Patent classifications
G06Q20/38215
Systems and methods for verifying users, in connection with transactions using payment devices
Systems and methods for verifying users in connection with transactions using payment devices are disclosed. One exemplary method generally includes receiving a select command for an AID associated with a payment application from a terminal and, in response, initiating by a security chip of a payment device, a timer after power-up of the security chip by the terminal. The method also includes capturing a biometric of a user, at a biometric sensor, according to the payment application, and verifying, by the security chip, the captured biometric based on reference biometric data. The method further includes, when the timer is unexpired and the captured biometric is verified, appending a first value to a CVR and returning a first AFL to the terminal, and when the timer is expired, appending a different value to the CVR and returning a different AFL to the terminal.
System and method for digital asset transfer
Methods, systems, and apparatus, including computer programs encoded on computer storage media, for digital asset buyback. One of the methods includes: obtaining a request for buying back a digital asset from a first blockchain account, the request comprising a quantity of the digital asset; identifying, based on the request, a blockchain contract that is deployed on the blockchain and that corresponds to the digital asset; generating a blockchain transaction for transferring the quantity of the digital asset from the first blockchain account to a second blockchain account associated with digital asset buyback, wherein the blockchain contract comprises a restriction prohibiting transfer of the digital asset out of the second blockchain account; and sending, to a blockchain node for adding to the blockchain, the blockchain transaction for transferring the quantity of the digital asset from the first blockchain account to the second blockchain account.
SECURE PAYMENT TRANSACTIONS
A client comprising an application for secure payment transactions is provided. The application runs on a personal mobile communication device and the client accesses a service provided by a server, which includes a payment gateway. Various security measures are included in the client-server communication related to executing payment transactions in a secure environment.
ENCRYPTED AND AUTHENTICATED MESSAGE SERVICES
A system manages payments by an entity to its partners (suppliers, service providers, etc.) by providing an intermediary capability to disaggregate and regenerate payment orders using real time inputs from the payee. A single obligation may be split into different payments to different institutions and payment vehicles such as prepaid cards, countries, and currencies. An Al predictive function may reduce foreign currency transfers and their associated costs by recognizing intra-divisional, intracompany and intercompany assets and liabilities to allow in-country net settlements to be made prior to using a foreign currency transfer. When needed, foreign currency transfers may be aggregated to reduce the volume and velocity of those transfers. Tokenization of financial data and accounts may further protect activity between payors, payees, and financial institutions.
ZERO KNOWLEDGE BLOCKCHAIN ATTRIBUTION
A content publisher may transfer an impression token value to a user in response to the content publisher displaying an advertisement for a merchant to the user. The content publisher may record the transfer on a zero knowledge blockchain. The merchant may transfer a conversion token value to the user in response to the user making a purchase from the merchant. The merchant may record the transfer on the zero knowledge blockchain. The user may transfer the impression token value and the conversion token value to a measurement company. The measurement company may calculate attribution and lift results for the advertisement.
Method and apparatus for finding and accessing a vehicle fueling station, including an electric vehicle charging station
A control system and method are provided for a station to dispense fuel to a vehicle, including an electric vehicle, without requiring dedicated access to a communications network, with the advantage that authorization for fleet vehicles or individuals can be obtained from an access management system, using a portable, wireless device, such as a smart phone or a dashboard appliance. The authorization is wirelessly relayed to the station by the wireless device, to enable the dispensing of fuel. Subsequently, a log comprising the transaction is provided to the access management system, through the same or a different wireless, mobile computing device. The log may also report status and other events, such as load shedding.
SYSTEMS AND METHODS FOR LINKING HIGH-VALUE TOKENS USING A LOW-VALUE TOKEN
Embodiments include methods and systems for linking high-value tokens using a low-value token, comprising receiving, from an electronic data server, a first high-value token and a request for a low-value token, the first high-value token being associated with sensitive data associated with a user, and the low-value token being associated with a subset of the sensitive data associated with the user. The methods and systems further comprise providing the low-value token to the electronic data server, and receiving, from a second electronic data server, the low-value token and a request for a second high-value token, the low-value token having been provided to the second electronic data server by the electronic data server. The methods and systems further comprise generating a second high-value token associated with the sensitive data associated with the user, and providing the second high-value token to the second electronic data server.
PRIVATE ISSUANCE OF ASSETS AND APPLICATIONS THEREOF
Disclosed herein are system, method, and computer program product embodiments for issuing assets and/or asset tokens using zero-knowledge proofs (ZKPs). An issuance system may receive a command to issue an asset. The issuance system may determine that issuing the assets would not violate administrator-defined or network-defined rules that may govern the types of assets and/or the quantity of assets that the issuance system may issue. The issuance system may then issue the assets and generate a ZKP corresponding to the issuance and indicating adherence to the rules while concealing information related to the asset token, such as the types of assets and/or quantity of assets. The issuance system may publish the ZKP to a blockchain so that verifier nodes may confirm that the issuance system adhered to the rules while still preventing access to the underlying issuance information.
NETWORK PROVISIONING AND TOKENIZATION USING A REMOTE TERMINAL
A method of tokenizing sensitive data from a terminal device includes receiving, a connection request comprising a hardware serial number associated with a terminal device and validating the hardware serial number associated with the terminal device. The method includes sending a command to a terminal device that causes the terminal device to display a prompt for sensitive data associated with a user interacting with the terminal device and receiving an encrypted data packet from the terminal device. The encrypted data packet includes the sensitive data. The method includes sending the encrypted data packet to a gateway system for tokenization, receiving a token that represents the sensitive data, and providing the token to the terminal device.
REMOTE VENDING TECHNIQUES
Examples of the present disclosure describe systems and methods relating to remote vending techniques. In an example, a vending device stocks one or more products to dispense to a user. A user computing device is used to communicate with a vending platform. The vending platform causes the vending device to dispense a product to the user. Since the user interacts with the vending platform and, in some instances, confirms his or her proximity to the vending device, the vending platform is able to gather and validate user information relating to the user and/or the user device. For example, the vending platform may collect a phone number, an email address, a device type, and/or a user location. Thus, such information gathered by the vending platform is usable to contact the user in the future, identify leads, and/or determine whether the vending platform assisted in converting a lead into a customer, etc.