server generated session ID and the mobile device transport key (mTK) generated during activation. The transaction of the requested service is initiated by the customer mobile device and is processed without storing confidential data such as financial account data or financial account identification data at the POS and/or the customer mobile.

PROVISION OF LOCATION-SPECIFIC USER INFORMATION

According to an example aspect of the present invention, there is provided a method, comprising: receiving user information provided by a user equipment, associating spatiotemporal information with the user information on the basis of location of at least one wireless access network device in communication with the user equipment, generating a proof of location indication transaction associated with the user information on the basis of the spatiotemporal information, and providing the proof of location indication transaction to a distributed ledger.