G06Q20/38215

Systems and Methods for Transaction Management in NFT-Directed Environments

Systems and techniques to facilitate transaction management in NFT-directed environments within an NFT platform are illustrated. One embodiment embeds an anchor into an application for utilizing tokens, wherein the anchor includes a verifier and an identifier unique to the application. The method verifies, using the verifier of the anchor, that a token is compatible with the application. The method imports the token into the application. The method associates the anchor with a lock, wherein the lock governs access to content of the token. The method identifies a completed transaction that changes access rights associated with the token, wherein the transaction is identified using at least one of information included in the anchor and information included in the lock. The method transmits, to a party to the transaction, a lock value, wherein the lock value, when detected by the lock, allows the party to access the token.

SYSTEM FOR STORE AND FORWARD IN POINT OF SALE TRANSACTIONS

Aspects described herein include a method (and associated system and computer program product) comprises receiving an amount of a transaction from a point of sale (POS) terminal, and receiving, at a payment terminal, one or more user inputs comprising payment presentation information for the transaction. The method further comprises communicating the payment presentation information to a payment processing service to complete processing of the transaction. The method further comprises determining that the payment presentation information is not received at the payment processing service, and in response, encrypting the payment presentation information and transmitting the encrypted payment presentation information from the payment terminal to an external device.

SYSTEMS AND METHODS FOR SECURE DIGITAL TRANSACTIONS
20230096124 · 2023-03-30 ·

Systems and methods for performing a transaction between a buyer and a seller using a secure transaction system are described herein. A buyer user device or a seller user device (it may be either) informs a secure server of a transaction amount, requests a transaction key from the secure server, and transports that transaction key to the other such user device. The other user device sends the transaction key and the transaction amount to the secure server to confirm the transaction. The use of session-based user identifiers at the buyer user device restricts the feasibility of inter-transaction analysis by unauthorized third parties. Further, the secure transaction system automatically calculates a credit relative to the present transaction to apply to a buyer relative balance account for the seller, which may accordingly be used by the buyer during a subsequent transaction with the seller, thereby incentivizing that future transaction.

DESTINATION ADDRESSING FOR TRANSACTIONS ASSOCIATED WITH A DISTRIBUTED LEDGER
20230036694 · 2023-02-02 ·

The present disclosure proposes computer implemented methods, devices and systems for implementing an addressing service for transactions associated with a distributed ledger, wherein an alias is provided for a client among one or more clients associated with the addressing service, the alias being specific to the client. The method comprises the steps of obtaining or accessing a plurality of seed words; for a given alias associated with a given client among the one or more clients, encoding the alias and applying a hash function to the encoded alias to obtain a hash value; extracting a first series from the hash value; and determining at least one seed word from the plurality of seed words based on the first series, the at least one seed word representing a code for the given alias.

SECURE PAYMENT TRANSACTIONS

A client comprising an application for secure payment transactions is provided. The application runs on a personal mobile communication device and the client accesses a service provided by a server, which includes a payment gateway. Various security measures are included in the client-server communication related to executing payment transactions in a secure environment.

SECURE POINT OF SALE (POS) OPERATIONS

Examples presented herein describe secure point of sale (POS) operations. One example is a method including receiving, at a mobile device, a communication associated with a custom tender payment for a secure transaction payment, where the mobile device includes a custom payment application configured for the secure transaction payment with a point of sale (POS) device. The method includes receiving account data associated with a user account selection for the custom tender payment for the secure transaction payment, transmitting an account signal including the account data, where when the account signal is transmitted to an integration server as part of the secure transaction payment, the account signal is not transmitted to the POS device, and receiving an authorization communication, where when the authorization communication is received by the mobile device from the integration server, the authorization communication is not communicated to the mobile device via the POS device.

DIGITAL INFRASTRUCTURE TO PERFORM MULTI-NETWORK CONNECTIONS

The current document discloses systems and methods that implement digital management of multi-network connections. When the digital infrastructure manager receives a client request for access to a service or service provider, the digital infrastructure manager issues a signed access token to the client, and the access token utilized in various ways when service requests are processed. The digital infrastructure manager then processes, transmits, and manages the request, response, and any additional actions required to satisfy the request including multiple and/or additional requests by the same or other clients.

LIGHT FIDELITY TRANSMISSION NETWORK SECURED WITH FRICTIONLESS AGENT-CENTRIC AUTHENTICATION DATA CHAINS
20220352983 · 2022-11-03 ·

Aspects of this disclosure relate to utilizing a 360-degree light source and frictionless authentication methods to provide access to a secure network and associated services. Data transmission is conducted via a light source that is also used to illuminate a location. An agent-centric method of frictionless data authentication and transfer is applied. The agent-centric authentication methods may be power efficient for use in connection with a mobile device having limited battery capacity and limited bandwidth.

MULTI-TIER TOKENIZATION WITH LONG TERM TOKEN
20220353257 · 2022-11-03 ·

Examples describe data security for communication systems. One example includes validating a user device using secure user data and generating a long term token for the user device, where the long term token is generated with a randomized unique token system. The method further includes receiving a transaction communication associated with a secure transaction, the transaction communication including the long term token, generating a transaction token that is different than the long term token for the transaction communication using the long term token from the transaction communication, and facilitating the secure transaction using the transaction token and the long term token.

Virtualization and secure processing of data

Systems, methods, and non-transient machine-interpretable data representing executable instruction sets and/or other products for the processing of data for the 5 secure creation, administration, manipulation, processing, and storage of electronic data useful in the processing of payment transactions and other secure data processes. In various aspects and embodiments the disclosure provides secure means for the authorization of sensitive and other data processes subject to controlled access. Such processes include, for example the creation, administration, 10 authorization, virtualization, storage, and other manipulation or processing of electronic data representing characteristics of, instructions for, and information associated with consumer, business, and other payment accounts, and other forms of secure payment elements, such as payment tokens; and data useful in processing transactions using such accounts and elements. Information associated with 15 particular payment means, such as accounts or payment tokens, can be stored, for example, in a data set, usually secure, sometimes referred to as a virtual or electronic wallet, or a secure payment token.