Patent classifications
G06Q20/38215
METHOD FOR PROVIDING DATA SECURITY USING ONE-WAY TOKEN
A new processing method is disclosed. The processing method includes receiving by a server computer, an update request message from a first authorizing computer for an interaction between two users. The update may be a transfer of interaction value from a first user to a second user, and may include such interaction details as the interaction value and information for a one-way token. The server computer may parse the update request message to determine the one-way token, and may determine a second account of the second user from the token. The server computer may determine a second authorizing computer associated with the second account, and may modify the update request message to include a second user account identifier as well as value adjustments based on calculated interaction velocities. The server computer may forward the update request message to the second authorizing computer for updating the account accordingly.
BLOCKCHAIN METHODS, NODES, SYSTEMS AND PRODUCTS
Proposed is a scalable and computationally light approach to validating blockchains called the Catastrophic Dissent Mechanism (CDM). CDM uses anonymous actors who are free to join and leave the system as they please. The mechanism gives all actors strong incentives to behave honestly, both as individuals, and as members of coalitions who might benefit in compromising the integrity of the blockchain. As a result, CDM offers users Strategically Provable Security (SPS). CDM provides a foundation to create an ecosystem of federated chains which can share heterogeneous tokens using different business logic. As a result, new instances of chains can be created to serve as inexpensive, scalable platforms for a wide variety of blockchain applications and to provide a path for existing instances to be upgraded or altered without the use of hard forks or breaking the rule that code is law.
SYSTEMS AND METHODS FOR CONTROLLED IP ACCESS USING A DISTRIBUTED LEDGER
Systems and methods for controlled IP access using a distributed ledger are disclosed. An example system may include a controller configured to: access a distributed ledger including intellectual property (IP) data about IP assets, where the IP assets include an aggregate stack of IP; tokenize the IP data; and interpret a distributed ledger operation corresponding to one of the IP assets. The controller may also be configured to: determine an analytic result value in response to the distributed ledger operation and the tokenized IP data, where the analytic result value includes statistical information corresponding to access events for an IP asset or distribution of IP assets according to access event rates; and to provide a report of the analytic result value; and record a transaction on the distributed ledger in response to providing the report.
Implementation of continuous real-time validation of distributed data storage systems
Provided herein is a system and method for implementing a real-time and continuous validation tool for a distributed ledger-based computing system (i.e., blockchain). In one or more examples a real-time validation tool and system can continuously monitor a blockchain computing system for activities that indicate abnormal or risky behavior, and can generate a report to a user that details those events. The real-time validation tool can be implemented as a node in a blockchain computing system and can use information gleaned from blockchain activity occurring in real-time as well as external data gathered from various sources to determine if one or more events has occurred that is indicative of abnormal or risky activity occurring within the blockchain computing system. The validation tool can be used to improve and secure an existing blockchain computing system against cyber intrusions and various integrity issues.
Bin-conserving tokenization techniques generating tokens in reverse order and employing common device pan with differing pan sequence number values across token instances
A payment token is generated within a token bank identification number (BIN) range, and is linked with an underlying account number of a consumer. A first instance of the token is made available in at least one of a first portable electronic device, a first mobile payment application (MPA), and a first web wallet of the consumer with an associated first primary account sequence number (PSN). A second instance of the token is made available in at least one of a second portable electronic device, a second mobile payment application (MPA), and a second web wallet of the consumer with an associated second primary account sequence number (PSN).
DIGITAL IDENTITY MANAGEMENT DEVICE
An identity management device and system. The device comprises a processor operably coupled to a memory, a display, and a communication interface. The device can have stored thereupon instructions that, when executed by processor, cause the processor to implement a user device interface configured to receive, from user device through the communication interface and store in the memory, at least one identification record comprising visually depictable identification data and a user interface configured to update the display to depict the visually depictable identification data. The identification record can comprise authentication data. Authentication data can be displayed on the device or securely transmitted.
SYSTEM AND METHOD FOR DIGITAL ASSET TRANSFER
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for digital asset buyback. One of the methods includes: obtaining a request for buying back a digital asset from a first blockchain account, the request comprising a quantity of the digital asset; identifying, based on the request, a blockchain contract that is deployed on the blockchain and that corresponds to the digital asset; generating a blockchain transaction for transferring the quantity of the digital asset from the first blockchain account to a second blockchain account associated with digital asset buyback, wherein the blockchain contract comprises a restriction prohibiting transfer of the digital asset out of the second blockchain account; and sending, to a blockchain node for adding to the blockchain, the blockchain transaction for transferring the quantity of the digital asset from the first blockchain account to the second blockchain account.
CRYPTOASSET CUSTODIAL SYSTEM WITH PROOF-OF-STAKE BLOCKCHAIN SUPPORT
Methods and systems for secure storage and retrieval of information, such as private keys, useable to control access to a blockchain, include: receiving, in a cryptoasset custodial system, a request to authorize a staking operation associated with a blockchain, wherein the staking operation is associated with a private key of an asymmetric cryptographic key pair, the private key is usable to control ownership of a cryptoasset recorded in the blockchain, and the private key is securely held in the custodial system; performing, in response to the request, a portion of the proof-of-stake protocol in a hardware security module using logic designed for the protocol, wherein the logic in the hardware security module is configured to authorize the staking operation by digitally signing an associated staking transaction; and sending the digitally signed staking transaction to another computer to effect the staking operation on behalf of the user.
Card not present transaction system and method for operating card not present transaction system to simplify hardware required at client sites
A card not present (CNP) transaction system includes a transaction control device for scanning a barcode to obtain transaction information and an address of a middleware and to send a connection message to the address of the middleware according to the transaction information, the middleware for establishing a connection with a transaction control device according to the connection message received, to obtain a transaction token and a transaction amount from the transaction control device through the connection and to send a transaction message according to the transaction token and the transaction amount, and an acquirer server for receiving the transaction message to establish a connection with the middleware and to generate a transaction confirmation message to the middleware according to the transaction message after verifying the transaction token.
Method for controlling and prioritizing a user-specific recharging of an energy storage device of a motor vehicle and a control device, charging management device, server apparatus, and motor vehicle for achieving the same
A method for controlling a charging operation of an energy storage device of a motor vehicle. A control device carries out the following: establishment of a prioritization of a motor vehicle for user-specific recharging of the energy storage device on the basis of the established prioritization; determination of a charging capacity predetermined by the prioritization for a recharging operation, depending on the determined charging capacity; creation of a digital certificate, which describes the determined charging capacity; and transmission of the created certificate to a charging management device of the motor vehicle. Depending on the charging capacity described by the certificate transmitted to the charging management device of the motor vehicle: generation of a control signal, which describes a course of the charging operation with the described charging capacity; and transmission of the created control signal to an energy delivery device of a charging station apparatus. Optionally, the charging capacity can be reduced by the certificate in the motor vehicle.