Patent classifications
G06Q20/38215
Systems and methods for e-certificate exchange and validation
Systems and methods described herein include first and second devices including one or more processors and memory, the first device being configured to purchase one or more certificates by a first process via one or more blockchain transactions. The second device may be in communication with the first device, and may be redeem the one or more certificates received by a second process via one or more blockchain transactions. The second device may exchange one or more codes to designate the one or more certificates as used on the first device. The system may include one or more servers in communication with the second device, and may be automatically generate a message containing updated redemption information of the one or more certificates when the updated redemption information has been stored in one or more databases, which may be in communication with the one or more servers.
System, method, and apparatus for securely transmitting data via a third-party webpage
Provided is a computer-implemented method for securely receiving data via a third-party webpage, including: generating configuration data in response to a request from a first system, the configuration data including a public key of a first key pair; digitally signing the configuration data based on a private key of a second key pair; transmitting the configuration data to the first system, the configuration data including code configured to facilitate the first system to embed a plurality of frames in a webpage, wherein the plurality of frames loads content from a domain that is independent from a domain that hosts the webpage; and verifying the configuration data based on a public key of the second key pair. The computer-implemented method may also include receiving, from a master frame of the plurality of frames, encrypted data. Systems and computer program products are also provided.
Data processing method, apparatus, and system
A data processing method, apparatus and system, for improving the security and accuracy in the data processing process. The method comprises: receiving target biometric information and verification password information of a target object sent by an acquisition institution server; recognizing, from registered biometric information of a plurality of objects, the registered biometric information matching the target biometric information; determining target account information of the target object according to the recognized registered biometric information; and sending a data processing request to a card issuing institution server corresponding to the target account information, the data processing request comprising the target account information and the verification password information, so that the card issuing institution server performs verification using the verification password information and performs data processing according to the target account information after the verification is passed.
Systems and methods for anonymous cryptocurrency transactions
Systems and methods for anonymous cryptocurrency transactions are disclosed. A method may include: receiving, from the electronic device associated with a sender of a cryptocurrency transaction, a zero-knowledge statement comprising a shuffled and anonymized list of participants comprising the sender, a receiver of the cryptocurrency transaction, and a plurality of decoy participants, a transfer amount, and a remaining balance, and a secret witness, wherein each participant is associated with an index; generating one-out-of-many proofs for the sender and the receiver based on their associated indices; generating a Basic Zether proof for the transfer amount and the remaining balance; conducting many-out-of-many proofs with parameters chosen for an anonymous payment setting; and constructing a zero-knowledge proof for the zero-knowledge statement. The sender sends an ordered list of the participants and the zero-knowledge proof to a verifier using the FiatShamir transform, and the verifier verifies the zero-knowledge proof.
Encapsulation of payment accounts with nested tokens
A method for encapsulating transaction instrument information in a transaction includes storing, in association with a first transaction and by a processor of the primary transaction processor server, payment data associated with a payment instrument used to settle a cost of a first transaction. The primary transaction processor server transmits the transaction data to a payment network processor. The primary transaction processor server receives an authorization package from the payment network processor that includes a cryptograph and a first network token. The processor of the primary transaction processor server generates a secondary token, and stores a correlation record to a computer-readable memory. The correlation record associates the secondary token to a second object stored by the primary transaction processor. The processor of the primary transaction processor server transmits a second transaction package including at least one of the network token and the secondary token to a merchant device.
SYSTEMS AND METHODS FOR VERIFYING USERS, IN CONNECTION WITH TRANSACTIONS USING PAYMENT DEVICES
Systems and methods for verifying users in connection with transactions are disclosed. One exemplary method includes, based on the payment card device being presented at a terminal, initiating, by a security chip of the payment card device, a timer and then based on the timer being unexpired, capturing, by a biometric sensor of the payment card device, a biometric image and verifying, by the security chip, the captured biometric image against reference biometric data stored the payment card device. The method also includes, based on the captured biometric image being verified, cooperating, by the security chip, with the terminal, to initiate a transaction to an account using a first account number specific to a biometric application of the payment card device.
Systems and methods for a transaction card having a cryptographic key
A method, apparatus, and system of activating and using a contactless card are disclosed. More particularly, a transaction card including a contactless enabled chip having payment information and identity information stored thereon, where the contactless enabled chip is configured to communicate the identity information to a mobile device via a contactless communication, and where the identity information comprises a cryptographic key, cryptographic token, or a digital certificate is disclosed.
BLOCKCHAIN METHODS, NODES, SYSTEMS AND PRODUCTS
Proposed is a scalable and computationally light approach to validating blockchains called the Catastrophic Dissent Mechanism (CDM). CDM uses anonymous actors who are free to join and leave the system as they please. The mechanism gives all actors strong incentives to behave honestly, both as individuals, and as members of coalitions who might benefit in compromising the integrity of the blockchain. As a result, CDM offers users Strategically Provable Security (SPS). CDM provides a foundation to create an ecosystem of federated chains which can share heterogeneous tokens using different business logic. As a result, new instances of chains can be created to serve as inexpensive, scalable platforms for a wide variety of blockchain applications and to provide a path for existing instances to be upgraded or altered without the use of hard forks or breaking the rule that code is law.
INTEROPERABLE MOBILE-INITIATED TRANSACTIONS WITH DYNAMIC AUTHENTICATION
A transaction is pre-staged by providing transaction preferences, such as a financial instrument, a transaction type, and a transaction amount, to a user device. The user device captures a visual code at a terminal, such as an ATM. The visual code includes terminal attributes, including a signed hash and call-back URI. The user device authenticates the visual code using the signed hash and requests the transaction through the issuer server. The issuer server creates and sends the card data to the call-back URI. The terminal uses the card data to create a transaction request it routes to through its acquirer server.
SYSTEMS AND METHODS FOR FACILITATING MOBILE PAYMENT TRANSACTIONS WITH A PLURALITY OF MERCHANTS
Systems and methods for facilitating mobile payment transactions with a plurality of vendors is described herein. An example method includes maintaining consumer information. The consumer information includes a plurality of respective account profiles associated with a plurality of consumers. The method also includes transmitting vendor content associated with a first vendor to a user's mobile computing device, and transmitting vendor content associated with a second vendor to the user's mobile computing device. The method further includes facilitating a plurality of mobile payment transactions with the user on behalf of the first and second vendors using a respective account profile associated with the user.