G06Q20/38215

HYBRID TOKENIZATION FOR PUSH PAYMENTS

A method of performing a funds transfer includes receiving a request for a cryptogram and generating an authentication code. The authentication code is divided into a first code portion and a second code portion. The first code portion is transmitted to a user device. The second code portion is transmitted to a transaction originator. A request for transaction data is received, including both code portions. The authentication code is verified based on the two code portions. A cryptogram is generated and transmitted to the transaction originator.

SYSTEMS, METHODS, AND APPARATUS FOR UTILIZING FORWARD MARKET PRICING TO FACILITATE OPERATIONAL DECISIONS
20200379769 · 2020-12-03 ·

Systems, methods, and apparatus for utilizing forward market pricing to facilitate operational decisions are disclosed. An example method may include interpreting a compute resource utilization requirement for a task system, and interpreting a behavioral data source, comprising entity behavioral data for an entity associated with the task system. The method may also include forecasting a forward market price for a compute resource in response to the compute resource utilization requirement and the behavioral data source, and, in response to the forward market price, adjusting an operation of the task system or executing a transaction.

SYSTEMS, METHODS, AND APPARATUS FOR UTILIZING FORWARD MARKET PRICING TO FACILITATE OPERATIONAL DECISIONS
20200379770 · 2020-12-03 ·

Systems, methods, and apparatus for utilizing forward market pricing to facilitate operational decisions are disclosed. An example method may include interpreting a resource utilization requirement for a task system having at least one of a compute task, a network task, or a core task. The method may further include interpreting an automated agent behavioral data source to obtain behavioral data, and operating a machine to forecast a forward market value for a resource in response to the resource utilization requirement and the behavioral data. The method then includes, in response to the forecast of the forward market value for the resource, adjusting an operation of the task system or executing a transaction.

METHODS FOR RESOURCE ALLOCATION AND UTILIZATION BASED ON FORWARD MARKET PRICE FORECAST
20200379771 · 2020-12-03 ·

Methods for utilizing forward market pricing to facilitate operational decisions are disclosed. An example method may include interpreting a resource utilization requirement for a task system having at least one of a compute task, a network task, or a core task, and accessing an external provider to provide at least a portion of the compute task, the network task, or the core task. The method may also include interpreting a behavioral data source and operating a machine to forecast a forward market value for a resource in response to a remaining resource utilization requirement and the behavioral data source. The method may then include, in response to the forecast of the forward market value for the resource, adjusting an operation of the task system or executing a transaction.

Applications login using a mechanism relating sub-tokens to the quality of a master token

Methods and systems allow a user to log in to a device so that a number of apps become accessible on the device without the user repeatedly logging in to each different app as the user launches multiple apps. A mechanism of providing a master token with a quality score and providing sub-tokens for each app that can use the sub-token and the score quality to evaluate the level of security provided by the initial login allows each app to skip its own login process and provides a level of enhanced efficiency and convenience for the user. A method includes authenticating a user; creating a master token on the user device; creating a sub-token of the master token for an app launched on the device; the app skipping the login process of the app in response to the sub-token so that the app proceeds directly to validating a transaction.

Method and system for exchange of value or tokens between blockchain networks
10853772 · 2020-12-01 ·

A blockchain value transfer method comprising receiving from a client a transfer request to transfer value in a form of at least one of a cryptocurrency and a token, determining if the transfer request is intra-chain or inter-chain, intra-chain defining a combined sending and receiving blockchain network and inter-chain defining a sending blockchain network and a receiving blockchain network, transmitting to the client a response to the transfer request, the response comprising a raw transaction, receiving from the client a response to the raw transaction wherein a private key of a user is used to sign the raw transaction, defining a signed transaction, verifying a signature of the signed transaction and broadcasting the signed transaction to the combined sending and receiving blockchain network if the transaction request is intra-chain or to each of the sending blockchain network and the receiving blockchain network if the transaction request is inter-chain.

Methods and devices for protecting sensitive data of transaction activity based on smart contract in blockchain

Disclosed herein are methods, devices, and apparatuses, including computer programs stored on computer-readable media, for protecting sensitive data of a transaction activity based on a smart contract in a blockchain. One of the methods includes: receiving activity data for creating an account for the transaction activity from a user, the activity data including at least an identifier of the smart contract in the blockchain and an expiration time of the transaction activity; sending the activity data to an authentication server for requesting a digital certificate of the activity data, wherein the digital certificate stores the identifier of the smart contract, and an expiration time of the digital certificate is set to be the expiration time of the transaction activity; and causing the account for the transaction activity to be created after to receiving the digital certificate from the authentication server.

Document generation with dynamic watermarking

Techniques are described for generating and presenting a digital document for a transfer. A check service may generate the digital document based on provided check data. The digital document may be stored on a user device and presented to a recipient, for example through the display of the user device. The digital document may also be provided to the recipient in an email or other type of communication. The check service may generate a digital watermark to include on the digital document. The watermark may be unique to the particular document, and may be algorithmically generated based on data that is associated with the particular document, such as a serial identifier, a transaction identifier, an amount, a user identifier of the sender, etc. The digital watermark may be regenerated when the recipient presents the document for payment, to confirm document validity.

Secure authentication based on identity data stored in a contactless card

Systems, methods, articles of manufacture, and computer-readable media for secure authentication based on identity data stored in a contactless card associated with an account. An application may receive an indication specifying to perform an operation. The application may receive encrypted data from the card, the encrypted data based on a cryptographic algorithm, a customer identifier, and a private key. The application may receive an indication that the authentication server verified the encrypted data based on the private key for the card. The application may determine a type of data required to authorize the operation. The application may receive data comprising passport data or driver license data from the card. The application may determine that the data satisfies a rule for authorizing the operation and authorize performance of the operation based on the authentication server verifying the encrypted data and the data satisfying the at least one rule.

Blockchain-Based Secure Transaction Method, Electronic Device, System and Storage Medium

A method includes: a supervisor writes a digital certificate and a corresponding first public key into an intelligent contract of a blockchain corresponding to an asset type to be supervised, so that all institutions with asset accounts under the asset type can obtain the first public key of the supervisor through the digital certificate, so as to generate an additive homomorphic key for homomorphic encryption of the balance of an asset account; when checking the balance of a new account of a transactor, the supervisor obtains a public key in a public-private key pair corresponding to the new account, generates an additive homomorphic key based on a supervision private key corresponding to the supervisor and a predetermined key exchange protocol and the public key in the public-private key pair according to the key exchange protocol, and decrypts the encrypted balance of the new account, using the generated additive homomorphic key.