Patent classifications
G06Q20/38215
GAIN AND LOSS COMPUTATION FOR CRYPTOCURRENCY TRANSACTIONS
Systems and methods for gain and loss computation for cryptocurrency transactions. An example method comprises: identifying a plurality of cryptocurrency trading transactions associated with an accounting perimeter of a plurality of accounting perimeters associated with one or more cryptocurrency trading accounts, wherein each cryptocurrency trading transaction of the plurality of cryptocurrency trading transactions is represented by one of: a cryptocurrency acquisition transaction or a cryptocurrency disposal transaction; for a given transaction perimeter, assigning each cryptocurrency trading transaction associated with the transaction perimeter to a transaction bucket of the sequence of transaction buckets associated with the transaction perimeter, wherein the transaction bucket is identified by a start time and an end time, and wherein the transaction bucket is selected based on a timestamp of the cryptocurrency trading transaction, such that the timestamp falls between the start time and the end time; for a given transaction bucket, matching each cryptocurrency disposal transaction associated with the given transaction bucket to one or more cryptocurrency acquisition transactions associated with the given transaction bucket; determining, for each of the matched transactions, a corresponding fiat currency transaction amount; and computing, using the fiat currency transaction amounts, one of: a gain associated with the cryptocurrency disposal transaction or a loss associated with the cryptocurrency disposal transaction.
CRYPTOASSET CUSTODIAL SYSTEM WITH CUSTOM LOGIC
Methods and systems including: receiving a request to take an action in a cryptoasset custodial system for an account holder; authenticating a policy map associated with the action, wherein the policy map defines access control rules governing which actions are allowed under conditions including a threshold number of endorsements needed; and validating endorsement messages for the action by checking digital signatures of the received endorsement messages, wherein at least one of the validated endorsement messages has been generated by digital signing with a first private key of a person, who is associated with the account holder, and at least one of the validated endorsement messages has been generated by digital signing with a second private key of a program, which is associated with the account holder, responsive to the program confirming one or more circumstances specified by the account holder are met at a time when the program is run.
Real-time authorization of initiated data exchanges based on tokenized data having limited temporal or geographic validity
The disclosed exemplary embodiments include computer-implemented systems, apparatuses, and processes that, among other things, authorize initiated exchanges of data based on tokenized data characterized by a limited temporal or geographic validity. For example, an apparatus may receive a first signal that includes first information identifying a first geographic position of a client device. The apparatus may also obtain a digital token representative of a pre-authorization of a data exchange between the client device and a terminal device during a corresponding temporal interval. The terminal device may, for example, be disposed within a geographic region that includes the first geographic position of the client device. The apparatus may generate and transmit a second signal that includes the digital token to the client device. In some examples, the apparatus may transmit the second signal being through a programmatic interface associated with an application program executed by the client device.
Systems and methods for provisioning digital identities to authenticate users
Systems and methods are provided for use in provisioning digital identities for users. One exemplary method includes receiving, at a card device, an authentication request and a captured first biometric of a user, from a communication device associated with the user, and comparing the first biometric and a first biometric reference at the card device, in response to the first biometric reference being stored at the card device. The method also includes capturing, at the card device, a second biometric of the user and comparing the second biometric to a second biometric reference stored at the card device. The method further includes compiling a response to the authentication request including a first indicator of the comparison of the first biometric to the first biometric reference and a second indicator of the comparison of the second biometric to the second biometric reference, and transmitting the response to the communication device.
Mobile payment systems and methods for in-store and online purchases
Systems and methods for implementing mobile payments. In an aspect of in-store purchase, a merchant sends a payment amount and merchant account info to transaction center. A buyer sends a code and buyer account info to transaction center. The code represents the merchant. In an aspect of online purchase, an e-commerce merchant provides options for a buyer to use names other than a first name plus a surname. In one embodiment, a buyer submits a shortened name or nickname for online purchases when a given payment service is used as a payment method.
SYSTEM AND METHOD FOR USING IMAGE DATA TO TRIGGER CONTACTLESS CARD TRANSACTIONS
A method for controlling a near field communication between a device and a transaction card is disclosed. The method includes the steps of capturing, by a front-facing camera of the device, a series of images of the transaction card and processing each image of the series of images to identify a darkness level associated with a distance of the transaction card from the front of the device. The method includes comparing each identified darkness level to a predetermined darkness level associated with a preferred distance for a near field communication read operation and automatically triggering a near field communication read operation between the device and the transaction card for the communication of a cryptogram from an applet of the transaction card to the device in response to the identified darkness level corresponding to the predetermined darkness level associated with the preferred distance for the near field communication read operation
Managing electronic cryptocurrencies
A method and system are configured for performing a transfer of digital currency from an owner of the digital currency to a recipient of the digital currency. The transfer of digital currency includes transferring a sequence of digitally signed transactions from the owner to the recipient. The method and system are further configured for recording the performed transfer of digital currency to a block chain public ledger, generating a digital contract for the recipient that converts the transferred digital currency from an intangible asset type to a financial asset type, and storing the generated digital contract along with electronic credentials associated with accessing the digital currency in a holding account for the recipient.
SYSTEM AND METHOD FOR IMPLEMENTING MARKET DATA RIGHTS ENFORCEMENT
An embodiment of the present invention is directed to delivering an entitlements model that scales to both mid-frequency and low-latency use cases. The innovative solution may be distributed in nature and able to operate in low priority threads alongside the main logic of the software. An embodiment of the present invention may be implemented as a software module with APIs for ease of adoption.
Computer system and method for more efficiently storing, issuing, and transacting tokenized blockchain game assets managed by a smart contract
A computer system and method is disclosed including a vault application to facilitate the transacting of game assets represented by tokens managed by a smart contract via a hybrid approach that permits certain transactions of game assets to be conducted using an in-game centralized database approach (which does not necessarily include a decentralized network) and other transactions to be managed on a decentralized network, via a blockchain or other distributed ledger technology (DLT) network.
Confidential blockchain transactions
A computer-implemented method includes: determining assets held by a remitter, the assets to be spent in a remittance transaction between the remitter and one or more payees, in which each asset corresponds to a respective asset identifier, a respective asset amount, and a respective asset commitment value; determining a remitter pseudo public key and a remitter pseudo private key; determining a cover party pseudo public key, in which the cover party pseudo public key is obtained based on asset commitment values of assets held by the cover party; and generating a linkable ring signature for the remittance transaction.