Patent classifications
G06Q20/38215
COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR ENABLING ZERO-KNOWLEDGE PROOF
The invention relates to efficient zero knowledge verification of composite statements that involve both arithmetic circuit satisfiability and dependent statements about the validity of public keys (key-statement proofs) simultaneously. The method enables a prover to prove this particular statement in zero-knowledge. More specifically, the invention relates to a computer-implemented method for enabling zero-knowledge proof or verification of a statement (S) in which a prover proves to a verifier that a statement is true while keeping a witness (w) to the statement a secret. The invention also relates to the reciprocal method employed by a verifier who verifies the proof. The method includes the prover sending to the verifier a set of data including a statement, which for a given function circuit output and an elliptic curve point, the function circuit input is equal to the corresponding elliptic curve point multiplier. The data includes individual wire commitments and/or a batched commitment for the circuit of the statement, an input and an output. The prover can include in the data, or have shared in advance, the specification of the or each elliptic curve used in the statement. The prover then sends an opening, in response to a challenge from the verifier. Alternatively, the prover additionally includes a proving key. With the data received from the prover, the verifier is able to determine that the circuit is satisfied and calculate the elliptic curve point and validate the statement, thus determining that the prover holds the witness to the statement. Upon receiving the data the verifier determines through calculations that the data complies with the statement.
COMPUTER-IMPLEMENTED SYSTEM AND METHOD FOR TRUSTLESS ZERO-KNOWLEDGE CONTINGENT PAYMENT
The invention relates to efficient zero knowledge verification of composite statements that involve both arithmetic circuit satisfiability and dependent statements about the validity of public keys (key-statement proofs) simultaneously. The method enables a prover to prove this particular statement in zero-knowledge. More specifically, the invention relates to a computer-implemented method for enabling zero-knowledge proof or verification of a statement (S) in which a prover proves to a verifier that a statement is true while keeping a witness (W) to the statement a secret. The invention also relates to the reciprocal method employed by a verifier who verifies the proof. The method includes the prover sending to the verifier a statement (S) having an arithmetic circuit with m gates and n wires configured to implement a function circuit and determine whether for a given function circuit output (h) and an elliptic curve point (P), the function circuit input (s) to a wire of the function circuit is equal to the corresponding elliptic curve point multiplier (s). The prover also sends individual wire commitments and/or a batched commitment for wires of the circuit, an input for a wire in the arithmetic circuit; and a function circuit output (h). The prover receives from the verifier a challenge value (x) and responding with an opening or additionally sends a proving key (PrK) to the verifier. The statement and the data enables the verifier to determine that the circuit is satisfied and calculate the elliptic curve point (P) and validate the statement, thus determining that the prover holds the witness (W) to the statement.
SYSTEM AND METHOD FOR MANAGING FUND TRANSFERS
The present disclosure provides a system and method for managing fund transfer. The system has one or more processors and a memory coupled to the processors and enables a user to link financial accounts to a user account, verify KYC documents before linking the financial accounts, and generates a unique code comprising details of the user account to safely transfer funds such as cryptocurrency. The system is further configured to executed at least one financial service request utilizing the unique code. A method for fund transfer and a system architecture for data routing for fund transfer is also provided herein
Payment authentication system for electronic commerce transactions
A payment managing system and method for enhancing the security of electronic user payment data can include employing a two factor authentication and keeping e-commerce host system outside the PCI scope. The two-factor authentication can include using a session ID and a one-time token (OTT). The session ID can identify a payment session that is initiated upon initiation of an e-commerce transaction. The payment managing system can provide a computing device initiating the transaction an iFrame to handle input user input data on an information resource. The OTT can be used to tokenize the user input data. The OTT can be included in payment authorization requests sent to the payment managing system. The payment managing system can obtain payment authorization without the user payment data being shared with e-commerce host systems.
Tokenizing sensitive data
Some systems and/or methods are configured to receive sensitive data from a vendor, determine a token key for the vendor, and utilize a proprietary algorithm, based on the token key to generate a vendor-specific token that is associated with the sensitive data. A token identifier may be created that comprises data related to the token key sending the vendor-specific token and the token identifier to the vendor.
Secure token distribution
A method for utilizing a registration authority computer to facilitate a certificate signing request is provided. A registration authority computer may receive a certificate signing request associated with a token requestor. The registration authority computer may authenticate the identity of the token requestor and forward the certificate signing request to a certificate authority computer. A token requestor ID and a signed certificate may be provided by the certificate authority computer and forwarded to the token requestor. The token requestor ID may be utilized by the token requestor to generate digital signatures for subsequent token-based transactions.
Tokenizing a primary account number prior to transmission to a terminal
In some implementations, a transaction card may receive transaction data from a transaction terminal based on initiation of a transaction with the transaction terminal; generate a tokenized primary account number, for use with the transaction, based on the transaction data and an actual primary account number of the transaction card; and transmit the tokenized primary account number to the transaction terminal for processing the transaction.
System and method using interaction token
A communication device may receive input from a user and initiate generation of an interaction token in response. This interaction token can be used by the communication device in order search for a specific resource provider computer from among one or more resource provider computers, and to initiate a resource transfer between the user and a specific resource provider, mediated by a token provider computer.
System and method for biometric credit based on blockchain
An example method for performing concepts disclosed can include: obtaining a first authentication factor including first biometric data of a user; hashing the first authentication factor to create a first hash; registering the user with a digital credit system using the created first hash; obtaining a second authentication factor including second biometric data of the user; hashing the second authentication factor to create a second hash; comparing the first hash and the second hash; and proceeding the transaction based on the comparison.
A METHOD FOR MANAGING A VERIFIED DIGITAL IDENTITY
A method and a system for managing a verified digital identity of a user is disclosed. The method comprises receiving a verified digital identity for a user, the digital identity comprising user-data stored as data items; wherein each data item is certified as a verified data item. The method includes the following transactions: receiving a user-data consent from the user to enable one or more institutions, including a first institution, access to a selected group of the data items; receiving a user-data request from the first institution requesting access to user data from the digital identity, determining whether the first institution's request matches the user-data consent for enabling access to the selected group of data items, in accordance with a determination that the institution's user-data request matches the user-data consent for enabling access to the data items, granting the user data request, and providing access for the first institution to the selected group of data items.